0x0, 0x0, 0x0, 0xffffffffeffffffc, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x31810}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r6) fstat(r6, &(0x7f0000000640)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r7, 0x0, 0x0) 08:43:46 executing program 0: unshare(0x20600) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fremovexattr(r0, &(0x7f0000000140)=@known='system.posix_acl_access\x00') 08:43:46 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) mmap(&(0x7f0000600000/0x4000)=nil, 0x4000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000000)={&(0x7f0000600000/0x1000)=nil, 0x1000}) [ 438.744941][ T26] audit: type=1804 audit(1568364226.608:94): pid=19047 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir979035643/syzkaller.8AO95N/431/bus" dev="sda1" ino=17457 res=1 08:43:46 executing program 1: pipe(&(0x7f00000003c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000000000/0x2000)=nil], &(0x7f00000001c0)=[0x1], &(0x7f0000000200), 0x0) symlink(&(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000001c0)='./file0\x00') 08:43:46 executing program 0: unshare(0x20600) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fremovexattr(r0, &(0x7f0000000140)=@known='system.posix_acl_access\x00') 08:43:46 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x14102, 0x0) ioctl$KVM_SET_CPUID2(0xffffffffffffffff, 0x4008ae90, &(0x7f0000000280)=ANY=[@ANYBLOB]) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) msgget$private(0x0, 0x10) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r2, 0x0) write$P9_RWALK(r2, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r2, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r2, r3) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) write$P9_RWALK(r4, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, 0xffffffffffffffff, 0x0) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r4, r5) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000180)={{{@in6=@empty, @in=@multicast2}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f0000000280)=0xe8) getresgid(0x0, &(0x7f0000000240), 0x0) stat(0x0, &(0x7f00000005c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=0x3, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x6, 0x2}, &(0x7f0000000140)=0x4, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffeffffffc, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x31810}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r6) fstat(r6, &(0x7f0000000640)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r7, 0x0, 0x0) [ 439.025256][ T26] audit: type=1804 audit(1568364226.888:95): pid=19064 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir674808152/syzkaller.tAlbc8/488/bus" dev="sda1" ino=17823 res=1 08:43:47 executing program 0: setrlimit(0x2, &(0x7f0000000100)) pkey_mprotect(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0x3, 0xffffffffffffffff) 08:43:47 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x14102, 0x0) ioctl$KVM_SET_CPUID2(0xffffffffffffffff, 0x4008ae90, &(0x7f0000000280)=ANY=[@ANYBLOB]) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) msgget$private(0x0, 0x10) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r2, 0x0) write$P9_RWALK(r2, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r2, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r2, r3) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) write$P9_RWALK(r4, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, 0xffffffffffffffff, 0x0) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r4, r5) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000180)={{{@in6=@empty, @in=@multicast2}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f0000000280)=0xe8) getresgid(0x0, &(0x7f0000000240), 0x0) stat(0x0, &(0x7f00000005c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=0x3, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x6, 0x2}, &(0x7f0000000140)=0x4, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffeffffffc, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x31810}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r6) fstat(r6, &(0x7f0000000640)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r7, 0x0, 0x0) 08:43:47 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x14102, 0x0) ioctl$KVM_SET_CPUID2(0xffffffffffffffff, 0x4008ae90, &(0x7f0000000280)=ANY=[@ANYBLOB]) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) msgget$private(0x0, 0x10) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r2, 0x0) write$P9_RWALK(r2, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r2, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r2, r3) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) write$P9_RWALK(r4, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, 0xffffffffffffffff, 0x0) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r4, r5) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000180)={{{@in6=@empty, @in=@multicast2}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f0000000280)=0xe8) getresgid(0x0, &(0x7f0000000240), 0x0) stat(0x0, &(0x7f00000005c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=0x3, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x6, 0x2}, &(0x7f0000000140)=0x4, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffeffffffc, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x31810}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r6) fstat(r6, &(0x7f0000000640)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r7, 0x0, 0x0) 08:43:47 executing program 1: pipe(&(0x7f00000003c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000000000/0x2000)=nil], &(0x7f00000001c0)=[0x1], &(0x7f0000000200), 0x0) symlink(&(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000001c0)='./file0\x00') [ 439.401972][T19087] mmap: syz-executor.0 (19087): VmData 18550784 exceed data ulimit 0. Update limits or use boot option ignore_rlimit_data. 08:43:47 executing program 0: setrlimit(0x2, &(0x7f0000000100)) pkey_mprotect(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0x3, 0xffffffffffffffff) 08:43:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x8000001000008912, &(0x7f0000000000)="11dca505ba583bcb7bf070") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000080)={0x11, @local, 0x0, 0x0, 'wrr\x00', 0x2, 0x55e, 0x5f}, 0x2c) [ 439.642873][ T26] audit: type=1804 audit(1568364227.508:96): pid=19083 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir979035643/syzkaller.8AO95N/432/bus" dev="sda1" ino=17521 res=1 [ 439.734150][T19099] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xdfb/0xee0 08:43:47 executing program 1: pipe(&(0x7f00000003c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000000000/0x2000)=nil], &(0x7f00000001c0)=[0x1], &(0x7f0000000200), 0x0) symlink(&(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000001c0)='./file0\x00') [ 439.810165][T19101] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xdfb/0xee0 08:43:47 executing program 0: setrlimit(0x2, &(0x7f0000000100)) pkey_mprotect(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0x3, 0xffffffffffffffff) 08:43:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x8000001000008912, &(0x7f0000000000)="11dca505ba583bcb7bf070") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000080)={0x11, @local, 0x0, 0x0, 'wrr\x00', 0x2, 0x55e, 0x5f}, 0x2c) 08:43:47 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r0, 0x400, 0x0) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file1\x00') 08:43:48 executing program 0: setrlimit(0x2, &(0x7f0000000100)) pkey_mprotect(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0x3, 0xffffffffffffffff) [ 440.127584][T19111] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xdfb/0xee0 08:43:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x8000001000008912, &(0x7f0000000000)="11dca505ba583bcb7bf070") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000080)={0x11, @local, 0x0, 0x0, 'wrr\x00', 0x2, 0x55e, 0x5f}, 0x2c) 08:43:48 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)="2f0000001c0005c5ffffff000d000000020000000b000000ec0091c913000180f0ffffeb", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGSKNS(r1, 0x894c, 0x0) write(0xffffffffffffffff, &(0x7f00000000c0)="2400000058001f03ff07f4f9002304000a04f51108000100030100020800038005000000", 0x24) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) 08:43:48 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r0, 0x400, 0x0) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file1\x00') 08:43:48 executing program 1: pipe(&(0x7f00000003c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000000000/0x2000)=nil], &(0x7f00000001c0)=[0x1], &(0x7f0000000200), 0x0) symlink(&(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000001c0)='./file0\x00') 08:43:48 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x28001) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x47, 0x2}, @ramp}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$evdev(r0, &(0x7f0000000040)=[{}, {}], 0x52a) 08:43:48 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000380)={0xaa, 0x28}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000280)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) madvise(&(0x7f0000011000/0xf000)=nil, 0xf000, 0x4) creat(&(0x7f0000000480)='./bus\x00', 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) read(r0, &(0x7f0000000040)=""/173, 0xad) [ 440.399985][T19122] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xdfb/0xee0 08:43:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x8000001000008912, &(0x7f0000000000)="11dca505ba583bcb7bf070") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000080)={0x11, @local, 0x0, 0x0, 'wrr\x00', 0x2, 0x55e, 0x5f}, 0x2c) 08:43:48 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r0, 0x400, 0x0) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file1\x00') 08:43:48 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000380)={0xaa, 0x28}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000280)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) madvise(&(0x7f0000011000/0xf000)=nil, 0xf000, 0x4) creat(&(0x7f0000000480)='./bus\x00', 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) read(r0, &(0x7f0000000040)=""/173, 0xad) 08:43:48 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x28001) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x47, 0x2}, @ramp}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$evdev(r0, &(0x7f0000000040)=[{}, {}], 0x52a) 08:43:48 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)="2f0000001c0005c5ffffff000d000000020000000b000000ec0091c913000180f0ffffeb", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGSKNS(r1, 0x894c, 0x0) write(0xffffffffffffffff, &(0x7f00000000c0)="2400000058001f03ff07f4f9002304000a04f51108000100030100020800038005000000", 0x24) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) 08:43:48 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000380)={0xaa, 0x28}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000280)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) madvise(&(0x7f0000011000/0xf000)=nil, 0xf000, 0x4) creat(&(0x7f0000000480)='./bus\x00', 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) read(r0, &(0x7f0000000040)=""/173, 0xad) [ 440.770041][T19145] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xdfb/0xee0 08:43:48 executing program 4: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x18}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000440)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb0100180006008456c37881d0bb3e2c258b0685079f"], 0x0, 0x17}, 0x20) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 08:43:48 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r0, 0x400, 0x0) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file1\x00') 08:43:48 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x28001) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x47, 0x2}, @ramp}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$evdev(r0, &(0x7f0000000040)=[{}, {}], 0x52a) 08:43:48 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000380)={0xaa, 0x28}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000280)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) madvise(&(0x7f0000011000/0xf000)=nil, 0xf000, 0x4) creat(&(0x7f0000000480)='./bus\x00', 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) read(r0, &(0x7f0000000040)=""/173, 0xad) 08:43:49 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)="2f0000001c0005c5ffffff000d000000020000000b000000ec0091c913000180f0ffffeb", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGSKNS(r1, 0x894c, 0x0) write(0xffffffffffffffff, &(0x7f00000000c0)="2400000058001f03ff07f4f9002304000a04f51108000100030100020800038005000000", 0x24) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 441.143601][T19162] device nr0 entered promiscuous mode 08:43:49 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000380)={0xaa, 0x28}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000280)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) madvise(&(0x7f0000011000/0xf000)=nil, 0xf000, 0x4) creat(&(0x7f0000000480)='./bus\x00', 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) read(r0, &(0x7f0000000040)=""/173, 0xad) 08:43:49 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[], 0xfffffed5) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-ssse3\x00'}, 0x5a) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r4, 0x0, 0x1ffffd, 0x0) 08:43:49 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000380)={0xaa, 0x28}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000280)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) madvise(&(0x7f0000011000/0xf000)=nil, 0xf000, 0x4) creat(&(0x7f0000000480)='./bus\x00', 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) read(r0, &(0x7f0000000040)=""/173, 0xad) 08:43:49 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000380)={0xaa, 0x28}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000280)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) madvise(&(0x7f0000011000/0xf000)=nil, 0xf000, 0x4) creat(&(0x7f0000000480)='./bus\x00', 0x0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) read(r0, &(0x7f0000000040)=""/173, 0xad) [ 441.476825][ T26] kauditd_printk_skb: 6 callbacks suppressed [ 441.476839][ T26] audit: type=1804 audit(1568364229.338:103): pid=19183 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir096477955/syzkaller.RhzUt3/219/bus" dev="sda1" ino=17846 res=1 08:43:49 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)="2f0000001c0005c5ffffff000d000000020000000b000000ec0091c913000180f0ffffeb", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGSKNS(r1, 0x894c, 0x0) write(0xffffffffffffffff, &(0x7f00000000c0)="2400000058001f03ff07f4f9002304000a04f51108000100030100020800038005000000", 0x24) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 441.711548][ T26] audit: type=1804 audit(1568364229.578:104): pid=19192 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir860262706/syzkaller.nj9VO6/224/bus" dev="sda1" ino=17844 res=1 08:43:49 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000180), 0x0) open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) waitid(0x1, 0x0, &(0x7f0000000280), 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x1) r1 = socket(0x0, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000140)) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSLCKTRMIOS(r3, 0x5457, &(0x7f0000000040)) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x2) [ 441.787387][ T26] audit: type=1804 audit(1568364229.648:105): pid=19194 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir096477955/syzkaller.RhzUt3/220/bus" dev="sda1" ino=17814 res=1 08:43:49 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r1, &(0x7f00000000c0)={0x9, @null=' \x00'}, 0x12) dup2(r0, r1) [ 442.018315][T19170] device nr0 entered promiscuous mode 08:43:50 executing program 4: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x18}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000440)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb0100180006008456c37881d0bb3e2c258b0685079f"], 0x0, 0x17}, 0x20) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 08:43:50 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r1, &(0x7f00000000c0)={0x9, @null=' \x00'}, 0x12) dup2(r0, r1) 08:43:50 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x28001) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x47, 0x2}, @ramp}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$evdev(r0, &(0x7f0000000040)=[{}, {}], 0x52a) 08:43:50 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000180), 0x0) open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) waitid(0x1, 0x0, &(0x7f0000000280), 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x1) r1 = socket(0x0, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000140)) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSLCKTRMIOS(r3, 0x5457, &(0x7f0000000040)) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x2) 08:43:50 executing program 3: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r1, &(0x7f00000000c0)={0x9, @null=' \x00'}, 0x12) dup2(r0, r1) 08:43:50 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000000)=0x6) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r0, r1, 0x0) 08:43:50 executing program 3: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r1, &(0x7f00000000c0)={0x9, @null=' \x00'}, 0x12) dup2(r0, r1) 08:43:50 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r1, &(0x7f00000000c0)={0x9, @null=' \x00'}, 0x12) dup2(r0, r1) 08:43:50 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000000)=0x6) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r0, r1, 0x0) [ 442.578269][T19227] device nr0 entered promiscuous mode 08:43:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000000)=0x6) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r0, r1, 0x0) 08:43:50 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r1, &(0x7f00000000c0)={0x9, @null=' \x00'}, 0x12) dup2(r0, r1) 08:43:50 executing program 3: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r1, &(0x7f00000000c0)={0x9, @null=' \x00'}, 0x12) dup2(r0, r1) 08:43:51 executing program 4: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x18}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000440)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb0100180006008456c37881d0bb3e2c258b0685079f"], 0x0, 0x17}, 0x20) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 08:43:51 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000180), 0x0) open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) waitid(0x1, 0x0, &(0x7f0000000280), 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x1) r1 = socket(0x0, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000140)) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSLCKTRMIOS(r3, 0x5457, &(0x7f0000000040)) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x2) 08:43:51 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000100)='/dev/uinput\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r1, 0x0) write$vnet(r0, &(0x7f0000000080)={0x1, {0x0, 0x0, 0x0}}, 0x68) 08:43:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000140)={@dev={0xfe, 0x80, [0x0, 0x1000000]}, 0x0, 0x0, 0xff, 0x1}, 0x21) 08:43:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000000)=0x6) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r0, r1, 0x0) 08:43:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000000)=0x6) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r0, r1, 0x0) 08:43:51 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000100)='/dev/uinput\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r1, 0x0) write$vnet(r0, &(0x7f0000000080)={0x1, {0x0, 0x0, 0x0}}, 0x68) 08:43:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000000)=0x6) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r0, r1, 0x0) 08:43:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000140)={@dev={0xfe, 0x80, [0x0, 0x1000000]}, 0x0, 0x0, 0xff, 0x1}, 0x21) 08:43:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000000)=0x6) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r0, r1, 0x0) [ 443.412450][T19269] device nr0 entered promiscuous mode 08:43:51 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000100)='/dev/uinput\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r1, 0x0) write$vnet(r0, &(0x7f0000000080)={0x1, {0x0, 0x0, 0x0}}, 0x68) 08:43:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000140)={@dev={0xfe, 0x80, [0x0, 0x1000000]}, 0x0, 0x0, 0xff, 0x1}, 0x21) 08:43:51 executing program 4: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x18}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000440)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb0100180006008456c37881d0bb3e2c258b0685079f"], 0x0, 0x17}, 0x20) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 08:43:51 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000180), 0x0) open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) waitid(0x1, 0x0, &(0x7f0000000280), 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x1) r1 = socket(0x0, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{}], 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000140)) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSLCKTRMIOS(r3, 0x5457, &(0x7f0000000040)) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x2) 08:43:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000140)={@dev={0xfe, 0x80, [0x0, 0x1000000]}, 0x0, 0x0, 0xff, 0x1}, 0x21) 08:43:51 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000100)='/dev/uinput\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r1, 0x0) write$vnet(r0, &(0x7f0000000080)={0x1, {0x0, 0x0, 0x0}}, 0x68) 08:43:51 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e0000003200050ad25a80648c6356c10224fc00120000000a000a00053582c1b0acea8b09000180feff0000d1bd", 0x2e}], 0x1}, 0x0) 08:43:51 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) listen(r0, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89eb, &(0x7f0000000000)) 08:43:51 executing program 3: r0 = creat(&(0x7f0000000340)='./file0\x00', 0x0) clone(0x40080000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) sync() [ 444.062005][T19310] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 08:43:52 executing program 0: syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppoe(0x18, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 444.139875][T19311] device nr0 entered promiscuous mode [ 444.156244][T19313] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 08:43:52 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) listen(r0, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89eb, &(0x7f0000000000)) [ 444.292214][T19317] EXT4-fs warning: 1 callbacks suppressed [ 444.292230][T19317] EXT4-fs warning (device sda1): ext4_group_add:1644: No reserved GDT blocks, can't resize 08:43:52 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) listen(r0, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89eb, &(0x7f0000000000)) [ 444.381015][T19325] EXT4-fs warning (device sda1): ext4_group_add:1644: No reserved GDT blocks, can't resize 08:43:52 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e0000003200050ad25a80648c6356c10224fc00120000000a000a00053582c1b0acea8b09000180feff0000d1bd", 0x2e}], 0x1}, 0x0) 08:43:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@ipv6_newaddr={0x2c, 0x14, 0x205, 0x0, 0x0, {0x2}, [@IFA_LOCAL={0x14, 0x2, @local}]}, 0x2c}}, 0x0) [ 444.559951][T19333] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 444.862497][T19337] netlink: 'syz-executor.1': attribute type 2 has an invalid length. 08:43:52 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) listen(r0, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89eb, &(0x7f0000000000)) 08:43:52 executing program 3: r0 = creat(&(0x7f0000000340)='./file0\x00', 0x0) clone(0x40080000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) sync() 08:43:52 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e0000003200050ad25a80648c6356c10224fc00120000000a000a00053582c1b0acea8b09000180feff0000d1bd", 0x2e}], 0x1}, 0x0) 08:43:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@ipv6_newaddr={0x2c, 0x14, 0x205, 0x0, 0x0, {0x2}, [@IFA_LOCAL={0x14, 0x2, @local}]}, 0x2c}}, 0x0) 08:43:52 executing program 4: r0 = creat(&(0x7f0000000340)='./file0\x00', 0x0) clone(0x40080000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) sync() [ 444.995967][T19344] EXT4-fs warning (device sda1): ext4_group_add:1644: No reserved GDT blocks, can't resize [ 445.022335][T19343] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 08:43:52 executing program 5: r0 = creat(&(0x7f0000000340)='./file0\x00', 0x0) clone(0x40080000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) sync() [ 445.040637][T19350] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 445.048447][T19352] EXT4-fs warning (device sda1): ext4_group_add:1644: No reserved GDT blocks, can't resize 08:43:53 executing program 3: r0 = creat(&(0x7f0000000340)='./file0\x00', 0x0) clone(0x40080000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) sync() [ 445.173440][T19356] EXT4-fs warning (device sda1): ext4_group_add:1644: No reserved GDT blocks, can't resize 08:43:53 executing program 4: r0 = creat(&(0x7f0000000340)='./file0\x00', 0x0) clone(0x40080000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) sync() 08:43:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@ipv6_newaddr={0x2c, 0x14, 0x205, 0x0, 0x0, {0x2}, [@IFA_LOCAL={0x14, 0x2, @local}]}, 0x2c}}, 0x0) 08:43:53 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e0000003200050ad25a80648c6356c10224fc00120000000a000a00053582c1b0acea8b09000180feff0000d1bd", 0x2e}], 0x1}, 0x0) 08:43:53 executing program 0: syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppoe(0x18, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 08:43:53 executing program 5: r0 = creat(&(0x7f0000000340)='./file0\x00', 0x0) clone(0x40080000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) sync() [ 445.328032][T19365] EXT4-fs warning (device sda1): ext4_group_add:1644: No reserved GDT blocks, can't resize [ 445.379049][T19371] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 445.411210][T19372] EXT4-fs warning (device sda1): ext4_group_add:1644: No reserved GDT blocks, can't resize 08:43:53 executing program 5: r0 = creat(&(0x7f0000000340)='./file0\x00', 0x0) clone(0x40080000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) sync() [ 445.444694][T19375] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 08:43:53 executing program 3: r0 = creat(&(0x7f0000000340)='./file0\x00', 0x0) clone(0x40080000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) sync() 08:43:53 executing program 4: r0 = creat(&(0x7f0000000340)='./file0\x00', 0x0) clone(0x40080000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) sync() 08:43:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@ipv6_newaddr={0x2c, 0x14, 0x205, 0x0, 0x0, {0x2}, [@IFA_LOCAL={0x14, 0x2, @local}]}, 0x2c}}, 0x0) [ 445.610430][T19388] EXT4-fs warning (device sda1): ext4_group_add:1644: No reserved GDT blocks, can't resize 08:43:53 executing program 5: r0 = socket$caif_seqpacket(0x25, 0x5, 0x0) sendto(r0, 0x0, 0x0, 0xee90e5aa9e11f77f, 0x0, 0x0) [ 445.724172][T19397] EXT4-fs warning (device sda1): ext4_group_add:1644: No reserved GDT blocks, can't resize [ 445.728664][T19400] netlink: 'syz-executor.1': attribute type 2 has an invalid length. 08:43:53 executing program 2: r0 = socket(0x15, 0x80005, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) 08:43:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x31, &(0x7f0000000080)={0x0, 'bridge0\x00'}, 0x18) 08:43:53 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0xfffff9fffff3ffa7, &(0x7f0000000140)) 08:43:53 executing program 2: r0 = socket(0x15, 0x80005, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) 08:43:53 executing program 5: r0 = socket$caif_seqpacket(0x25, 0x5, 0x0) sendto(r0, 0x0, 0x0, 0xee90e5aa9e11f77f, 0x0, 0x0) 08:43:54 executing program 0: syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppoe(0x18, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 08:43:54 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x19, 0x4, &(0x7f00000020c0)=ANY=[@ANYBLOB="1800000000000000000000000000000079110000000000009500000000000000ec9ac6fa8d25294013684a23600edaec56cb0600f2c7fd4926d395d8919b5d3fe4112348e709735a6b69f9e9ef9565c85cadf4b404182858792747b0b2394d41197b4c14bcc3f0cb912da94f2871a249de472a1977645440441eddd29f30ec22634dc8ee52261c74dd5c646964213b90b3fe48edb67e96e9e9c0a184227f00526d4059781f7d09356f1ed2c1bd477d43bc08f33ae06b1b6f2a2bb64b0c24af08f482fd9b398c2246c4f9ee73977848c25f5f16898cdcd7b9aa1760ea1842a460d5202c313d5397cb28ae8ec415dd036e621fbd62fe61fa62b6aa5c036447364f60b75cade7e9bea598dffeff240e9439c629b16ed40965a499fc2dc1d9f8e0ce1d45b0ce26f086d557c2a65b2a85a07675155db28f9f794e44ea151c22a23a84e28d49f607d1b188f17a045dadb6849fd2ae359e88f768e2fd304a400f0f5a1cd14ef4a008cf9ac316"], &(0x7f0000000100)='\x05\x00\x00\x00', 0x2, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x15, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 08:43:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x31, &(0x7f0000000080)={0x0, 'bridge0\x00'}, 0x18) 08:43:54 executing program 5: r0 = socket$caif_seqpacket(0x25, 0x5, 0x0) sendto(r0, 0x0, 0x0, 0xee90e5aa9e11f77f, 0x0, 0x0) 08:43:54 executing program 2: r0 = socket(0x15, 0x80005, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) 08:43:54 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0xfffff9fffff3ffa7, &(0x7f0000000140)) 08:43:54 executing program 5: r0 = socket$caif_seqpacket(0x25, 0x5, 0x0) sendto(r0, 0x0, 0x0, 0xee90e5aa9e11f77f, 0x0, 0x0) 08:43:54 executing program 2: r0 = socket(0x15, 0x80005, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) 08:43:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x31, &(0x7f0000000080)={0x0, 'bridge0\x00'}, 0x18) 08:43:54 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0xfffff9fffff3ffa7, &(0x7f0000000140)) 08:43:54 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x19, 0x4, &(0x7f00000020c0)=ANY=[@ANYBLOB="1800000000000000000000000000000079110000000000009500000000000000ec9ac6fa8d25294013684a23600edaec56cb0600f2c7fd4926d395d8919b5d3fe4112348e709735a6b69f9e9ef9565c85cadf4b404182858792747b0b2394d41197b4c14bcc3f0cb912da94f2871a249de472a1977645440441eddd29f30ec22634dc8ee52261c74dd5c646964213b90b3fe48edb67e96e9e9c0a184227f00526d4059781f7d09356f1ed2c1bd477d43bc08f33ae06b1b6f2a2bb64b0c24af08f482fd9b398c2246c4f9ee73977848c25f5f16898cdcd7b9aa1760ea1842a460d5202c313d5397cb28ae8ec415dd036e621fbd62fe61fa62b6aa5c036447364f60b75cade7e9bea598dffeff240e9439c629b16ed40965a499fc2dc1d9f8e0ce1d45b0ce26f086d557c2a65b2a85a07675155db28f9f794e44ea151c22a23a84e28d49f607d1b188f17a045dadb6849fd2ae359e88f768e2fd304a400f0f5a1cd14ef4a008cf9ac316"], &(0x7f0000000100)='\x05\x00\x00\x00', 0x2, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x15, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 08:43:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca5055e62cfe47bf070") r1 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x4, 0x4) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x380000, @ipv4}, 0x1c) 08:43:55 executing program 0: syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppoe(0x18, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 08:43:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x31, &(0x7f0000000080)={0x0, 'bridge0\x00'}, 0x18) 08:43:55 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETZCNT(0x0, 0x0, 0xc, 0x0) 08:43:55 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0xfffff9fffff3ffa7, &(0x7f0000000140)) 08:43:55 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x19, 0x4, &(0x7f00000020c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='\x05\x00\x00\x00', 0x2, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x15, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 08:43:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca5055e62cfe47bf070") r1 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x4, 0x4) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x380000, @ipv4}, 0x1c) 08:43:55 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x19, 0x4, &(0x7f00000020c0)=ANY=[@ANYBLOB="1800000000000000000000000000000079110000000000009500000000000000ec9ac6fa8d25294013684a23600edaec56cb0600f2c7fd4926d395d8919b5d3fe4112348e709735a6b69f9e9ef9565c85cadf4b404182858792747b0b2394d41197b4c14bcc3f0cb912da94f2871a249de472a1977645440441eddd29f30ec22634dc8ee52261c74dd5c646964213b90b3fe48edb67e96e9e9c0a184227f00526d4059781f7d09356f1ed2c1bd477d43bc08f33ae06b1b6f2a2bb64b0c24af08f482fd9b398c2246c4f9ee73977848c25f5f16898cdcd7b9aa1760ea1842a460d5202c313d5397cb28ae8ec415dd036e621fbd62fe61fa62b6aa5c036447364f60b75cade7e9bea598dffeff240e9439c629b16ed40965a499fc2dc1d9f8e0ce1d45b0ce26f086d557c2a65b2a85a07675155db28f9f794e44ea151c22a23a84e28d49f607d1b188f17a045dadb6849fd2ae359e88f768e2fd304a400f0f5a1cd14ef4a008cf9ac316"], &(0x7f0000000100)='\x05\x00\x00\x00', 0x2, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x15, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 08:43:55 executing program 4: mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x200000c, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_UNREGISTER(r0, 0xc020aa04, &(0x7f0000007ffc)={&(0x7f0000006000/0x1000)=nil, 0x1000}) 08:43:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca5055e62cfe47bf070") r1 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x4, 0x4) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x380000, @ipv4}, 0x1c) 08:43:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) r2 = epoll_create1(0x0) dup2(r2, r1) 08:43:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) 08:43:55 executing program 4: mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x200000c, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_UNREGISTER(r0, 0xc020aa04, &(0x7f0000007ffc)={&(0x7f0000006000/0x1000)=nil, 0x1000}) 08:43:55 executing program 4: mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x200000c, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_UNREGISTER(r0, 0xc020aa04, &(0x7f0000007ffc)={&(0x7f0000006000/0x1000)=nil, 0x1000}) 08:43:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) r2 = epoll_create1(0x0) dup2(r2, r1) 08:43:55 executing program 1: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f0000000000)="a2e6fa9a", 0x31c) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) sendto$inet6(r0, &(0x7f0000000140)="ce0410000013f9ff00911efc0fb35c02630dffffff215963e1b24aab877b2b345ed9cc0542607d853096bd845011399e970800d8fcb3f6217eb878cd015763b1ec71", 0x42, 0x0, 0x0, 0x0) 08:43:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca5055e62cfe47bf070") r1 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x4, 0x4) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x380000, @ipv4}, 0x1c) 08:43:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) 08:43:55 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x1bc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xe, 0x0, &(0x7f0000000280)="20cf4d411d520bdfae1c3821271c", 0x0}, 0x28) 08:43:55 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x20000000000000) 08:43:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) r2 = epoll_create1(0x0) dup2(r2, r1) 08:43:56 executing program 4: mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x200000c, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_UNREGISTER(r0, 0xc020aa04, &(0x7f0000007ffc)={&(0x7f0000006000/0x1000)=nil, 0x1000}) 08:43:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) 08:43:56 executing program 1: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f0000000000)="a2e6fa9a", 0x31c) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) sendto$inet6(r0, &(0x7f0000000140)="ce0410000013f9ff00911efc0fb35c02630dffffff215963e1b24aab877b2b345ed9cc0542607d853096bd845011399e970800d8fcb3f6217eb878cd015763b1ec71", 0x42, 0x0, 0x0, 0x0) 08:43:56 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x1bc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xe, 0x0, &(0x7f0000000280)="20cf4d411d520bdfae1c3821271c", 0x0}, 0x28) 08:43:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) r2 = epoll_create1(0x0) dup2(r2, r1) 08:43:56 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x20000000000000) 08:43:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) 08:43:56 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=@gettaction={0x20, 0x32, 0x201, 0x0, 0x0, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x2}}]}, 0x20}}, 0x0) 08:43:56 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x1bc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xe, 0x0, &(0x7f0000000280)="20cf4d411d520bdfae1c3821271c", 0x0}, 0x28) 08:43:56 executing program 1: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f0000000000)="a2e6fa9a", 0x31c) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) sendto$inet6(r0, &(0x7f0000000140)="ce0410000013f9ff00911efc0fb35c02630dffffff215963e1b24aab877b2b345ed9cc0542607d853096bd845011399e970800d8fcb3f6217eb878cd015763b1ec71", 0x42, 0x0, 0x0, 0x0) 08:43:56 executing program 3: r0 = socket(0x15, 0x80005, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) 08:43:56 executing program 2: syz_emit_ethernet(0x10, &(0x7f0000000000)={@local, @dev, [{[], {0x8864}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @multicast1}, @icmp=@address_reply={0x44, 0x10}}}}}, 0x0) 08:43:56 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=@gettaction={0x20, 0x32, 0x201, 0x0, 0x0, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x2}}]}, 0x20}}, 0x0) 08:43:56 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x20000000000000) 08:43:56 executing program 1: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f0000000000)="a2e6fa9a", 0x31c) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) sendto$inet6(r0, &(0x7f0000000140)="ce0410000013f9ff00911efc0fb35c02630dffffff215963e1b24aab877b2b345ed9cc0542607d853096bd845011399e970800d8fcb3f6217eb878cd015763b1ec71", 0x42, 0x0, 0x0, 0x0) 08:43:56 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x1bc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xe, 0x0, &(0x7f0000000280)="20cf4d411d520bdfae1c3821271c", 0x0}, 0x28) 08:43:56 executing program 3: r0 = socket(0x15, 0x80005, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) 08:43:56 executing program 2: syz_emit_ethernet(0x10, &(0x7f0000000000)={@local, @dev, [{[], {0x8864}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @multicast1}, @icmp=@address_reply={0x44, 0x10}}}}}, 0x0) 08:43:56 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=@gettaction={0x20, 0x32, 0x201, 0x0, 0x0, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x2}}]}, 0x20}}, 0x0) 08:43:56 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x20000000000000) 08:43:56 executing program 3: r0 = socket(0x15, 0x80005, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) 08:43:56 executing program 0: ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000000)={0x0, 0xfff, 0x0, 0x3, 0x8}, &(0x7f0000000200)=0x18) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={r0, @in6={{0xa, 0x0, 0x3f, @loopback}}}, &(0x7f0000000400)=0x90) r1 = socket$inet6(0xa, 0x0, 0x8010000000000084) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000000)={r3}, 0x14) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x13e) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) poll(0x0, 0x0, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) 08:43:56 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000021000500d25a80648c63940d0924fc00100002400200a06d053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) 08:43:56 executing program 2: syz_emit_ethernet(0x10, &(0x7f0000000000)={@local, @dev, [{[], {0x8864}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @multicast1}, @icmp=@address_reply={0x44, 0x10}}}}}, 0x0) 08:43:57 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x10031, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000013000/0x4000)=nil, 0x4000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0xd, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0x76, &(0x7f00000001c0)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000080)=0x98) r4 = dup2(r1, r3) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) dup3(r4, r2, 0x0) 08:43:57 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=@gettaction={0x20, 0x32, 0x201, 0x0, 0x0, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x2}}]}, 0x20}}, 0x0) 08:43:57 executing program 3: r0 = socket(0x15, 0x80005, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) 08:43:57 executing program 2: syz_emit_ethernet(0x10, &(0x7f0000000000)={@local, @dev, [{[], {0x8864}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @multicast1}, @icmp=@address_reply={0x44, 0x10}}}}}, 0x0) 08:43:57 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af13, &(0x7f0000000100)) 08:43:57 executing program 4: r0 = getuid() syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='errors=continue,uid=', @ANYRESHEX=r0, @ANYBLOB=',disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=0x0]) 08:43:57 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x20200, 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f00000000c0)={0x3d}) creat(&(0x7f0000000180)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000000)=[{}, {}, {}, {}], 0x4, 0x8) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) prctl$PR_GET_TSC(0x19, &(0x7f0000000140)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000240)={0x2, 0x4e20, @empty}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000280)=""/134}, 0x18) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="020027bd7000fbdbdf25013b00000c0004000100000004000000080005000000000008000300810000000800020000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) syz_emit_ethernet(0x72, &(0x7f0000000200)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0xb, 0x4, 0x0, 0x0, 0x0, 0x0, {0x12, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4029, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x34, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {}]}]}}}}}}}, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)) sendto$inet(0xffffffffffffffff, &(0x7f00000005c0), 0x29806c5fa86ed4a, 0x1, 0x0, 0xffffffffffffff82) shutdown(r3, 0x1) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000500)={0x5, {{0xa, 0x4e20, 0xfffffffffffffff8, @rand_addr="440e06e3d07da913e0bf83acf2418443", 0x3ff}}}, 0x88) r5 = creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_script(r5, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x14) fallocate(r5, 0x10, 0x0, 0x8000) fallocate(r1, 0x11, 0x0, 0x100000001) ioctl$RNDGETENTCNT(r3, 0x80045200, &(0x7f0000000480)) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000100)=@profile={'changeprofile ', 'SEG6\x00'}, 0x1b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) 08:43:57 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x10031, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000013000/0x4000)=nil, 0x4000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0xd, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0x76, &(0x7f00000001c0)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000080)=0x98) r4 = dup2(r1, r3) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) dup3(r4, r2, 0x0) 08:43:57 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000480)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BINDER_WRITE_READ(r0, 0xc018620c, 0x0) [ 449.559712][T19624] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 449.679880][T19642] binder: 19634:19642 ioctl c018620c 0 returned -14 08:43:57 executing program 0: ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000000)={0x0, 0xfff, 0x0, 0x3, 0x8}, &(0x7f0000000200)=0x18) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={r0, @in6={{0xa, 0x0, 0x3f, @loopback}}}, &(0x7f0000000400)=0x90) r1 = socket$inet6(0xa, 0x0, 0x8010000000000084) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000000)={r3}, 0x14) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x13e) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) poll(0x0, 0x0, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) 08:43:57 executing program 4: r0 = getuid() syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='errors=continue,uid=', @ANYRESHEX=r0, @ANYBLOB=',disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=0x0]) 08:43:57 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af13, &(0x7f0000000100)) 08:43:57 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x10031, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000013000/0x4000)=nil, 0x4000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0xd, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0x76, &(0x7f00000001c0)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000080)=0x98) r4 = dup2(r1, r3) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) dup3(r4, r2, 0x0) [ 449.758199][T19648] binder: 19634:19648 ioctl c018620c 0 returned -14 [ 449.813158][T19652] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 08:43:57 executing program 2: ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000000)={0x0, 0xfff, 0x0, 0x3, 0x8}, &(0x7f0000000200)=0x18) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={r0, @in6={{0xa, 0x0, 0x3f, @loopback}}}, &(0x7f0000000400)=0x90) r1 = socket$inet6(0xa, 0x0, 0x8010000000000084) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000000)={r3}, 0x14) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="73d6797a3095b0289b8a81c06de33018a463a1f21062b09fb85f06000000000000003da1caec4f07c72fc438cf52ad37be407f0000000000000034c21b19c84a8ebbd5113ad51ba489e535fd16e19975e45c278ed7f8f8227f45f3ef162e1dbf9365e76fc3401bada166714d2bf96481239ee79e666430c80bc1d2a494e44b92eec5388bf29e9641b53b067773ff524f229c086b626eefe2469a6ba9bc3040b07952a8a4bcbc47db45da22250445d9fd842084b7d8109fcab851a240ba1fd9de4625668763a0240d1feca2c60cd4825e9c003f4ec2528def1320aa9d37d3a32e2eb7be9d3e6107659b7f017a2e979f4b1627bdebe28d005258b0f21b1b6d89ce9daca5c04f2248004ca090b4c021fe53cbb2b9c45c1af31b296e3c29f615dc23b231834167e4a258ff94a1483806c27e97d5898432f0883e49ec28223e24"], 0x13e) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) poll(0x0, 0x0, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) 08:43:57 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x20200, 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f00000000c0)={0x3d}) creat(&(0x7f0000000180)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000000)=[{}, {}, {}, {}], 0x4, 0x8) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) prctl$PR_GET_TSC(0x19, &(0x7f0000000140)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000240)={0x2, 0x4e20, @empty}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000280)=""/134}, 0x18) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="020027bd7000fbdbdf25013b00000c0004000100000004000000080005000000000008000300810000000800020000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) syz_emit_ethernet(0x72, &(0x7f0000000200)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0xb, 0x4, 0x0, 0x0, 0x0, 0x0, {0x12, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4029, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x34, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {}]}]}}}}}}}, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)) sendto$inet(0xffffffffffffffff, &(0x7f00000005c0), 0x29806c5fa86ed4a, 0x1, 0x0, 0xffffffffffffff82) shutdown(r3, 0x1) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000500)={0x5, {{0xa, 0x4e20, 0xfffffffffffffff8, @rand_addr="440e06e3d07da913e0bf83acf2418443", 0x3ff}}}, 0x88) r5 = creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_script(r5, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x14) fallocate(r5, 0x10, 0x0, 0x8000) fallocate(r1, 0x11, 0x0, 0x100000001) ioctl$RNDGETENTCNT(r3, 0x80045200, &(0x7f0000000480)) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000100)=@profile={'changeprofile ', 'SEG6\x00'}, 0x1b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) 08:43:57 executing program 4: r0 = getuid() syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='errors=continue,uid=', @ANYRESHEX=r0, @ANYBLOB=',disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=0x0]) 08:43:58 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x10031, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000013000/0x4000)=nil, 0x4000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0xd, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0x76, &(0x7f00000001c0)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000080)=0x98) r4 = dup2(r1, r3) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) dup3(r4, r2, 0x0) 08:43:58 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af13, &(0x7f0000000100)) 08:43:58 executing program 0: ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000000)={0x0, 0xfff, 0x0, 0x3, 0x8}, &(0x7f0000000200)=0x18) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={r0, @in6={{0xa, 0x0, 0x3f, @loopback}}}, &(0x7f0000000400)=0x90) r1 = socket$inet6(0xa, 0x0, 0x8010000000000084) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000000)={r3}, 0x14) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="73d6797a3095b0289b8a81c06de33018a463a1f21062b09fb85f06000000000000003da1caec4f07c72fc438cf52ad37be407f0000000000000034c21b19c84a8ebbd5113ad51ba489e535fd16e19975e45c278ed7f8f8227f45f3ef162e1dbf9365e76fc3401bada166714d2bf96481239ee79e666430c80bc1d2a494e44b92eec5388bf29e9641b53b067773ff524f229c086b626eefe2469a6ba9bc3040b07952a8a4bcbc47db45da22250445d9fd842084b7d8109fcab851a240ba1fd9de4625668763a0240d1feca2c60cd4825e9c003f4ec2528def1320aa9d37d3a32e2eb7be9d3e6107659b7f017a2e979f4b1627bdebe28d005258b0f21b1b6d89ce9daca5c04f2248004ca090b4c021fe53cbb2b9c45c1af31b296e3c29f615dc23b231834167e4a258ff94a1483806c27e97d5898432f0883e49ec28223e24"], 0x13e) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) poll(0x0, 0x0, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) 08:43:58 executing program 2: ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000000)={0x0, 0xfff, 0x0, 0x3, 0x8}, &(0x7f0000000200)=0x18) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={r0, @in6={{0xa, 0x0, 0x3f, @loopback}}}, &(0x7f0000000400)=0x90) r1 = socket$inet6(0xa, 0x0, 0x8010000000000084) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000000)={r3}, 0x14) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x13e) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) poll(0x0, 0x0, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) [ 450.335649][T19690] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 08:43:58 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af13, &(0x7f0000000100)) 08:43:58 executing program 4: r0 = getuid() syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='errors=continue,uid=', @ANYRESHEX=r0, @ANYBLOB=',disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=0x0]) 08:43:58 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x20200, 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f00000000c0)={0x3d}) creat(&(0x7f0000000180)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000000)=[{}, {}, {}, {}], 0x4, 0x8) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) prctl$PR_GET_TSC(0x19, &(0x7f0000000140)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000240)={0x2, 0x4e20, @empty}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000280)=""/134}, 0x18) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="020027bd7000fbdbdf25013b00000c0004000100000004000000080005000000000008000300810000000800020000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) syz_emit_ethernet(0x72, &(0x7f0000000200)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0xb, 0x4, 0x0, 0x0, 0x0, 0x0, {0x12, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4029, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x34, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {}]}]}}}}}}}, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)) sendto$inet(0xffffffffffffffff, &(0x7f00000005c0), 0x29806c5fa86ed4a, 0x1, 0x0, 0xffffffffffffff82) shutdown(r3, 0x1) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000500)={0x5, {{0xa, 0x4e20, 0xfffffffffffffff8, @rand_addr="440e06e3d07da913e0bf83acf2418443", 0x3ff}}}, 0x88) r5 = creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_script(r5, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x14) fallocate(r5, 0x10, 0x0, 0x8000) fallocate(r1, 0x11, 0x0, 0x100000001) ioctl$RNDGETENTCNT(r3, 0x80045200, &(0x7f0000000480)) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000100)=@profile={'changeprofile ', 'SEG6\x00'}, 0x1b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) 08:43:58 executing program 2: ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000000)={0x0, 0xfff, 0x0, 0x3, 0x8}, &(0x7f0000000200)=0x18) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={r0, @in6={{0xa, 0x0, 0x3f, @loopback}}}, &(0x7f0000000400)=0x90) r1 = socket$inet6(0xa, 0x0, 0x8010000000000084) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000000)={r3}, 0x14) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x13e) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) poll(0x0, 0x0, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) [ 450.903100][T19720] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 08:43:58 executing program 0: ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000000)={0x0, 0xfff, 0x0, 0x3, 0x8}, &(0x7f0000000200)=0x18) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={r0, @in6={{0xa, 0x0, 0x3f, @loopback}}}, &(0x7f0000000400)=0x90) r1 = socket$inet6(0xa, 0x0, 0x8010000000000084) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000000)={r3}, 0x14) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x13e) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) poll(0x0, 0x0, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) 08:43:59 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x20200, 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f00000000c0)={0x3d}) creat(&(0x7f0000000180)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000000)=[{}, {}, {}, {}], 0x4, 0x8) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) prctl$PR_GET_TSC(0x19, &(0x7f0000000140)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000240)={0x2, 0x4e20, @empty}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000280)=""/134}, 0x18) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="020027bd7000fbdbdf25013b00000c0004000100000004000000080005000000000008000300810000000800020000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) syz_emit_ethernet(0x72, &(0x7f0000000200)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0xb, 0x4, 0x0, 0x0, 0x0, 0x0, {0x12, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4029, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x34, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {}]}]}}}}}}}, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)) sendto$inet(0xffffffffffffffff, &(0x7f00000005c0), 0x29806c5fa86ed4a, 0x1, 0x0, 0xffffffffffffff82) shutdown(r3, 0x1) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000500)={0x5, {{0xa, 0x4e20, 0xfffffffffffffff8, @rand_addr="440e06e3d07da913e0bf83acf2418443", 0x3ff}}}, 0x88) r5 = creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_script(r5, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x14) fallocate(r5, 0x10, 0x0, 0x8000) fallocate(r1, 0x11, 0x0, 0x100000001) ioctl$RNDGETENTCNT(r3, 0x80045200, &(0x7f0000000480)) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000100)=@profile={'changeprofile ', 'SEG6\x00'}, 0x1b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) 08:43:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x20200, 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f00000000c0)={0x3d}) creat(&(0x7f0000000180)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000000)=[{}, {}, {}, {}], 0x4, 0x8) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) prctl$PR_GET_TSC(0x19, &(0x7f0000000140)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000240)={0x2, 0x4e20, @empty}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000280)=""/134}, 0x18) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="020027bd7000fbdbdf25013b00000c0004000100000004000000080005000000000008000300810000000800020000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) syz_emit_ethernet(0x72, &(0x7f0000000200)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0xb, 0x4, 0x0, 0x0, 0x0, 0x0, {0x12, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4029, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x34, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {}]}]}}}}}}}, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)) sendto$inet(0xffffffffffffffff, &(0x7f00000005c0), 0x29806c5fa86ed4a, 0x1, 0x0, 0xffffffffffffff82) shutdown(r3, 0x1) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000500)={0x5, {{0xa, 0x4e20, 0xfffffffffffffff8, @rand_addr="440e06e3d07da913e0bf83acf2418443", 0x3ff}}}, 0x88) r5 = creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_script(r5, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x14) fallocate(r5, 0x10, 0x0, 0x8000) fallocate(r1, 0x11, 0x0, 0x100000001) ioctl$RNDGETENTCNT(r3, 0x80045200, &(0x7f0000000480)) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000100)=@profile={'changeprofile ', 'SEG6\x00'}, 0x1b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) 08:43:59 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x20200, 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f00000000c0)={0x3d}) creat(&(0x7f0000000180)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000000)=[{}, {}, {}, {}], 0x4, 0x8) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) prctl$PR_GET_TSC(0x19, &(0x7f0000000140)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000240)={0x2, 0x4e20, @empty}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000280)=""/134}, 0x18) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="020027bd7000fbdbdf25013b00000c0004000100000004000000080005000000000008000300810000000800020000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) syz_emit_ethernet(0x72, &(0x7f0000000200)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0xb, 0x4, 0x0, 0x0, 0x0, 0x0, {0x12, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4029, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x34, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {}]}]}}}}}}}, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)) sendto$inet(0xffffffffffffffff, &(0x7f00000005c0), 0x29806c5fa86ed4a, 0x1, 0x0, 0xffffffffffffff82) shutdown(r3, 0x1) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000500)={0x5, {{0xa, 0x4e20, 0xfffffffffffffff8, @rand_addr="440e06e3d07da913e0bf83acf2418443", 0x3ff}}}, 0x88) r5 = creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_script(r5, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x14) fallocate(r5, 0x10, 0x0, 0x8000) fallocate(r1, 0x11, 0x0, 0x100000001) ioctl$RNDGETENTCNT(r3, 0x80045200, &(0x7f0000000480)) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000100)=@profile={'changeprofile ', 'SEG6\x00'}, 0x1b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) 08:43:59 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x20200, 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f00000000c0)={0x3d}) creat(&(0x7f0000000180)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000000)=[{}, {}, {}, {}], 0x4, 0x8) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) prctl$PR_GET_TSC(0x19, &(0x7f0000000140)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000240)={0x2, 0x4e20, @empty}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000280)=""/134}, 0x18) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="020027bd7000fbdbdf25013b00000c0004000100000004000000080005000000000008000300810000000800020000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) syz_emit_ethernet(0x72, &(0x7f0000000200)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0xb, 0x4, 0x0, 0x0, 0x0, 0x0, {0x12, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4029, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x34, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {}]}]}}}}}}}, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)) sendto$inet(0xffffffffffffffff, &(0x7f00000005c0), 0x29806c5fa86ed4a, 0x1, 0x0, 0xffffffffffffff82) shutdown(r3, 0x1) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000500)={0x5, {{0xa, 0x4e20, 0xfffffffffffffff8, @rand_addr="440e06e3d07da913e0bf83acf2418443", 0x3ff}}}, 0x88) r5 = creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_script(r5, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x14) fallocate(r5, 0x10, 0x0, 0x8000) fallocate(r1, 0x11, 0x0, 0x100000001) ioctl$RNDGETENTCNT(r3, 0x80045200, &(0x7f0000000480)) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000100)=@profile={'changeprofile ', 'SEG6\x00'}, 0x1b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) 08:43:59 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x20200, 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f00000000c0)={0x3d}) creat(&(0x7f0000000180)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000000)=[{}, {}, {}, {}], 0x4, 0x8) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) prctl$PR_GET_TSC(0x19, &(0x7f0000000140)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000240)={0x2, 0x4e20, @empty}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000280)=""/134}, 0x18) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="020027bd7000fbdbdf25013b00000c0004000100000004000000080005000000000008000300810000000800020000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) syz_emit_ethernet(0x72, &(0x7f0000000200)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0xb, 0x4, 0x0, 0x0, 0x0, 0x0, {0x12, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4029, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x34, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {}]}]}}}}}}}, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)) sendto$inet(0xffffffffffffffff, &(0x7f00000005c0), 0x29806c5fa86ed4a, 0x1, 0x0, 0xffffffffffffff82) shutdown(r3, 0x1) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000500)={0x5, {{0xa, 0x4e20, 0xfffffffffffffff8, @rand_addr="440e06e3d07da913e0bf83acf2418443", 0x3ff}}}, 0x88) r5 = creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_script(r5, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x14) fallocate(r5, 0x10, 0x0, 0x8000) fallocate(r1, 0x11, 0x0, 0x100000001) ioctl$RNDGETENTCNT(r3, 0x80045200, &(0x7f0000000480)) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000100)=@profile={'changeprofile ', 'SEG6\x00'}, 0x1b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) [ 451.518931][T19752] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 451.691499][T19750] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 08:43:59 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x20200, 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f00000000c0)={0x3d}) creat(&(0x7f0000000180)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000000)=[{}, {}, {}, {}], 0x4, 0x8) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) prctl$PR_GET_TSC(0x19, &(0x7f0000000140)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000240)={0x2, 0x4e20, @empty}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000280)=""/134}, 0x18) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="020027bd7000fbdbdf25013b00000c0004000100000004000000080005000000000008000300810000000800020000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) syz_emit_ethernet(0x72, &(0x7f0000000200)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0xb, 0x4, 0x0, 0x0, 0x0, 0x0, {0x12, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4029, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x34, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {}]}]}}}}}}}, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)) sendto$inet(0xffffffffffffffff, &(0x7f00000005c0), 0x29806c5fa86ed4a, 0x1, 0x0, 0xffffffffffffff82) shutdown(r3, 0x1) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000500)={0x5, {{0xa, 0x4e20, 0xfffffffffffffff8, @rand_addr="440e06e3d07da913e0bf83acf2418443", 0x3ff}}}, 0x88) r5 = creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_script(r5, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x14) fallocate(r5, 0x10, 0x0, 0x8000) fallocate(r1, 0x11, 0x0, 0x100000001) ioctl$RNDGETENTCNT(r3, 0x80045200, &(0x7f0000000480)) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000100)=@profile={'changeprofile ', 'SEG6\x00'}, 0x1b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) 08:43:59 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x20200, 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f00000000c0)={0x3d}) creat(&(0x7f0000000180)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000000)=[{}, {}, {}, {}], 0x4, 0x8) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) prctl$PR_GET_TSC(0x19, &(0x7f0000000140)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000240)={0x2, 0x4e20, @empty}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000280)=""/134}, 0x18) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="020027bd7000fbdbdf25013b00000c0004000100000004000000080005000000000008000300810000000800020000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) syz_emit_ethernet(0x72, &(0x7f0000000200)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0xb, 0x4, 0x0, 0x0, 0x0, 0x0, {0x12, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4029, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x34, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {}]}]}}}}}}}, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)) sendto$inet(0xffffffffffffffff, &(0x7f00000005c0), 0x29806c5fa86ed4a, 0x1, 0x0, 0xffffffffffffff82) shutdown(r3, 0x1) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000500)={0x5, {{0xa, 0x4e20, 0xfffffffffffffff8, @rand_addr="440e06e3d07da913e0bf83acf2418443", 0x3ff}}}, 0x88) r5 = creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_script(r5, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x14) fallocate(r5, 0x10, 0x0, 0x8000) fallocate(r1, 0x11, 0x0, 0x100000001) ioctl$RNDGETENTCNT(r3, 0x80045200, &(0x7f0000000480)) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000100)=@profile={'changeprofile ', 'SEG6\x00'}, 0x1b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) 08:43:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x20200, 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f00000000c0)={0x3d}) creat(&(0x7f0000000180)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000000)=[{}, {}, {}, {}], 0x4, 0x8) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) prctl$PR_GET_TSC(0x19, &(0x7f0000000140)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000240)={0x2, 0x4e20, @empty}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000280)=""/134}, 0x18) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="020027bd7000fbdbdf25013b00000c0004000100000004000000080005000000000008000300810000000800020000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) syz_emit_ethernet(0x72, &(0x7f0000000200)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0xb, 0x4, 0x0, 0x0, 0x0, 0x0, {0x12, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4029, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x34, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {}]}]}}}}}}}, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)) sendto$inet(0xffffffffffffffff, &(0x7f00000005c0), 0x29806c5fa86ed4a, 0x1, 0x0, 0xffffffffffffff82) shutdown(r3, 0x1) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000500)={0x5, {{0xa, 0x4e20, 0xfffffffffffffff8, @rand_addr="440e06e3d07da913e0bf83acf2418443", 0x3ff}}}, 0x88) r5 = creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_script(r5, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x14) fallocate(r5, 0x10, 0x0, 0x8000) fallocate(r1, 0x11, 0x0, 0x100000001) ioctl$RNDGETENTCNT(r3, 0x80045200, &(0x7f0000000480)) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000100)=@profile={'changeprofile ', 'SEG6\x00'}, 0x1b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) [ 452.065777][T19758] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 08:44:00 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x20200, 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f00000000c0)={0x3d}) creat(&(0x7f0000000180)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000000)=[{}, {}, {}, {}], 0x4, 0x8) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) prctl$PR_GET_TSC(0x19, &(0x7f0000000140)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000240)={0x2, 0x4e20, @empty}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000280)=""/134}, 0x18) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="020027bd7000fbdbdf25013b00000c0004000100000004000000080005000000000008000300810000000800020000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) syz_emit_ethernet(0x72, &(0x7f0000000200)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0xb, 0x4, 0x0, 0x0, 0x0, 0x0, {0x12, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4029, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x34, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {}]}]}}}}}}}, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)) sendto$inet(0xffffffffffffffff, &(0x7f00000005c0), 0x29806c5fa86ed4a, 0x1, 0x0, 0xffffffffffffff82) shutdown(r3, 0x1) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000500)={0x5, {{0xa, 0x4e20, 0xfffffffffffffff8, @rand_addr="440e06e3d07da913e0bf83acf2418443", 0x3ff}}}, 0x88) r5 = creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_script(r5, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x14) fallocate(r5, 0x10, 0x0, 0x8000) fallocate(r1, 0x11, 0x0, 0x100000001) ioctl$RNDGETENTCNT(r3, 0x80045200, &(0x7f0000000480)) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000100)=@profile={'changeprofile ', 'SEG6\x00'}, 0x1b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) 08:44:00 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x20200, 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f00000000c0)={0x3d}) creat(&(0x7f0000000180)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000000)=[{}, {}, {}, {}], 0x4, 0x8) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) prctl$PR_GET_TSC(0x19, &(0x7f0000000140)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000240)={0x2, 0x4e20, @empty}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000280)=""/134}, 0x18) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="020027bd7000fbdbdf25013b00000c0004000100000004000000080005000000000008000300810000000800020000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) syz_emit_ethernet(0x72, &(0x7f0000000200)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0xb, 0x4, 0x0, 0x0, 0x0, 0x0, {0x12, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4029, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x34, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {}]}]}}}}}}}, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)) sendto$inet(0xffffffffffffffff, &(0x7f00000005c0), 0x29806c5fa86ed4a, 0x1, 0x0, 0xffffffffffffff82) shutdown(r3, 0x1) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000500)={0x5, {{0xa, 0x4e20, 0xfffffffffffffff8, @rand_addr="440e06e3d07da913e0bf83acf2418443", 0x3ff}}}, 0x88) r5 = creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_script(r5, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x14) fallocate(r5, 0x10, 0x0, 0x8000) fallocate(r1, 0x11, 0x0, 0x100000001) ioctl$RNDGETENTCNT(r3, 0x80045200, &(0x7f0000000480)) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000100)=@profile={'changeprofile ', 'SEG6\x00'}, 0x1b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) 08:44:00 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x20200, 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f00000000c0)={0x3d}) creat(&(0x7f0000000180)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000000)=[{}, {}, {}, {}], 0x4, 0x8) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) prctl$PR_GET_TSC(0x19, &(0x7f0000000140)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000240)={0x2, 0x4e20, @empty}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000280)=""/134}, 0x18) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="020027bd7000fbdbdf25013b00000c0004000100000004000000080005000000000008000300810000000800020000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) syz_emit_ethernet(0x72, &(0x7f0000000200)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0xb, 0x4, 0x0, 0x0, 0x0, 0x0, {0x12, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4029, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x34, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {}]}]}}}}}}}, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)) sendto$inet(0xffffffffffffffff, &(0x7f00000005c0), 0x29806c5fa86ed4a, 0x1, 0x0, 0xffffffffffffff82) shutdown(r3, 0x1) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000500)={0x5, {{0xa, 0x4e20, 0xfffffffffffffff8, @rand_addr="440e06e3d07da913e0bf83acf2418443", 0x3ff}}}, 0x88) r5 = creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_script(r5, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x14) fallocate(r5, 0x10, 0x0, 0x8000) fallocate(r1, 0x11, 0x0, 0x100000001) ioctl$RNDGETENTCNT(r3, 0x80045200, &(0x7f0000000480)) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000100)=@profile={'changeprofile ', 'SEG6\x00'}, 0x1b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) 08:44:00 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x20200, 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f00000000c0)={0x3d}) creat(&(0x7f0000000180)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000000)=[{}, {}, {}, {}], 0x4, 0x8) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) prctl$PR_GET_TSC(0x19, &(0x7f0000000140)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000240)={0x2, 0x4e20, @empty}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000280)=""/134}, 0x18) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="020027bd7000fbdbdf25013b00000c0004000100000004000000080005000000000008000300810000000800020000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) syz_emit_ethernet(0x72, &(0x7f0000000200)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0xb, 0x4, 0x0, 0x0, 0x0, 0x0, {0x12, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4029, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x34, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {}]}]}}}}}}}, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)) sendto$inet(0xffffffffffffffff, &(0x7f00000005c0), 0x29806c5fa86ed4a, 0x1, 0x0, 0xffffffffffffff82) shutdown(r3, 0x1) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000500)={0x5, {{0xa, 0x4e20, 0xfffffffffffffff8, @rand_addr="440e06e3d07da913e0bf83acf2418443", 0x3ff}}}, 0x88) r5 = creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_script(r5, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x14) fallocate(r5, 0x10, 0x0, 0x8000) fallocate(r1, 0x11, 0x0, 0x100000001) ioctl$RNDGETENTCNT(r3, 0x80045200, &(0x7f0000000480)) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000100)=@profile={'changeprofile ', 'SEG6\x00'}, 0x1b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) 08:44:00 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x20200, 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f00000000c0)={0x3d}) creat(&(0x7f0000000180)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000000)=[{}, {}, {}, {}], 0x4, 0x8) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) prctl$PR_GET_TSC(0x19, &(0x7f0000000140)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000240)={0x2, 0x4e20, @empty}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000280)=""/134}, 0x18) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="020027bd7000fbdbdf25013b00000c0004000100000004000000080005000000000008000300810000000800020000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) syz_emit_ethernet(0x72, &(0x7f0000000200)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0xb, 0x4, 0x0, 0x0, 0x0, 0x0, {0x12, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4029, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x34, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {}]}]}}}}}}}, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)) sendto$inet(0xffffffffffffffff, &(0x7f00000005c0), 0x29806c5fa86ed4a, 0x1, 0x0, 0xffffffffffffff82) shutdown(r3, 0x1) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000500)={0x5, {{0xa, 0x4e20, 0xfffffffffffffff8, @rand_addr="440e06e3d07da913e0bf83acf2418443", 0x3ff}}}, 0x88) r5 = creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_script(r5, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x14) fallocate(r5, 0x10, 0x0, 0x8000) fallocate(r1, 0x11, 0x0, 0x100000001) ioctl$RNDGETENTCNT(r3, 0x80045200, &(0x7f0000000480)) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000100)=@profile={'changeprofile ', 'SEG6\x00'}, 0x1b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) 08:44:00 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x20200, 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f00000000c0)={0x3d}) creat(&(0x7f0000000180)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000000)=[{}, {}, {}, {}], 0x4, 0x8) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) prctl$PR_GET_TSC(0x19, &(0x7f0000000140)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000240)={0x2, 0x4e20, @empty}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000280)=""/134}, 0x18) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="020027bd7000fbdbdf25013b00000c0004000100000004000000080005000000000008000300810000000800020000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) syz_emit_ethernet(0x72, &(0x7f0000000200)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0xb, 0x4, 0x0, 0x0, 0x0, 0x0, {0x12, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4029, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x34, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {}]}]}}}}}}}, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)) sendto$inet(0xffffffffffffffff, &(0x7f00000005c0), 0x29806c5fa86ed4a, 0x1, 0x0, 0xffffffffffffff82) shutdown(r3, 0x1) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000500)={0x5, {{0xa, 0x4e20, 0xfffffffffffffff8, @rand_addr="440e06e3d07da913e0bf83acf2418443", 0x3ff}}}, 0x88) r5 = creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_script(r5, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x14) fallocate(r5, 0x10, 0x0, 0x8000) fallocate(r1, 0x11, 0x0, 0x100000001) ioctl$RNDGETENTCNT(r3, 0x80045200, &(0x7f0000000480)) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000100)=@profile={'changeprofile ', 'SEG6\x00'}, 0x1b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) 08:44:01 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)='+', 0x1}], 0x1}, 0xc100) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000480)="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", 0x10c7}], 0x1) 08:44:01 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x20200, 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f00000000c0)={0x3d}) creat(&(0x7f0000000180)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000000)=[{}, {}, {}, {}], 0x4, 0x8) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) prctl$PR_GET_TSC(0x19, &(0x7f0000000140)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000240)={0x2, 0x4e20, @empty}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000280)=""/134}, 0x18) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="020027bd7000fbdbdf25013b00000c0004000100000004000000080005000000000008000300810000000800020000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) syz_emit_ethernet(0x72, &(0x7f0000000200)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0xb, 0x4, 0x0, 0x0, 0x0, 0x0, {0x12, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4029, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x34, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {}]}]}}}}}}}, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)) sendto$inet(0xffffffffffffffff, &(0x7f00000005c0), 0x29806c5fa86ed4a, 0x1, 0x0, 0xffffffffffffff82) shutdown(r3, 0x1) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000500)={0x5, {{0xa, 0x4e20, 0xfffffffffffffff8, @rand_addr="440e06e3d07da913e0bf83acf2418443", 0x3ff}}}, 0x88) r5 = creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_script(r5, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x14) fallocate(r5, 0x10, 0x0, 0x8000) fallocate(r1, 0x11, 0x0, 0x100000001) ioctl$RNDGETENTCNT(r3, 0x80045200, &(0x7f0000000480)) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000100)=@profile={'changeprofile ', 'SEG6\x00'}, 0x1b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) 08:44:01 executing program 1: mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2000, 0x0, &(0x7f0000c87000/0x2000)=nil) r0 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffa, 0x80002) ioctl$FS_IOC_FSGETXATTR(r0, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0xfffffffffffffffe, 0x1000020000005, 0x7ff0bdbe}) 08:44:01 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000), 0x4) 08:44:01 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)='+', 0x1}], 0x1}, 0xc100) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000480)="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", 0x10c7}], 0x1) 08:44:01 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x20200, 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f00000000c0)={0x3d}) creat(&(0x7f0000000180)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000000)=[{}, {}, {}, {}], 0x4, 0x8) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) prctl$PR_GET_TSC(0x19, &(0x7f0000000140)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000240)={0x2, 0x4e20, @empty}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000280)=""/134}, 0x18) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="020027bd7000fbdbdf25013b00000c0004000100000004000000080005000000000008000300810000000800020000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) syz_emit_ethernet(0x72, &(0x7f0000000200)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0xb, 0x4, 0x0, 0x0, 0x0, 0x0, {0x12, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4029, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x34, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {}]}]}}}}}}}, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)) sendto$inet(0xffffffffffffffff, &(0x7f00000005c0), 0x29806c5fa86ed4a, 0x1, 0x0, 0xffffffffffffff82) shutdown(r3, 0x1) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000500)={0x5, {{0xa, 0x4e20, 0xfffffffffffffff8, @rand_addr="440e06e3d07da913e0bf83acf2418443", 0x3ff}}}, 0x88) r5 = creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_script(r5, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x14) fallocate(r5, 0x10, 0x0, 0x8000) fallocate(r1, 0x11, 0x0, 0x100000001) ioctl$RNDGETENTCNT(r3, 0x80045200, &(0x7f0000000480)) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000100)=@profile={'changeprofile ', 'SEG6\x00'}, 0x1b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) 08:44:02 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x20200, 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f00000000c0)={0x3d}) creat(&(0x7f0000000180)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000000)=[{}, {}, {}, {}], 0x4, 0x8) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) prctl$PR_GET_TSC(0x19, &(0x7f0000000140)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000240)={0x2, 0x4e20, @empty}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000280)=""/134}, 0x18) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="020027bd7000fbdbdf25013b00000c0004000100000004000000080005000000000008000300810000000800020000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) syz_emit_ethernet(0x72, &(0x7f0000000200)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0xb, 0x4, 0x0, 0x0, 0x0, 0x0, {0x12, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4029, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x34, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {}]}]}}}}}}}, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)) sendto$inet(0xffffffffffffffff, &(0x7f00000005c0), 0x29806c5fa86ed4a, 0x1, 0x0, 0xffffffffffffff82) shutdown(r3, 0x1) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000500)={0x5, {{0xa, 0x4e20, 0xfffffffffffffff8, @rand_addr="440e06e3d07da913e0bf83acf2418443", 0x3ff}}}, 0x88) r5 = creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_script(r5, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x14) fallocate(r5, 0x10, 0x0, 0x8000) fallocate(r1, 0x11, 0x0, 0x100000001) ioctl$RNDGETENTCNT(r3, 0x80045200, &(0x7f0000000480)) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000100)=@profile={'changeprofile ', 'SEG6\x00'}, 0x1b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) 08:44:02 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)='+', 0x1}], 0x1}, 0xc100) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000480)="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", 0x10c7}], 0x1) 08:44:02 executing program 1: mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2000, 0x0, &(0x7f0000c87000/0x2000)=nil) r0 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffa, 0x80002) ioctl$FS_IOC_FSGETXATTR(r0, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0xfffffffffffffffe, 0x1000020000005, 0x7ff0bdbe}) 08:44:02 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000), 0x4) 08:44:02 executing program 1: mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2000, 0x0, &(0x7f0000c87000/0x2000)=nil) r0 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffa, 0x80002) ioctl$FS_IOC_FSGETXATTR(r0, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0xfffffffffffffffe, 0x1000020000005, 0x7ff0bdbe}) 08:44:02 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)='+', 0x1}], 0x1}, 0xc100) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000480)="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", 0x10c7}], 0x1) 08:44:02 executing program 5: mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2000, 0x0, &(0x7f0000c87000/0x2000)=nil) r0 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffa, 0x80002) ioctl$FS_IOC_FSGETXATTR(r0, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0xfffffffffffffffe, 0x1000020000005, 0x7ff0bdbe}) 08:44:03 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000), 0x4) 08:44:03 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x20200, 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f00000000c0)={0x3d}) creat(&(0x7f0000000180)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000000)=[{}, {}, {}, {}], 0x4, 0x8) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) prctl$PR_GET_TSC(0x19, &(0x7f0000000140)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000240)={0x2, 0x4e20, @empty}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000280)=""/134}, 0x18) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="020027bd7000fbdbdf25013b00000c0004000100000004000000080005000000000008000300810000000800020000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) syz_emit_ethernet(0x72, &(0x7f0000000200)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0xb, 0x4, 0x0, 0x0, 0x0, 0x0, {0x12, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4029, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x34, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {}]}]}}}}}}}, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)) sendto$inet(0xffffffffffffffff, &(0x7f00000005c0), 0x29806c5fa86ed4a, 0x1, 0x0, 0xffffffffffffff82) shutdown(r3, 0x1) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000500)={0x5, {{0xa, 0x4e20, 0xfffffffffffffff8, @rand_addr="440e06e3d07da913e0bf83acf2418443", 0x3ff}}}, 0x88) r5 = creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_script(r5, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x14) fallocate(r5, 0x10, 0x0, 0x8000) fallocate(r1, 0x11, 0x0, 0x100000001) ioctl$RNDGETENTCNT(r3, 0x80045200, &(0x7f0000000480)) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000100)=@profile={'changeprofile ', 'SEG6\x00'}, 0x1b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) 08:44:03 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x20200, 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f00000000c0)={0x3d}) creat(&(0x7f0000000180)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000000)=[{}, {}, {}, {}], 0x4, 0x8) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) prctl$PR_GET_TSC(0x19, &(0x7f0000000140)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000240)={0x2, 0x4e20, @empty}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000280)=""/134}, 0x18) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="020027bd7000fbdbdf25013b00000c0004000100000004000000080005000000000008000300810000000800020000000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) syz_emit_ethernet(0x72, &(0x7f0000000200)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0xb, 0x4, 0x0, 0x0, 0x0, 0x0, {0x12, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4029, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x34, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {}]}]}}}}}}}, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)) sendto$inet(0xffffffffffffffff, &(0x7f00000005c0), 0x29806c5fa86ed4a, 0x1, 0x0, 0xffffffffffffff82) shutdown(r3, 0x1) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000500)={0x5, {{0xa, 0x4e20, 0xfffffffffffffff8, @rand_addr="440e06e3d07da913e0bf83acf2418443", 0x3ff}}}, 0x88) r5 = creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_script(r5, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x14) fallocate(r5, 0x10, 0x0, 0x8000) fallocate(r1, 0x11, 0x0, 0x100000001) ioctl$RNDGETENTCNT(r3, 0x80045200, &(0x7f0000000480)) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000100)=@profile={'changeprofile ', 'SEG6\x00'}, 0x1b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) 08:44:03 executing program 1: mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2000, 0x0, &(0x7f0000c87000/0x2000)=nil) r0 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffa, 0x80002) ioctl$FS_IOC_FSGETXATTR(r0, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0xfffffffffffffffe, 0x1000020000005, 0x7ff0bdbe}) 08:44:03 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x8, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 08:44:03 executing program 5: mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2000, 0x0, &(0x7f0000c87000/0x2000)=nil) r0 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffa, 0x80002) ioctl$FS_IOC_FSGETXATTR(r0, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0xfffffffffffffffe, 0x1000020000005, 0x7ff0bdbe}) 08:44:03 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000), 0x4) 08:44:03 executing program 5: mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2000, 0x0, &(0x7f0000c87000/0x2000)=nil) r0 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffa, 0x80002) ioctl$FS_IOC_FSGETXATTR(r0, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0xfffffffffffffffe, 0x1000020000005, 0x7ff0bdbe}) 08:44:03 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000000100)) 08:44:03 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x8, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 08:44:03 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x30, &(0x7f0000000040)={'filter\x00', 0x7, 0x4, 0x48c, 0x128, 0x128, 0x268, 0x3a8, 0x3a8, 0x3a8, 0x4, 0x0, {[{{@arp={@dev, @rand_addr, 0x0, 0x0, @empty, {}, @mac=@link_local, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'hsr0\x00', 'irlan0\x00'}, 0xf0, 0x128}, @unspec=@RATEEST={0x38, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@broadcast, @loopback, 0x0, 0x0, @empty, {}, @mac=@link_local, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'vxcan1\x00', 'veth1\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@broadcast, @mac=@random="485051ae7249", @loopback, @remote}}}, {{@arp={@rand_addr, @broadcast, 0x0, 0x0, @mac=@link_local, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'batadv0\x00', 'nlmon0\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@remote, @dev, @multicast1}}}], {{[], 0xc0, 0xe4}, {0x24}}}}, 0x4d8) 08:44:03 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=@framed={{0xffffff85, 0x6cb321000000002c, 0x0, 0x0, 0x0, 0x6d}, [@ldst={0x3, 0x0, 0x3}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0x100b0, &(0x7f000000cf3d)=""/195}, 0x48) 08:44:03 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000000100)) 08:44:03 executing program 2: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040)=0xfffffffffffffff8, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='veth1\x00', 0x10) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_int(r1, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000000240)=0x1, 0x4) sendto$inet(r1, &(0x7f0000000080)=';', 0x1, 0x0, 0x0, 0x0) sendto$unix(r1, &(0x7f0000000040), 0xfd1b, 0x4004800, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 08:44:04 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000000100)) 08:44:04 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x30, &(0x7f0000000040)={'filter\x00', 0x7, 0x4, 0x48c, 0x128, 0x128, 0x268, 0x3a8, 0x3a8, 0x3a8, 0x4, 0x0, {[{{@arp={@dev, @rand_addr, 0x0, 0x0, @empty, {}, @mac=@link_local, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'hsr0\x00', 'irlan0\x00'}, 0xf0, 0x128}, @unspec=@RATEEST={0x38, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@broadcast, @loopback, 0x0, 0x0, @empty, {}, @mac=@link_local, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'vxcan1\x00', 'veth1\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@broadcast, @mac=@random="485051ae7249", @loopback, @remote}}}, {{@arp={@rand_addr, @broadcast, 0x0, 0x0, @mac=@link_local, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'batadv0\x00', 'nlmon0\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@remote, @dev, @multicast1}}}], {{[], 0xc0, 0xe4}, {0x24}}}}, 0x4d8) 08:44:04 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=@framed={{0xffffff85, 0x6cb321000000002c, 0x0, 0x0, 0x0, 0x6d}, [@ldst={0x3, 0x0, 0x3}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0x100b0, &(0x7f000000cf3d)=""/195}, 0x48) 08:44:04 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x8, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 08:44:04 executing program 2: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040)=0xfffffffffffffff8, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='veth1\x00', 0x10) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_int(r1, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000000240)=0x1, 0x4) sendto$inet(r1, &(0x7f0000000080)=';', 0x1, 0x0, 0x0, 0x0) sendto$unix(r1, &(0x7f0000000040), 0xfd1b, 0x4004800, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 08:44:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socket(0x1d, 0x0, 0x0) 08:44:04 executing program 2: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040)=0xfffffffffffffff8, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='veth1\x00', 0x10) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_int(r1, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000000240)=0x1, 0x4) sendto$inet(r1, &(0x7f0000000080)=';', 0x1, 0x0, 0x0, 0x0) sendto$unix(r1, &(0x7f0000000040), 0xfd1b, 0x4004800, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 08:44:04 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=@framed={{0xffffff85, 0x6cb321000000002c, 0x0, 0x0, 0x0, 0x6d}, [@ldst={0x3, 0x0, 0x3}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0x100b0, &(0x7f000000cf3d)=""/195}, 0x48) 08:44:04 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x30, &(0x7f0000000040)={'filter\x00', 0x7, 0x4, 0x48c, 0x128, 0x128, 0x268, 0x3a8, 0x3a8, 0x3a8, 0x4, 0x0, {[{{@arp={@dev, @rand_addr, 0x0, 0x0, @empty, {}, @mac=@link_local, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'hsr0\x00', 'irlan0\x00'}, 0xf0, 0x128}, @unspec=@RATEEST={0x38, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@broadcast, @loopback, 0x0, 0x0, @empty, {}, @mac=@link_local, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'vxcan1\x00', 'veth1\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@broadcast, @mac=@random="485051ae7249", @loopback, @remote}}}, {{@arp={@rand_addr, @broadcast, 0x0, 0x0, @mac=@link_local, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'batadv0\x00', 'nlmon0\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@remote, @dev, @multicast1}}}], {{[], 0xc0, 0xe4}, {0x24}}}}, 0x4d8) 08:44:04 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000000100)) [ 456.778968][T19911] can: request_module (can-proto-0) failed. 08:44:04 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x8, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 456.833556][T19913] can: request_module (can-proto-0) failed. 08:44:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socket(0x1d, 0x0, 0x0) 08:44:04 executing program 2: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040)=0xfffffffffffffff8, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='veth1\x00', 0x10) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_int(r1, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000000240)=0x1, 0x4) sendto$inet(r1, &(0x7f0000000080)=';', 0x1, 0x0, 0x0, 0x0) sendto$unix(r1, &(0x7f0000000040), 0xfd1b, 0x4004800, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 08:44:04 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=@framed={{0xffffff85, 0x6cb321000000002c, 0x0, 0x0, 0x0, 0x6d}, [@ldst={0x3, 0x0, 0x3}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0x100b0, &(0x7f000000cf3d)=""/195}, 0x48) 08:44:04 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x30, &(0x7f0000000040)={'filter\x00', 0x7, 0x4, 0x48c, 0x128, 0x128, 0x268, 0x3a8, 0x3a8, 0x3a8, 0x4, 0x0, {[{{@arp={@dev, @rand_addr, 0x0, 0x0, @empty, {}, @mac=@link_local, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'hsr0\x00', 'irlan0\x00'}, 0xf0, 0x128}, @unspec=@RATEEST={0x38, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@broadcast, @loopback, 0x0, 0x0, @empty, {}, @mac=@link_local, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'vxcan1\x00', 'veth1\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@broadcast, @mac=@random="485051ae7249", @loopback, @remote}}}, {{@arp={@rand_addr, @broadcast, 0x0, 0x0, @mac=@link_local, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'batadv0\x00', 'nlmon0\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@remote, @dev, @multicast1}}}], {{[], 0xc0, 0xe4}, {0x24}}}}, 0x4d8) 08:44:05 executing program 1: ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(r0, 0xfffffbfffff3ffa7, &(0x7f0000000140)) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0xc0000) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)={0x28, 0x0, 0x43335e0b664d39ad, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x4, 0x1, @udp='udp:syz2\x00'}]}]}, 0x28}}, 0x0) [ 457.132255][T19932] can: request_module (can-proto-0) failed. 08:44:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socket(0x1d, 0x0, 0x0) 08:44:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000140)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@gettaction={0x18, 0x30, 0xffffff1f, 0x0, 0x0, {}, [@action_gd=@TCA_ACT_TAB={0x4}]}, 0x18}}, 0x0) 08:44:05 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x1006, 0x0, 0x1, r3, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x336, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:44:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f00001c3000)={&(0x7f0000014000)={0x2, 0x0, @local}, 0x10, 0x0, 0x0, &(0x7f0000000840)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0}, &(0x7f0000000280)=[{&(0x7f00000001c0)=""/168, 0xa8}], 0x1}}, @rdma_args={0x48, 0x114, 0x1, {{}, {0x0}, 0x0, 0x40000}}], 0x90}, 0x0) 08:44:05 executing program 0: syz_emit_ethernet(0x595, &(0x7f0000000240)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "7f81dd", 0x55f, 0x0, 0x0, @dev, @ipv4={[], [], @multicast2}, {[@hopopts={0x0, 0x0, [], [@ra]}, @routing={0x0, 0x8, 0x0, 0x0, 0x0, [@mcast1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast1, @ipv4={[], [], @remote}]}, @dstopts={0x0, 0x14, [], [@padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @generic={0x0, 0x3f, "d6af6fb5496040ec3fbfcee02dc046bf41f6b203c89dc1e20cf57c26afd7f0ba0d901bfedf1deccad1ad15aaa6eef00df6bcb8a0cc2ae1db0107e256ad9f01"}, @enc_lim, @hao={0xc9, 0x10, @mcast1}, @generic={0x0, 0x44, "5c8edcc4a11f2a6094f67fcb0099111b8df1c3acb034e60f144021218d86007caeeec04c049b3a6cef5e9e8ab2a9a722d604e300ee1ef57fc9c3526717542330a3a67bfd"}]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@local]}, @fragment, @hopopts={0x0, 0x1c, [], [@calipso={0x7, 0x40, {0x0, 0xe, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, @calipso={0x7, 0x28, {0x0, 0x8, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0]}}, @generic={0x0, 0x25, "5502675e2355db906d875d681d6c83fbff7b50b2cc3c9683b973fc7b75d506b2119388115d"}, @calipso={0x7, 0x10, {0x0, 0x2, 0x0, 0x0, [0x0]}}, @jumbo, @calipso={0x7, 0x28, {0x0, 0x8, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0]}}, @ra, @ra, @padn={0x1, 0x2, [0x0, 0x0]}]}, @dstopts={0x0, 0x7, [], [@calipso={0x7, 0x38, {0x0, 0xc, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}]}], @icmpv6=@time_exceed={0x3, 0x0, 0x0, 0x0, [], {0x0, 0x6, "af266d", 0x0, 0x0, 0x0, @ipv4={[], [], @empty}, @ipv4, [@srh={0x0, 0x8, 0x4, 0x4, 0x0, 0x0, 0x0, [@rand_addr="dca9351cc6f307458cd9fb5e518ab63c", @mcast2, @remote, @mcast1]}, @hopopts={0x0, 0x16, [], [@pad1, @enc_lim, @ra, @pad1, @enc_lim, @generic={0x0, 0x9f, "3af643d06a0a421eb71289619ebaf6433ec8ef95ee9b09321b8f750201c8d3af46f7e8d0b077992af9619c5ef009e593dbb0e087c770b795ce01c9caeafd0eedd209d9f1bd6283cf37cde132496e1843b99d3f80e0c08c10b66cc705c508f9d02c9c5fc9f747993105e2d7c3d880d076c74676899944e45d0e02798a5ea290939c5adfdd1d6cf2dc927fc668810f45efefb3442c7a5a9e52351cb03ea582e6"}]}, @srh={0x0, 0x10, 0x4, 0x8, 0x0, 0x0, 0x0, [@mcast2, @mcast1, @dev, @rand_addr="a64d3cb2a7b617de64feb4df9d3fab71", @loopback, @empty, @empty, @remote]}, @srh={0x0, 0x6, 0x4, 0x3, 0x0, 0x0, 0x0, [@empty, @dev, @ipv4={[], [], @broadcast}]}, @dstopts={0x0, 0xc, [], [@pad1, @enc_lim, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @hao={0xc9, 0x10, @dev}, @hao={0xc9, 0x10, @rand_addr="77c29572ec5a7671ddae4a5e320a45ee"}, @calipso={0x7, 0x20, {0x0, 0x6, 0x0, 0x0, [0x0, 0x0, 0x0]}}, @pad1]}, @routing={0x0, 0xa, 0x0, 0x0, 0x0, [@dev, @ipv4={[], [], @loopback}, @mcast1, @local, @ipv4={[], [], @broadcast}]}], "c0ca705de1e04e01a7484dd362ccb5a6ef9a891605475de2426fda4ad199b433e381bf5173927500e0f87e804e609e7e0049ae580f0b5bb715c41b55eedd6d"}}}}}}}, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r1, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 457.376555][T19951] can: request_module (can-proto-0) failed. 08:44:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000140)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@gettaction={0x18, 0x30, 0xffffff1f, 0x0, 0x0, {}, [@action_gd=@TCA_ACT_TAB={0x4}]}, 0x18}}, 0x0) 08:44:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socket(0x1d, 0x0, 0x0) 08:44:05 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x1006, 0x0, 0x1, r3, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x336, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:44:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000140)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@gettaction={0x18, 0x30, 0xffffff1f, 0x0, 0x0, {}, [@action_gd=@TCA_ACT_TAB={0x4}]}, 0x18}}, 0x0) 08:44:05 executing program 0: syz_emit_ethernet(0x595, &(0x7f0000000240)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "7f81dd", 0x55f, 0x0, 0x0, @dev, @ipv4={[], [], @multicast2}, {[@hopopts={0x0, 0x0, [], [@ra]}, @routing={0x0, 0x8, 0x0, 0x0, 0x0, [@mcast1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast1, @ipv4={[], [], @remote}]}, @dstopts={0x0, 0x14, [], [@padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @generic={0x0, 0x3f, "d6af6fb5496040ec3fbfcee02dc046bf41f6b203c89dc1e20cf57c26afd7f0ba0d901bfedf1deccad1ad15aaa6eef00df6bcb8a0cc2ae1db0107e256ad9f01"}, @enc_lim, @hao={0xc9, 0x10, @mcast1}, @generic={0x0, 0x44, "5c8edcc4a11f2a6094f67fcb0099111b8df1c3acb034e60f144021218d86007caeeec04c049b3a6cef5e9e8ab2a9a722d604e300ee1ef57fc9c3526717542330a3a67bfd"}]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@local]}, @fragment, @hopopts={0x0, 0x1c, [], [@calipso={0x7, 0x40, {0x0, 0xe, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, @calipso={0x7, 0x28, {0x0, 0x8, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0]}}, @generic={0x0, 0x25, "5502675e2355db906d875d681d6c83fbff7b50b2cc3c9683b973fc7b75d506b2119388115d"}, @calipso={0x7, 0x10, {0x0, 0x2, 0x0, 0x0, [0x0]}}, @jumbo, @calipso={0x7, 0x28, {0x0, 0x8, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0]}}, @ra, @ra, @padn={0x1, 0x2, [0x0, 0x0]}]}, @dstopts={0x0, 0x7, [], [@calipso={0x7, 0x38, {0x0, 0xc, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}]}], @icmpv6=@time_exceed={0x3, 0x0, 0x0, 0x0, [], {0x0, 0x6, "af266d", 0x0, 0x0, 0x0, @ipv4={[], [], @empty}, @ipv4, [@srh={0x0, 0x8, 0x4, 0x4, 0x0, 0x0, 0x0, [@rand_addr="dca9351cc6f307458cd9fb5e518ab63c", @mcast2, @remote, @mcast1]}, @hopopts={0x0, 0x16, [], [@pad1, @enc_lim, @ra, @pad1, @enc_lim, @generic={0x0, 0x9f, "3af643d06a0a421eb71289619ebaf6433ec8ef95ee9b09321b8f750201c8d3af46f7e8d0b077992af9619c5ef009e593dbb0e087c770b795ce01c9caeafd0eedd209d9f1bd6283cf37cde132496e1843b99d3f80e0c08c10b66cc705c508f9d02c9c5fc9f747993105e2d7c3d880d076c74676899944e45d0e02798a5ea290939c5adfdd1d6cf2dc927fc668810f45efefb3442c7a5a9e52351cb03ea582e6"}]}, @srh={0x0, 0x10, 0x4, 0x8, 0x0, 0x0, 0x0, [@mcast2, @mcast1, @dev, @rand_addr="a64d3cb2a7b617de64feb4df9d3fab71", @loopback, @empty, @empty, @remote]}, @srh={0x0, 0x6, 0x4, 0x3, 0x0, 0x0, 0x0, [@empty, @dev, @ipv4={[], [], @broadcast}]}, @dstopts={0x0, 0xc, [], [@pad1, @enc_lim, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @hao={0xc9, 0x10, @dev}, @hao={0xc9, 0x10, @rand_addr="77c29572ec5a7671ddae4a5e320a45ee"}, @calipso={0x7, 0x20, {0x0, 0x6, 0x0, 0x0, [0x0, 0x0, 0x0]}}, @pad1]}, @routing={0x0, 0xa, 0x0, 0x0, 0x0, [@dev, @ipv4={[], [], @loopback}, @mcast1, @local, @ipv4={[], [], @broadcast}]}], "c0ca705de1e04e01a7484dd362ccb5a6ef9a891605475de2426fda4ad199b433e381bf5173927500e0f87e804e609e7e0049ae580f0b5bb715c41b55eedd6d"}}}}}}}, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r1, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 457.636887][T19972] can: request_module (can-proto-0) failed. 08:44:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f00001c3000)={&(0x7f0000014000)={0x2, 0x0, @local}, 0x10, 0x0, 0x0, &(0x7f0000000840)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0}, &(0x7f0000000280)=[{&(0x7f00000001c0)=""/168, 0xa8}], 0x1}}, @rdma_args={0x48, 0x114, 0x1, {{}, {0x0}, 0x0, 0x40000}}], 0x90}, 0x0) 08:44:05 executing program 1: ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(r0, 0xfffffbfffff3ffa7, &(0x7f0000000140)) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0xc0000) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)={0x28, 0x0, 0x43335e0b664d39ad, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x4, 0x1, @udp='udp:syz2\x00'}]}]}, 0x28}}, 0x0) 08:44:05 executing program 3: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{0x0, 0x224}], 0x1, 0x0) 08:44:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000140)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@gettaction={0x18, 0x30, 0xffffff1f, 0x0, 0x0, {}, [@action_gd=@TCA_ACT_TAB={0x4}]}, 0x18}}, 0x0) 08:44:05 executing program 3: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{0x0, 0x224}], 0x1, 0x0) 08:44:05 executing program 0: syz_emit_ethernet(0x595, &(0x7f0000000240)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "7f81dd", 0x55f, 0x0, 0x0, @dev, @ipv4={[], [], @multicast2}, {[@hopopts={0x0, 0x0, [], [@ra]}, @routing={0x0, 0x8, 0x0, 0x0, 0x0, [@mcast1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast1, @ipv4={[], [], @remote}]}, @dstopts={0x0, 0x14, [], [@padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @generic={0x0, 0x3f, "d6af6fb5496040ec3fbfcee02dc046bf41f6b203c89dc1e20cf57c26afd7f0ba0d901bfedf1deccad1ad15aaa6eef00df6bcb8a0cc2ae1db0107e256ad9f01"}, @enc_lim, @hao={0xc9, 0x10, @mcast1}, @generic={0x0, 0x44, "5c8edcc4a11f2a6094f67fcb0099111b8df1c3acb034e60f144021218d86007caeeec04c049b3a6cef5e9e8ab2a9a722d604e300ee1ef57fc9c3526717542330a3a67bfd"}]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@local]}, @fragment, @hopopts={0x0, 0x1c, [], [@calipso={0x7, 0x40, {0x0, 0xe, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, @calipso={0x7, 0x28, {0x0, 0x8, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0]}}, @generic={0x0, 0x25, "5502675e2355db906d875d681d6c83fbff7b50b2cc3c9683b973fc7b75d506b2119388115d"}, @calipso={0x7, 0x10, {0x0, 0x2, 0x0, 0x0, [0x0]}}, @jumbo, @calipso={0x7, 0x28, {0x0, 0x8, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0]}}, @ra, @ra, @padn={0x1, 0x2, [0x0, 0x0]}]}, @dstopts={0x0, 0x7, [], [@calipso={0x7, 0x38, {0x0, 0xc, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}]}], @icmpv6=@time_exceed={0x3, 0x0, 0x0, 0x0, [], {0x0, 0x6, "af266d", 0x0, 0x0, 0x0, @ipv4={[], [], @empty}, @ipv4, [@srh={0x0, 0x8, 0x4, 0x4, 0x0, 0x0, 0x0, [@rand_addr="dca9351cc6f307458cd9fb5e518ab63c", @mcast2, @remote, @mcast1]}, @hopopts={0x0, 0x16, [], [@pad1, @enc_lim, @ra, @pad1, @enc_lim, @generic={0x0, 0x9f, "3af643d06a0a421eb71289619ebaf6433ec8ef95ee9b09321b8f750201c8d3af46f7e8d0b077992af9619c5ef009e593dbb0e087c770b795ce01c9caeafd0eedd209d9f1bd6283cf37cde132496e1843b99d3f80e0c08c10b66cc705c508f9d02c9c5fc9f747993105e2d7c3d880d076c74676899944e45d0e02798a5ea290939c5adfdd1d6cf2dc927fc668810f45efefb3442c7a5a9e52351cb03ea582e6"}]}, @srh={0x0, 0x10, 0x4, 0x8, 0x0, 0x0, 0x0, [@mcast2, @mcast1, @dev, @rand_addr="a64d3cb2a7b617de64feb4df9d3fab71", @loopback, @empty, @empty, @remote]}, @srh={0x0, 0x6, 0x4, 0x3, 0x0, 0x0, 0x0, [@empty, @dev, @ipv4={[], [], @broadcast}]}, @dstopts={0x0, 0xc, [], [@pad1, @enc_lim, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @hao={0xc9, 0x10, @dev}, @hao={0xc9, 0x10, @rand_addr="77c29572ec5a7671ddae4a5e320a45ee"}, @calipso={0x7, 0x20, {0x0, 0x6, 0x0, 0x0, [0x0, 0x0, 0x0]}}, @pad1]}, @routing={0x0, 0xa, 0x0, 0x0, 0x0, [@dev, @ipv4={[], [], @loopback}, @mcast1, @local, @ipv4={[], [], @broadcast}]}], "c0ca705de1e04e01a7484dd362ccb5a6ef9a891605475de2426fda4ad199b433e381bf5173927500e0f87e804e609e7e0049ae580f0b5bb715c41b55eedd6d"}}}}}}}, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r1, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 08:44:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f00001c3000)={&(0x7f0000014000)={0x2, 0x0, @local}, 0x10, 0x0, 0x0, &(0x7f0000000840)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0}, &(0x7f0000000280)=[{&(0x7f00000001c0)=""/168, 0xa8}], 0x1}}, @rdma_args={0x48, 0x114, 0x1, {{}, {0x0}, 0x0, 0x40000}}], 0x90}, 0x0) 08:44:05 executing program 1: ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(r0, 0xfffffbfffff3ffa7, &(0x7f0000000140)) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0xc0000) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)={0x28, 0x0, 0x43335e0b664d39ad, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x4, 0x1, @udp='udp:syz2\x00'}]}]}, 0x28}}, 0x0) 08:44:06 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r1, 0x80000) 08:44:06 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x1006, 0x0, 0x1, r3, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x336, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:44:06 executing program 3: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{0x0, 0x224}], 0x1, 0x0) 08:44:06 executing program 0: syz_emit_ethernet(0x595, &(0x7f0000000240)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "7f81dd", 0x55f, 0x0, 0x0, @dev, @ipv4={[], [], @multicast2}, {[@hopopts={0x0, 0x0, [], [@ra]}, @routing={0x0, 0x8, 0x0, 0x0, 0x0, [@mcast1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast1, @ipv4={[], [], @remote}]}, @dstopts={0x0, 0x14, [], [@padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @generic={0x0, 0x3f, "d6af6fb5496040ec3fbfcee02dc046bf41f6b203c89dc1e20cf57c26afd7f0ba0d901bfedf1deccad1ad15aaa6eef00df6bcb8a0cc2ae1db0107e256ad9f01"}, @enc_lim, @hao={0xc9, 0x10, @mcast1}, @generic={0x0, 0x44, "5c8edcc4a11f2a6094f67fcb0099111b8df1c3acb034e60f144021218d86007caeeec04c049b3a6cef5e9e8ab2a9a722d604e300ee1ef57fc9c3526717542330a3a67bfd"}]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@local]}, @fragment, @hopopts={0x0, 0x1c, [], [@calipso={0x7, 0x40, {0x0, 0xe, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, @calipso={0x7, 0x28, {0x0, 0x8, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0]}}, @generic={0x0, 0x25, "5502675e2355db906d875d681d6c83fbff7b50b2cc3c9683b973fc7b75d506b2119388115d"}, @calipso={0x7, 0x10, {0x0, 0x2, 0x0, 0x0, [0x0]}}, @jumbo, @calipso={0x7, 0x28, {0x0, 0x8, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0]}}, @ra, @ra, @padn={0x1, 0x2, [0x0, 0x0]}]}, @dstopts={0x0, 0x7, [], [@calipso={0x7, 0x38, {0x0, 0xc, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}]}], @icmpv6=@time_exceed={0x3, 0x0, 0x0, 0x0, [], {0x0, 0x6, "af266d", 0x0, 0x0, 0x0, @ipv4={[], [], @empty}, @ipv4, [@srh={0x0, 0x8, 0x4, 0x4, 0x0, 0x0, 0x0, [@rand_addr="dca9351cc6f307458cd9fb5e518ab63c", @mcast2, @remote, @mcast1]}, @hopopts={0x0, 0x16, [], [@pad1, @enc_lim, @ra, @pad1, @enc_lim, @generic={0x0, 0x9f, "3af643d06a0a421eb71289619ebaf6433ec8ef95ee9b09321b8f750201c8d3af46f7e8d0b077992af9619c5ef009e593dbb0e087c770b795ce01c9caeafd0eedd209d9f1bd6283cf37cde132496e1843b99d3f80e0c08c10b66cc705c508f9d02c9c5fc9f747993105e2d7c3d880d076c74676899944e45d0e02798a5ea290939c5adfdd1d6cf2dc927fc668810f45efefb3442c7a5a9e52351cb03ea582e6"}]}, @srh={0x0, 0x10, 0x4, 0x8, 0x0, 0x0, 0x0, [@mcast2, @mcast1, @dev, @rand_addr="a64d3cb2a7b617de64feb4df9d3fab71", @loopback, @empty, @empty, @remote]}, @srh={0x0, 0x6, 0x4, 0x3, 0x0, 0x0, 0x0, [@empty, @dev, @ipv4={[], [], @broadcast}]}, @dstopts={0x0, 0xc, [], [@pad1, @enc_lim, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @hao={0xc9, 0x10, @dev}, @hao={0xc9, 0x10, @rand_addr="77c29572ec5a7671ddae4a5e320a45ee"}, @calipso={0x7, 0x20, {0x0, 0x6, 0x0, 0x0, [0x0, 0x0, 0x0]}}, @pad1]}, @routing={0x0, 0xa, 0x0, 0x0, 0x0, [@dev, @ipv4={[], [], @loopback}, @mcast1, @local, @ipv4={[], [], @broadcast}]}], "c0ca705de1e04e01a7484dd362ccb5a6ef9a891605475de2426fda4ad199b433e381bf5173927500e0f87e804e609e7e0049ae580f0b5bb715c41b55eedd6d"}}}}}}}, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r1, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 08:44:06 executing program 1: ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(r0, 0xfffffbfffff3ffa7, &(0x7f0000000140)) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0xc0000) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)={0x28, 0x0, 0x43335e0b664d39ad, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x4, 0x1, @udp='udp:syz2\x00'}]}]}, 0x28}}, 0x0) 08:44:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f00001c3000)={&(0x7f0000014000)={0x2, 0x0, @local}, 0x10, 0x0, 0x0, &(0x7f0000000840)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0}, &(0x7f0000000280)=[{&(0x7f00000001c0)=""/168, 0xa8}], 0x1}}, @rdma_args={0x48, 0x114, 0x1, {{}, {0x0}, 0x0, 0x40000}}], 0x90}, 0x0) 08:44:06 executing program 0: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = dup2(r0, r0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x82, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) mmap(&(0x7f0000000000/0x22000)=nil, 0x22000, 0xfffffbffffffffff, 0x2000000000032, 0xffffffffffffffff, 0x0) close(r0) 08:44:06 executing program 3: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{0x0, 0x224}], 0x1, 0x0) 08:44:06 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r1, 0x80000) 08:44:06 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000340)='/dev/video#\x00', 0xff, 0x0) ioctl$VIDIOC_S_EDID(r0, 0xc0285629, &(0x7f00000003c0)={0x0, 0x0, 0x0, [], 0x0}) 08:44:06 executing program 3: r0 = socket$inet(0x2, 0x3, 0x480000000002) setsockopt$inet_int(r0, 0x0, 0xc8, &(0x7f0000000080), 0x4) r1 = socket$inet(0x2, 0x3, 0x480000000002) setsockopt$inet_int(r1, 0x0, 0xc8, &(0x7f0000000080), 0x4) 08:44:06 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) pipe(0x0) sendto$rxrpc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) syz_open_dev$swradio(0x0, 0x0, 0x2) 08:44:06 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x1006, 0x0, 0x1, r3, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x336, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:44:06 executing program 0: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = dup2(r0, r0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x82, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) mmap(&(0x7f0000000000/0x22000)=nil, 0x22000, 0xfffffbffffffffff, 0x2000000000032, 0xffffffffffffffff, 0x0) close(r0) 08:44:06 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r1, 0x80000) 08:44:06 executing program 3: r0 = socket$inet(0x2, 0x3, 0x480000000002) setsockopt$inet_int(r0, 0x0, 0xc8, &(0x7f0000000080), 0x4) r1 = socket$inet(0x2, 0x3, 0x480000000002) setsockopt$inet_int(r1, 0x0, 0xc8, &(0x7f0000000080), 0x4) 08:44:06 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000340)='/dev/video#\x00', 0xff, 0x0) ioctl$VIDIOC_S_EDID(r0, 0xc0285629, &(0x7f00000003c0)={0x0, 0x0, 0x0, [], 0x0}) 08:44:06 executing program 0: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = dup2(r0, r0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x82, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) mmap(&(0x7f0000000000/0x22000)=nil, 0x22000, 0xfffffbffffffffff, 0x2000000000032, 0xffffffffffffffff, 0x0) close(r0) 08:44:06 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r1, 0x80000) 08:44:06 executing program 3: r0 = socket$inet(0x2, 0x3, 0x480000000002) setsockopt$inet_int(r0, 0x0, 0xc8, &(0x7f0000000080), 0x4) r1 = socket$inet(0x2, 0x3, 0x480000000002) setsockopt$inet_int(r1, 0x0, 0xc8, &(0x7f0000000080), 0x4) 08:44:07 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xfffffbff406855c7, &(0x7f0000000000)) 08:44:07 executing program 3: r0 = socket$inet(0x2, 0x3, 0x480000000002) setsockopt$inet_int(r0, 0x0, 0xc8, &(0x7f0000000080), 0x4) r1 = socket$inet(0x2, 0x3, 0x480000000002) setsockopt$inet_int(r1, 0x0, 0xc8, &(0x7f0000000080), 0x4) 08:44:07 executing program 0: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = dup2(r0, r0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x82, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) mmap(&(0x7f0000000000/0x22000)=nil, 0x22000, 0xfffffbffffffffff, 0x2000000000032, 0xffffffffffffffff, 0x0) close(r0) 08:44:07 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) pipe(0x0) sendto$rxrpc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) syz_open_dev$swradio(0x0, 0x0, 0x2) 08:44:07 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000340)='/dev/video#\x00', 0xff, 0x0) ioctl$VIDIOC_S_EDID(r0, 0xc0285629, &(0x7f00000003c0)={0x0, 0x0, 0x0, [], 0x0}) 08:44:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") unshare(0x24000400) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000000), &(0x7f0000000100)=0x4) 08:44:07 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xfffffbff406855c7, &(0x7f0000000000)) 08:44:07 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) pipe(0x0) sendto$rxrpc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) syz_open_dev$swradio(0x0, 0x0, 0x2) 08:44:07 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) pipe(0x0) sendto$rxrpc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) syz_open_dev$swradio(0x0, 0x0, 0x2) 08:44:07 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000340)='/dev/video#\x00', 0xff, 0x0) ioctl$VIDIOC_S_EDID(r0, 0xc0285629, &(0x7f00000003c0)={0x0, 0x0, 0x0, [], 0x0}) 08:44:07 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xfffffbff406855c7, &(0x7f0000000000)) 08:44:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") unshare(0x24000400) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000000), &(0x7f0000000100)=0x4) 08:44:07 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) pipe(0x0) sendto$rxrpc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) syz_open_dev$swradio(0x0, 0x0, 0x2) 08:44:07 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xfffffbff406855c7, &(0x7f0000000000)) 08:44:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") unshare(0x24000400) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000000), &(0x7f0000000100)=0x4) 08:44:07 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) pipe(0x0) sendto$rxrpc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) syz_open_dev$swradio(0x0, 0x0, 0x2) 08:44:07 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) pipe(0x0) sendto$rxrpc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) syz_open_dev$swradio(0x0, 0x0, 0x2) 08:44:07 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) pipe(0x0) sendto$rxrpc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) syz_open_dev$swradio(0x0, 0x0, 0x2) 08:44:08 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) pipe(0x0) sendto$rxrpc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) syz_open_dev$swradio(0x0, 0x0, 0x2) 08:44:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") unshare(0x24000400) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000000), &(0x7f0000000100)=0x4) 08:44:08 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) pipe(0x0) sendto$rxrpc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) syz_open_dev$swradio(0x0, 0x0, 0x2) 08:44:08 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) pipe(0x0) sendto$rxrpc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) syz_open_dev$swradio(0x0, 0x0, 0x2) 08:44:08 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) pipe(0x0) sendto$rxrpc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) syz_open_dev$swradio(0x0, 0x0, 0x2) 08:44:08 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) pipe(0x0) sendto$rxrpc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) syz_open_dev$swradio(0x0, 0x0, 0x2) 08:44:08 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) pipe(0x0) sendto$rxrpc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) syz_open_dev$swradio(0x0, 0x0, 0x2) 08:44:08 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) pipe(0x0) sendto$rxrpc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) syz_open_dev$swradio(0x0, 0x0, 0x2) 08:44:09 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) pipe(0x0) sendto$rxrpc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) syz_open_dev$swradio(0x0, 0x0, 0x2) 08:44:09 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) pipe(0x0) sendto$rxrpc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) syz_open_dev$swradio(0x0, 0x0, 0x2) 08:44:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) pipe(0x0) sendto$rxrpc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) syz_open_dev$swradio(0x0, 0x0, 0x2) 08:44:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) semget(0x1, 0x4, 0x200) semop(0x0, 0x0, 0x0) semctl$IPC_RMID(0x0, 0x3, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20ncci\x00', 0x0, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x21, &(0x7f0000000200), &(0x7f00000001c0)=0x4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r2 = fanotify_init(0x200, 0x0) fanotify_mark(r2, 0xd, 0x16, r1, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f00000000c0)="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") setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x2, &(0x7f0000000000)=0x41, 0x4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000040)) 08:44:09 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) pipe(0x0) sendto$rxrpc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) syz_open_dev$swradio(0x0, 0x0, 0x2) 08:44:09 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) pipe(0x0) sendto$rxrpc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) syz_open_dev$swradio(0x0, 0x0, 0x2) 08:44:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) semget(0x1, 0x4, 0x200) semop(0x0, 0x0, 0x0) semctl$IPC_RMID(0x0, 0x3, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20ncci\x00', 0x0, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x21, &(0x7f0000000200), &(0x7f00000001c0)=0x4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r2 = fanotify_init(0x200, 0x0) fanotify_mark(r2, 0xd, 0x16, r1, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f00000000c0)="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") setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x2, &(0x7f0000000000)=0x41, 0x4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000040)) 08:44:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) pipe(0x0) sendto$rxrpc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) syz_open_dev$swradio(0x0, 0x0, 0x2) 08:44:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) semget(0x1, 0x4, 0x200) semop(0x0, 0x0, 0x0) semctl$IPC_RMID(0x0, 0x3, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20ncci\x00', 0x0, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x21, &(0x7f0000000200), &(0x7f00000001c0)=0x4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r2 = fanotify_init(0x200, 0x0) fanotify_mark(r2, 0xd, 0x16, r1, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f00000000c0)="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") setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x2, &(0x7f0000000000)=0x41, 0x4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000040)) 08:44:09 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) pipe(0x0) sendto$rxrpc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) syz_open_dev$swradio(0x0, 0x0, 0x2) 08:44:09 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) pipe(0x0) sendto$rxrpc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) syz_open_dev$swradio(0x0, 0x0, 0x2) 08:44:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) semget(0x1, 0x4, 0x200) semop(0x0, 0x0, 0x0) semctl$IPC_RMID(0x0, 0x3, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20ncci\x00', 0x0, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x21, &(0x7f0000000200), &(0x7f00000001c0)=0x4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r2 = fanotify_init(0x200, 0x0) fanotify_mark(r2, 0xd, 0x16, r1, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f00000000c0)="6e54b082454e59c20ed8053c7aed08c069cfd78aa950b9a211e7b1ab34555f6e794819a1c216205781387bbb14f7568e938e8cef77b7579c3493f6ecc6abb7035486a8fa775452fc963dc19949efce897e7bb21fa9ce60fd6d5918281d2124c69301a091b195c0f61fd51ddfa2e3378c3dcbae731cddb0ae5994507f72fdfd0f29a6736715c81a30f1f629e6241c2c13d5e3df568e3620050267e754912072c1dbaac0203b07ec615176266529d8ac4b23a1afa5026bf4e4c59701ac2becdf57209dd96b80c275e3ac6c1d177809ecc2201a8f8ae3f7bfc93403b8f55257fb933c68af1b058fc2fabfdf7882c653cededf2aecff3d28e218a9bb2da33eb570f9") setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x2, &(0x7f0000000000)=0x41, 0x4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000040)) 08:44:10 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) pipe(0x0) sendto$rxrpc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) syz_open_dev$swradio(0x0, 0x0, 0x2) 08:44:10 executing program 4: r0 = socket$kcm(0xa, 0x6, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0x2, &(0x7f0000000080), 0x4a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) 08:44:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) semget(0x1, 0x4, 0x200) semop(0x0, 0x0, 0x0) semctl$IPC_RMID(0x0, 0x3, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20ncci\x00', 0x0, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x21, &(0x7f0000000200), &(0x7f00000001c0)=0x4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r2 = fanotify_init(0x200, 0x0) fanotify_mark(r2, 0xd, 0x16, r1, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f00000000c0)="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") setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x2, &(0x7f0000000000)=0x41, 0x4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000040)) 08:44:10 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioprio_set$pid(0x0, 0x0, 0x3) 08:44:10 executing program 4: r0 = socket$kcm(0xa, 0x6, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0x2, &(0x7f0000000080), 0x4a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) 08:44:10 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) pipe(0x0) sendto$rxrpc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) syz_open_dev$swradio(0x0, 0x0, 0x2) 08:44:10 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioprio_set$pid(0x0, 0x0, 0x3) 08:44:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) semget(0x1, 0x4, 0x200) semop(0x0, 0x0, 0x0) semctl$IPC_RMID(0x0, 0x3, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20ncci\x00', 0x0, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x21, &(0x7f0000000200), &(0x7f00000001c0)=0x4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r2 = fanotify_init(0x200, 0x0) fanotify_mark(r2, 0xd, 0x16, r1, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f00000000c0)="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") setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x2, &(0x7f0000000000)=0x41, 0x4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000040)) 08:44:10 executing program 4: r0 = socket$kcm(0xa, 0x6, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0x2, &(0x7f0000000080), 0x4a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) 08:44:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) semget(0x1, 0x4, 0x200) semop(0x0, 0x0, 0x0) semctl$IPC_RMID(0x0, 0x3, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20ncci\x00', 0x0, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x21, &(0x7f0000000200), &(0x7f00000001c0)=0x4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r2 = fanotify_init(0x200, 0x0) fanotify_mark(r2, 0xd, 0x16, r1, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f00000000c0)="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") setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x2, &(0x7f0000000000)=0x41, 0x4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000040)) 08:44:10 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioprio_set$pid(0x0, 0x0, 0x3) 08:44:10 executing program 4: r0 = socket$kcm(0xa, 0x6, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0x2, &(0x7f0000000080), 0x4a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) 08:44:10 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0xfffffffffffffef1, 0xfa00, {0x0, 0x0}}, 0x1c3) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000880)="17", 0x1}, {0x0}], 0x2) 08:44:10 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioprio_set$pid(0x0, 0x0, 0x3) 08:44:10 executing program 3: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000077c0)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = socket$pppoe(0x18, 0x1, 0x0) pipe2(0x0, 0x0) r2 = syz_open_dev$media(0x0, 0x0, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xffffffffffffffff}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in6, @in=@empty}}, {{@in=@empty}, 0x0, @in=@dev}}, &(0x7f0000000040)=0xe8) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000240), 0x4) connect$pppoe(r1, &(0x7f0000000080)={0x18, 0x0, {0x2, @link_local, 'bond0\x00'}}, 0x1e) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000340)={0x10000, 0x1, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) keyctl$get_keyring_id(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='bbr\x00', 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x100) ioctl$SIOCAX25DELFWD(r0, 0x89eb, &(0x7f00000000c0)={@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}) 08:44:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000002680)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)=[@rights={{0x14, 0x1, 0x1, [r0]}}], 0x18}], 0x4924924924922a7, 0x0) 08:44:11 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000180)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_GET_SERIAL(r0, 0xc0104307, &(0x7f0000000080)=0x10000) 08:44:11 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$llc_int(r0, 0x10c, 0x2, &(0x7f0000000040), 0x4) 08:44:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000002680)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)=[@rights={{0x14, 0x1, 0x1, [r0]}}], 0x18}], 0x4924924924922a7, 0x0) 08:44:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000002680)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)=[@rights={{0x14, 0x1, 0x1, [r0]}}], 0x18}], 0x4924924924922a7, 0x0) 08:44:11 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000180)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_GET_SERIAL(r0, 0xc0104307, &(0x7f0000000080)=0x10000) 08:44:11 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$llc_int(r0, 0x10c, 0x2, &(0x7f0000000040), 0x4) [ 463.379927][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 463.386075][ C0] protocol 88fb is buggy, dev hsr_slave_1 08:44:11 executing program 3: syz_open_dev$sndctrl(&(0x7f0000000600)='/dev/snd/controlC#\x00', 0x0, 0x0) syz_open_dev$video4linux(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) dup(r0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) unshare(0x600) pselect6(0x40, &(0x7f0000000100), 0x0, &(0x7f0000000180)={0x1b8}, &(0x7f0000000200)={0x0, 0x989680}, 0x0) 08:44:11 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$llc_int(r0, 0x10c, 0x2, &(0x7f0000000040), 0x4) 08:44:12 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0xfffffffffffffef1, 0xfa00, {0x0, 0x0}}, 0x1c3) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000880)="17", 0x1}, {0x0}], 0x2) 08:44:12 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000180)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_GET_SERIAL(r0, 0xc0104307, &(0x7f0000000080)=0x10000) 08:44:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000002680)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)=[@rights={{0x14, 0x1, 0x1, [r0]}}], 0x18}], 0x4924924924922a7, 0x0) 08:44:12 executing program 3: syz_open_dev$sndctrl(&(0x7f0000000600)='/dev/snd/controlC#\x00', 0x0, 0x0) syz_open_dev$video4linux(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) dup(r0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) unshare(0x600) pselect6(0x40, &(0x7f0000000100), 0x0, &(0x7f0000000180)={0x1b8}, &(0x7f0000000200)={0x0, 0x989680}, 0x0) 08:44:12 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$llc_int(r0, 0x10c, 0x2, &(0x7f0000000040), 0x4) 08:44:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000002680)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)=[@rights={{0x14, 0x1, 0x1, [r0]}}], 0x18}], 0x4924924924922a7, 0x0) 08:44:12 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000180)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_GET_SERIAL(r0, 0xc0104307, &(0x7f0000000080)=0x10000) 08:44:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000002680)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)=[@rights={{0x14, 0x1, 0x1, [r0]}}], 0x18}], 0x4924924924922a7, 0x0) 08:44:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6(0xa, 0x400000000001, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) rt_sigaction(0x12, 0x0, 0x0, 0x8, &(0x7f0000000440)) timer_create(0x3, 0x0, 0x0) r2 = dup(r0) inotify_add_watch(0xffffffffffffffff, &(0x7f00000001c0)='./bus\x00', 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) getsockopt$inet6_tcp_buf(r0, 0x6, 0x7ab51b07805a3552, &(0x7f0000000380)=""/234, &(0x7f0000000300)=0xea) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0xfffffffffffffd79) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) accept(r0, &(0x7f0000000240)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000002c0)=0x80) pwrite64(r0, &(0x7f0000000500), 0x0, 0x0) ftruncate(r3, 0x7fff) sendfile(r2, r3, 0x0, 0x8040fffffffd) 08:44:12 executing program 3: syz_open_dev$sndctrl(&(0x7f0000000600)='/dev/snd/controlC#\x00', 0x0, 0x0) syz_open_dev$video4linux(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) dup(r0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) unshare(0x600) pselect6(0x40, &(0x7f0000000100), 0x0, &(0x7f0000000180)={0x1b8}, &(0x7f0000000200)={0x0, 0x989680}, 0x0) 08:44:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000002680)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)=[@rights={{0x14, 0x1, 0x1, [r0]}}], 0x18}], 0x4924924924922a7, 0x0) 08:44:12 executing program 2: r0 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) io_setup(0x5, &(0x7f0000000300)=0x0) io_submit(r2, 0x1, &(0x7f0000000000)=[&(0x7f0000000540)={0x3000000, 0x0, 0x0, 0x800000000001, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 08:44:12 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0xfffffffffffffef1, 0xfa00, {0x0, 0x0}}, 0x1c3) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000880)="17", 0x1}, {0x0}], 0x2) 08:44:12 executing program 4: socket$inet(0xa, 0x801, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, &(0x7f0000000140)="66b9810000400f322ed30cbad104ec660f38df2b0fe21526660ff85e503ede1b0f20c06635000000800f22c0b800088ec00fae470b", 0x35}], 0x1, 0x51, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000fe9000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x10000000) 08:44:12 executing program 3: syz_open_dev$sndctrl(&(0x7f0000000600)='/dev/snd/controlC#\x00', 0x0, 0x0) syz_open_dev$video4linux(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) dup(r0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) unshare(0x600) pselect6(0x40, &(0x7f0000000100), 0x0, &(0x7f0000000180)={0x1b8}, &(0x7f0000000200)={0x0, 0x989680}, 0x0) 08:44:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpriority(0x2, 0x0) 08:44:12 executing program 2: r0 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) io_setup(0x5, &(0x7f0000000300)=0x0) io_submit(r2, 0x1, &(0x7f0000000000)=[&(0x7f0000000540)={0x3000000, 0x0, 0x0, 0x800000000001, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 08:44:12 executing program 3: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 08:44:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpriority(0x2, 0x0) 08:44:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpriority(0x2, 0x0) [ 465.315334][T20323] cgroup: fork rejected by pids controller in /syz5 08:44:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6(0xa, 0x400000000001, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) rt_sigaction(0x12, 0x0, 0x0, 0x8, &(0x7f0000000440)) timer_create(0x3, 0x0, 0x0) r2 = dup(r0) inotify_add_watch(0xffffffffffffffff, &(0x7f00000001c0)='./bus\x00', 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) getsockopt$inet6_tcp_buf(r0, 0x6, 0x7ab51b07805a3552, &(0x7f0000000380)=""/234, &(0x7f0000000300)=0xea) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0xfffffffffffffd79) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) accept(r0, &(0x7f0000000240)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000002c0)=0x80) pwrite64(r0, &(0x7f0000000500), 0x0, 0x0) ftruncate(r3, 0x7fff) sendfile(r2, r3, 0x0, 0x8040fffffffd) 08:44:13 executing program 2: r0 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) io_setup(0x5, &(0x7f0000000300)=0x0) io_submit(r2, 0x1, &(0x7f0000000000)=[&(0x7f0000000540)={0x3000000, 0x0, 0x0, 0x800000000001, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 08:44:13 executing program 3: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 08:44:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpriority(0x2, 0x0) 08:44:13 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0xfffffffffffffef1, 0xfa00, {0x0, 0x0}}, 0x1c3) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000880)="17", 0x1}, {0x0}], 0x2) 08:44:13 executing program 4: socket$inet(0xa, 0x801, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, &(0x7f0000000140)="66b9810000400f322ed30cbad104ec660f38df2b0fe21526660ff85e503ede1b0f20c06635000000800f22c0b800088ec00fae470b", 0x35}], 0x1, 0x51, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000fe9000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x10000000) 08:44:13 executing program 1: socket$inet(0xa, 0x801, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, &(0x7f0000000140)="66b9810000400f322ed30cbad104ec660f38df2b0fe21526660ff85e503ede1b0f20c06635000000800f22c0b800088ec00fae470b", 0x35}], 0x1, 0x51, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000fe9000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x10000000) 08:44:13 executing program 2: r0 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) io_setup(0x5, &(0x7f0000000300)=0x0) io_submit(r2, 0x1, &(0x7f0000000000)=[&(0x7f0000000540)={0x3000000, 0x0, 0x0, 0x800000000001, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 08:44:13 executing program 3: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 08:44:14 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x3, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x6c, [{0x1, 0x2}]}, @enum]}, {0x0, [0x5f]}}, &(0x7f00000002c0)=""/236, 0x3f, 0xec, 0x1}, 0x20) 08:44:14 executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() perf_event_open(&(0x7f00000015c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x15, 0x4, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff23, 0x0, 0x7ff, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0xf91575ca2f3c10d3, @perf_bp={0x0, 0x8}, 0x0, 0x101}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff03f0000d698cb89e40f008061fffffff00004000630677fbac141414e9", 0x0, 0x100}, 0x28) 08:44:14 executing program 3: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 08:44:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6(0xa, 0x400000000001, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) rt_sigaction(0x12, 0x0, 0x0, 0x8, &(0x7f0000000440)) timer_create(0x3, 0x0, 0x0) r2 = dup(r0) inotify_add_watch(0xffffffffffffffff, &(0x7f00000001c0)='./bus\x00', 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) getsockopt$inet6_tcp_buf(r0, 0x6, 0x7ab51b07805a3552, &(0x7f0000000380)=""/234, &(0x7f0000000300)=0xea) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0xfffffffffffffd79) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) accept(r0, &(0x7f0000000240)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000002c0)=0x80) pwrite64(r0, &(0x7f0000000500), 0x0, 0x0) ftruncate(r3, 0x7fff) sendfile(r2, r3, 0x0, 0x8040fffffffd) 08:44:14 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x3, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x6c, [{0x1, 0x2}]}, @enum]}, {0x0, [0x5f]}}, &(0x7f00000002c0)=""/236, 0x3f, 0xec, 0x1}, 0x20) 08:44:14 executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() perf_event_open(&(0x7f00000015c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x15, 0x4, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff23, 0x0, 0x7ff, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0xf91575ca2f3c10d3, @perf_bp={0x0, 0x8}, 0x0, 0x101}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff03f0000d698cb89e40f008061fffffff00004000630677fbac141414e9", 0x0, 0x100}, 0x28) 08:44:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000004c0)='bbr\x00', 0x4) openat$md(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) bind$inet(r0, &(0x7f0000000240)={0x2, 0x4e23}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) ioprio_get$uid(0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0xffffffffffffffd0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) link(0x0, 0x0) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x3b2) sendmsg$TIPC_CMD_GET_MAX_PORTS(r1, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000100)={0x1c, 0x0, 0x8, 0x70bd29, 0x25dfdbfb}, 0x1c}, 0x1, 0x0, 0x0, 0xc0}, 0x40005) 08:44:14 executing program 4: socket$inet(0xa, 0x801, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, &(0x7f0000000140)="66b9810000400f322ed30cbad104ec660f38df2b0fe21526660ff85e503ede1b0f20c06635000000800f22c0b800088ec00fae470b", 0x35}], 0x1, 0x51, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000fe9000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x10000000) 08:44:14 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x3, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x6c, [{0x1, 0x2}]}, @enum]}, {0x0, [0x5f]}}, &(0x7f00000002c0)=""/236, 0x3f, 0xec, 0x1}, 0x20) 08:44:14 executing program 1: socket$inet(0xa, 0x801, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, &(0x7f0000000140)="66b9810000400f322ed30cbad104ec660f38df2b0fe21526660ff85e503ede1b0f20c06635000000800f22c0b800088ec00fae470b", 0x35}], 0x1, 0x51, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000fe9000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x10000000) 08:44:14 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x3, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x6c, [{0x1, 0x2}]}, @enum]}, {0x0, [0x5f]}}, &(0x7f00000002c0)=""/236, 0x3f, 0xec, 0x1}, 0x20) 08:44:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") ioprio_set$uid(0x3, 0x0, 0x0) 08:44:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") ioprio_set$uid(0x3, 0x0, 0x0) 08:44:15 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)="ba", 0xfcb9, 0x0, 0x0, 0x325) close(r0) 08:44:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6(0xa, 0x400000000001, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) rt_sigaction(0x12, 0x0, 0x0, 0x8, &(0x7f0000000440)) timer_create(0x3, 0x0, 0x0) r2 = dup(r0) inotify_add_watch(0xffffffffffffffff, &(0x7f00000001c0)='./bus\x00', 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) getsockopt$inet6_tcp_buf(r0, 0x6, 0x7ab51b07805a3552, &(0x7f0000000380)=""/234, &(0x7f0000000300)=0xea) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0xfffffffffffffd79) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) accept(r0, &(0x7f0000000240)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000002c0)=0x80) pwrite64(r0, &(0x7f0000000500), 0x0, 0x0) ftruncate(r3, 0x7fff) sendfile(r2, r3, 0x0, 0x8040fffffffd) 08:44:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") ioprio_set$uid(0x3, 0x0, 0x0) 08:44:15 executing program 1: socket$inet(0xa, 0x801, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, &(0x7f0000000140)="66b9810000400f322ed30cbad104ec660f38df2b0fe21526660ff85e503ede1b0f20c06635000000800f22c0b800088ec00fae470b", 0x35}], 0x1, 0x51, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000fe9000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x10000000) 08:44:15 executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() perf_event_open(&(0x7f00000015c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x15, 0x4, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff23, 0x0, 0x7ff, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0xf91575ca2f3c10d3, @perf_bp={0x0, 0x8}, 0x0, 0x101}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff03f0000d698cb89e40f008061fffffff00004000630677fbac141414e9", 0x0, 0x100}, 0x28) 08:44:15 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)="ba", 0xfcb9, 0x0, 0x0, 0x325) close(r0) 08:44:15 executing program 4: socket$inet(0xa, 0x801, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, &(0x7f0000000140)="66b9810000400f322ed30cbad104ec660f38df2b0fe21526660ff85e503ede1b0f20c06635000000800f22c0b800088ec00fae470b", 0x35}], 0x1, 0x51, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000fe9000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x10000000) 08:44:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") ioprio_set$uid(0x3, 0x0, 0x0) 08:44:16 executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() perf_event_open(&(0x7f00000015c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x15, 0x4, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff23, 0x0, 0x7ff, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0xf91575ca2f3c10d3, @perf_bp={0x0, 0x8}, 0x0, 0x101}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff03f0000d698cb89e40f008061fffffff00004000630677fbac141414e9", 0x0, 0x100}, 0x28) 08:44:16 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)="ba", 0xfcb9, 0x0, 0x0, 0x325) close(r0) 08:44:16 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)="ba", 0xfcb9, 0x0, 0x0, 0x325) close(r0) 08:44:16 executing program 1: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000640)=@broute={'broute\x06\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/368]}, 0x1e8) socket(0x0, 0x803, 0x0) 08:44:16 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)="ba", 0xfcb9, 0x0, 0x0, 0x325) close(r0) 08:44:16 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)="ba", 0xfcb9, 0x0, 0x0, 0x325) close(r0) 08:44:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000080)=@sr0='ubi!/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='ubifs\x00', 0x0, 0x0) 08:44:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xfffffffffffffffc, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) syz_open_dev$adsp(0x0, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, 0x0) semget$private(0x0, 0x0, 0x0) semget$private(0x0, 0x0, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000000)=0x80000001, 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00d00, 0x0, 0x0, 0x800, 0x2000000000002) 08:44:16 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x57, 0x65}, [@ldst={0x7}]}, &(0x7f0000003ff6)='OPL\x00', 0x4, 0xff06, &(0x7f000000cf3d)=""/195}, 0x48) 08:44:16 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2000000, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$join(0x1, &(0x7f00000000c0)={'syz'}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xe19, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) link(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000280)=[{r0}], 0x1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000740)=0x20000000) mq_open(0x0, 0x0, 0x0, 0x0) poll(&(0x7f0000000080), 0x0, 0x0) [ 468.573875][T20614] UBIFS error (pid: 20614): cannot open "ubi!/sr0", error -19 08:44:16 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)="ba", 0xfcb9, 0x0, 0x0, 0x325) close(r0) 08:44:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000080)=@sr0='ubi!/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='ubifs\x00', 0x0, 0x0) [ 468.710831][T20621] mmap: syz-executor.5 (20621) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 08:44:16 executing program 1: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000640)=@broute={'broute\x06\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000ff0000000000000000d17d000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000080000000000000099000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006e72300000000000000000000000000079616d3000000001000000000000b40079616d3000000000000000000000000076657468315f743e5f7465616d0000000180c2000000000000000000aaaaaaaaaa000000000000000000b0000000b0000000e000000071756f746100000000000000000000000000000000000000000000000000000018000000000000000000000000000000000000000a000000000000000000000041554449540000000000000000010000000000000000000000000000000000000800"/368]}, 0x1e8) socket(0x0, 0x803, 0x0) 08:44:16 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x57, 0x65}, [@ldst={0x7}]}, &(0x7f0000003ff6)='OPL\x00', 0x4, 0xff06, &(0x7f000000cf3d)=""/195}, 0x48) [ 468.833531][T20631] UBIFS error (pid: 20631): cannot open "ubi!/sr0", error -19 08:44:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000080)=@sr0='ubi!/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='ubifs\x00', 0x0, 0x0) 08:44:16 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4c7]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:44:17 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x57, 0x65}, [@ldst={0x7}]}, &(0x7f0000003ff6)='OPL\x00', 0x4, 0xff06, &(0x7f000000cf3d)=""/195}, 0x48) [ 469.094484][T20649] UBIFS error (pid: 20649): cannot open "ubi!/sr0", error -19 08:44:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000080)=@sr0='ubi!/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='ubifs\x00', 0x0, 0x0) 08:44:17 executing program 1: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000640)=@broute={'broute\x06\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/368]}, 0x1e8) socket(0x0, 0x803, 0x0) [ 469.412579][T20665] UBIFS error (pid: 20665): cannot open "ubi!/sr0", error -19 08:44:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xfffffffffffffffc, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) syz_open_dev$adsp(0x0, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, 0x0) semget$private(0x0, 0x0, 0x0) semget$private(0x0, 0x0, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000000)=0x80000001, 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00d00, 0x0, 0x0, 0x800, 0x2000000000002) 08:44:17 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x57, 0x65}, [@ldst={0x7}]}, &(0x7f0000003ff6)='OPL\x00', 0x4, 0xff06, &(0x7f000000cf3d)=""/195}, 0x48) 08:44:17 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2000000, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$join(0x1, &(0x7f00000000c0)={'syz'}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xe19, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) link(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000280)=[{r0}], 0x1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000740)=0x20000000) mq_open(0x0, 0x0, 0x0, 0x0) poll(&(0x7f0000000080), 0x0, 0x0) 08:44:17 executing program 1: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000640)=@broute={'broute\x06\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/368]}, 0x1e8) socket(0x0, 0x803, 0x0) 08:44:17 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4c7]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:44:17 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2000000, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$join(0x1, &(0x7f00000000c0)={'syz'}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xe19, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) link(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000280)=[{r0}], 0x1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000740)=0x20000000) mq_open(0x0, 0x0, 0x0, 0x0) poll(&(0x7f0000000080), 0x0, 0x0) 08:44:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xfffffffffffffffc, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) syz_open_dev$adsp(0x0, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, 0x0) semget$private(0x0, 0x0, 0x0) semget$private(0x0, 0x0, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000000)=0x80000001, 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00d00, 0x0, 0x0, 0x800, 0x2000000000002) 08:44:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xfffffffffffffffc, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) syz_open_dev$adsp(0x0, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, 0x0) semget$private(0x0, 0x0, 0x0) semget$private(0x0, 0x0, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000000)=0x80000001, 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00d00, 0x0, 0x0, 0x800, 0x2000000000002) 08:44:17 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4c7]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:44:18 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2000000, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$join(0x1, &(0x7f00000000c0)={'syz'}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xe19, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) link(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000280)=[{r0}], 0x1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000740)=0x20000000) mq_open(0x0, 0x0, 0x0, 0x0) poll(&(0x7f0000000080), 0x0, 0x0) 08:44:18 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2000000, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$join(0x1, &(0x7f00000000c0)={'syz'}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xe19, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) link(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000280)=[{r0}], 0x1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000740)=0x20000000) mq_open(0x0, 0x0, 0x0, 0x0) poll(&(0x7f0000000080), 0x0, 0x0) 08:44:18 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4c7]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:44:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xfffffffffffffffc, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) syz_open_dev$adsp(0x0, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, 0x0) semget$private(0x0, 0x0, 0x0) semget$private(0x0, 0x0, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000000)=0x80000001, 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00d00, 0x0, 0x0, 0x800, 0x2000000000002) 08:44:19 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2000000, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$join(0x1, &(0x7f00000000c0)={'syz'}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xe19, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) link(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000280)=[{r0}], 0x1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000740)=0x20000000) mq_open(0x0, 0x0, 0x0, 0x0) poll(&(0x7f0000000080), 0x0, 0x0) 08:44:19 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2000000, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$join(0x1, &(0x7f00000000c0)={'syz'}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) memfd_create(&(0x7f0000000500)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xe19, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) link(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000280)=[{r0}], 0x1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000740)=0x20000000) mq_open(0x0, 0x0, 0x0, 0x0) poll(&(0x7f0000000080), 0x0, 0x0) 08:44:19 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4c7]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:44:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xfffffffffffffffc, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) syz_open_dev$adsp(0x0, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, 0x0) semget$private(0x0, 0x0, 0x0) semget$private(0x0, 0x0, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000000)=0x80000001, 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00d00, 0x0, 0x0, 0x800, 0x2000000000002) 08:44:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xfffffffffffffffc, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) syz_open_dev$adsp(0x0, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, 0x0) semget$private(0x0, 0x0, 0x0) semget$private(0x0, 0x0, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000000)=0x80000001, 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00d00, 0x0, 0x0, 0x800, 0x2000000000002) 08:44:19 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0/file0\x00') r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, &(0x7f0000017000), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000cab000)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x0, &(0x7f0000017000), 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) setfsuid(0x0) socket$inet_tcp(0x2, 0x1, 0x0) setfsuid(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x40000000015, 0x5, 0x0) connect$inet(r3, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$SO_RDS_TRANSPORT(r3, 0x114, 0x8, &(0x7f00000008c0)=0x2, 0x4) bind$inet(r3, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}, 0x0) recvmmsg(r3, &(0x7f0000001700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$SIOCX25GCAUSEDIAG(r3, 0x89e6, &(0x7f00000000c0)={0x9, 0x1}) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$VIDIOC_G_SLICED_VBI_CAP(0xffffffffffffffff, 0xc0745645, &(0x7f0000000000)={0x5, [0x30b0, 0x3, 0x5, 0x5, 0x4, 0x7fffffff, 0x72f8, 0x10001, 0x80000000, 0x6, 0x8001, 0x7, 0x9, 0x401, 0x7fffffff, 0xe835, 0x8b, 0x200, 0xffffffff, 0x1, 0x8f, 0x100000000, 0x81, 0x10000, 0x2, 0x4, 0x100, 0xf4, 0xffffffff, 0x0, 0x7, 0x0, 0x9, 0x9, 0x0, 0x9, 0x80, 0x3, 0x1, 0x100, 0x200, 0x0, 0x10000, 0x5, 0x800, 0x5, 0xffffffff, 0x40], 0x2}) 08:44:19 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4c7]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:44:19 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x4, @dev, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000300)) recvfrom$llc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 08:44:19 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4c7]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:44:20 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x4, @dev, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000300)) recvfrom$llc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 08:44:20 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0/file0\x00') r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, &(0x7f0000017000), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000cab000)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x0, &(0x7f0000017000), 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) setfsuid(0x0) socket$inet_tcp(0x2, 0x1, 0x0) setfsuid(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x40000000015, 0x5, 0x0) connect$inet(r3, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$SO_RDS_TRANSPORT(r3, 0x114, 0x8, &(0x7f00000008c0)=0x2, 0x4) bind$inet(r3, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}, 0x0) recvmmsg(r3, &(0x7f0000001700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$SIOCX25GCAUSEDIAG(r3, 0x89e6, &(0x7f00000000c0)={0x9, 0x1}) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$VIDIOC_G_SLICED_VBI_CAP(0xffffffffffffffff, 0xc0745645, &(0x7f0000000000)={0x5, [0x30b0, 0x3, 0x5, 0x5, 0x4, 0x7fffffff, 0x72f8, 0x10001, 0x80000000, 0x6, 0x8001, 0x7, 0x9, 0x401, 0x7fffffff, 0xe835, 0x8b, 0x200, 0xffffffff, 0x1, 0x8f, 0x100000000, 0x81, 0x10000, 0x2, 0x4, 0x100, 0xf4, 0xffffffff, 0x0, 0x7, 0x0, 0x9, 0x9, 0x0, 0x9, 0x80, 0x3, 0x1, 0x100, 0x200, 0x0, 0x10000, 0x5, 0x800, 0x5, 0xffffffff, 0x40], 0x2}) 08:44:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xfffffffffffffffc, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) syz_open_dev$adsp(0x0, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, 0x0) semget$private(0x0, 0x0, 0x0) semget$private(0x0, 0x0, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000000)=0x80000001, 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00d00, 0x0, 0x0, 0x800, 0x2000000000002) 08:44:20 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x4, @dev, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000300)) recvfrom$llc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 08:44:20 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0/file0\x00') r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, &(0x7f0000017000), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000cab000)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x0, &(0x7f0000017000), 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) setfsuid(0x0) socket$inet_tcp(0x2, 0x1, 0x0) setfsuid(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x40000000015, 0x5, 0x0) connect$inet(r3, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$SO_RDS_TRANSPORT(r3, 0x114, 0x8, &(0x7f00000008c0)=0x2, 0x4) bind$inet(r3, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}, 0x0) recvmmsg(r3, &(0x7f0000001700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$SIOCX25GCAUSEDIAG(r3, 0x89e6, &(0x7f00000000c0)={0x9, 0x1}) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$VIDIOC_G_SLICED_VBI_CAP(0xffffffffffffffff, 0xc0745645, &(0x7f0000000000)={0x5, [0x30b0, 0x3, 0x5, 0x5, 0x4, 0x7fffffff, 0x72f8, 0x10001, 0x80000000, 0x6, 0x8001, 0x7, 0x9, 0x401, 0x7fffffff, 0xe835, 0x8b, 0x200, 0xffffffff, 0x1, 0x8f, 0x100000000, 0x81, 0x10000, 0x2, 0x4, 0x100, 0xf4, 0xffffffff, 0x0, 0x7, 0x0, 0x9, 0x9, 0x0, 0x9, 0x80, 0x3, 0x1, 0x100, 0x200, 0x0, 0x10000, 0x5, 0x800, 0x5, 0xffffffff, 0x40], 0x2}) 08:44:20 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0/file0\x00') r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, &(0x7f0000017000), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000cab000)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x0, &(0x7f0000017000), 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) setfsuid(0x0) socket$inet_tcp(0x2, 0x1, 0x0) setfsuid(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x40000000015, 0x5, 0x0) connect$inet(r3, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$SO_RDS_TRANSPORT(r3, 0x114, 0x8, &(0x7f00000008c0)=0x2, 0x4) bind$inet(r3, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}, 0x0) recvmmsg(r3, &(0x7f0000001700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$SIOCX25GCAUSEDIAG(r3, 0x89e6, &(0x7f00000000c0)={0x9, 0x1}) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$VIDIOC_G_SLICED_VBI_CAP(0xffffffffffffffff, 0xc0745645, &(0x7f0000000000)={0x5, [0x30b0, 0x3, 0x5, 0x5, 0x4, 0x7fffffff, 0x72f8, 0x10001, 0x80000000, 0x6, 0x8001, 0x7, 0x9, 0x401, 0x7fffffff, 0xe835, 0x8b, 0x200, 0xffffffff, 0x1, 0x8f, 0x100000000, 0x81, 0x10000, 0x2, 0x4, 0x100, 0xf4, 0xffffffff, 0x0, 0x7, 0x0, 0x9, 0x9, 0x0, 0x9, 0x80, 0x3, 0x1, 0x100, 0x200, 0x0, 0x10000, 0x5, 0x800, 0x5, 0xffffffff, 0x40], 0x2}) 08:44:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xfffffffffffffffc, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) syz_open_dev$adsp(0x0, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, 0x0) semget$private(0x0, 0x0, 0x0) semget$private(0x0, 0x0, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000000)=0x80000001, 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00d00, 0x0, 0x0, 0x800, 0x2000000000002) 08:44:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xfffffffffffffffc, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) syz_open_dev$adsp(0x0, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, 0x0) semget$private(0x0, 0x0, 0x0) semget$private(0x0, 0x0, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000000)=0x80000001, 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00d00, 0x0, 0x0, 0x800, 0x2000000000002) 08:44:21 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x4, @dev, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000300)) recvfrom$llc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 08:44:21 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0/file0\x00') r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, &(0x7f0000017000), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000cab000)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x0, &(0x7f0000017000), 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) setfsuid(0x0) socket$inet_tcp(0x2, 0x1, 0x0) setfsuid(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x40000000015, 0x5, 0x0) connect$inet(r3, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$SO_RDS_TRANSPORT(r3, 0x114, 0x8, &(0x7f00000008c0)=0x2, 0x4) bind$inet(r3, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}, 0x0) recvmmsg(r3, &(0x7f0000001700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$SIOCX25GCAUSEDIAG(r3, 0x89e6, &(0x7f00000000c0)={0x9, 0x1}) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$VIDIOC_G_SLICED_VBI_CAP(0xffffffffffffffff, 0xc0745645, &(0x7f0000000000)={0x5, [0x30b0, 0x3, 0x5, 0x5, 0x4, 0x7fffffff, 0x72f8, 0x10001, 0x80000000, 0x6, 0x8001, 0x7, 0x9, 0x401, 0x7fffffff, 0xe835, 0x8b, 0x200, 0xffffffff, 0x1, 0x8f, 0x100000000, 0x81, 0x10000, 0x2, 0x4, 0x100, 0xf4, 0xffffffff, 0x0, 0x7, 0x0, 0x9, 0x9, 0x0, 0x9, 0x80, 0x3, 0x1, 0x100, 0x200, 0x0, 0x10000, 0x5, 0x800, 0x5, 0xffffffff, 0x40], 0x2}) 08:44:21 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0/file0\x00') r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, &(0x7f0000017000), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000cab000)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x0, &(0x7f0000017000), 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) setfsuid(0x0) socket$inet_tcp(0x2, 0x1, 0x0) setfsuid(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x40000000015, 0x5, 0x0) connect$inet(r3, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$SO_RDS_TRANSPORT(r3, 0x114, 0x8, &(0x7f00000008c0)=0x2, 0x4) bind$inet(r3, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}, 0x0) recvmmsg(r3, &(0x7f0000001700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$SIOCX25GCAUSEDIAG(r3, 0x89e6, &(0x7f00000000c0)={0x9, 0x1}) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$VIDIOC_G_SLICED_VBI_CAP(0xffffffffffffffff, 0xc0745645, &(0x7f0000000000)={0x5, [0x30b0, 0x3, 0x5, 0x5, 0x4, 0x7fffffff, 0x72f8, 0x10001, 0x80000000, 0x6, 0x8001, 0x7, 0x9, 0x401, 0x7fffffff, 0xe835, 0x8b, 0x200, 0xffffffff, 0x1, 0x8f, 0x100000000, 0x81, 0x10000, 0x2, 0x4, 0x100, 0xf4, 0xffffffff, 0x0, 0x7, 0x0, 0x9, 0x9, 0x0, 0x9, 0x80, 0x3, 0x1, 0x100, 0x200, 0x0, 0x10000, 0x5, 0x800, 0x5, 0xffffffff, 0x40], 0x2}) 08:44:21 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0/file0\x00') r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, &(0x7f0000017000), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000cab000)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x0, &(0x7f0000017000), 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) setfsuid(0x0) socket$inet_tcp(0x2, 0x1, 0x0) setfsuid(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x40000000015, 0x5, 0x0) connect$inet(r3, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$SO_RDS_TRANSPORT(r3, 0x114, 0x8, &(0x7f00000008c0)=0x2, 0x4) bind$inet(r3, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}, 0x0) recvmmsg(r3, &(0x7f0000001700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$SIOCX25GCAUSEDIAG(r3, 0x89e6, &(0x7f00000000c0)={0x9, 0x1}) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$VIDIOC_G_SLICED_VBI_CAP(0xffffffffffffffff, 0xc0745645, &(0x7f0000000000)={0x5, [0x30b0, 0x3, 0x5, 0x5, 0x4, 0x7fffffff, 0x72f8, 0x10001, 0x80000000, 0x6, 0x8001, 0x7, 0x9, 0x401, 0x7fffffff, 0xe835, 0x8b, 0x200, 0xffffffff, 0x1, 0x8f, 0x100000000, 0x81, 0x10000, 0x2, 0x4, 0x100, 0xf4, 0xffffffff, 0x0, 0x7, 0x0, 0x9, 0x9, 0x0, 0x9, 0x80, 0x3, 0x1, 0x100, 0x200, 0x0, 0x10000, 0x5, 0x800, 0x5, 0xffffffff, 0x40], 0x2}) 08:44:21 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0/file0\x00') r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, &(0x7f0000017000), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000cab000)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x0, &(0x7f0000017000), 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) setfsuid(0x0) socket$inet_tcp(0x2, 0x1, 0x0) setfsuid(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x40000000015, 0x5, 0x0) connect$inet(r3, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$SO_RDS_TRANSPORT(r3, 0x114, 0x8, &(0x7f00000008c0)=0x2, 0x4) bind$inet(r3, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}, 0x0) recvmmsg(r3, &(0x7f0000001700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$SIOCX25GCAUSEDIAG(r3, 0x89e6, &(0x7f00000000c0)={0x9, 0x1}) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$VIDIOC_G_SLICED_VBI_CAP(0xffffffffffffffff, 0xc0745645, &(0x7f0000000000)={0x5, [0x30b0, 0x3, 0x5, 0x5, 0x4, 0x7fffffff, 0x72f8, 0x10001, 0x80000000, 0x6, 0x8001, 0x7, 0x9, 0x401, 0x7fffffff, 0xe835, 0x8b, 0x200, 0xffffffff, 0x1, 0x8f, 0x100000000, 0x81, 0x10000, 0x2, 0x4, 0x100, 0xf4, 0xffffffff, 0x0, 0x7, 0x0, 0x9, 0x9, 0x0, 0x9, 0x80, 0x3, 0x1, 0x100, 0x200, 0x0, 0x10000, 0x5, 0x800, 0x5, 0xffffffff, 0x40], 0x2}) 08:44:21 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0/file0\x00') r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, &(0x7f0000017000), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000cab000)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x0, &(0x7f0000017000), 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) setfsuid(0x0) socket$inet_tcp(0x2, 0x1, 0x0) setfsuid(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x40000000015, 0x5, 0x0) connect$inet(r3, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$SO_RDS_TRANSPORT(r3, 0x114, 0x8, &(0x7f00000008c0)=0x2, 0x4) bind$inet(r3, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}, 0x0) recvmmsg(r3, &(0x7f0000001700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$SIOCX25GCAUSEDIAG(r3, 0x89e6, &(0x7f00000000c0)={0x9, 0x1}) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$VIDIOC_G_SLICED_VBI_CAP(0xffffffffffffffff, 0xc0745645, &(0x7f0000000000)={0x5, [0x30b0, 0x3, 0x5, 0x5, 0x4, 0x7fffffff, 0x72f8, 0x10001, 0x80000000, 0x6, 0x8001, 0x7, 0x9, 0x401, 0x7fffffff, 0xe835, 0x8b, 0x200, 0xffffffff, 0x1, 0x8f, 0x100000000, 0x81, 0x10000, 0x2, 0x4, 0x100, 0xf4, 0xffffffff, 0x0, 0x7, 0x0, 0x9, 0x9, 0x0, 0x9, 0x80, 0x3, 0x1, 0x100, 0x200, 0x0, 0x10000, 0x5, 0x800, 0x5, 0xffffffff, 0x40], 0x2}) 08:44:22 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af00, &(0x7f0000000140)) 08:44:22 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0/file0\x00') r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, &(0x7f0000017000), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000cab000)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x0, &(0x7f0000017000), 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) setfsuid(0x0) socket$inet_tcp(0x2, 0x1, 0x0) setfsuid(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x40000000015, 0x5, 0x0) connect$inet(r3, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$SO_RDS_TRANSPORT(r3, 0x114, 0x8, &(0x7f00000008c0)=0x2, 0x4) bind$inet(r3, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}, 0x0) recvmmsg(r3, &(0x7f0000001700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$SIOCX25GCAUSEDIAG(r3, 0x89e6, &(0x7f00000000c0)={0x9, 0x1}) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$VIDIOC_G_SLICED_VBI_CAP(0xffffffffffffffff, 0xc0745645, &(0x7f0000000000)={0x5, [0x30b0, 0x3, 0x5, 0x5, 0x4, 0x7fffffff, 0x72f8, 0x10001, 0x80000000, 0x6, 0x8001, 0x7, 0x9, 0x401, 0x7fffffff, 0xe835, 0x8b, 0x200, 0xffffffff, 0x1, 0x8f, 0x100000000, 0x81, 0x10000, 0x2, 0x4, 0x100, 0xf4, 0xffffffff, 0x0, 0x7, 0x0, 0x9, 0x9, 0x0, 0x9, 0x80, 0x3, 0x1, 0x100, 0x200, 0x0, 0x10000, 0x5, 0x800, 0x5, 0xffffffff, 0x40], 0x2}) 08:44:22 executing program 1: r0 = socket$inet(0x10, 0x3, 0xc) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000000a43ba5d806055b6fdd80b40000000140017002beeec2400020cd37e99d69cda45a95e", 0x4c}], 0x1}, 0x0) 08:44:22 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0/file0\x00') r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, &(0x7f0000017000), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000cab000)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x0, &(0x7f0000017000), 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) setfsuid(0x0) socket$inet_tcp(0x2, 0x1, 0x0) setfsuid(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x40000000015, 0x5, 0x0) connect$inet(r3, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$SO_RDS_TRANSPORT(r3, 0x114, 0x8, &(0x7f00000008c0)=0x2, 0x4) bind$inet(r3, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}, 0x0) recvmmsg(r3, &(0x7f0000001700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$SIOCX25GCAUSEDIAG(r3, 0x89e6, &(0x7f00000000c0)={0x9, 0x1}) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$VIDIOC_G_SLICED_VBI_CAP(0xffffffffffffffff, 0xc0745645, &(0x7f0000000000)={0x5, [0x30b0, 0x3, 0x5, 0x5, 0x4, 0x7fffffff, 0x72f8, 0x10001, 0x80000000, 0x6, 0x8001, 0x7, 0x9, 0x401, 0x7fffffff, 0xe835, 0x8b, 0x200, 0xffffffff, 0x1, 0x8f, 0x100000000, 0x81, 0x10000, 0x2, 0x4, 0x100, 0xf4, 0xffffffff, 0x0, 0x7, 0x0, 0x9, 0x9, 0x0, 0x9, 0x80, 0x3, 0x1, 0x100, 0x200, 0x0, 0x10000, 0x5, 0x800, 0x5, 0xffffffff, 0x40], 0x2}) 08:44:22 executing program 4: r0 = io_uring_setup(0x40000000e, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, [], {0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) 08:44:22 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af00, &(0x7f0000000140)) 08:44:22 executing program 1: r0 = socket$inet(0x10, 0x3, 0xc) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000000a43ba5d806055b6fdd80b40000000140017002beeec2400020cd37e99d69cda45a95e", 0x4c}], 0x1}, 0x0) 08:44:22 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0/file0\x00') r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, &(0x7f0000017000), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000cab000)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x0, &(0x7f0000017000), 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) setfsuid(0x0) socket$inet_tcp(0x2, 0x1, 0x0) setfsuid(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x40000000015, 0x5, 0x0) connect$inet(r3, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$SO_RDS_TRANSPORT(r3, 0x114, 0x8, &(0x7f00000008c0)=0x2, 0x4) bind$inet(r3, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}, 0x0) recvmmsg(r3, &(0x7f0000001700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$SIOCX25GCAUSEDIAG(r3, 0x89e6, &(0x7f00000000c0)={0x9, 0x1}) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$VIDIOC_G_SLICED_VBI_CAP(0xffffffffffffffff, 0xc0745645, &(0x7f0000000000)={0x5, [0x30b0, 0x3, 0x5, 0x5, 0x4, 0x7fffffff, 0x72f8, 0x10001, 0x80000000, 0x6, 0x8001, 0x7, 0x9, 0x401, 0x7fffffff, 0xe835, 0x8b, 0x200, 0xffffffff, 0x1, 0x8f, 0x100000000, 0x81, 0x10000, 0x2, 0x4, 0x100, 0xf4, 0xffffffff, 0x0, 0x7, 0x0, 0x9, 0x9, 0x0, 0x9, 0x80, 0x3, 0x1, 0x100, 0x200, 0x0, 0x10000, 0x5, 0x800, 0x5, 0xffffffff, 0x40], 0x2}) 08:44:22 executing program 4: r0 = io_uring_setup(0x40000000e, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, [], {0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) 08:44:22 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0/file0\x00') r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, &(0x7f0000017000), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000cab000)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x0, &(0x7f0000017000), 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r2) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) setfsuid(0x0) socket$inet_tcp(0x2, 0x1, 0x0) setfsuid(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x40000000015, 0x5, 0x0) connect$inet(r3, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$SO_RDS_TRANSPORT(r3, 0x114, 0x8, &(0x7f00000008c0)=0x2, 0x4) bind$inet(r3, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}, 0x0) recvmmsg(r3, &(0x7f0000001700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$SIOCX25GCAUSEDIAG(r3, 0x89e6, &(0x7f00000000c0)={0x9, 0x1}) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$VIDIOC_G_SLICED_VBI_CAP(0xffffffffffffffff, 0xc0745645, &(0x7f0000000000)={0x5, [0x30b0, 0x3, 0x5, 0x5, 0x4, 0x7fffffff, 0x72f8, 0x10001, 0x80000000, 0x6, 0x8001, 0x7, 0x9, 0x401, 0x7fffffff, 0xe835, 0x8b, 0x200, 0xffffffff, 0x1, 0x8f, 0x100000000, 0x81, 0x10000, 0x2, 0x4, 0x100, 0xf4, 0xffffffff, 0x0, 0x7, 0x0, 0x9, 0x9, 0x0, 0x9, 0x80, 0x3, 0x1, 0x100, 0x200, 0x0, 0x10000, 0x5, 0x800, 0x5, 0xffffffff, 0x40], 0x2}) 08:44:22 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af00, &(0x7f0000000140)) 08:44:22 executing program 1: r0 = socket$inet(0x10, 0x3, 0xc) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000000a43ba5d806055b6fdd80b40000000140017002beeec2400020cd37e99d69cda45a95e", 0x4c}], 0x1}, 0x0) 08:44:22 executing program 4: r0 = io_uring_setup(0x40000000e, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, [], {0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) 08:44:22 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x0, 0x30}, 0xc) ftruncate(r3, 0x200004) sendfile(r0, r3, 0x0, 0x80001d00c0d0) 08:44:22 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af00, &(0x7f0000000140)) 08:44:23 executing program 1: r0 = socket$inet(0x10, 0x3, 0xc) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000000a43ba5d806055b6fdd80b40000000140017002beeec2400020cd37e99d69cda45a95e", 0x4c}], 0x1}, 0x0) 08:44:23 executing program 4: r0 = io_uring_setup(0x40000000e, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, [], {0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) 08:44:23 executing program 0: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@uni_xlate='uni_xlate=1'}]}) 08:44:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], 0x20}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x218fe53f1794f59, 0x0) 08:44:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5055e0bcfe47bf070") r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) recvmmsg(r1, &(0x7f0000000180), 0x114, 0x0, 0x0) [ 475.298137][T20982] FAT-fs (loop0): bogus number of reserved sectors [ 475.308941][ T26] audit: type=1800 audit(1568364263.168:106): pid=20971 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="bus" dev="sda1" ino=16728 res=0 [ 475.339231][T20982] FAT-fs (loop0): Can't find a valid FAT filesystem 08:44:23 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x0, 0x30}, 0xc) ftruncate(r3, 0x200004) sendfile(r0, r3, 0x0, 0x80001d00c0d0) [ 475.449927][T20982] FAT-fs (loop0): bogus number of reserved sectors [ 475.456486][T20982] FAT-fs (loop0): Can't find a valid FAT filesystem 08:44:23 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) fadvise64(r0, 0x0, 0x0, 0x0) 08:44:23 executing program 4: mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) 08:44:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], 0x20}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x218fe53f1794f59, 0x0) 08:44:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5055e0bcfe47bf070") r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) recvmmsg(r1, &(0x7f0000000180), 0x114, 0x0, 0x0) 08:44:23 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x0, 0x30}, 0xc) ftruncate(r3, 0x200004) sendfile(r0, r3, 0x0, 0x80001d00c0d0) 08:44:23 executing program 0: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@uni_xlate='uni_xlate=1'}]}) [ 475.745359][T21005] 9pnet_virtio: no channels available for device 127.0.0.1 08:44:23 executing program 4: mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) [ 475.791954][T21017] 9pnet_virtio: no channels available for device 127.0.0.1 08:44:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5055e0bcfe47bf070") r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) recvmmsg(r1, &(0x7f0000000180), 0x114, 0x0, 0x0) [ 475.832375][T21014] FAT-fs (loop0): bogus number of reserved sectors 08:44:23 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) fadvise64(r0, 0x0, 0x0, 0x0) 08:44:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], 0x20}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x218fe53f1794f59, 0x0) [ 475.889458][T21014] FAT-fs (loop0): Can't find a valid FAT filesystem 08:44:23 executing program 4: mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) [ 475.940895][T21025] 9pnet_virtio: no channels available for device 127.0.0.1 08:44:23 executing program 0: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@uni_xlate='uni_xlate=1'}]}) 08:44:23 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x0, 0x30}, 0xc) ftruncate(r3, 0x200004) sendfile(r0, r3, 0x0, 0x80001d00c0d0) 08:44:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], 0x20}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x218fe53f1794f59, 0x0) 08:44:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5055e0bcfe47bf070") r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) recvmmsg(r1, &(0x7f0000000180), 0x114, 0x0, 0x0) 08:44:24 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) fadvise64(r0, 0x0, 0x0, 0x0) 08:44:24 executing program 4: mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) [ 476.225390][T21039] 9pnet_virtio: no channels available for device 127.0.0.1 08:44:24 executing program 1: getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000d00)=""/4096, &(0x7f00000001c0)=0x1000) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text16={0x10, &(0x7f0000000240)="2e0f38f126098866dfa8a1c00f07baf80c66b851f8608666efbafc0cb00dee6467660f3810cf6766c7442400440000006766c74424022ad16bc46766c744240600000000670f011c24f30fc7752266b80000c0fe0f23d00f21f866353000000f0f23f8b83b008ed866b9800000c00f326635010000000f30", 0x78}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 08:44:24 executing program 5: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x77, &(0x7f00000000c0), 0x8) [ 476.408328][T21052] FAT-fs (loop0): bogus number of reserved sectors 08:44:24 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) fadvise64(r0, 0x0, 0x0, 0x0) [ 476.452869][T21052] FAT-fs (loop0): Can't find a valid FAT filesystem [ 476.524728][T21060] 9pnet_virtio: no channels available for device 127.0.0.1 08:44:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x2) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000180)=0xd80, 0x4) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x2c3) recvmsg(r1, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x12000) 08:44:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x9000800}, 0xc) close(r0) 08:44:24 executing program 4: socket(0x11, 0x3, 0x0) capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000804000)) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000000040)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) 08:44:24 executing program 0: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@uni_xlate='uni_xlate=1'}]}) 08:44:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x2) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000180)=0xd80, 0x4) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x2c3) recvmsg(r1, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x12000) 08:44:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x9000800}, 0xc) close(r0) [ 476.885032][T21085] FAT-fs (loop0): bogus number of reserved sectors [ 476.934669][T21085] FAT-fs (loop0): Can't find a valid FAT filesystem 08:44:24 executing program 4: socket(0x11, 0x3, 0x0) capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000804000)) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000000040)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) 08:44:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x9000800}, 0xc) close(r0) 08:44:25 executing program 1: getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000d00)=""/4096, &(0x7f00000001c0)=0x1000) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text16={0x10, &(0x7f0000000240)="2e0f38f126098866dfa8a1c00f07baf80c66b851f8608666efbafc0cb00dee6467660f3810cf6766c7442400440000006766c74424022ad16bc46766c744240600000000670f011c24f30fc7752266b80000c0fe0f23d00f21f866353000000f0f23f8b83b008ed866b9800000c00f326635010000000f30", 0x78}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 08:44:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x2) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000180)=0xd80, 0x4) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x2c3) recvmsg(r1, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x12000) 08:44:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x2) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000180)=0xd80, 0x4) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x2c3) recvmsg(r1, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x12000) 08:44:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x9000800}, 0xc) close(r0) 08:44:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x9000800}, 0xc) close(r0) 08:44:25 executing program 4: socket(0x11, 0x3, 0x0) capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000804000)) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000000040)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) 08:44:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x2) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000180)=0xd80, 0x4) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x2c3) recvmsg(r1, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x12000) 08:44:25 executing program 3: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040), 0x1000000000000324, 0x0, 0xfffffffffffffdfc}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x2, 0x2) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000080)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000001c0)={{{@in6, @in=@initdev}}, {{@in=@empty}, 0x0, @in6=@ipv4={[], [], @initdev}}}, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x03\x01\x00\x00\x00)\x00', @ifru_flags}) 08:44:25 executing program 4: socket(0x11, 0x3, 0x0) capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000804000)) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000000040)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) 08:44:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x9000800}, 0xc) close(r0) 08:44:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x2) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000180)=0xd80, 0x4) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x2c3) recvmsg(r1, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x12000) 08:44:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x40000fffffd, 0x200000000000042) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000000)={0x1000000000000a1, 0x4, 0x0, 0x0, 0x0, 0x7ff0bdbe}) [ 477.954752][T21139] usb usb7: usbfs: process 21139 (syz-executor.2) did not claim interface 4 before use 08:44:26 executing program 1: getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000d00)=""/4096, &(0x7f00000001c0)=0x1000) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text16={0x10, &(0x7f0000000240)="2e0f38f126098866dfa8a1c00f07baf80c66b851f8608666efbafc0cb00dee6467660f3810cf6766c7442400440000006766c74424022ad16bc46766c744240600000000670f011c24f30fc7752266b80000c0fe0f23d00f21f866353000000f0f23f8b83b008ed866b9800000c00f326635010000000f30", 0x78}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 08:44:26 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)=0xece) write$cgroup_type(r1, &(0x7f0000000100)='threaded\x00', 0xff34) fallocate(r1, 0x3, 0x0, 0x10000408001) write$cgroup_type(r1, &(0x7f00000000c0)='threaded\x00', 0x9) fallocate(r1, 0x3, 0x0, 0x80000009) 08:44:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x9000800}, 0xc) close(r0) 08:44:26 executing program 3: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040), 0x1000000000000324, 0x0, 0xfffffffffffffdfc}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x2, 0x2) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000080)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000001c0)={{{@in6, @in=@initdev}}, {{@in=@empty}, 0x0, @in6=@ipv4={[], [], @initdev}}}, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x03\x01\x00\x00\x00)\x00', @ifru_flags}) 08:44:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x40000fffffd, 0x200000000000042) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000000)={0x1000000000000a1, 0x4, 0x0, 0x0, 0x0, 0x7ff0bdbe}) 08:44:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x2) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000180)=0xd80, 0x4) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x2c3) recvmsg(r1, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x12000) [ 478.224681][T21154] usb usb7: usbfs: process 21154 (syz-executor.2) did not claim interface 4 before use 08:44:26 executing program 0: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040), 0x1000000000000324, 0x0, 0xfffffffffffffdfc}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x2, 0x2) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000080)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000001c0)={{{@in6, @in=@initdev}}, {{@in=@empty}, 0x0, @in6=@ipv4={[], [], @initdev}}}, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x03\x01\x00\x00\x00)\x00', @ifru_flags}) 08:44:26 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x8}, 0x0) 08:44:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x40000fffffd, 0x200000000000042) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000000)={0x1000000000000a1, 0x4, 0x0, 0x0, 0x0, 0x7ff0bdbe}) 08:44:26 executing program 3: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040), 0x1000000000000324, 0x0, 0xfffffffffffffdfc}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x2, 0x2) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000080)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000001c0)={{{@in6, @in=@initdev}}, {{@in=@empty}, 0x0, @in6=@ipv4={[], [], @initdev}}}, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x03\x01\x00\x00\x00)\x00', @ifru_flags}) 08:44:26 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)=0xece) write$cgroup_type(r1, &(0x7f0000000100)='threaded\x00', 0xff34) fallocate(r1, 0x3, 0x0, 0x10000408001) write$cgroup_type(r1, &(0x7f00000000c0)='threaded\x00', 0x9) fallocate(r1, 0x3, 0x0, 0x80000009) 08:44:26 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x8}, 0x0) [ 478.665059][T21180] usb usb7: usbfs: process 21180 (syz-executor.2) did not claim interface 4 before use 08:44:26 executing program 1: getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000d00)=""/4096, &(0x7f00000001c0)=0x1000) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text16={0x10, &(0x7f0000000240)="2e0f38f126098866dfa8a1c00f07baf80c66b851f8608666efbafc0cb00dee6467660f3810cf6766c7442400440000006766c74424022ad16bc46766c744240600000000670f011c24f30fc7752266b80000c0fe0f23d00f21f866353000000f0f23f8b83b008ed866b9800000c00f326635010000000f30", 0x78}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 08:44:26 executing program 3: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040), 0x1000000000000324, 0x0, 0xfffffffffffffdfc}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x2, 0x2) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000080)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000001c0)={{{@in6, @in=@initdev}}, {{@in=@empty}, 0x0, @in6=@ipv4={[], [], @initdev}}}, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x03\x01\x00\x00\x00)\x00', @ifru_flags}) 08:44:26 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x8}, 0x0) 08:44:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x40000fffffd, 0x200000000000042) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000000)={0x1000000000000a1, 0x4, 0x0, 0x0, 0x0, 0x7ff0bdbe}) 08:44:26 executing program 0: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040), 0x1000000000000324, 0x0, 0xfffffffffffffdfc}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x2, 0x2) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000080)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000001c0)={{{@in6, @in=@initdev}}, {{@in=@empty}, 0x0, @in6=@ipv4={[], [], @initdev}}}, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x03\x01\x00\x00\x00)\x00', @ifru_flags}) 08:44:26 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)=0xece) write$cgroup_type(r1, &(0x7f0000000100)='threaded\x00', 0xff34) fallocate(r1, 0x3, 0x0, 0x10000408001) write$cgroup_type(r1, &(0x7f00000000c0)='threaded\x00', 0x9) fallocate(r1, 0x3, 0x0, 0x80000009) 08:44:26 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x8}, 0x0) [ 478.995977][T21195] usb usb7: usbfs: process 21195 (syz-executor.2) did not claim interface 4 before use 08:44:27 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)=0xece) write$cgroup_type(r1, &(0x7f0000000100)='threaded\x00', 0xff34) fallocate(r1, 0x3, 0x0, 0x10000408001) write$cgroup_type(r1, &(0x7f00000000c0)='threaded\x00', 0x9) fallocate(r1, 0x3, 0x0, 0x80000009) 08:44:27 executing program 2: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000000)="1f0000000102ff05fd4354c007f37fff0a0501000800010004000300ffdf00", 0x1f) 08:44:27 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/tcp\x00') r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r2, r0, 0x0, 0x200000001008147c) 08:44:27 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)=0xece) write$cgroup_type(r1, &(0x7f0000000100)='threaded\x00', 0xff34) fallocate(r1, 0x3, 0x0, 0x10000408001) write$cgroup_type(r1, &(0x7f00000000c0)='threaded\x00', 0x9) fallocate(r1, 0x3, 0x0, 0x80000009) 08:44:27 executing program 0: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040), 0x1000000000000324, 0x0, 0xfffffffffffffdfc}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x2, 0x2) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000080)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000001c0)={{{@in6, @in=@initdev}}, {{@in=@empty}, 0x0, @in6=@ipv4={[], [], @initdev}}}, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x03\x01\x00\x00\x00)\x00', @ifru_flags}) [ 479.333344][T21218] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. [ 479.390164][T21218] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 08:44:27 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)=0xece) write$cgroup_type(r1, &(0x7f0000000100)='threaded\x00', 0xff34) fallocate(r1, 0x3, 0x0, 0x10000408001) write$cgroup_type(r1, &(0x7f00000000c0)='threaded\x00', 0x9) fallocate(r1, 0x3, 0x0, 0x80000009) 08:44:27 executing program 2: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000000)="1f0000000102ff05fd4354c007f37fff0a0501000800010004000300ffdf00", 0x1f) 08:44:27 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/tcp\x00') r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r2, r0, 0x0, 0x200000001008147c) 08:44:27 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013000d0468fe0704000000000000ff3f06000000450001070000001419001a000400020003000a00400000c00b005d14a4e91ee438", 0x39}], 0x1) 08:44:27 executing program 4: prctl$PR_CAPBSET_DROP(0x18, 0x24) capset(&(0x7f00000fc000)={0x20071026}, &(0x7f000047efe8)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) 08:44:27 executing program 0: r0 = epoll_create1(0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000240)='/dev/input/event#\x00', 0x0, 0x0) dup2(r2, r1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) [ 479.668799][T21238] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. 08:44:27 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)=0xece) write$cgroup_type(r1, &(0x7f0000000100)='threaded\x00', 0xff34) fallocate(r1, 0x3, 0x0, 0x10000408001) write$cgroup_type(r1, &(0x7f00000000c0)='threaded\x00', 0x9) fallocate(r1, 0x3, 0x0, 0x80000009) [ 479.747021][T21238] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 479.774095][T21244] capability: warning: `syz-executor.4' uses deprecated v2 capabilities in a way that may be insecure 08:44:27 executing program 4: prctl$PR_CAPBSET_DROP(0x18, 0x24) capset(&(0x7f00000fc000)={0x20071026}, &(0x7f000047efe8)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) 08:44:27 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/tcp\x00') r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r2, r0, 0x0, 0x200000001008147c) 08:44:27 executing program 2: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000000)="1f0000000102ff05fd4354c007f37fff0a0501000800010004000300ffdf00", 0x1f) 08:44:27 executing program 0: r0 = epoll_create1(0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000240)='/dev/input/event#\x00', 0x0, 0x0) dup2(r2, r1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 08:44:27 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013000d0468fe0704000000000000ff3f06000000450001070000001419001a000400020003000a00400000c00b005d14a4e91ee438", 0x39}], 0x1) 08:44:27 executing program 4: prctl$PR_CAPBSET_DROP(0x18, 0x24) capset(&(0x7f00000fc000)={0x20071026}, &(0x7f000047efe8)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) [ 480.045470][T21263] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. 08:44:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013000d0468fe0704000000000000ff3f06000000450001070000001419001a000400020003000a00400000c00b005d14a4e91ee438", 0x39}], 0x1) 08:44:28 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000480)={r0, 0x4000, 0xe80, 0x0, &(0x7f0000000040)="423b91bf2981165c0606028a73a2", 0x0, 0x10000000000009d}, 0x28) [ 480.115396][T21263] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 08:44:28 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/tcp\x00') r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r2, r0, 0x0, 0x200000001008147c) 08:44:28 executing program 0: r0 = epoll_create1(0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000240)='/dev/input/event#\x00', 0x0, 0x0) dup2(r2, r1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 08:44:28 executing program 4: prctl$PR_CAPBSET_DROP(0x18, 0x24) capset(&(0x7f00000fc000)={0x20071026}, &(0x7f000047efe8)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) 08:44:28 executing program 2: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000000)="1f0000000102ff05fd4354c007f37fff0a0501000800010004000300ffdf00", 0x1f) 08:44:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013000d0468fe0704000000000000ff3f06000000450001070000001419001a000400020003000a00400000c00b005d14a4e91ee438", 0x39}], 0x1) 08:44:28 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x0, 0x0, 0x5}, 0x14a) 08:44:28 executing program 0: r0 = epoll_create1(0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000240)='/dev/input/event#\x00', 0x0, 0x0) dup2(r2, r1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) [ 480.415211][T21289] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. [ 480.444037][T21289] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 08:44:28 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x64, 0x19, 0x205, 0x0, 0x0, {0x1d, 0xd601, 0x9}, [@nested={0x50, 0x10, [@typed={0xc, 0x0, @u64}, @typed={0x8, 0x0, @pid}, @typed={0x8, 0x0, @pid}, @typed={0x30, 0x0, @binary="a94dd3281779d9bd7a758ff8aac8569820acfe7dcbdeaa12affacee65d9d4a2f1022dce0606e0fd71d"}]}]}, 0x64}}, 0x0) 08:44:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000200)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) close(r1) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000c85000)) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000013c0)='ramfs\x00', 0x0, 0x0) poll(&(0x7f0000000000)=[{r2}], 0x2000000000000051, 0x0) 08:44:28 executing program 1: socket$inet6(0x10, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x952, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x0, 0x0, 0x2, 0x0, 0x9, 0x0, 0x5, 0xffffffff, 0x5, 0x6, 0x0, 0x4, 0x20, 0x9fc5, 0x0, 0x9, 0xfff, 0x10001, 0x80000001, 0x8, 0x400, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0xd}, 0x0, 0x3, 0x4d, 0x9, 0xbe4, 0x5, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x201, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="00002f1454f71f3be48a2ba75c9c02392cb9"], 0x12) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000100)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) socket$bt_hidp(0x1f, 0x3, 0x6) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) 08:44:28 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x0, 0x0, 0x5}, 0x14a) 08:44:28 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000140)='&ppp0\x00', 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) ftruncate(r1, 0x400) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r2) 08:44:28 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x64, 0x19, 0x205, 0x0, 0x0, {0x1d, 0xd601, 0x9}, [@nested={0x50, 0x10, [@typed={0xc, 0x0, @u64}, @typed={0x8, 0x0, @pid}, @typed={0x8, 0x0, @pid}, @typed={0x30, 0x0, @binary="a94dd3281779d9bd7a758ff8aac8569820acfe7dcbdeaa12affacee65d9d4a2f1022dce0606e0fd71d"}]}]}, 0x64}}, 0x0) 08:44:28 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) sync() fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, 0x0, &(0x7f0000001640)='./file0\x00', 0xffffffffffffffff) dup3(r0, r1, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) sendmsg$can_bcm(r1, 0x0, 0x0) ioctl$SIOCAX25ADDUID(0xffffffffffffffff, 0x89e1, 0x0) 08:44:28 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x0, 0x0, 0x5}, 0x14a) 08:44:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000200)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) close(r1) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000c85000)) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000013c0)='ramfs\x00', 0x0, 0x0) poll(&(0x7f0000000000)=[{r2}], 0x2000000000000051, 0x0) 08:44:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000200)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) close(r1) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000c85000)) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000013c0)='ramfs\x00', 0x0, 0x0) poll(&(0x7f0000000000)=[{r2}], 0x2000000000000051, 0x0) 08:44:28 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x0, 0x0, 0x5}, 0x14a) 08:44:28 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x64, 0x19, 0x205, 0x0, 0x0, {0x1d, 0xd601, 0x9}, [@nested={0x50, 0x10, [@typed={0xc, 0x0, @u64}, @typed={0x8, 0x0, @pid}, @typed={0x8, 0x0, @pid}, @typed={0x30, 0x0, @binary="a94dd3281779d9bd7a758ff8aac8569820acfe7dcbdeaa12affacee65d9d4a2f1022dce0606e0fd71d"}]}]}, 0x64}}, 0x0) 08:44:29 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) sync() fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, 0x0, &(0x7f0000001640)='./file0\x00', 0xffffffffffffffff) dup3(r0, r1, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) sendmsg$can_bcm(r1, 0x0, 0x0) ioctl$SIOCAX25ADDUID(0xffffffffffffffff, 0x89e1, 0x0) 08:44:29 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x64, 0x19, 0x205, 0x0, 0x0, {0x1d, 0xd601, 0x9}, [@nested={0x50, 0x10, [@typed={0xc, 0x0, @u64}, @typed={0x8, 0x0, @pid}, @typed={0x8, 0x0, @pid}, @typed={0x30, 0x0, @binary="a94dd3281779d9bd7a758ff8aac8569820acfe7dcbdeaa12affacee65d9d4a2f1022dce0606e0fd71d"}]}]}, 0x64}}, 0x0) 08:44:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000200)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) close(r1) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000c85000)) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000013c0)='ramfs\x00', 0x0, 0x0) poll(&(0x7f0000000000)=[{r2}], 0x2000000000000051, 0x0) 08:44:29 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) sync() fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, 0x0, &(0x7f0000001640)='./file0\x00', 0xffffffffffffffff) dup3(r0, r1, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) sendmsg$can_bcm(r1, 0x0, 0x0) ioctl$SIOCAX25ADDUID(0xffffffffffffffff, 0x89e1, 0x0) 08:44:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000200)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) close(r1) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000c85000)) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000013c0)='ramfs\x00', 0x0, 0x0) poll(&(0x7f0000000000)=[{r2}], 0x2000000000000051, 0x0) 08:44:29 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) sync() fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, 0x0, &(0x7f0000001640)='./file0\x00', 0xffffffffffffffff) dup3(r0, r1, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) sendmsg$can_bcm(r1, 0x0, 0x0) ioctl$SIOCAX25ADDUID(0xffffffffffffffff, 0x89e1, 0x0) 08:44:29 executing program 1: socket$inet6(0x10, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x952, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x0, 0x0, 0x2, 0x0, 0x9, 0x0, 0x5, 0xffffffff, 0x5, 0x6, 0x0, 0x4, 0x20, 0x9fc5, 0x0, 0x9, 0xfff, 0x10001, 0x80000001, 0x8, 0x400, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0xd}, 0x0, 0x3, 0x4d, 0x9, 0xbe4, 0x5, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x201, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="00002f1454f71f3be48a2ba75c9c02392cb9"], 0x12) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000100)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) socket$bt_hidp(0x1f, 0x3, 0x6) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) 08:44:29 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) sync() fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, 0x0, &(0x7f0000001640)='./file0\x00', 0xffffffffffffffff) dup3(r0, r1, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) sendmsg$can_bcm(r1, 0x0, 0x0) ioctl$SIOCAX25ADDUID(0xffffffffffffffff, 0x89e1, 0x0) 08:44:29 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) sync() fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, 0x0, &(0x7f0000001640)='./file0\x00', 0xffffffffffffffff) dup3(r0, r1, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) sendmsg$can_bcm(r1, 0x0, 0x0) ioctl$SIOCAX25ADDUID(0xffffffffffffffff, 0x89e1, 0x0) 08:44:29 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) sync() fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, 0x0, &(0x7f0000001640)='./file0\x00', 0xffffffffffffffff) dup3(r0, r1, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) sendmsg$can_bcm(r1, 0x0, 0x0) ioctl$SIOCAX25ADDUID(0xffffffffffffffff, 0x89e1, 0x0) 08:44:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000200)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) close(r1) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000c85000)) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000013c0)='ramfs\x00', 0x0, 0x0) poll(&(0x7f0000000000)=[{r2}], 0x2000000000000051, 0x0) 08:44:29 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) sync() fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, 0x0, &(0x7f0000001640)='./file0\x00', 0xffffffffffffffff) dup3(r0, r1, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) sendmsg$can_bcm(r1, 0x0, 0x0) ioctl$SIOCAX25ADDUID(0xffffffffffffffff, 0x89e1, 0x0) 08:44:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000200)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) close(r1) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000c85000)) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000013c0)='ramfs\x00', 0x0, 0x0) poll(&(0x7f0000000000)=[{r2}], 0x2000000000000051, 0x0) 08:44:29 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) sync() fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, 0x0, &(0x7f0000001640)='./file0\x00', 0xffffffffffffffff) dup3(r0, r1, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) sendmsg$can_bcm(r1, 0x0, 0x0) ioctl$SIOCAX25ADDUID(0xffffffffffffffff, 0x89e1, 0x0) 08:44:29 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) sync() fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, 0x0, &(0x7f0000001640)='./file0\x00', 0xffffffffffffffff) dup3(r0, r1, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) sendmsg$can_bcm(r1, 0x0, 0x0) ioctl$SIOCAX25ADDUID(0xffffffffffffffff, 0x89e1, 0x0) 08:44:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000200)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) close(r1) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000c85000)) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000013c0)='ramfs\x00', 0x0, 0x0) poll(&(0x7f0000000000)=[{r2}], 0x2000000000000051, 0x0) 08:44:30 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f00000001c0)=ANY=[@ANYBLOB="050000000000000020000040050000a90000000000fae9fff7ff00000000000001000000000000002560b7adff"]) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000040)={0x1, 0x0, [{0x48c, 0x0, 0x2}]}) 08:44:30 executing program 2: r0 = socket$kcm(0x2, 0x2, 0x73) recvmmsg(r0, &(0x7f00000001c0), 0xb2, 0x1, 0x0) 08:44:30 executing program 1: socket$inet6(0x10, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x952, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x0, 0x0, 0x2, 0x0, 0x9, 0x0, 0x5, 0xffffffff, 0x5, 0x6, 0x0, 0x4, 0x20, 0x9fc5, 0x0, 0x9, 0xfff, 0x10001, 0x80000001, 0x8, 0x400, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0xd}, 0x0, 0x3, 0x4d, 0x9, 0xbe4, 0x5, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x201, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="00002f1454f71f3be48a2ba75c9c02392cb9"], 0x12) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000100)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) socket$bt_hidp(0x1f, 0x3, 0x6) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) 08:44:30 executing program 4: r0 = socket(0x2, 0x3, 0x2) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000a80)=0xffffffff, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$unix(r0, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0x6a0000e7}, 0x6e) 08:44:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000200)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) close(r1) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000c85000)) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000013c0)='ramfs\x00', 0x0, 0x0) poll(&(0x7f0000000000)=[{r2}], 0x2000000000000051, 0x0) 08:44:30 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0xd) ioctl$TCXONC(r0, 0x540b, 0x2) 08:44:30 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f00000001c0)=ANY=[@ANYBLOB="050000000000000020000040050000a90000000000fae9fff7ff00000000000001000000000000002560b7adff"]) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000040)={0x1, 0x0, [{0x48c, 0x0, 0x2}]}) 08:44:30 executing program 2: r0 = socket$kcm(0x2, 0x2, 0x73) recvmmsg(r0, &(0x7f00000001c0), 0xb2, 0x1, 0x0) 08:44:30 executing program 2: r0 = socket$kcm(0x2, 0x2, 0x73) recvmmsg(r0, &(0x7f00000001c0), 0xb2, 0x1, 0x0) 08:44:30 executing program 4: r0 = socket(0x2, 0x3, 0x2) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000a80)=0xffffffff, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$unix(r0, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0x6a0000e7}, 0x6e) 08:44:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000200)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) close(r1) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000c85000)) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000013c0)='ramfs\x00', 0x0, 0x0) poll(&(0x7f0000000000)=[{r2}], 0x2000000000000051, 0x0) 08:44:30 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0xd) ioctl$TCXONC(r0, 0x540b, 0x2) 08:44:30 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f00000001c0)=ANY=[@ANYBLOB="050000000000000020000040050000a90000000000fae9fff7ff00000000000001000000000000002560b7adff"]) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000040)={0x1, 0x0, [{0x48c, 0x0, 0x2}]}) 08:44:30 executing program 2: r0 = socket$kcm(0x2, 0x2, 0x73) recvmmsg(r0, &(0x7f00000001c0), 0xb2, 0x1, 0x0) 08:44:31 executing program 1: socket$inet6(0x10, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x952, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x0, 0x0, 0x2, 0x0, 0x9, 0x0, 0x5, 0xffffffff, 0x5, 0x6, 0x0, 0x4, 0x20, 0x9fc5, 0x0, 0x9, 0xfff, 0x10001, 0x80000001, 0x8, 0x400, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0xd}, 0x0, 0x3, 0x4d, 0x9, 0xbe4, 0x5, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x201, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="00002f1454f71f3be48a2ba75c9c02392cb9"], 0x12) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000100)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) socket$bt_hidp(0x1f, 0x3, 0x6) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) 08:44:31 executing program 4: r0 = socket(0x2, 0x3, 0x2) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000a80)=0xffffffff, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$unix(r0, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0x6a0000e7}, 0x6e) 08:44:31 executing program 5: r0 = socket(0x2, 0x3, 0x2) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000a80)=0xffffffff, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$unix(r0, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0x6a0000e7}, 0x6e) 08:44:31 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f00000001c0)=ANY=[@ANYBLOB="050000000000000020000040050000a90000000000fae9fff7ff00000000000001000000000000002560b7adff"]) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000040)={0x1, 0x0, [{0x48c, 0x0, 0x2}]}) 08:44:31 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0xd) ioctl$TCXONC(r0, 0x540b, 0x2) 08:44:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f00000001c0)=ANY=[@ANYBLOB="050000000000000020000040050000a90000000000fae9fff7ff00000000000001000000000000002560b7adff"]) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000040)={0x1, 0x0, [{0x48c, 0x0, 0x2}]}) 08:44:31 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0xd) ioctl$TCXONC(r0, 0x540b, 0x2) 08:44:31 executing program 5: r0 = socket(0x2, 0x3, 0x2) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000a80)=0xffffffff, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$unix(r0, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0x6a0000e7}, 0x6e) 08:44:31 executing program 4: r0 = socket(0x2, 0x3, 0x2) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000a80)=0xffffffff, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$unix(r0, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0x6a0000e7}, 0x6e) 08:44:31 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f00000001c0)=ANY=[@ANYBLOB="050000000000000020000040050000a90000000000fae9fff7ff00000000000001000000000000002560b7adff"]) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000040)={0x1, 0x0, [{0x48c, 0x0, 0x2}]}) 08:44:31 executing program 0: clone(0x41bc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000001c0)) ptrace(0x4206, r0) ptrace$getregset(0x4205, r0, 0x1, &(0x7f0000000000)={0x0}) 08:44:31 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x9, 0x1d, 0x6, 0xc, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), &(0x7f00000002c0)}, 0x1b) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000002540)={r0, &(0x7f0000000340)='U', &(0x7f0000002440)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000800)={r0, &(0x7f0000000380)="c2", &(0x7f0000000700)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f00000004c0)='1', &(0x7f0000000540)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000280)="eb", &(0x7f0000000400)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f00000000c0), &(0x7f00000002c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), &(0x7f0000001440)}, 0x20) 08:44:32 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x9, 0x1d, 0x6, 0xc, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), &(0x7f00000002c0)}, 0x1b) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000002540)={r0, &(0x7f0000000340)='U', &(0x7f0000002440)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000800)={r0, &(0x7f0000000380)="c2", &(0x7f0000000700)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f00000004c0)='1', &(0x7f0000000540)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000280)="eb", &(0x7f0000000400)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f00000000c0), &(0x7f00000002c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), &(0x7f0000001440)}, 0x20) 08:44:32 executing program 5: r0 = socket(0x2, 0x3, 0x2) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000a80)=0xffffffff, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$unix(r0, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0x6a0000e7}, 0x6e) 08:44:32 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000500)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000002c0)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x8, 0x0) 08:44:32 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f00000001c0)=ANY=[@ANYBLOB="050000000000000020000040050000a90000000000fae9fff7ff00000000000001000000000000002560b7adff"]) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000040)={0x1, 0x0, [{0x48c, 0x0, 0x2}]}) 08:44:32 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x9, 0x1d, 0x6, 0xc, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), &(0x7f00000002c0)}, 0x1b) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000002540)={r0, &(0x7f0000000340)='U', &(0x7f0000002440)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000800)={r0, &(0x7f0000000380)="c2", &(0x7f0000000700)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f00000004c0)='1', &(0x7f0000000540)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000280)="eb", &(0x7f0000000400)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f00000000c0), &(0x7f00000002c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), &(0x7f0000001440)}, 0x20) 08:44:32 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x9, 0x1d, 0x6, 0xc, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), &(0x7f00000002c0)}, 0x1b) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000002540)={r0, &(0x7f0000000340)='U', &(0x7f0000002440)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000800)={r0, &(0x7f0000000380)="c2", &(0x7f0000000700)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f00000004c0)='1', &(0x7f0000000540)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000280)="eb", &(0x7f0000000400)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f00000000c0), &(0x7f00000002c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), &(0x7f0000001440)}, 0x20) 08:44:32 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x9, 0x1d, 0x6, 0xc, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), &(0x7f00000002c0)}, 0x1b) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000002540)={r0, &(0x7f0000000340)='U', &(0x7f0000002440)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000800)={r0, &(0x7f0000000380)="c2", &(0x7f0000000700)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f00000004c0)='1', &(0x7f0000000540)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000280)="eb", &(0x7f0000000400)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f00000000c0), &(0x7f00000002c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), &(0x7f0000001440)}, 0x20) 08:44:32 executing program 0: clone(0x41bc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000001c0)) ptrace(0x4206, r0) ptrace$getregset(0x4205, r0, 0x1, &(0x7f0000000000)={0x0}) 08:44:32 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x9, 0x1d, 0x6, 0xc, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), &(0x7f00000002c0)}, 0x1b) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000002540)={r0, &(0x7f0000000340)='U', &(0x7f0000002440)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000800)={r0, &(0x7f0000000380)="c2", &(0x7f0000000700)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f00000004c0)='1', &(0x7f0000000540)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000280)="eb", &(0x7f0000000400)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f00000000c0), &(0x7f00000002c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), &(0x7f0000001440)}, 0x20) 08:44:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dcab0d5e0be6e47bf070") mount$9p_tcp(&(0x7f00000003c0)='\n-7.0.0.1\x00', &(0x7f0000000400)='.\x00', &(0x7f0000000480)='9p\x00', 0x0, &(0x7f0000000080)={'trans=tcp,', {'port'}, 0x2c, {[{@version_L='version=9p2000.L'}]}}) 08:44:32 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000500)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000002c0)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x8, 0x0) 08:44:32 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x9, 0x1d, 0x6, 0xc, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), &(0x7f00000002c0)}, 0x1b) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000002540)={r0, &(0x7f0000000340)='U', &(0x7f0000002440)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000800)={r0, &(0x7f0000000380)="c2", &(0x7f0000000700)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f00000004c0)='1', &(0x7f0000000540)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000280)="eb", &(0x7f0000000400)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f00000000c0), &(0x7f00000002c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), &(0x7f0000001440)}, 0x20) 08:44:32 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x9, 0x1d, 0x6, 0xc, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), &(0x7f00000002c0)}, 0x1b) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000002540)={r0, &(0x7f0000000340)='U', &(0x7f0000002440)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000800)={r0, &(0x7f0000000380)="c2", &(0x7f0000000700)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f00000004c0)='1', &(0x7f0000000540)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000280)="eb", &(0x7f0000000400)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f00000000c0), &(0x7f00000002c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), &(0x7f0000001440)}, 0x20) 08:44:32 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x9, 0x1d, 0x6, 0xc, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), &(0x7f00000002c0)}, 0x1b) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000002540)={r0, &(0x7f0000000340)='U', &(0x7f0000002440)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000800)={r0, &(0x7f0000000380)="c2", &(0x7f0000000700)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f00000004c0)='1', &(0x7f0000000540)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000280)="eb", &(0x7f0000000400)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f00000000c0), &(0x7f00000002c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), &(0x7f0000001440)}, 0x20) 08:44:32 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x9, 0x1d, 0x6, 0xc, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), &(0x7f00000002c0)}, 0x1b) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000002540)={r0, &(0x7f0000000340)='U', &(0x7f0000002440)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000800)={r0, &(0x7f0000000380)="c2", &(0x7f0000000700)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f00000004c0)='1', &(0x7f0000000540)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000280)="eb", &(0x7f0000000400)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f00000000c0), &(0x7f00000002c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), &(0x7f0000001440)}, 0x20) [ 485.014799][T21534] 9pnet: p9_fd_create_tcp (21534): problem connecting socket to [ 485.014799][T21534] -7.0.0.1 08:44:32 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000500)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000002c0)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x8, 0x0) 08:44:33 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000500)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000002c0)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x8, 0x0) [ 485.092836][T21537] 9pnet: p9_fd_create_tcp (21537): problem connecting socket to [ 485.092836][T21537] -7.0.0.1 08:44:33 executing program 1: r0 = socket(0x10, 0x80002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'nlmon0\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x17f, &(0x7f0000000000)={&(0x7f0000000780)=ANY=[@ANYBLOB="7400000024000b0500000000000000edffffff00", @ANYRES32=r1, @ANYBLOB="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"], 0x74}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000180)=[{0x3, 0x1000000000000, &(0x7f0000000080), 0x0, &(0x7f0000000100)}], 0x492492492492642, 0x0) 08:44:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dcab0d5e0be6e47bf070") mount$9p_tcp(&(0x7f00000003c0)='\n-7.0.0.1\x00', &(0x7f0000000400)='.\x00', &(0x7f0000000480)='9p\x00', 0x0, &(0x7f0000000080)={'trans=tcp,', {'port'}, 0x2c, {[{@version_L='version=9p2000.L'}]}}) [ 485.408522][T21556] 9pnet: p9_fd_create_tcp (21556): problem connecting socket to [ 485.408522][T21556] -7.0.0.1 08:44:33 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r0, &(0x7f0000000040), 0x10) ioctl$int_in(r0, 0x100000000005452, &(0x7f0000000080)=0x9) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvmmsg(r0, &(0x7f00000005c0), 0x179, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bdfe47bf070") 08:44:33 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000500)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000002c0)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x8, 0x0) 08:44:33 executing program 0: clone(0x41bc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000001c0)) ptrace(0x4206, r0) ptrace$getregset(0x4205, r0, 0x1, &(0x7f0000000000)={0x0}) 08:44:33 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000500)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000002c0)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x8, 0x0) 08:44:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dcab0d5e0be6e47bf070") mount$9p_tcp(&(0x7f00000003c0)='\n-7.0.0.1\x00', &(0x7f0000000400)='.\x00', &(0x7f0000000480)='9p\x00', 0x0, &(0x7f0000000080)={'trans=tcp,', {'port'}, 0x2c, {[{@version_L='version=9p2000.L'}]}}) 08:44:33 executing program 1: r0 = socket(0x10, 0x80002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'nlmon0\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x17f, &(0x7f0000000000)={&(0x7f0000000780)=ANY=[@ANYBLOB="7400000024000b0500000000000000edffffff00", @ANYRES32=r1, @ANYBLOB="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"], 0x74}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000180)=[{0x3, 0x1000000000000, &(0x7f0000000080), 0x0, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 485.776527][T21570] 9pnet: p9_fd_create_tcp (21570): problem connecting socket to [ 485.776527][T21570] -7.0.0.1 08:44:33 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000500)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000002c0)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x8, 0x0) 08:44:33 executing program 4: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) close(r1) socket$caif_seqpacket(0x25, 0x5, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000540)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 08:44:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dcab0d5e0be6e47bf070") mount$9p_tcp(&(0x7f00000003c0)='\n-7.0.0.1\x00', &(0x7f0000000400)='.\x00', &(0x7f0000000480)='9p\x00', 0x0, &(0x7f0000000080)={'trans=tcp,', {'port'}, 0x2c, {[{@version_L='version=9p2000.L'}]}}) 08:44:33 executing program 1: r0 = socket(0x10, 0x80002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'nlmon0\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x17f, &(0x7f0000000000)={&(0x7f0000000780)=ANY=[@ANYBLOB="7400000024000b0500000000000000edffffff00", @ANYRES32=r1, @ANYBLOB="00000014f1ffffffffffffff0800010073667100480002000000000000000080b9a00600000000000000030000000033cc3598c9aa8178bdf1000000000000000000000000de7f4687000000000000000000000001009900007c24f1583940ea0e363002e94564838f54825863fe646c248656cb5d845549c5ceffcfeaab4260fca524afef20c0034fbd32262c964c61f3771603fd386dc70a77e574632bd950e808d63007d6c6251ac28f6b621f863af067671514a292528d7d2bef3b8444b64c875270810633f2eb7d7a89d0f3cf2074bb2e180708593cd728026dfe7b7bc2cbc705ed95700983ea22eefa47c53252758e28ba5302e15a86aff40a0cb6088e18f3326fa3a5dcd32cb951da688b87961591b4671e40cf37feaa14dd000000000000321e6e4daef23cf875a45a0643142ac688f2a10d2a194d7079ce17e9cbda5da7ecf526f153140e6740200000b3c3c00b656f9021957cb27486eea0345bdf43b770452e1353b94835d8eea1357707dacc631c885e515d18f9e1697a8604cd27f232de351b821c373ad44e60efd73e28c85c3f602e6f2d8268072ed7c6b236260b42d174ef6f656b58d72f67910c859263d463c20754585ddd2f5d331fed7266ebb98dac677cbb31a8f512a7c21e951375864317372142624c5c77600d75c2ec1b098392a706280d6b1294fd1088a9a6c4af3878fdf13f52eefc28049d4865ce8da80da72b8934456f306e1c7c42b847b4259c6ec8a4d9ffe6704608e5022134f9e4fb1e320d04a36967266b86f0abf91ef93652fa0b839f5f4e4629f76e541c5d190e1792e446c3f08fb705"], 0x74}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000180)=[{0x3, 0x1000000000000, &(0x7f0000000080), 0x0, &(0x7f0000000100)}], 0x492492492492642, 0x0) 08:44:33 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32, @ANYBLOB="0000060005007f001f00ff7f0900d40a8c6d07e06c112a75ce7cafe8f8bce2b46a184bdeeae04033f5185e61658c66c38b7b32feffff00005635813a3dc02e58e9881cea747243c80354a5083b7f8be5d455ee968dbf30f16f962a585b101c1076292321ede55c54f308cce8db1630e0f11b3fb67e3e9cf01b5587572fe42c548d589b52170d27"], 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x0, @rand_addr="9db68d65167b482bc26aed6705be1e6f"}, r2}}, 0x30) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32, @ANYBLOB="0000060005007f001f00ff7f0900d40a8c6d07e06c112a75ce7cafe8f8bce2b46a184bdeeae04033f5185e61658c66c38b7b32feffff00005635813a3dc02e58e9881cea747243c80354a5083b7f8be5d455ee968dbf30f16f962a585b101c1076292321ede55c54f308cce8db1630e0f11b3fb67e3e9cf01b5587572fe42c548d58"], 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) geteuid() signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) setresgid(0x0, 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) r3 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(r3, 0x101, 0x6, 0x0, 0x0) r4 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(r4, 0x101, 0x6, &(0x7f0000000000), 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, &(0x7f0000000000), &(0x7f0000000040)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32], &(0x7f0000000580)=0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@multicast1, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) sched_setscheduler(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fstat(r0, 0x0) gettid() getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, &(0x7f0000000040)) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, 0x0) r5 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) getsockopt$ax25_int(r5, 0x101, 0x0, 0x0, &(0x7f0000000040)) socket$isdn_base(0x22, 0x3, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) r6 = dup(0xffffffffffffffff) recvfrom$unix(r6, &(0x7f00000002c0)=""/129, 0x81, 0x0, 0x0, 0x0) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, 0x0) bind$bt_hci(r6, &(0x7f0000000200), 0xc) bpf$MAP_CREATE(0x0, 0x0, 0x0) getpid() write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f00000036c0)) fstat(0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000003840)) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x0, 0x0, 0x0) getresgid(0x0, &(0x7f0000003980), &(0x7f00000039c0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003b40)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, 0x0}], 0x1, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r7, &(0x7f00000005c0)=""/223, 0xfc61) 08:44:34 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x68, r1, 0x457e44295867a64f, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x60, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) [ 486.068489][T21590] 9pnet: p9_fd_create_tcp (21590): problem connecting socket to [ 486.068489][T21590] -7.0.0.1 08:44:34 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r0, &(0x7f0000000040), 0x10) ioctl$int_in(r0, 0x100000000005452, &(0x7f0000000080)=0x9) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvmmsg(r0, &(0x7f00000005c0), 0x179, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bdfe47bf070") 08:44:34 executing program 1: r0 = socket(0x10, 0x80002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'nlmon0\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x17f, &(0x7f0000000000)={&(0x7f0000000780)=ANY=[@ANYBLOB="7400000024000b0500000000000000edffffff00", @ANYRES32=r1, @ANYBLOB="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"], 0x74}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000180)=[{0x3, 0x1000000000000, &(0x7f0000000080), 0x0, &(0x7f0000000100)}], 0x492492492492642, 0x0) 08:44:34 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x68, r1, 0x457e44295867a64f, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x60, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 08:44:34 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32, @ANYBLOB="0000060005007f001f00ff7f0900d40a8c6d07e06c112a75ce7cafe8f8bce2b46a184bdeeae04033f5185e61658c66c38b7b32feffff00005635813a3dc02e58e9881cea747243c80354a5083b7f8be5d455ee968dbf30f16f962a585b101c1076292321ede55c54f308cce8db1630e0f11b3fb67e3e9cf01b5587572fe42c548d589b52170d27"], 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x0, @rand_addr="9db68d65167b482bc26aed6705be1e6f"}, r2}}, 0x30) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32, @ANYBLOB="0000060005007f001f00ff7f0900d40a8c6d07e06c112a75ce7cafe8f8bce2b46a184bdeeae04033f5185e61658c66c38b7b32feffff00005635813a3dc02e58e9881cea747243c80354a5083b7f8be5d455ee968dbf30f16f962a585b101c1076292321ede55c54f308cce8db1630e0f11b3fb67e3e9cf01b5587572fe42c548d58"], 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) geteuid() signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) setresgid(0x0, 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) r3 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(r3, 0x101, 0x6, 0x0, 0x0) r4 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(r4, 0x101, 0x6, &(0x7f0000000000), 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, &(0x7f0000000000), &(0x7f0000000040)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32], &(0x7f0000000580)=0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@multicast1, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) sched_setscheduler(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fstat(r0, 0x0) gettid() getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, &(0x7f0000000040)) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, 0x0) r5 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) getsockopt$ax25_int(r5, 0x101, 0x0, 0x0, &(0x7f0000000040)) socket$isdn_base(0x22, 0x3, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) r6 = dup(0xffffffffffffffff) recvfrom$unix(r6, &(0x7f00000002c0)=""/129, 0x81, 0x0, 0x0, 0x0) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, 0x0) bind$bt_hci(r6, &(0x7f0000000200), 0xc) bpf$MAP_CREATE(0x0, 0x0, 0x0) getpid() write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f00000036c0)) fstat(0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000003840)) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x0, 0x0, 0x0) getresgid(0x0, &(0x7f0000003980), &(0x7f00000039c0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003b40)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, 0x0}], 0x1, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r7, &(0x7f00000005c0)=""/223, 0xfc61) 08:44:34 executing program 0: clone(0x41bc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000001c0)) ptrace(0x4206, r0) ptrace$getregset(0x4205, r0, 0x1, &(0x7f0000000000)={0x0}) 08:44:34 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x68, r1, 0x457e44295867a64f, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x60, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 08:44:34 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r0, &(0x7f0000000040), 0x10) ioctl$int_in(r0, 0x100000000005452, &(0x7f0000000080)=0x9) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvmmsg(r0, &(0x7f00000005c0), 0x179, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bdfe47bf070") 08:44:34 executing program 4: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) close(r1) socket$caif_seqpacket(0x25, 0x5, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000540)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 08:44:34 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x68, r1, 0x457e44295867a64f, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x60, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 08:44:35 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32, @ANYBLOB="0000060005007f001f00ff7f0900d40a8c6d07e06c112a75ce7cafe8f8bce2b46a184bdeeae04033f5185e61658c66c38b7b32feffff00005635813a3dc02e58e9881cea747243c80354a5083b7f8be5d455ee968dbf30f16f962a585b101c1076292321ede55c54f308cce8db1630e0f11b3fb67e3e9cf01b5587572fe42c548d589b52170d27"], 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x0, @rand_addr="9db68d65167b482bc26aed6705be1e6f"}, r2}}, 0x30) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32, @ANYBLOB="0000060005007f001f00ff7f0900d40a8c6d07e06c112a75ce7cafe8f8bce2b46a184bdeeae04033f5185e61658c66c38b7b32feffff00005635813a3dc02e58e9881cea747243c80354a5083b7f8be5d455ee968dbf30f16f962a585b101c1076292321ede55c54f308cce8db1630e0f11b3fb67e3e9cf01b5587572fe42c548d58"], 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) geteuid() signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) setresgid(0x0, 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) r3 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(r3, 0x101, 0x6, 0x0, 0x0) r4 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(r4, 0x101, 0x6, &(0x7f0000000000), 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, &(0x7f0000000000), &(0x7f0000000040)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32], &(0x7f0000000580)=0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@multicast1, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) sched_setscheduler(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fstat(r0, 0x0) gettid() getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, &(0x7f0000000040)) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, 0x0) r5 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) getsockopt$ax25_int(r5, 0x101, 0x0, 0x0, &(0x7f0000000040)) socket$isdn_base(0x22, 0x3, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) r6 = dup(0xffffffffffffffff) recvfrom$unix(r6, &(0x7f00000002c0)=""/129, 0x81, 0x0, 0x0, 0x0) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, 0x0) bind$bt_hci(r6, &(0x7f0000000200), 0xc) bpf$MAP_CREATE(0x0, 0x0, 0x0) getpid() write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f00000036c0)) fstat(0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000003840)) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x0, 0x0, 0x0) getresgid(0x0, &(0x7f0000003980), &(0x7f00000039c0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003b40)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, 0x0}], 0x1, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r7, &(0x7f00000005c0)=""/223, 0xfc61) 08:44:35 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32, @ANYBLOB="0000060005007f001f00ff7f0900d40a8c6d07e06c112a75ce7cafe8f8bce2b46a184bdeeae04033f5185e61658c66c38b7b32feffff00005635813a3dc02e58e9881cea747243c80354a5083b7f8be5d455ee968dbf30f16f962a585b101c1076292321ede55c54f308cce8db1630e0f11b3fb67e3e9cf01b5587572fe42c548d589b52170d27"], 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x0, @rand_addr="9db68d65167b482bc26aed6705be1e6f"}, r2}}, 0x30) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32, @ANYBLOB="0000060005007f001f00ff7f0900d40a8c6d07e06c112a75ce7cafe8f8bce2b46a184bdeeae04033f5185e61658c66c38b7b32feffff00005635813a3dc02e58e9881cea747243c80354a5083b7f8be5d455ee968dbf30f16f962a585b101c1076292321ede55c54f308cce8db1630e0f11b3fb67e3e9cf01b5587572fe42c548d58"], 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) geteuid() signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) setresgid(0x0, 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) r3 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(r3, 0x101, 0x6, 0x0, 0x0) r4 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(r4, 0x101, 0x6, &(0x7f0000000000), 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, &(0x7f0000000000), &(0x7f0000000040)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32], &(0x7f0000000580)=0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@multicast1, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) sched_setscheduler(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fstat(r0, 0x0) gettid() getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, &(0x7f0000000040)) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, 0x0) r5 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) getsockopt$ax25_int(r5, 0x101, 0x0, 0x0, &(0x7f0000000040)) socket$isdn_base(0x22, 0x3, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) r6 = dup(0xffffffffffffffff) recvfrom$unix(r6, &(0x7f00000002c0)=""/129, 0x81, 0x0, 0x0, 0x0) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, 0x0) bind$bt_hci(r6, &(0x7f0000000200), 0xc) bpf$MAP_CREATE(0x0, 0x0, 0x0) getpid() write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f00000036c0)) fstat(0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000003840)) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x0, 0x0, 0x0) getresgid(0x0, &(0x7f0000003980), &(0x7f00000039c0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003b40)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, 0x0}], 0x1, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r7, &(0x7f00000005c0)=""/223, 0xfc61) 08:44:35 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r0, &(0x7f0000000040), 0x10) ioctl$int_in(r0, 0x100000000005452, &(0x7f0000000080)=0x9) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvmmsg(r0, &(0x7f00000005c0), 0x179, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bdfe47bf070") 08:44:35 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r0, &(0x7f0000000040), 0x10) ioctl$int_in(r0, 0x100000000005452, &(0x7f0000000080)=0x9) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvmmsg(r0, &(0x7f00000005c0), 0x179, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bdfe47bf070") 08:44:35 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32, @ANYBLOB="0000060005007f001f00ff7f0900d40a8c6d07e06c112a75ce7cafe8f8bce2b46a184bdeeae04033f5185e61658c66c38b7b32feffff00005635813a3dc02e58e9881cea747243c80354a5083b7f8be5d455ee968dbf30f16f962a585b101c1076292321ede55c54f308cce8db1630e0f11b3fb67e3e9cf01b5587572fe42c548d589b52170d27"], 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x0, @rand_addr="9db68d65167b482bc26aed6705be1e6f"}, r2}}, 0x30) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32, @ANYBLOB="0000060005007f001f00ff7f0900d40a8c6d07e06c112a75ce7cafe8f8bce2b46a184bdeeae04033f5185e61658c66c38b7b32feffff00005635813a3dc02e58e9881cea747243c80354a5083b7f8be5d455ee968dbf30f16f962a585b101c1076292321ede55c54f308cce8db1630e0f11b3fb67e3e9cf01b5587572fe42c548d58"], 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) geteuid() signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) setresgid(0x0, 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) r3 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(r3, 0x101, 0x6, 0x0, 0x0) r4 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(r4, 0x101, 0x6, &(0x7f0000000000), 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, &(0x7f0000000000), &(0x7f0000000040)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32], &(0x7f0000000580)=0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@multicast1, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) sched_setscheduler(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fstat(r0, 0x0) gettid() getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, &(0x7f0000000040)) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, 0x0) r5 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) getsockopt$ax25_int(r5, 0x101, 0x0, 0x0, &(0x7f0000000040)) socket$isdn_base(0x22, 0x3, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) r6 = dup(0xffffffffffffffff) recvfrom$unix(r6, &(0x7f00000002c0)=""/129, 0x81, 0x0, 0x0, 0x0) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, 0x0) bind$bt_hci(r6, &(0x7f0000000200), 0xc) bpf$MAP_CREATE(0x0, 0x0, 0x0) getpid() write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f00000036c0)) fstat(0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000003840)) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x0, 0x0, 0x0) getresgid(0x0, &(0x7f0000003980), &(0x7f00000039c0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003b40)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, 0x0}], 0x1, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r7, &(0x7f00000005c0)=""/223, 0xfc61) 08:44:35 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32, @ANYBLOB="0000060005007f001f00ff7f0900d40a8c6d07e06c112a75ce7cafe8f8bce2b46a184bdeeae04033f5185e61658c66c38b7b32feffff00005635813a3dc02e58e9881cea747243c80354a5083b7f8be5d455ee968dbf30f16f962a585b101c1076292321ede55c54f308cce8db1630e0f11b3fb67e3e9cf01b5587572fe42c548d589b52170d27"], 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x0, @rand_addr="9db68d65167b482bc26aed6705be1e6f"}, r2}}, 0x30) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32, @ANYBLOB="0000060005007f001f00ff7f0900d40a8c6d07e06c112a75ce7cafe8f8bce2b46a184bdeeae04033f5185e61658c66c38b7b32feffff00005635813a3dc02e58e9881cea747243c80354a5083b7f8be5d455ee968dbf30f16f962a585b101c1076292321ede55c54f308cce8db1630e0f11b3fb67e3e9cf01b5587572fe42c548d58"], 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) geteuid() signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) setresgid(0x0, 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) r3 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(r3, 0x101, 0x6, 0x0, 0x0) r4 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(r4, 0x101, 0x6, &(0x7f0000000000), 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, &(0x7f0000000000), &(0x7f0000000040)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32], &(0x7f0000000580)=0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@multicast1, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) sched_setscheduler(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fstat(r0, 0x0) gettid() getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, &(0x7f0000000040)) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, 0x0) r5 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) getsockopt$ax25_int(r5, 0x101, 0x0, 0x0, &(0x7f0000000040)) socket$isdn_base(0x22, 0x3, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) r6 = dup(0xffffffffffffffff) recvfrom$unix(r6, &(0x7f00000002c0)=""/129, 0x81, 0x0, 0x0, 0x0) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, 0x0) bind$bt_hci(r6, &(0x7f0000000200), 0xc) bpf$MAP_CREATE(0x0, 0x0, 0x0) getpid() write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f00000036c0)) fstat(0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000003840)) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x0, 0x0, 0x0) getresgid(0x0, &(0x7f0000003980), &(0x7f00000039c0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003b40)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, 0x0}], 0x1, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r7, &(0x7f00000005c0)=""/223, 0xfc61) 08:44:35 executing program 4: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) close(r1) socket$caif_seqpacket(0x25, 0x5, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000540)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 08:44:35 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32, @ANYBLOB="0000060005007f001f00ff7f0900d40a8c6d07e06c112a75ce7cafe8f8bce2b46a184bdeeae04033f5185e61658c66c38b7b32feffff00005635813a3dc02e58e9881cea747243c80354a5083b7f8be5d455ee968dbf30f16f962a585b101c1076292321ede55c54f308cce8db1630e0f11b3fb67e3e9cf01b5587572fe42c548d589b52170d27"], 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x0, @rand_addr="9db68d65167b482bc26aed6705be1e6f"}, r2}}, 0x30) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32, @ANYBLOB="0000060005007f001f00ff7f0900d40a8c6d07e06c112a75ce7cafe8f8bce2b46a184bdeeae04033f5185e61658c66c38b7b32feffff00005635813a3dc02e58e9881cea747243c80354a5083b7f8be5d455ee968dbf30f16f962a585b101c1076292321ede55c54f308cce8db1630e0f11b3fb67e3e9cf01b5587572fe42c548d58"], 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) geteuid() signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) setresgid(0x0, 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) r3 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(r3, 0x101, 0x6, 0x0, 0x0) r4 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(r4, 0x101, 0x6, &(0x7f0000000000), 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, &(0x7f0000000000), &(0x7f0000000040)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32], &(0x7f0000000580)=0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@multicast1, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) sched_setscheduler(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fstat(r0, 0x0) gettid() getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, &(0x7f0000000040)) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, 0x0) r5 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) getsockopt$ax25_int(r5, 0x101, 0x0, 0x0, &(0x7f0000000040)) socket$isdn_base(0x22, 0x3, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) r6 = dup(0xffffffffffffffff) recvfrom$unix(r6, &(0x7f00000002c0)=""/129, 0x81, 0x0, 0x0, 0x0) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, 0x0) bind$bt_hci(r6, &(0x7f0000000200), 0xc) bpf$MAP_CREATE(0x0, 0x0, 0x0) getpid() write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f00000036c0)) fstat(0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000003840)) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x0, 0x0, 0x0) getresgid(0x0, &(0x7f0000003980), &(0x7f00000039c0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003b40)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, 0x0}], 0x1, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r7, &(0x7f00000005c0)=""/223, 0xfc61) 08:44:36 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r0, &(0x7f0000000040), 0x10) ioctl$int_in(r0, 0x100000000005452, &(0x7f0000000080)=0x9) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvmmsg(r0, &(0x7f00000005c0), 0x179, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bdfe47bf070") 08:44:36 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32, @ANYBLOB="0000060005007f001f00ff7f0900d40a8c6d07e06c112a75ce7cafe8f8bce2b46a184bdeeae04033f5185e61658c66c38b7b32feffff00005635813a3dc02e58e9881cea747243c80354a5083b7f8be5d455ee968dbf30f16f962a585b101c1076292321ede55c54f308cce8db1630e0f11b3fb67e3e9cf01b5587572fe42c548d589b52170d27"], 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x0, @rand_addr="9db68d65167b482bc26aed6705be1e6f"}, r2}}, 0x30) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32, @ANYBLOB="0000060005007f001f00ff7f0900d40a8c6d07e06c112a75ce7cafe8f8bce2b46a184bdeeae04033f5185e61658c66c38b7b32feffff00005635813a3dc02e58e9881cea747243c80354a5083b7f8be5d455ee968dbf30f16f962a585b101c1076292321ede55c54f308cce8db1630e0f11b3fb67e3e9cf01b5587572fe42c548d58"], 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) geteuid() signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) setresgid(0x0, 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) r3 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(r3, 0x101, 0x6, 0x0, 0x0) r4 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(r4, 0x101, 0x6, &(0x7f0000000000), 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, &(0x7f0000000000), &(0x7f0000000040)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32], &(0x7f0000000580)=0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@multicast1, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) sched_setscheduler(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fstat(r0, 0x0) gettid() getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, &(0x7f0000000040)) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, 0x0) r5 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) getsockopt$ax25_int(r5, 0x101, 0x0, 0x0, &(0x7f0000000040)) socket$isdn_base(0x22, 0x3, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) r6 = dup(0xffffffffffffffff) recvfrom$unix(r6, &(0x7f00000002c0)=""/129, 0x81, 0x0, 0x0, 0x0) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, 0x0) bind$bt_hci(r6, &(0x7f0000000200), 0xc) bpf$MAP_CREATE(0x0, 0x0, 0x0) getpid() write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f00000036c0)) fstat(0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000003840)) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x0, 0x0, 0x0) getresgid(0x0, &(0x7f0000003980), &(0x7f00000039c0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003b40)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, 0x0}], 0x1, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r7, &(0x7f00000005c0)=""/223, 0xfc61) 08:44:36 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r0, &(0x7f0000000040), 0x10) ioctl$int_in(r0, 0x100000000005452, &(0x7f0000000080)=0x9) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvmmsg(r0, &(0x7f00000005c0), 0x179, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bdfe47bf070") 08:44:36 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32, @ANYBLOB="0000060005007f001f00ff7f0900d40a8c6d07e06c112a75ce7cafe8f8bce2b46a184bdeeae04033f5185e61658c66c38b7b32feffff00005635813a3dc02e58e9881cea747243c80354a5083b7f8be5d455ee968dbf30f16f962a585b101c1076292321ede55c54f308cce8db1630e0f11b3fb67e3e9cf01b5587572fe42c548d589b52170d27"], 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x0, @rand_addr="9db68d65167b482bc26aed6705be1e6f"}, r2}}, 0x30) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32, @ANYBLOB="0000060005007f001f00ff7f0900d40a8c6d07e06c112a75ce7cafe8f8bce2b46a184bdeeae04033f5185e61658c66c38b7b32feffff00005635813a3dc02e58e9881cea747243c80354a5083b7f8be5d455ee968dbf30f16f962a585b101c1076292321ede55c54f308cce8db1630e0f11b3fb67e3e9cf01b5587572fe42c548d58"], 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) geteuid() signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) setresgid(0x0, 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) r3 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(r3, 0x101, 0x6, 0x0, 0x0) r4 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(r4, 0x101, 0x6, &(0x7f0000000000), 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, &(0x7f0000000000), &(0x7f0000000040)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32], &(0x7f0000000580)=0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@multicast1, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) sched_setscheduler(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fstat(r0, 0x0) gettid() getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, &(0x7f0000000040)) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, 0x0) r5 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) getsockopt$ax25_int(r5, 0x101, 0x0, 0x0, &(0x7f0000000040)) socket$isdn_base(0x22, 0x3, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) r6 = dup(0xffffffffffffffff) recvfrom$unix(r6, &(0x7f00000002c0)=""/129, 0x81, 0x0, 0x0, 0x0) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, 0x0) bind$bt_hci(r6, &(0x7f0000000200), 0xc) bpf$MAP_CREATE(0x0, 0x0, 0x0) getpid() write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f00000036c0)) fstat(0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000003840)) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x0, 0x0, 0x0) getresgid(0x0, &(0x7f0000003980), &(0x7f00000039c0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003b40)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, 0x0}], 0x1, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r7, &(0x7f00000005c0)=""/223, 0xfc61) 08:44:36 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32, @ANYBLOB="0000060005007f001f00ff7f0900d40a8c6d07e06c112a75ce7cafe8f8bce2b46a184bdeeae04033f5185e61658c66c38b7b32feffff00005635813a3dc02e58e9881cea747243c80354a5083b7f8be5d455ee968dbf30f16f962a585b101c1076292321ede55c54f308cce8db1630e0f11b3fb67e3e9cf01b5587572fe42c548d589b52170d27"], 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x0, @rand_addr="9db68d65167b482bc26aed6705be1e6f"}, r2}}, 0x30) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32, @ANYBLOB="0000060005007f001f00ff7f0900d40a8c6d07e06c112a75ce7cafe8f8bce2b46a184bdeeae04033f5185e61658c66c38b7b32feffff00005635813a3dc02e58e9881cea747243c80354a5083b7f8be5d455ee968dbf30f16f962a585b101c1076292321ede55c54f308cce8db1630e0f11b3fb67e3e9cf01b5587572fe42c548d58"], 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) geteuid() signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) setresgid(0x0, 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) r3 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(r3, 0x101, 0x6, 0x0, 0x0) r4 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(r4, 0x101, 0x6, &(0x7f0000000000), 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, &(0x7f0000000000), &(0x7f0000000040)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32], &(0x7f0000000580)=0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@multicast1, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) sched_setscheduler(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fstat(r0, 0x0) gettid() getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, &(0x7f0000000040)) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, 0x0) r5 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) getsockopt$ax25_int(r5, 0x101, 0x0, 0x0, &(0x7f0000000040)) socket$isdn_base(0x22, 0x3, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) r6 = dup(0xffffffffffffffff) recvfrom$unix(r6, &(0x7f00000002c0)=""/129, 0x81, 0x0, 0x0, 0x0) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, 0x0) bind$bt_hci(r6, &(0x7f0000000200), 0xc) bpf$MAP_CREATE(0x0, 0x0, 0x0) getpid() write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f00000036c0)) fstat(0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000003840)) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x0, 0x0, 0x0) getresgid(0x0, &(0x7f0000003980), &(0x7f00000039c0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003b40)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, 0x0}], 0x1, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r7, &(0x7f00000005c0)=""/223, 0xfc61) 08:44:36 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32, @ANYBLOB="0000060005007f001f00ff7f0900d40a8c6d07e06c112a75ce7cafe8f8bce2b46a184bdeeae04033f5185e61658c66c38b7b32feffff00005635813a3dc02e58e9881cea747243c80354a5083b7f8be5d455ee968dbf30f16f962a585b101c1076292321ede55c54f308cce8db1630e0f11b3fb67e3e9cf01b5587572fe42c548d589b52170d27"], 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x0, @rand_addr="9db68d65167b482bc26aed6705be1e6f"}, r2}}, 0x30) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32, @ANYBLOB="0000060005007f001f00ff7f0900d40a8c6d07e06c112a75ce7cafe8f8bce2b46a184bdeeae04033f5185e61658c66c38b7b32feffff00005635813a3dc02e58e9881cea747243c80354a5083b7f8be5d455ee968dbf30f16f962a585b101c1076292321ede55c54f308cce8db1630e0f11b3fb67e3e9cf01b5587572fe42c548d58"], 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) geteuid() signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) setresgid(0x0, 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) r3 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(r3, 0x101, 0x6, 0x0, 0x0) r4 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(r4, 0x101, 0x6, &(0x7f0000000000), 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, &(0x7f0000000000), &(0x7f0000000040)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32], &(0x7f0000000580)=0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@multicast1, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) sched_setscheduler(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fstat(r0, 0x0) gettid() getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, &(0x7f0000000040)) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, 0x0) r5 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) getsockopt$ax25_int(r5, 0x101, 0x0, 0x0, &(0x7f0000000040)) socket$isdn_base(0x22, 0x3, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) r6 = dup(0xffffffffffffffff) recvfrom$unix(r6, &(0x7f00000002c0)=""/129, 0x81, 0x0, 0x0, 0x0) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, 0x0) bind$bt_hci(r6, &(0x7f0000000200), 0xc) bpf$MAP_CREATE(0x0, 0x0, 0x0) getpid() write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f00000036c0)) fstat(0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000003840)) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x0, 0x0, 0x0) getresgid(0x0, &(0x7f0000003980), &(0x7f00000039c0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003b40)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, 0x0}], 0x1, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r7, &(0x7f00000005c0)=""/223, 0xfc61) 08:44:36 executing program 4: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) close(r1) socket$caif_seqpacket(0x25, 0x5, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000540)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 08:44:37 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32, @ANYBLOB="0000060005007f001f00ff7f0900d40a8c6d07e06c112a75ce7cafe8f8bce2b46a184bdeeae04033f5185e61658c66c38b7b32feffff00005635813a3dc02e58e9881cea747243c80354a5083b7f8be5d455ee968dbf30f16f962a585b101c1076292321ede55c54f308cce8db1630e0f11b3fb67e3e9cf01b5587572fe42c548d589b52170d27"], 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x0, @rand_addr="9db68d65167b482bc26aed6705be1e6f"}, r2}}, 0x30) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32, @ANYBLOB="0000060005007f001f00ff7f0900d40a8c6d07e06c112a75ce7cafe8f8bce2b46a184bdeeae04033f5185e61658c66c38b7b32feffff00005635813a3dc02e58e9881cea747243c80354a5083b7f8be5d455ee968dbf30f16f962a585b101c1076292321ede55c54f308cce8db1630e0f11b3fb67e3e9cf01b5587572fe42c548d58"], 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) geteuid() signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) setresgid(0x0, 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) r3 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(r3, 0x101, 0x6, 0x0, 0x0) r4 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(r4, 0x101, 0x6, &(0x7f0000000000), 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, &(0x7f0000000000), &(0x7f0000000040)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32], &(0x7f0000000580)=0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@multicast1, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) sched_setscheduler(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fstat(r0, 0x0) gettid() getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, &(0x7f0000000040)) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, 0x0) r5 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) getsockopt$ax25_int(r5, 0x101, 0x0, 0x0, &(0x7f0000000040)) socket$isdn_base(0x22, 0x3, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) r6 = dup(0xffffffffffffffff) recvfrom$unix(r6, &(0x7f00000002c0)=""/129, 0x81, 0x0, 0x0, 0x0) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, 0x0) bind$bt_hci(r6, &(0x7f0000000200), 0xc) bpf$MAP_CREATE(0x0, 0x0, 0x0) getpid() write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f00000036c0)) fstat(0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000003840)) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x0, 0x0, 0x0) getresgid(0x0, &(0x7f0000003980), &(0x7f00000039c0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003b40)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, 0x0}], 0x1, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r7, &(0x7f00000005c0)=""/223, 0xfc61) 08:44:37 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32, @ANYBLOB="0000060005007f001f00ff7f0900d40a8c6d07e06c112a75ce7cafe8f8bce2b46a184bdeeae04033f5185e61658c66c38b7b32feffff00005635813a3dc02e58e9881cea747243c80354a5083b7f8be5d455ee968dbf30f16f962a585b101c1076292321ede55c54f308cce8db1630e0f11b3fb67e3e9cf01b5587572fe42c548d589b52170d27"], 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x0, @rand_addr="9db68d65167b482bc26aed6705be1e6f"}, r2}}, 0x30) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32, @ANYBLOB="0000060005007f001f00ff7f0900d40a8c6d07e06c112a75ce7cafe8f8bce2b46a184bdeeae04033f5185e61658c66c38b7b32feffff00005635813a3dc02e58e9881cea747243c80354a5083b7f8be5d455ee968dbf30f16f962a585b101c1076292321ede55c54f308cce8db1630e0f11b3fb67e3e9cf01b5587572fe42c548d58"], 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) geteuid() signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) setresgid(0x0, 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) r3 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(r3, 0x101, 0x6, 0x0, 0x0) r4 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(r4, 0x101, 0x6, &(0x7f0000000000), 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, &(0x7f0000000000), &(0x7f0000000040)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32], &(0x7f0000000580)=0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@multicast1, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) sched_setscheduler(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fstat(r0, 0x0) gettid() getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, &(0x7f0000000040)) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, 0x0) r5 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) getsockopt$ax25_int(r5, 0x101, 0x0, 0x0, &(0x7f0000000040)) socket$isdn_base(0x22, 0x3, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) r6 = dup(0xffffffffffffffff) recvfrom$unix(r6, &(0x7f00000002c0)=""/129, 0x81, 0x0, 0x0, 0x0) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, 0x0) bind$bt_hci(r6, &(0x7f0000000200), 0xc) bpf$MAP_CREATE(0x0, 0x0, 0x0) getpid() write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f00000036c0)) fstat(0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000003840)) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x0, 0x0, 0x0) getresgid(0x0, &(0x7f0000003980), &(0x7f00000039c0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003b40)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, 0x0}], 0x1, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r7, &(0x7f00000005c0)=""/223, 0xfc61) 08:44:37 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32, @ANYBLOB="0000060005007f001f00ff7f0900d40a8c6d07e06c112a75ce7cafe8f8bce2b46a184bdeeae04033f5185e61658c66c38b7b32feffff00005635813a3dc02e58e9881cea747243c80354a5083b7f8be5d455ee968dbf30f16f962a585b101c1076292321ede55c54f308cce8db1630e0f11b3fb67e3e9cf01b5587572fe42c548d589b52170d27"], 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x0, @rand_addr="9db68d65167b482bc26aed6705be1e6f"}, r2}}, 0x30) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32, @ANYBLOB="0000060005007f001f00ff7f0900d40a8c6d07e06c112a75ce7cafe8f8bce2b46a184bdeeae04033f5185e61658c66c38b7b32feffff00005635813a3dc02e58e9881cea747243c80354a5083b7f8be5d455ee968dbf30f16f962a585b101c1076292321ede55c54f308cce8db1630e0f11b3fb67e3e9cf01b5587572fe42c548d58"], 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) geteuid() signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) setresgid(0x0, 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) r3 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(r3, 0x101, 0x6, 0x0, 0x0) r4 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(r4, 0x101, 0x6, &(0x7f0000000000), 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, &(0x7f0000000000), &(0x7f0000000040)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32], &(0x7f0000000580)=0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@multicast1, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) sched_setscheduler(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fstat(r0, 0x0) gettid() getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, &(0x7f0000000040)) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, 0x0) r5 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) getsockopt$ax25_int(r5, 0x101, 0x0, 0x0, &(0x7f0000000040)) socket$isdn_base(0x22, 0x3, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) r6 = dup(0xffffffffffffffff) recvfrom$unix(r6, &(0x7f00000002c0)=""/129, 0x81, 0x0, 0x0, 0x0) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, 0x0) bind$bt_hci(r6, &(0x7f0000000200), 0xc) bpf$MAP_CREATE(0x0, 0x0, 0x0) getpid() write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f00000036c0)) fstat(0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000003840)) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x0, 0x0, 0x0) getresgid(0x0, &(0x7f0000003980), &(0x7f00000039c0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003b40)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, 0x0}], 0x1, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r7, &(0x7f00000005c0)=""/223, 0xfc61) 08:44:37 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32, @ANYBLOB="0000060005007f001f00ff7f0900d40a8c6d07e06c112a75ce7cafe8f8bce2b46a184bdeeae04033f5185e61658c66c38b7b32feffff00005635813a3dc02e58e9881cea747243c80354a5083b7f8be5d455ee968dbf30f16f962a585b101c1076292321ede55c54f308cce8db1630e0f11b3fb67e3e9cf01b5587572fe42c548d589b52170d27"], 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x0, @rand_addr="9db68d65167b482bc26aed6705be1e6f"}, r2}}, 0x30) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32, @ANYBLOB="0000060005007f001f00ff7f0900d40a8c6d07e06c112a75ce7cafe8f8bce2b46a184bdeeae04033f5185e61658c66c38b7b32feffff00005635813a3dc02e58e9881cea747243c80354a5083b7f8be5d455ee968dbf30f16f962a585b101c1076292321ede55c54f308cce8db1630e0f11b3fb67e3e9cf01b5587572fe42c548d58"], 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) geteuid() signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) setresgid(0x0, 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) r3 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(r3, 0x101, 0x6, 0x0, 0x0) r4 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(r4, 0x101, 0x6, &(0x7f0000000000), 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, &(0x7f0000000000), &(0x7f0000000040)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32], &(0x7f0000000580)=0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@multicast1, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) sched_setscheduler(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fstat(r0, 0x0) gettid() getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, &(0x7f0000000040)) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, 0x0) r5 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) getsockopt$ax25_int(r5, 0x101, 0x0, 0x0, &(0x7f0000000040)) socket$isdn_base(0x22, 0x3, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) r6 = dup(0xffffffffffffffff) recvfrom$unix(r6, &(0x7f00000002c0)=""/129, 0x81, 0x0, 0x0, 0x0) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, 0x0) bind$bt_hci(r6, &(0x7f0000000200), 0xc) bpf$MAP_CREATE(0x0, 0x0, 0x0) getpid() write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f00000036c0)) fstat(0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000003840)) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x0, 0x0, 0x0) getresgid(0x0, &(0x7f0000003980), &(0x7f00000039c0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003b40)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, 0x0}], 0x1, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r7, &(0x7f00000005c0)=""/223, 0xfc61) 08:44:37 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32, @ANYBLOB="0000060005007f001f00ff7f0900d40a8c6d07e06c112a75ce7cafe8f8bce2b46a184bdeeae04033f5185e61658c66c38b7b32feffff00005635813a3dc02e58e9881cea747243c80354a5083b7f8be5d455ee968dbf30f16f962a585b101c1076292321ede55c54f308cce8db1630e0f11b3fb67e3e9cf01b5587572fe42c548d589b52170d27"], 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x0, @rand_addr="9db68d65167b482bc26aed6705be1e6f"}, r2}}, 0x30) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32, @ANYBLOB="0000060005007f001f00ff7f0900d40a8c6d07e06c112a75ce7cafe8f8bce2b46a184bdeeae04033f5185e61658c66c38b7b32feffff00005635813a3dc02e58e9881cea747243c80354a5083b7f8be5d455ee968dbf30f16f962a585b101c1076292321ede55c54f308cce8db1630e0f11b3fb67e3e9cf01b5587572fe42c548d58"], 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) geteuid() signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) setresgid(0x0, 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) r3 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(r3, 0x101, 0x6, 0x0, 0x0) r4 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(r4, 0x101, 0x6, &(0x7f0000000000), 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, &(0x7f0000000000), &(0x7f0000000040)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32], &(0x7f0000000580)=0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@multicast1, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) sched_setscheduler(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fstat(r0, 0x0) gettid() getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, &(0x7f0000000040)) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, 0x0) r5 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) getsockopt$ax25_int(r5, 0x101, 0x0, 0x0, &(0x7f0000000040)) socket$isdn_base(0x22, 0x3, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) r6 = dup(0xffffffffffffffff) recvfrom$unix(r6, &(0x7f00000002c0)=""/129, 0x81, 0x0, 0x0, 0x0) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, 0x0) bind$bt_hci(r6, &(0x7f0000000200), 0xc) bpf$MAP_CREATE(0x0, 0x0, 0x0) getpid() write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f00000036c0)) fstat(0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000003840)) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x0, 0x0, 0x0) getresgid(0x0, &(0x7f0000003980), &(0x7f00000039c0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003b40)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, 0x0}], 0x1, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r7, &(0x7f00000005c0)=""/223, 0xfc61) 08:44:37 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm(twofish))\x00'}, 0x58) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r1, r0) 08:44:37 executing program 4: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ubi_ctrl\x00', 0x200, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0xfffffffffffffe24) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x80000000003e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x8, 0x3, 0xfffffffffffff0f8, 0x4, 0x74}, &(0x7f0000000140)=0x14) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={r1, 0x7}, &(0x7f00000002c0)=0x8) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) fanotify_init(0x2, 0x80000) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {0x4, 0x7}, [{0x8, 0x2}, {0x8, 0x2}, {}, {0x8, 0x1}], {}, {0x20, 0x7}}, 0x54, 0x1) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r2 = msgget(0x1, 0x0) msgrcv(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB='\x00'], 0x1, 0x1, 0x0) 08:44:37 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32, @ANYBLOB="0000060005007f001f00ff7f0900d40a8c6d07e06c112a75ce7cafe8f8bce2b46a184bdeeae04033f5185e61658c66c38b7b32feffff00005635813a3dc02e58e9881cea747243c80354a5083b7f8be5d455ee968dbf30f16f962a585b101c1076292321ede55c54f308cce8db1630e0f11b3fb67e3e9cf01b5587572fe42c548d589b52170d27"], 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x0, @rand_addr="9db68d65167b482bc26aed6705be1e6f"}, r2}}, 0x30) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32, @ANYBLOB="0000060005007f001f00ff7f0900d40a8c6d07e06c112a75ce7cafe8f8bce2b46a184bdeeae04033f5185e61658c66c38b7b32feffff00005635813a3dc02e58e9881cea747243c80354a5083b7f8be5d455ee968dbf30f16f962a585b101c1076292321ede55c54f308cce8db1630e0f11b3fb67e3e9cf01b5587572fe42c548d58"], 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) geteuid() signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) setresgid(0x0, 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) r3 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(r3, 0x101, 0x6, 0x0, 0x0) r4 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(r4, 0x101, 0x6, &(0x7f0000000000), 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, &(0x7f0000000000), &(0x7f0000000040)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32], &(0x7f0000000580)=0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@multicast1, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) sched_setscheduler(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fstat(r0, 0x0) gettid() getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, &(0x7f0000000040)) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, 0x0) r5 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) getsockopt$ax25_int(r5, 0x101, 0x0, 0x0, &(0x7f0000000040)) socket$isdn_base(0x22, 0x3, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) r6 = dup(0xffffffffffffffff) recvfrom$unix(r6, &(0x7f00000002c0)=""/129, 0x81, 0x0, 0x0, 0x0) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, 0x0) bind$bt_hci(r6, &(0x7f0000000200), 0xc) bpf$MAP_CREATE(0x0, 0x0, 0x0) getpid() write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f00000036c0)) fstat(0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000003840)) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x0, 0x0, 0x0) getresgid(0x0, &(0x7f0000003980), &(0x7f00000039c0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003b40)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, 0x0}], 0x1, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r7, &(0x7f00000005c0)=""/223, 0xfc61) 08:44:38 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32, @ANYBLOB="0000060005007f001f00ff7f0900d40a8c6d07e06c112a75ce7cafe8f8bce2b46a184bdeeae04033f5185e61658c66c38b7b32feffff00005635813a3dc02e58e9881cea747243c80354a5083b7f8be5d455ee968dbf30f16f962a585b101c1076292321ede55c54f308cce8db1630e0f11b3fb67e3e9cf01b5587572fe42c548d589b52170d27"], 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x0, @rand_addr="9db68d65167b482bc26aed6705be1e6f"}, r2}}, 0x30) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32, @ANYBLOB="0000060005007f001f00ff7f0900d40a8c6d07e06c112a75ce7cafe8f8bce2b46a184bdeeae04033f5185e61658c66c38b7b32feffff00005635813a3dc02e58e9881cea747243c80354a5083b7f8be5d455ee968dbf30f16f962a585b101c1076292321ede55c54f308cce8db1630e0f11b3fb67e3e9cf01b5587572fe42c548d58"], 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) geteuid() signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) setresgid(0x0, 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) r3 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(r3, 0x101, 0x6, 0x0, 0x0) r4 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(r4, 0x101, 0x6, &(0x7f0000000000), 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, &(0x7f0000000000), &(0x7f0000000040)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32], &(0x7f0000000580)=0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@multicast1, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) sched_setscheduler(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fstat(r0, 0x0) gettid() getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, &(0x7f0000000040)) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, 0x0) r5 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) getsockopt$ax25_int(r5, 0x101, 0x0, 0x0, &(0x7f0000000040)) socket$isdn_base(0x22, 0x3, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) r6 = dup(0xffffffffffffffff) recvfrom$unix(r6, &(0x7f00000002c0)=""/129, 0x81, 0x0, 0x0, 0x0) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, 0x0) bind$bt_hci(r6, &(0x7f0000000200), 0xc) bpf$MAP_CREATE(0x0, 0x0, 0x0) getpid() write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f00000036c0)) fstat(0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000003840)) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x0, 0x0, 0x0) getresgid(0x0, &(0x7f0000003980), &(0x7f00000039c0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003b40)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, 0x0}], 0x1, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r7, &(0x7f00000005c0)=""/223, 0xfc61) [ 490.241077][T21832] overlayfs: workdir and upperdir must reside under the same mount 08:44:38 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32, @ANYBLOB="0000060005007f001f00ff7f0900d40a8c6d07e06c112a75ce7cafe8f8bce2b46a184bdeeae04033f5185e61658c66c38b7b32feffff00005635813a3dc02e58e9881cea747243c80354a5083b7f8be5d455ee968dbf30f16f962a585b101c1076292321ede55c54f308cce8db1630e0f11b3fb67e3e9cf01b5587572fe42c548d589b52170d27"], 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x0, @rand_addr="9db68d65167b482bc26aed6705be1e6f"}, r2}}, 0x30) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32, @ANYBLOB="0000060005007f001f00ff7f0900d40a8c6d07e06c112a75ce7cafe8f8bce2b46a184bdeeae04033f5185e61658c66c38b7b32feffff00005635813a3dc02e58e9881cea747243c80354a5083b7f8be5d455ee968dbf30f16f962a585b101c1076292321ede55c54f308cce8db1630e0f11b3fb67e3e9cf01b5587572fe42c548d58"], 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) geteuid() signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) setresgid(0x0, 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) r3 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(r3, 0x101, 0x6, 0x0, 0x0) r4 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(r4, 0x101, 0x6, &(0x7f0000000000), 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, &(0x7f0000000000), &(0x7f0000000040)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32], &(0x7f0000000580)=0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@multicast1, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) sched_setscheduler(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fstat(r0, 0x0) gettid() getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, &(0x7f0000000040)) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, 0x0) r5 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) getsockopt$ax25_int(r5, 0x101, 0x0, 0x0, &(0x7f0000000040)) socket$isdn_base(0x22, 0x3, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) r6 = dup(0xffffffffffffffff) recvfrom$unix(r6, &(0x7f00000002c0)=""/129, 0x81, 0x0, 0x0, 0x0) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, 0x0) bind$bt_hci(r6, &(0x7f0000000200), 0xc) bpf$MAP_CREATE(0x0, 0x0, 0x0) getpid() write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f00000036c0)) fstat(0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000003840)) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x0, 0x0, 0x0) getresgid(0x0, &(0x7f0000003980), &(0x7f00000039c0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003b40)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, 0x0}], 0x1, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r7, &(0x7f00000005c0)=""/223, 0xfc61) 08:44:38 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32, @ANYBLOB="0000060005007f001f00ff7f0900d40a8c6d07e06c112a75ce7cafe8f8bce2b46a184bdeeae04033f5185e61658c66c38b7b32feffff00005635813a3dc02e58e9881cea747243c80354a5083b7f8be5d455ee968dbf30f16f962a585b101c1076292321ede55c54f308cce8db1630e0f11b3fb67e3e9cf01b5587572fe42c548d589b52170d27"], 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x0, @rand_addr="9db68d65167b482bc26aed6705be1e6f"}, r2}}, 0x30) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32, @ANYBLOB="0000060005007f001f00ff7f0900d40a8c6d07e06c112a75ce7cafe8f8bce2b46a184bdeeae04033f5185e61658c66c38b7b32feffff00005635813a3dc02e58e9881cea747243c80354a5083b7f8be5d455ee968dbf30f16f962a585b101c1076292321ede55c54f308cce8db1630e0f11b3fb67e3e9cf01b5587572fe42c548d58"], 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) geteuid() signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) setresgid(0x0, 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) r3 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(r3, 0x101, 0x6, 0x0, 0x0) r4 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(r4, 0x101, 0x6, &(0x7f0000000000), 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, &(0x7f0000000000), &(0x7f0000000040)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32], &(0x7f0000000580)=0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@multicast1, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) sched_setscheduler(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fstat(r0, 0x0) gettid() getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, &(0x7f0000000040)) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, 0x0) r5 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) getsockopt$ax25_int(r5, 0x101, 0x0, 0x0, &(0x7f0000000040)) socket$isdn_base(0x22, 0x3, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) r6 = dup(0xffffffffffffffff) recvfrom$unix(r6, &(0x7f00000002c0)=""/129, 0x81, 0x0, 0x0, 0x0) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, 0x0) bind$bt_hci(r6, &(0x7f0000000200), 0xc) bpf$MAP_CREATE(0x0, 0x0, 0x0) getpid() write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f00000036c0)) fstat(0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000003840)) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x0, 0x0, 0x0) getresgid(0x0, &(0x7f0000003980), &(0x7f00000039c0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003b40)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, 0x0}], 0x1, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r7, &(0x7f00000005c0)=""/223, 0xfc61) 08:44:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm(twofish))\x00'}, 0x58) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r1, r0) 08:44:38 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32, @ANYBLOB="0000060005007f001f00ff7f0900d40a8c6d07e06c112a75ce7cafe8f8bce2b46a184bdeeae04033f5185e61658c66c38b7b32feffff00005635813a3dc02e58e9881cea747243c80354a5083b7f8be5d455ee968dbf30f16f962a585b101c1076292321ede55c54f308cce8db1630e0f11b3fb67e3e9cf01b5587572fe42c548d589b52170d27"], 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x0, @rand_addr="9db68d65167b482bc26aed6705be1e6f"}, r2}}, 0x30) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32, @ANYBLOB="0000060005007f001f00ff7f0900d40a8c6d07e06c112a75ce7cafe8f8bce2b46a184bdeeae04033f5185e61658c66c38b7b32feffff00005635813a3dc02e58e9881cea747243c80354a5083b7f8be5d455ee968dbf30f16f962a585b101c1076292321ede55c54f308cce8db1630e0f11b3fb67e3e9cf01b5587572fe42c548d58"], 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) geteuid() signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) setresgid(0x0, 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) r3 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(r3, 0x101, 0x6, 0x0, 0x0) r4 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(r4, 0x101, 0x6, &(0x7f0000000000), 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, &(0x7f0000000000), &(0x7f0000000040)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32], &(0x7f0000000580)=0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@multicast1, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) sched_setscheduler(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fstat(r0, 0x0) gettid() getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, &(0x7f0000000040)) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, 0x0) r5 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) getsockopt$ax25_int(r5, 0x101, 0x0, 0x0, &(0x7f0000000040)) socket$isdn_base(0x22, 0x3, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) r6 = dup(0xffffffffffffffff) recvfrom$unix(r6, &(0x7f00000002c0)=""/129, 0x81, 0x0, 0x0, 0x0) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, 0x0) bind$bt_hci(r6, &(0x7f0000000200), 0xc) bpf$MAP_CREATE(0x0, 0x0, 0x0) getpid() write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f00000036c0)) fstat(0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000003840)) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x0, 0x0, 0x0) getresgid(0x0, &(0x7f0000003980), &(0x7f00000039c0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003b40)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, 0x0}], 0x1, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r7, &(0x7f00000005c0)=""/223, 0xfc61) [ 490.922951][T21832] overlayfs: workdir and upperdir must reside under the same mount 08:44:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm(twofish))\x00'}, 0x58) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r1, r0) 08:44:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000380)={@in6={{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x34, 0x0, "9a00d38b746182c674a091e67c5247fde12adf7a882321dd0d2cc79bfff2ec89a4a95cbb6e5436d76660287063c998430e1295b0d3923b45082cff270fc09c9e1ca0cc77b8c43a8cb33e7ff11414b04f"}, 0xd8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") unshare(0x20020400) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000480)={@in6={{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x0, 0x0, "5cb65778722c5720d883b47b5cd28f0375184192cd3b9c7c2637715f3c5db5d3f290a654df33994b4cb9c8e1bd31296a02b3006ddac6c17015c61eaa2e25889f5b8e2f1beda9e55b4c1823308c7db92d"}, 0xd8) 08:44:38 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)) prlimit64(0x0, 0x7, &(0x7f0000000000), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:44:38 executing program 4: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ubi_ctrl\x00', 0x200, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0xfffffffffffffe24) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x80000000003e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x8, 0x3, 0xfffffffffffff0f8, 0x4, 0x74}, &(0x7f0000000140)=0x14) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={r1, 0x7}, &(0x7f00000002c0)=0x8) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) fanotify_init(0x2, 0x80000) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {0x4, 0x7}, [{0x8, 0x2}, {0x8, 0x2}, {}, {0x8, 0x1}], {}, {0x20, 0x7}}, 0x54, 0x1) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r2 = msgget(0x1, 0x0) msgrcv(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB='\x00'], 0x1, 0x1, 0x0) 08:44:38 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32, @ANYBLOB="0000060005007f001f00ff7f0900d40a8c6d07e06c112a75ce7cafe8f8bce2b46a184bdeeae04033f5185e61658c66c38b7b32feffff00005635813a3dc02e58e9881cea747243c80354a5083b7f8be5d455ee968dbf30f16f962a585b101c1076292321ede55c54f308cce8db1630e0f11b3fb67e3e9cf01b5587572fe42c548d589b52170d27"], 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x0, @rand_addr="9db68d65167b482bc26aed6705be1e6f"}, r2}}, 0x30) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32, @ANYBLOB="0000060005007f001f00ff7f0900d40a8c6d07e06c112a75ce7cafe8f8bce2b46a184bdeeae04033f5185e61658c66c38b7b32feffff00005635813a3dc02e58e9881cea747243c80354a5083b7f8be5d455ee968dbf30f16f962a585b101c1076292321ede55c54f308cce8db1630e0f11b3fb67e3e9cf01b5587572fe42c548d58"], 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) geteuid() signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) setresgid(0x0, 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) r3 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(r3, 0x101, 0x6, 0x0, 0x0) r4 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(r4, 0x101, 0x6, &(0x7f0000000000), 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, &(0x7f0000000000), &(0x7f0000000040)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32], &(0x7f0000000580)=0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@multicast1, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) sched_setscheduler(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fstat(r0, 0x0) gettid() getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, &(0x7f0000000040)) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, 0x0) r5 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) getsockopt$ax25_int(r5, 0x101, 0x0, 0x0, &(0x7f0000000040)) socket$isdn_base(0x22, 0x3, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) r6 = dup(0xffffffffffffffff) recvfrom$unix(r6, &(0x7f00000002c0)=""/129, 0x81, 0x0, 0x0, 0x0) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, 0x0) bind$bt_hci(r6, &(0x7f0000000200), 0xc) bpf$MAP_CREATE(0x0, 0x0, 0x0) getpid() write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x6, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f00000036c0)) fstat(0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000003840)) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x0, 0x0, 0x0) getresgid(0x0, &(0x7f0000003980), &(0x7f00000039c0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003b40)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, 0x0}], 0x1, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r7, &(0x7f00000005c0)=""/223, 0xfc61) 08:44:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm(twofish))\x00'}, 0x58) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r1, r0) 08:44:39 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)) prlimit64(0x0, 0x7, &(0x7f0000000000), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:44:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000380)={@in6={{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x34, 0x0, "9a00d38b746182c674a091e67c5247fde12adf7a882321dd0d2cc79bfff2ec89a4a95cbb6e5436d76660287063c998430e1295b0d3923b45082cff270fc09c9e1ca0cc77b8c43a8cb33e7ff11414b04f"}, 0xd8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") unshare(0x20020400) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000480)={@in6={{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x0, 0x0, "5cb65778722c5720d883b47b5cd28f0375184192cd3b9c7c2637715f3c5db5d3f290a654df33994b4cb9c8e1bd31296a02b3006ddac6c17015c61eaa2e25889f5b8e2f1beda9e55b4c1823308c7db92d"}, 0xd8) 08:44:39 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)) prlimit64(0x0, 0x7, &(0x7f0000000000), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:44:39 executing program 0: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ubi_ctrl\x00', 0x200, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0xfffffffffffffe24) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x80000000003e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x8, 0x3, 0xfffffffffffff0f8, 0x4, 0x74}, &(0x7f0000000140)=0x14) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={r1, 0x7}, &(0x7f00000002c0)=0x8) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) fanotify_init(0x2, 0x80000) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {0x4, 0x7}, [{0x8, 0x2}, {0x8, 0x2}, {}, {0x8, 0x1}], {}, {0x20, 0x7}}, 0x54, 0x1) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r2 = msgget(0x1, 0x0) msgrcv(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB='\x00'], 0x1, 0x1, 0x0) 08:44:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000380)={@in6={{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x34, 0x0, "9a00d38b746182c674a091e67c5247fde12adf7a882321dd0d2cc79bfff2ec89a4a95cbb6e5436d76660287063c998430e1295b0d3923b45082cff270fc09c9e1ca0cc77b8c43a8cb33e7ff11414b04f"}, 0xd8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") unshare(0x20020400) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000480)={@in6={{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x0, 0x0, "5cb65778722c5720d883b47b5cd28f0375184192cd3b9c7c2637715f3c5db5d3f290a654df33994b4cb9c8e1bd31296a02b3006ddac6c17015c61eaa2e25889f5b8e2f1beda9e55b4c1823308c7db92d"}, 0xd8) 08:44:39 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)) prlimit64(0x0, 0x7, &(0x7f0000000000), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:44:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000380)={@in6={{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x34, 0x0, "9a00d38b746182c674a091e67c5247fde12adf7a882321dd0d2cc79bfff2ec89a4a95cbb6e5436d76660287063c998430e1295b0d3923b45082cff270fc09c9e1ca0cc77b8c43a8cb33e7ff11414b04f"}, 0xd8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") unshare(0x20020400) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000480)={@in6={{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x0, 0x0, "5cb65778722c5720d883b47b5cd28f0375184192cd3b9c7c2637715f3c5db5d3f290a654df33994b4cb9c8e1bd31296a02b3006ddac6c17015c61eaa2e25889f5b8e2f1beda9e55b4c1823308c7db92d"}, 0xd8) 08:44:39 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000800)=@newsa={0x140, 0x10, 0x621, 0x0, 0x0, {{@in=@local, @in6=@mcast1}, {@in6=@ipv4={[], [], @multicast1}, 0x0, 0x6c}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}, @extra_flags={0x8, 0x18, 0x4}]}, 0x140}}, 0x0) 08:44:39 executing program 5: r0 = socket$inet(0x2, 0x3, 0x80000000002) setsockopt$inet_int(r0, 0x0, 0x80000000000c8, &(0x7f0000000000), 0x4) setsockopt$inet_int(r0, 0x0, 0x100000000c9, 0x0, 0xfe37) 08:44:39 executing program 0: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ubi_ctrl\x00', 0x200, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0xfffffffffffffe24) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x80000000003e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x8, 0x3, 0xfffffffffffff0f8, 0x4, 0x74}, &(0x7f0000000140)=0x14) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={r1, 0x7}, &(0x7f00000002c0)=0x8) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) fanotify_init(0x2, 0x80000) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {0x4, 0x7}, [{0x8, 0x2}, {0x8, 0x2}, {}, {0x8, 0x1}], {}, {0x20, 0x7}}, 0x54, 0x1) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r2 = msgget(0x1, 0x0) msgrcv(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB='\x00'], 0x1, 0x1, 0x0) 08:44:39 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000280)={0x0, 0x3ddc060000000000, 0x187, 0x0, [], [{0x801, 0x0, 0x287e0}, {0x801}]}) 08:44:39 executing program 3: setrlimit(0x400000000000007, &(0x7f0000000000)) memfd_create(&(0x7f0000001680)='.\x00', 0x0) 08:44:39 executing program 4: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ubi_ctrl\x00', 0x200, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0xfffffffffffffe24) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x80000000003e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x8, 0x3, 0xfffffffffffff0f8, 0x4, 0x74}, &(0x7f0000000140)=0x14) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={r1, 0x7}, &(0x7f00000002c0)=0x8) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) fanotify_init(0x2, 0x80000) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {0x4, 0x7}, [{0x8, 0x2}, {0x8, 0x2}, {}, {0x8, 0x1}], {}, {0x20, 0x7}}, 0x54, 0x1) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r2 = msgget(0x1, 0x0) msgrcv(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB='\x00'], 0x1, 0x1, 0x0) 08:44:39 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000800)=@newsa={0x140, 0x10, 0x621, 0x0, 0x0, {{@in=@local, @in6=@mcast1}, {@in6=@ipv4={[], [], @multicast1}, 0x0, 0x6c}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}, @extra_flags={0x8, 0x18, 0x4}]}, 0x140}}, 0x0) 08:44:40 executing program 5: r0 = socket$inet(0x2, 0x3, 0x80000000002) setsockopt$inet_int(r0, 0x0, 0x80000000000c8, &(0x7f0000000000), 0x4) setsockopt$inet_int(r0, 0x0, 0x100000000c9, 0x0, 0xfe37) 08:44:40 executing program 3: setrlimit(0x400000000000007, &(0x7f0000000000)) memfd_create(&(0x7f0000001680)='.\x00', 0x0) 08:44:40 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000800)=@newsa={0x140, 0x10, 0x621, 0x0, 0x0, {{@in=@local, @in6=@mcast1}, {@in6=@ipv4={[], [], @multicast1}, 0x0, 0x6c}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}, @extra_flags={0x8, 0x18, 0x4}]}, 0x140}}, 0x0) 08:44:40 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000280)={0x0, 0x3ddc060000000000, 0x187, 0x0, [], [{0x801, 0x0, 0x287e0}, {0x801}]}) 08:44:40 executing program 3: setrlimit(0x400000000000007, &(0x7f0000000000)) memfd_create(&(0x7f0000001680)='.\x00', 0x0) 08:44:40 executing program 5: r0 = socket$inet(0x2, 0x3, 0x80000000002) setsockopt$inet_int(r0, 0x0, 0x80000000000c8, &(0x7f0000000000), 0x4) setsockopt$inet_int(r0, 0x0, 0x100000000c9, 0x0, 0xfe37) 08:44:40 executing program 3: setrlimit(0x400000000000007, &(0x7f0000000000)) memfd_create(&(0x7f0000001680)='.\x00', 0x0) 08:44:40 executing program 0: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ubi_ctrl\x00', 0x200, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0xfffffffffffffe24) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x80000000003e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x8, 0x3, 0xfffffffffffff0f8, 0x4, 0x74}, &(0x7f0000000140)=0x14) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={r1, 0x7}, &(0x7f00000002c0)=0x8) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) fanotify_init(0x2, 0x80000) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {0x4, 0x7}, [{0x8, 0x2}, {0x8, 0x2}, {}, {0x8, 0x1}], {}, {0x20, 0x7}}, 0x54, 0x1) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r2 = msgget(0x1, 0x0) msgrcv(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB='\x00'], 0x1, 0x1, 0x0) 08:44:40 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000800)=@newsa={0x140, 0x10, 0x621, 0x0, 0x0, {{@in=@local, @in6=@mcast1}, {@in6=@ipv4={[], [], @multicast1}, 0x0, 0x6c}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}, @extra_flags={0x8, 0x18, 0x4}]}, 0x140}}, 0x0) 08:44:40 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000280)={0x0, 0x3ddc060000000000, 0x187, 0x0, [], [{0x801, 0x0, 0x287e0}, {0x801}]}) [ 492.986358][T21968] overlayfs: conflicting lowerdir path 08:44:40 executing program 4: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ubi_ctrl\x00', 0x200, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0xfffffffffffffe24) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x80000000003e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x8, 0x3, 0xfffffffffffff0f8, 0x4, 0x74}, &(0x7f0000000140)=0x14) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={r1, 0x7}, &(0x7f00000002c0)=0x8) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) fanotify_init(0x2, 0x80000) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {0x4, 0x7}, [{0x8, 0x2}, {0x8, 0x2}, {}, {0x8, 0x1}], {}, {0x20, 0x7}}, 0x54, 0x1) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r2 = msgget(0x1, 0x0) msgrcv(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB='\x00'], 0x1, 0x1, 0x0) 08:44:40 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xe, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x60}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251}, 0x48) 08:44:40 executing program 5: r0 = socket$inet(0x2, 0x3, 0x80000000002) setsockopt$inet_int(r0, 0x0, 0x80000000000c8, &(0x7f0000000000), 0x4) setsockopt$inet_int(r0, 0x0, 0x100000000c9, 0x0, 0xfe37) 08:44:40 executing program 1: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000f40)=[{&(0x7f0000000280)=""/99, 0x63}], 0x1, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000300)={0x24, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}]}, 0x24}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0x49d}, {&(0x7f0000000400)=""/120, 0x2ce}, {&(0x7f0000000480)=""/60, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0x16}], 0x161, &(0x7f0000000600)=""/191, 0xbf}}], 0x40000000000020a, 0x0, &(0x7f0000003700)={0x77359400}) 08:44:40 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000280)={0x0, 0x3ddc060000000000, 0x187, 0x0, [], [{0x801, 0x0, 0x287e0}, {0x801}]}) 08:44:40 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 08:44:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) 08:44:41 executing program 2: socket$inet(0x2, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 08:44:41 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xe, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x60}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251}, 0x48) 08:44:41 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 08:44:41 executing program 1: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000f40)=[{&(0x7f0000000280)=""/99, 0x63}], 0x1, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000300)={0x24, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}]}, 0x24}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0x49d}, {&(0x7f0000000400)=""/120, 0x2ce}, {&(0x7f0000000480)=""/60, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0x16}], 0x161, &(0x7f0000000600)=""/191, 0xbf}}], 0x40000000000020a, 0x0, &(0x7f0000003700)={0x77359400}) 08:44:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) 08:44:41 executing program 2: socket$inet(0x2, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 08:44:41 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xe, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x60}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251}, 0x48) 08:44:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) 08:44:41 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 08:44:41 executing program 1: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000f40)=[{&(0x7f0000000280)=""/99, 0x63}], 0x1, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000300)={0x24, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}]}, 0x24}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0x49d}, {&(0x7f0000000400)=""/120, 0x2ce}, {&(0x7f0000000480)=""/60, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0x16}], 0x161, &(0x7f0000000600)=""/191, 0xbf}}], 0x40000000000020a, 0x0, &(0x7f0000003700)={0x77359400}) 08:44:41 executing program 4: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x3, 0x2, 0x1c}, 0x24) io_setup(0x8, &(0x7f00000000c0)=0x0) io_submit(r1, 0x1, &(0x7f00000001c0)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 08:44:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) 08:44:42 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="b700000001ed0000bfa30000000000000703000028feffff720af0fff8ffffff71a4f0ff00000000b706000008ffffffce400300000000005504000001ed00003400000000ffffffcf640000000000007b1a00fe000000001d00000000000000b7000000000000009500000000000000023bc065b7a379d179fc9e94af69912435f1b6a693002e7f3be361917adef6ee1caa2b4f8ef1e50beca19bc461e91a7168c5181554a090f32050e436fe275daf51ebd601b6bf01c8e8b1b5e4fef3bef70548aed0d600c095199fe3ff3128e599b0eaebbdbd7359a48f5b0afc646cb7798b3e6440c2fbdb00a3e35208b0bb0d2cd8dff0c710e4cdbf4fc41fbb07f94369e646b8ee6de2109fbe4ef154400e2438ec649dc74a1a61ab36a98d9ec21ead2ed51b104d4d91af25b845d8a7925c3109b151b8b9f75dd08d123deda8a3658d42ecbf28bf7076c15b463bebc72f526d8e8afcb913466aaa7f6df70252e79166d858fcd0e06dd31af9612f2460d0b11008e59a5923906f88b53987ad1714e72ba7a54f0c33d39000d06ad99edc3a6138d5fcfba53f8d0c67ff616236fd9aa58f2477184b6a89adaf17b0a6041bdef728d236619074d6ebdf098bc908f523d228a40f9411fe7226a4040996e37c4f46756d50b928f63fc77b830282294484fa6da21b62987c71c1d6e6297eadbab95444937b029e3bd90eef517a085eaa790167cdd110d9fcc36a8dc6cf1c8e24fe23d7b67259611b731c6fc186844deadc5bdaa83c0556cbb3c059516806c9b3382fa112a062deb156617f6d14206180c0d4201ddb5e08f8325537bdfcb5e63d851e44dd66a233020e21523d52fb773cae297bb9c53b24e05e3c7e47420849fec082cb98cc58a3005d3dc31ef661261ddce821b6322061516eb2000000632058e418cbf931b694069c46"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 08:44:42 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xe, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x60}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251}, 0x48) 08:44:42 executing program 1: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000f40)=[{&(0x7f0000000280)=""/99, 0x63}], 0x1, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000300)={0x24, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}]}, 0x24}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0x49d}, {&(0x7f0000000400)=""/120, 0x2ce}, {&(0x7f0000000480)=""/60, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0x16}], 0x161, &(0x7f0000000600)=""/191, 0xbf}}], 0x40000000000020a, 0x0, &(0x7f0000003700)={0x77359400}) 08:44:42 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r1, 0x400455c8, 0x2) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) dup2(r3, r1) 08:44:42 executing program 5: r0 = syz_open_dev$swradio(&(0x7f0000000540)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000840)={0x0, 0xffffffffffffff81, 0x1, {0xb, @vbi={0x0, 0xffffffffffffffff}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000840)={0x0, 0xa, 0x1, {0xb, @win={{0x0, 0x5d}, 0x0, 0x0, 0x0, 0x0, 0x0}}}) 08:44:42 executing program 2: socket$inet(0x2, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 08:44:42 executing program 3: futex(&(0x7f0000000040)=0x4, 0x0, 0x4, &(0x7f0000000000)={0x77359400}, 0x0, 0x0) timer_create(0x0, &(0x7f0000000200)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r0+30000000}}, 0x0) r1 = gettid() tkill(r1, 0x1000000000016) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r3 = gettid() tkill(r3, 0x1000000000016) futex(&(0x7f0000000280), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 08:44:42 executing program 4: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x3, 0x2, 0x1c}, 0x24) io_setup(0x8, &(0x7f00000000c0)=0x0) io_submit(r1, 0x1, &(0x7f00000001c0)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 08:44:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const={0x0, 0x0, 0x2}]}}, &(0x7f0000000300)=""/244, 0x26, 0xf4, 0x1}, 0x20) 08:44:42 executing program 4: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x3, 0x2, 0x1c}, 0x24) io_setup(0x8, &(0x7f00000000c0)=0x0) io_submit(r1, 0x1, &(0x7f00000001c0)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 08:44:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const={0x0, 0x0, 0x2}]}}, &(0x7f0000000300)=""/244, 0x26, 0xf4, 0x1}, 0x20) 08:44:42 executing program 5: r0 = syz_open_dev$swradio(&(0x7f0000000540)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000840)={0x0, 0xffffffffffffff81, 0x1, {0xb, @vbi={0x0, 0xffffffffffffffff}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000840)={0x0, 0xa, 0x1, {0xb, @win={{0x0, 0x5d}, 0x0, 0x0, 0x0, 0x0, 0x0}}}) 08:44:42 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r1, 0x400455c8, 0x2) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) dup2(r3, r1) 08:44:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const={0x0, 0x0, 0x2}]}}, &(0x7f0000000300)=""/244, 0x26, 0xf4, 0x1}, 0x20) 08:44:42 executing program 5: r0 = syz_open_dev$swradio(&(0x7f0000000540)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000840)={0x0, 0xffffffffffffff81, 0x1, {0xb, @vbi={0x0, 0xffffffffffffffff}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000840)={0x0, 0xa, 0x1, {0xb, @win={{0x0, 0x5d}, 0x0, 0x0, 0x0, 0x0, 0x0}}}) 08:44:42 executing program 4: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x3, 0x2, 0x1c}, 0x24) io_setup(0x8, &(0x7f00000000c0)=0x0) io_submit(r1, 0x1, &(0x7f00000001c0)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 08:44:42 executing program 2: socket$inet(0x2, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 08:44:43 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r1, 0x400455c8, 0x2) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) dup2(r3, r1) 08:44:43 executing program 3: futex(&(0x7f0000000040)=0x4, 0x0, 0x4, &(0x7f0000000000)={0x77359400}, 0x0, 0x0) timer_create(0x0, &(0x7f0000000200)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r0+30000000}}, 0x0) r1 = gettid() tkill(r1, 0x1000000000016) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r3 = gettid() tkill(r3, 0x1000000000016) futex(&(0x7f0000000280), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 08:44:43 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const={0x0, 0x0, 0x2}]}}, &(0x7f0000000300)=""/244, 0x26, 0xf4, 0x1}, 0x20) 08:44:43 executing program 5: r0 = syz_open_dev$swradio(&(0x7f0000000540)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000840)={0x0, 0xffffffffffffff81, 0x1, {0xb, @vbi={0x0, 0xffffffffffffffff}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000840)={0x0, 0xa, 0x1, {0xb, @win={{0x0, 0x5d}, 0x0, 0x0, 0x0, 0x0, 0x0}}}) 08:44:43 executing program 4: unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{0x77359400}, {0x0, 0x1c9c380}}, 0x0) 08:44:43 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r1, 0x400455c8, 0x2) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) dup2(r3, r1) 08:44:43 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000980)='net/sofH\x16tnet_sua') openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='stat\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) preadv(r1, &(0x7f00000017c0), 0x199, 0x0) 08:44:43 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_type(r0, &(0x7f0000000680)='cgroup.type\x00', 0x2, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000001540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@ptr={0x0, 0x0, 0x0, 0x2, 0x2}, @volatile={0x0, 0x0, 0x0, 0x4}]}}, &(0x7f00000002c0)=""/245, 0x32, 0xf5, 0x1}, 0x20) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x42400) openat$cgroup_procs(r2, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000140)=0x2) socket$kcm(0x11, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)={[{0x0, 'cpu'}, {0x2f, 'io'}]}, 0x9) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r2, 0x7, 0x0, 0x6, 0x0}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000003c0)={r3, 0x10, &(0x7f0000000280)={&(0x7f0000000000)=""/31, 0x1f}}, 0x10) write$cgroup_int(r4, 0x0, 0x0) 08:44:43 executing program 4: unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{0x77359400}, {0x0, 0x1c9c380}}, 0x0) 08:44:43 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b04, &(0x7f0000000bc0)='wlan1\x00\x0e\xd3UM\xe1\x04\xbeK\x19\xec\x0e\x00\x00\x00\x00\xff\xff\xff\x8d\x02\x01\xe5\xe8\",\x91\x91\x13\x9f\x19\x9e\x02\x00?\x00\xff\x8d\x00\x00\xf6\x00\xd4\xf2\xe7\xf9\x01\x06\x8c\xe2K\x04\xd9\xfd\xbd\x00\x1d})\xa0\xb1\xd2\xe4\x00\x00\x00\x00\x00\xa4]\xbb\x10F\xe4\xa8\xa8\x00\x00\x00\x00\xdfA\x83\xcdx\x90\x9a\x82\xc0)(4\xdf\bL\x7f\xff\xff\xffs\x18Z\xcc\x026\xf4\xb0\x9b@:HX\xbd(\xbfjOc\xcd\x15\xc1K\xab\xe9\xe3\xe8\x05\xda\xce\xed\xa5\xb8<\x9d\x12\x19Z\xb3@o\xc7\xce\xec\x02:a\xad\xef,\xbc (\x02z\x8eni)\xb5i\x0f\xc7\v\x9dz\xfa\x88\x87\xa2\xa8\xd9\x95:E\xfeO\xe7\xf8EX\xe3\xbcf\x02\x98P\x1a\x1f\x16\xb9\b\xa2\xb0\xb1\xc4vCh.\xa3\xd7G0\x92C5\x9d\x17\xd1\x96g\x8d\xd1\x06i\xde<\xf3\xd9\x93M/\x1eQ\xba\xe7\xf4\x9c\x9a\x1a\xde\b\xcaot\xeeKr\xb3\"\xa9\xef\xa2\xd8\x03_\xee=[o\xaa`\x93d\xff9\xfa\r\xbe\x16\xef\xf0\xfeThQ\xb8\xe8\xba7\xd0\xab.\x13L8V\x1d\xa0\x02y\xe4\xef\x00\x8b\xcd\x1b\xe8#\xb4\xea@\x1b\xd0y\x02iE\xb30\xe8\xdb\xb1\xdb/e\xb3X\xe4Tr\xb4w\xba\xa9\xfe\x0f\xdcFc\xd0\x9f\x82\x9d\xae\x9cyQOT\xdc\x86\x82Q\xe0\xab\xc1w\x03;-^(\x02=\xf39#\x9a\xcd\xe0\xd8q\x9a\xcd\xdeAF,\x04\"\x84\xa9O\x97\xf7\xfb\xa2N>\xcb\x9d\xc0\x810\x12\xcc@\x89\xf8F\x82\x88O\x03\xeb\xad\xc7\xee\x17\x1f\xaaX\xeeO\xb5\xcf\xff@\xc09[\xec>\xf1_\xfd\xeb\x1e\x83\xbb\xd7\xdb\xf8\x94\x9d\xdf\xcc\xd8F\x005\xba$\xb3\x9cy\xb4n\xd4\x97\x87}\x8e\x03\x8b\xbbU_\xa4\tG\xbdZWQ\xf2\x91\xcb\xbf\x06\x93N\xf61\x9ea\xc3\xfd\xca\x9e`[\xd4\xb2\xe1\xa2\xc6h\xf8\x0f\xbaDP\x91\x13H\n\xe5F*\xe8\an\xeb\x18\x80A\xfe\xc3\xb4pJ;\xaa\x84*_k\xea\x87x\xda\xe8\xf5+\x89\xdc\x19|:,\xb7b\xc9\x10\x8a\xbe\xc3\x15)\x80\xd0t`7\xed\xe4&\xe25\x98vW\xf1\xdcL=\xf7\xa9\x9b\xe6\x03W^t\'*b\x98:\x8aU\xe0\x99!E\x87@*C\x97|?\xff7\xca\xfc\xaa<\xc8L\xbf/9\x1df\x8c\xa6\x8f3\xcc@g\x80)\xf4\v\xcd\x98[Y\x04\xb6b\xff\x86\xdb\x7f\xb9\x10\xd9\x18j\x1d\x16p\xc3\x02\'\x8eY\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\xd8s\x1a\xc8\xf0z\xfc\xf6\xba*\xfar\xef\x98\xad\xaf\xb6r\xff\xfc\xcf\xebo\x8c\xd9:\x8d\xf2eBcU\xca\x83\x88L\xf6\xa7\xf4|,\xdb\x85y\xfc\xad\xc6\xa0\x8aK\xb40\xfb\xc5\x85') 08:44:43 executing program 0: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x4, r0, 0xfffffffffffffffd) keyctl$describe(0x6, r0, 0x0, 0x0) 08:44:43 executing program 0: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x4, r0, 0xfffffffffffffffd) keyctl$describe(0x6, r0, 0x0, 0x0) 08:44:43 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b04, &(0x7f0000000bc0)='wlan1\x00\x0e\xd3UM\xe1\x04\xbeK\x19\xec\x0e\x00\x00\x00\x00\xff\xff\xff\x8d\x02\x01\xe5\xe8\",\x91\x91\x13\x9f\x19\x9e\x02\x00?\x00\xff\x8d\x00\x00\xf6\x00\xd4\xf2\xe7\xf9\x01\x06\x8c\xe2K\x04\xd9\xfd\xbd\x00\x1d})\xa0\xb1\xd2\xe4\x00\x00\x00\x00\x00\xa4]\xbb\x10F\xe4\xa8\xa8\x00\x00\x00\x00\xdfA\x83\xcdx\x90\x9a\x82\xc0)(4\xdf\bL\x7f\xff\xff\xffs\x18Z\xcc\x026\xf4\xb0\x9b@:HX\xbd(\xbfjOc\xcd\x15\xc1K\xab\xe9\xe3\xe8\x05\xda\xce\xed\xa5\xb8<\x9d\x12\x19Z\xb3@o\xc7\xce\xec\x02:a\xad\xef,\xbc (\x02z\x8eni)\xb5i\x0f\xc7\v\x9dz\xfa\x88\x87\xa2\xa8\xd9\x95:E\xfeO\xe7\xf8EX\xe3\xbcf\x02\x98P\x1a\x1f\x16\xb9\b\xa2\xb0\xb1\xc4vCh.\xa3\xd7G0\x92C5\x9d\x17\xd1\x96g\x8d\xd1\x06i\xde<\xf3\xd9\x93M/\x1eQ\xba\xe7\xf4\x9c\x9a\x1a\xde\b\xcaot\xeeKr\xb3\"\xa9\xef\xa2\xd8\x03_\xee=[o\xaa`\x93d\xff9\xfa\r\xbe\x16\xef\xf0\xfeThQ\xb8\xe8\xba7\xd0\xab.\x13L8V\x1d\xa0\x02y\xe4\xef\x00\x8b\xcd\x1b\xe8#\xb4\xea@\x1b\xd0y\x02iE\xb30\xe8\xdb\xb1\xdb/e\xb3X\xe4Tr\xb4w\xba\xa9\xfe\x0f\xdcFc\xd0\x9f\x82\x9d\xae\x9cyQOT\xdc\x86\x82Q\xe0\xab\xc1w\x03;-^(\x02=\xf39#\x9a\xcd\xe0\xd8q\x9a\xcd\xdeAF,\x04\"\x84\xa9O\x97\xf7\xfb\xa2N>\xcb\x9d\xc0\x810\x12\xcc@\x89\xf8F\x82\x88O\x03\xeb\xad\xc7\xee\x17\x1f\xaaX\xeeO\xb5\xcf\xff@\xc09[\xec>\xf1_\xfd\xeb\x1e\x83\xbb\xd7\xdb\xf8\x94\x9d\xdf\xcc\xd8F\x005\xba$\xb3\x9cy\xb4n\xd4\x97\x87}\x8e\x03\x8b\xbbU_\xa4\tG\xbdZWQ\xf2\x91\xcb\xbf\x06\x93N\xf61\x9ea\xc3\xfd\xca\x9e`[\xd4\xb2\xe1\xa2\xc6h\xf8\x0f\xbaDP\x91\x13H\n\xe5F*\xe8\an\xeb\x18\x80A\xfe\xc3\xb4pJ;\xaa\x84*_k\xea\x87x\xda\xe8\xf5+\x89\xdc\x19|:,\xb7b\xc9\x10\x8a\xbe\xc3\x15)\x80\xd0t`7\xed\xe4&\xe25\x98vW\xf1\xdcL=\xf7\xa9\x9b\xe6\x03W^t\'*b\x98:\x8aU\xe0\x99!E\x87@*C\x97|?\xff7\xca\xfc\xaa<\xc8L\xbf/9\x1df\x8c\xa6\x8f3\xcc@g\x80)\xf4\v\xcd\x98[Y\x04\xb6b\xff\x86\xdb\x7f\xb9\x10\xd9\x18j\x1d\x16p\xc3\x02\'\x8eY\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\xd8s\x1a\xc8\xf0z\xfc\xf6\xba*\xfar\xef\x98\xad\xaf\xb6r\xff\xfc\xcf\xebo\x8c\xd9:\x8d\xf2eBcU\xca\x83\x88L\xf6\xa7\xf4|,\xdb\x85y\xfc\xad\xc6\xa0\x8aK\xb40\xfb\xc5\x85') [ 496.066996][T22131] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 496.182616][T22131] CPU: 0 PID: 22131 Comm: syz-executor.1 Not tainted 5.3.0-rc6-next-20190830 #75 [ 496.191774][T22131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 496.201823][T22131] Call Trace: [ 496.201919][T22131] dump_stack+0x172/0x1f0 [ 496.201939][T22131] dump_header+0x177/0x1152 [ 496.214069][T22131] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 496.219877][T22131] ? ___ratelimit+0x2c8/0x595 [ 496.224559][T22131] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 496.230364][T22131] ? lockdep_hardirqs_on+0x418/0x5d0 [ 496.235656][T22131] ? trace_hardirqs_on+0x67/0x240 [ 496.240690][T22131] ? pagefault_out_of_memory+0x11c/0x11c [ 496.246318][T22131] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 496.252126][T22131] ? ___ratelimit+0x60/0x595 [ 496.256710][T22131] ? do_raw_spin_unlock+0x57/0x270 [ 496.261822][T22131] oom_kill_process.cold+0x10/0x15 [ 496.267022][T22131] out_of_memory+0x334/0x1340 [ 496.271702][T22131] ? cgroup_file_notify+0x140/0x1b0 [ 496.277075][T22131] ? oom_killer_disable+0x280/0x280 [ 496.282289][T22131] mem_cgroup_out_of_memory+0x1d8/0x240 [ 496.287834][T22131] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 496.293465][T22131] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 496.293487][T22131] ? cgroup_file_notify+0x140/0x1b0 [ 496.293505][T22131] memory_max_write+0x262/0x3a0 [ 496.293524][T22131] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 496.316081][T22131] ? lock_acquire+0x190/0x410 [ 496.320765][T22131] ? kernfs_fop_write+0x227/0x480 [ 496.325809][T22131] cgroup_file_write+0x241/0x790 [ 496.330756][T22131] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 496.337520][T22131] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 496.343164][T22131] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 496.348807][T22131] kernfs_fop_write+0x2b8/0x480 [ 496.354042][T22131] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 496.360296][T22131] __vfs_write+0x8a/0x110 [ 496.364628][T22131] ? kernfs_fop_open+0xd80/0xd80 [ 496.369572][T22131] vfs_write+0x268/0x5d0 [ 496.373823][T22131] ksys_write+0x14f/0x290 [ 496.378155][T22131] ? __ia32_sys_read+0xb0/0xb0 [ 496.382917][T22131] ? do_syscall_64+0x26/0x760 [ 496.387597][T22131] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 496.394097][T22131] ? do_syscall_64+0x26/0x760 [ 496.398784][T22131] __x64_sys_write+0x73/0xb0 [ 496.403384][T22131] do_syscall_64+0xfa/0x760 [ 496.407898][T22131] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 496.413794][T22131] RIP: 0033:0x4598e9 [ 496.417691][T22131] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 496.437292][T22131] RSP: 002b:00007fb555521c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 496.437306][T22131] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004598e9 [ 496.437313][T22131] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 496.437319][T22131] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 496.437327][T22131] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb5555226d4 08:44:44 executing program 3: futex(&(0x7f0000000040)=0x4, 0x0, 0x4, &(0x7f0000000000)={0x77359400}, 0x0, 0x0) timer_create(0x0, &(0x7f0000000200)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r0+30000000}}, 0x0) r1 = gettid() tkill(r1, 0x1000000000016) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r3 = gettid() tkill(r3, 0x1000000000016) futex(&(0x7f0000000280), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 08:44:44 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000980)='net/sofH\x16tnet_sua') openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='stat\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) preadv(r1, &(0x7f00000017c0), 0x199, 0x0) 08:44:44 executing program 0: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x4, r0, 0xfffffffffffffffd) keyctl$describe(0x6, r0, 0x0, 0x0) 08:44:44 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b04, &(0x7f0000000bc0)='wlan1\x00\x0e\xd3UM\xe1\x04\xbeK\x19\xec\x0e\x00\x00\x00\x00\xff\xff\xff\x8d\x02\x01\xe5\xe8\",\x91\x91\x13\x9f\x19\x9e\x02\x00?\x00\xff\x8d\x00\x00\xf6\x00\xd4\xf2\xe7\xf9\x01\x06\x8c\xe2K\x04\xd9\xfd\xbd\x00\x1d})\xa0\xb1\xd2\xe4\x00\x00\x00\x00\x00\xa4]\xbb\x10F\xe4\xa8\xa8\x00\x00\x00\x00\xdfA\x83\xcdx\x90\x9a\x82\xc0)(4\xdf\bL\x7f\xff\xff\xffs\x18Z\xcc\x026\xf4\xb0\x9b@:HX\xbd(\xbfjOc\xcd\x15\xc1K\xab\xe9\xe3\xe8\x05\xda\xce\xed\xa5\xb8<\x9d\x12\x19Z\xb3@o\xc7\xce\xec\x02:a\xad\xef,\xbc (\x02z\x8eni)\xb5i\x0f\xc7\v\x9dz\xfa\x88\x87\xa2\xa8\xd9\x95:E\xfeO\xe7\xf8EX\xe3\xbcf\x02\x98P\x1a\x1f\x16\xb9\b\xa2\xb0\xb1\xc4vCh.\xa3\xd7G0\x92C5\x9d\x17\xd1\x96g\x8d\xd1\x06i\xde<\xf3\xd9\x93M/\x1eQ\xba\xe7\xf4\x9c\x9a\x1a\xde\b\xcaot\xeeKr\xb3\"\xa9\xef\xa2\xd8\x03_\xee=[o\xaa`\x93d\xff9\xfa\r\xbe\x16\xef\xf0\xfeThQ\xb8\xe8\xba7\xd0\xab.\x13L8V\x1d\xa0\x02y\xe4\xef\x00\x8b\xcd\x1b\xe8#\xb4\xea@\x1b\xd0y\x02iE\xb30\xe8\xdb\xb1\xdb/e\xb3X\xe4Tr\xb4w\xba\xa9\xfe\x0f\xdcFc\xd0\x9f\x82\x9d\xae\x9cyQOT\xdc\x86\x82Q\xe0\xab\xc1w\x03;-^(\x02=\xf39#\x9a\xcd\xe0\xd8q\x9a\xcd\xdeAF,\x04\"\x84\xa9O\x97\xf7\xfb\xa2N>\xcb\x9d\xc0\x810\x12\xcc@\x89\xf8F\x82\x88O\x03\xeb\xad\xc7\xee\x17\x1f\xaaX\xeeO\xb5\xcf\xff@\xc09[\xec>\xf1_\xfd\xeb\x1e\x83\xbb\xd7\xdb\xf8\x94\x9d\xdf\xcc\xd8F\x005\xba$\xb3\x9cy\xb4n\xd4\x97\x87}\x8e\x03\x8b\xbbU_\xa4\tG\xbdZWQ\xf2\x91\xcb\xbf\x06\x93N\xf61\x9ea\xc3\xfd\xca\x9e`[\xd4\xb2\xe1\xa2\xc6h\xf8\x0f\xbaDP\x91\x13H\n\xe5F*\xe8\an\xeb\x18\x80A\xfe\xc3\xb4pJ;\xaa\x84*_k\xea\x87x\xda\xe8\xf5+\x89\xdc\x19|:,\xb7b\xc9\x10\x8a\xbe\xc3\x15)\x80\xd0t`7\xed\xe4&\xe25\x98vW\xf1\xdcL=\xf7\xa9\x9b\xe6\x03W^t\'*b\x98:\x8aU\xe0\x99!E\x87@*C\x97|?\xff7\xca\xfc\xaa<\xc8L\xbf/9\x1df\x8c\xa6\x8f3\xcc@g\x80)\xf4\v\xcd\x98[Y\x04\xb6b\xff\x86\xdb\x7f\xb9\x10\xd9\x18j\x1d\x16p\xc3\x02\'\x8eY\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\xd8s\x1a\xc8\xf0z\xfc\xf6\xba*\xfar\xef\x98\xad\xaf\xb6r\xff\xfc\xcf\xebo\x8c\xd9:\x8d\xf2eBcU\xca\x83\x88L\xf6\xa7\xf4|,\xdb\x85y\xfc\xad\xc6\xa0\x8aK\xb40\xfb\xc5\x85') 08:44:44 executing program 4: unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{0x77359400}, {0x0, 0x1c9c380}}, 0x0) [ 496.437334][T22131] R13: 00000000004c9a52 R14: 00000000004e1148 R15: 00000000ffffffff [ 496.490825][T22131] memory: usage 118936kB, limit 0kB, failcnt 12 [ 496.497168][T22131] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 496.563077][T22131] Memory cgroup stats for /syz1: [ 496.563387][T22131] anon 113672192 [ 496.563387][T22131] file 204800 [ 496.563387][T22131] kernel_stack 524288 [ 496.563387][T22131] slab 5570560 [ 496.563387][T22131] sock 53248 [ 496.563387][T22131] shmem 57344 [ 496.563387][T22131] file_mapped 135168 [ 496.563387][T22131] file_dirty 135168 [ 496.563387][T22131] file_writeback 0 [ 496.563387][T22131] anon_thp 96468992 [ 496.563387][T22131] inactive_anon 79777792 [ 496.563387][T22131] active_anon 21295104 [ 496.563387][T22131] inactive_file 135168 [ 496.563387][T22131] active_file 94208 [ 496.563387][T22131] unevictable 12525568 [ 496.563387][T22131] slab_reclaimable 1892352 [ 496.563387][T22131] slab_unreclaimable 3678208 [ 496.563387][T22131] pgfault 49170 [ 496.563387][T22131] pgmajfault 0 [ 496.563387][T22131] workingset_refault 0 [ 496.563387][T22131] workingset_activate 0 [ 496.563387][T22131] workingset_nodereclaim 0 [ 496.563387][T22131] pgrefill 43 [ 496.563387][T22131] pgscan 43 [ 496.563387][T22131] pgsteal 39 08:44:44 executing program 0: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x4, r0, 0xfffffffffffffffd) keyctl$describe(0x6, r0, 0x0, 0x0) [ 497.016984][T22131] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=18638,uid=0 [ 497.035610][T22131] Memory cgroup out of memory: Killed process 18638 (syz-executor.1) total-vm:72964kB, anon-rss:18480kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:159744kB oom_score_adj:1000 [ 497.128392][T22127] syz-executor.1 invoked oom-killer: gfp_mask=0x40cc0(GFP_KERNEL|__GFP_COMP), order=0, oom_score_adj=1000 [ 497.149522][T22127] CPU: 0 PID: 22127 Comm: syz-executor.1 Not tainted 5.3.0-rc6-next-20190830 #75 [ 497.159128][T22127] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 497.169189][T22127] Call Trace: [ 497.172498][T22127] dump_stack+0x172/0x1f0 [ 497.176844][T22127] dump_header+0x177/0x1152 [ 497.181368][T22127] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 497.187185][T22127] ? ___ratelimit+0x2c8/0x595 [ 497.191863][T22127] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 497.197679][T22127] ? lockdep_hardirqs_on+0x418/0x5d0 [ 497.202962][T22127] ? trace_hardirqs_on+0x67/0x240 [ 497.208067][T22127] ? pagefault_out_of_memory+0x11c/0x11c [ 497.213680][T22127] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 497.219465][T22127] ? ___ratelimit+0x60/0x595 [ 497.224036][T22127] ? do_raw_spin_unlock+0x57/0x270 [ 497.229127][T22127] oom_kill_process.cold+0x10/0x15 [ 497.234218][T22127] out_of_memory+0x334/0x1340 [ 497.238882][T22127] ? lock_downgrade+0x920/0x920 [ 497.243712][T22127] ? oom_killer_disable+0x280/0x280 [ 497.248896][T22127] mem_cgroup_out_of_memory+0x1d8/0x240 [ 497.254415][T22127] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 497.260026][T22127] ? do_raw_spin_unlock+0x57/0x270 [ 497.265288][T22127] ? _raw_spin_unlock+0x2d/0x50 [ 497.270118][T22127] try_charge+0xf4b/0x1440 [ 497.274511][T22127] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 497.279950][T22127] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 497.285470][T22127] ? cache_grow_begin+0x122/0xd20 [ 497.290485][T22127] ? find_held_lock+0x35/0x130 [ 497.295237][T22127] ? cache_grow_begin+0x122/0xd20 [ 497.300249][T22127] __memcg_kmem_charge_memcg+0x71/0xf0 [ 497.305692][T22127] ? memcg_kmem_put_cache+0x50/0x50 [ 497.310977][T22127] ? __kasan_check_read+0x11/0x20 [ 497.316020][T22127] cache_grow_begin+0x629/0xd20 [ 497.320851][T22127] ? __sanitizer_cov_trace_cmp2+0x11/0x20 [ 497.326549][T22127] ? mempolicy_slab_node+0x139/0x390 [ 497.331820][T22127] fallback_alloc+0x1fd/0x2d0 [ 497.336481][T22127] ____cache_alloc_node+0x1bc/0x1d0 [ 497.343841][T22127] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 497.350077][T22127] kmem_cache_alloc+0x1ef/0x710 [ 497.354963][T22127] ? lockdep_init_map+0x1be/0x6d0 [ 497.359969][T22127] seq_open+0x5c/0x1c0 [ 497.364041][T22127] kernfs_fop_open+0x596/0xd80 [ 497.368790][T22127] do_dentry_open+0x4df/0x1250 [ 497.373535][T22127] ? kernfs_notify+0x210/0x210 [ 497.378280][T22127] ? chown_common+0x5c0/0x5c0 [ 497.382938][T22127] vfs_open+0xa0/0xd0 [ 497.386901][T22127] path_openat+0x10e9/0x46d0 [ 497.391479][T22127] ? save_stack+0x23/0x90 [ 497.395794][T22127] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 497.401575][T22127] ? kasan_slab_alloc+0xf/0x20 [ 497.406315][T22127] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 497.411768][T22127] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 497.417134][T22127] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 497.422582][T22127] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 497.428019][T22127] ? __alloc_fd+0x487/0x620 [ 497.432501][T22127] do_filp_open+0x1a1/0x280 [ 497.436990][T22127] ? may_open_dev+0x100/0x100 [ 497.441648][T22127] ? __kasan_check_read+0x11/0x20 [ 497.446645][T22127] ? do_raw_spin_unlock+0x57/0x270 [ 497.451744][T22127] do_sys_open+0x3fe/0x5d0 [ 497.456856][T22127] ? filp_open+0x80/0x80 [ 497.461077][T22127] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 497.466529][T22127] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 497.471964][T22127] ? do_syscall_64+0x26/0x760 [ 497.476616][T22127] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 497.482757][T22127] ? do_syscall_64+0x26/0x760 [ 497.487416][T22127] __x64_sys_openat+0x9d/0x100 [ 497.492157][T22127] do_syscall_64+0xfa/0x760 [ 497.496655][T22127] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 497.503312][T22127] RIP: 0033:0x4598e9 [ 497.507200][T22127] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 497.526807][T22127] RSP: 002b:00007fb555542c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 497.535653][T22127] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00000000004598e9 [ 497.543603][T22127] RDX: 0000000000000002 RSI: 0000000020000080 RDI: 0000000000000004 [ 497.551571][T22127] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 497.559605][T22127] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb5555436d4 [ 497.567555][T22127] R13: 00000000004c6101 R14: 00000000004daea8 R15: 00000000ffffffff [ 497.586382][T22127] memory: usage 100264kB, limit 0kB, failcnt 20 [ 497.595571][T22127] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 497.612648][T22127] Memory cgroup stats for /syz1: [ 497.612957][T22127] anon 94822400 [ 497.612957][T22127] file 204800 [ 497.612957][T22127] kernel_stack 524288 [ 497.612957][T22127] slab 5570560 [ 497.612957][T22127] sock 53248 [ 497.612957][T22127] shmem 57344 [ 497.612957][T22127] file_mapped 135168 [ 497.612957][T22127] file_dirty 135168 [ 497.612957][T22127] file_writeback 0 [ 497.612957][T22127] anon_thp 85983232 [ 497.612957][T22127] inactive_anon 62291968 [ 497.612957][T22127] active_anon 20213760 [ 497.612957][T22127] inactive_file 135168 [ 497.612957][T22127] active_file 94208 [ 497.612957][T22127] unevictable 12525568 [ 497.612957][T22127] slab_reclaimable 1892352 [ 497.612957][T22127] slab_unreclaimable 3678208 [ 497.612957][T22127] pgfault 49170 [ 497.612957][T22127] pgmajfault 0 [ 497.612957][T22127] workingset_refault 0 [ 497.612957][T22127] workingset_activate 0 [ 497.612957][T22127] workingset_nodereclaim 0 [ 497.612957][T22127] pgrefill 43 [ 497.612957][T22127] pgscan 76 [ 497.612957][T22127] pgsteal 39 [ 497.722828][T22127] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=18761,uid=0 [ 497.739966][T22127] Memory cgroup out of memory: Killed process 18761 (syz-executor.1) total-vm:72708kB, anon-rss:18232kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:159744kB oom_score_adj:1000 [ 497.765198][ T1065] oom_reaper: reaped process 18761 (syz-executor.1), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB [ 497.770637][T22127] syz-executor.1 invoked oom-killer: gfp_mask=0x40cc0(GFP_KERNEL|__GFP_COMP), order=0, oom_score_adj=1000 [ 497.787766][T22127] CPU: 1 PID: 22127 Comm: syz-executor.1 Not tainted 5.3.0-rc6-next-20190830 #75 [ 497.796870][T22127] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 497.806924][T22127] Call Trace: [ 497.810219][T22127] dump_stack+0x172/0x1f0 [ 497.814616][T22127] dump_header+0x177/0x1152 [ 497.819098][T22127] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 497.824877][T22127] ? ___ratelimit+0x2c8/0x595 [ 497.829542][T22127] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 497.835338][T22127] ? lockdep_hardirqs_on+0x418/0x5d0 [ 497.840609][T22127] ? trace_hardirqs_on+0x67/0x240 [ 497.845623][T22127] ? pagefault_out_of_memory+0x11c/0x11c [ 497.851244][T22127] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 497.857107][T22127] ? ___ratelimit+0x60/0x595 [ 497.861699][T22127] ? do_raw_spin_unlock+0x57/0x270 [ 497.866817][T22127] oom_kill_process.cold+0x10/0x15 [ 497.871925][T22127] out_of_memory+0x334/0x1340 [ 497.876728][T22127] ? lock_downgrade+0x920/0x920 [ 497.881560][T22127] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 497.887343][T22127] ? oom_killer_disable+0x280/0x280 [ 497.892541][T22127] mem_cgroup_out_of_memory+0x1d8/0x240 [ 497.898075][T22127] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 497.903756][T22127] ? do_raw_spin_unlock+0x57/0x270 [ 497.908854][T22127] ? _raw_spin_unlock+0x2d/0x50 [ 497.913825][T22127] try_charge+0xf4b/0x1440 [ 497.918244][T22127] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 497.923719][T22127] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 497.929242][T22127] ? cache_grow_begin+0x122/0xd20 [ 497.934257][T22127] ? find_held_lock+0x35/0x130 [ 497.938999][T22127] ? cache_grow_begin+0x122/0xd20 [ 497.944024][T22127] __memcg_kmem_charge_memcg+0x71/0xf0 [ 497.949477][T22127] ? memcg_kmem_put_cache+0x50/0x50 [ 497.954765][T22127] ? __kasan_check_read+0x11/0x20 [ 497.959803][T22127] cache_grow_begin+0x629/0xd20 [ 497.964643][T22127] ? __sanitizer_cov_trace_cmp2+0x11/0x20 [ 497.970350][T22127] ? mempolicy_slab_node+0x139/0x390 [ 497.975624][T22127] fallback_alloc+0x1fd/0x2d0 [ 497.980312][T22127] ____cache_alloc_node+0x1bc/0x1d0 [ 497.985505][T22127] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 497.991745][T22127] kmem_cache_alloc+0x1ef/0x710 [ 497.996612][T22127] ? lockdep_init_map+0x1be/0x6d0 [ 498.001666][T22127] seq_open+0x5c/0x1c0 [ 498.005725][T22127] kernfs_fop_open+0x596/0xd80 [ 498.010491][T22127] do_dentry_open+0x4df/0x1250 [ 498.015267][T22127] ? kernfs_notify+0x210/0x210 [ 498.020028][T22127] ? chown_common+0x5c0/0x5c0 [ 498.024709][T22127] vfs_open+0xa0/0xd0 [ 498.028679][T22127] path_openat+0x10e9/0x46d0 [ 498.033257][T22127] ? save_stack+0x23/0x90 [ 498.037575][T22127] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 498.043368][T22127] ? kasan_slab_alloc+0xf/0x20 [ 498.048113][T22127] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 498.053585][T22127] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 498.059001][T22127] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 498.064445][T22127] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 498.069895][T22127] ? __alloc_fd+0x487/0x620 [ 498.074392][T22127] do_filp_open+0x1a1/0x280 [ 498.078876][T22127] ? may_open_dev+0x100/0x100 [ 498.083538][T22127] ? __kasan_check_read+0x11/0x20 [ 498.088539][T22127] ? do_raw_spin_unlock+0x57/0x270 [ 498.093758][T22127] do_sys_open+0x3fe/0x5d0 [ 498.098165][T22127] ? filp_open+0x80/0x80 [ 498.102392][T22127] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 498.107831][T22127] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 498.113283][T22127] ? do_syscall_64+0x26/0x760 [ 498.117959][T22127] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 498.124010][T22127] ? do_syscall_64+0x26/0x760 [ 498.128677][T22127] __x64_sys_openat+0x9d/0x100 [ 498.133434][T22127] do_syscall_64+0xfa/0x760 [ 498.137931][T22127] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 498.143800][T22127] RIP: 0033:0x4598e9 [ 498.147687][T22127] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 498.167278][T22127] RSP: 002b:00007fb555542c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 498.175671][T22127] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00000000004598e9 [ 498.183623][T22127] RDX: 0000000000000002 RSI: 0000000020000080 RDI: 0000000000000004 [ 498.191590][T22127] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 498.199558][T22127] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb5555436d4 [ 498.207517][T22127] R13: 00000000004c6101 R14: 00000000004daea8 R15: 00000000ffffffff [ 498.216938][T22127] memory: usage 81840kB, limit 0kB, failcnt 26 [ 498.223276][T22127] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 498.230250][T22127] Memory cgroup stats for /syz1: [ 498.230484][T22127] anon 76021760 [ 498.230484][T22127] file 204800 [ 498.230484][T22127] kernel_stack 524288 [ 498.230484][T22127] slab 5570560 [ 498.230484][T22127] sock 53248 [ 498.230484][T22127] shmem 57344 [ 498.230484][T22127] file_mapped 135168 [ 498.230484][T22127] file_dirty 135168 [ 498.230484][T22127] file_writeback 0 [ 498.230484][T22127] anon_thp 69206016 [ 498.230484][T22127] inactive_anon 45613056 [ 498.230484][T22127] active_anon 20213760 [ 498.230484][T22127] inactive_file 135168 [ 498.230484][T22127] active_file 94208 [ 498.230484][T22127] unevictable 10428416 [ 498.230484][T22127] slab_reclaimable 1892352 [ 498.230484][T22127] slab_unreclaimable 3678208 [ 498.230484][T22127] pgfault 49170 [ 498.230484][T22127] pgmajfault 0 [ 498.230484][T22127] workingset_refault 0 [ 498.230484][T22127] workingset_activate 0 [ 498.230484][T22127] workingset_nodereclaim 0 [ 498.230484][T22127] pgrefill 43 [ 498.230484][T22127] pgscan 76 [ 498.230484][T22127] pgsteal 39 [ 498.332835][T22127] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=18723,uid=0 [ 498.348458][T22127] Memory cgroup out of memory: Killed process 18723 (syz-executor.1) total-vm:72708kB, anon-rss:18232kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:159744kB oom_score_adj:1000 [ 498.373791][ T1065] oom_reaper: reaped process 18723 (syz-executor.1), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB [ 498.376817][T22124] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 498.395619][T22124] CPU: 0 PID: 22124 Comm: syz-executor.1 Not tainted 5.3.0-rc6-next-20190830 #75 [ 498.404725][T22124] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 498.414773][T22124] Call Trace: [ 498.418059][T22124] dump_stack+0x172/0x1f0 [ 498.422414][T22124] dump_header+0x177/0x1152 [ 498.426911][T22124] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 498.432708][T22124] ? ___ratelimit+0x2c8/0x595 [ 498.437361][T22124] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 498.443150][T22124] ? lockdep_hardirqs_on+0x418/0x5d0 [ 498.448415][T22124] ? trace_hardirqs_on+0x67/0x240 [ 498.453424][T22124] ? pagefault_out_of_memory+0x11c/0x11c [ 498.459042][T22124] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 498.464825][T22124] ? ___ratelimit+0x60/0x595 [ 498.469452][T22124] ? do_raw_spin_unlock+0x57/0x270 [ 498.474553][T22124] oom_kill_process.cold+0x10/0x15 [ 498.479646][T22124] out_of_memory+0x334/0x1340 [ 498.484300][T22124] ? lock_downgrade+0x920/0x920 [ 498.489242][T22124] ? oom_killer_disable+0x280/0x280 [ 498.494424][T22124] mem_cgroup_out_of_memory+0x1d8/0x240 [ 498.499947][T22124] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 498.505557][T22124] ? do_raw_spin_unlock+0x57/0x270 [ 498.510647][T22124] ? _raw_spin_unlock+0x2d/0x50 [ 498.515478][T22124] try_charge+0xa2d/0x1440 [ 498.519913][T22124] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 498.525449][T22124] ? percpu_ref_tryget_live+0x111/0x290 [ 498.530980][T22124] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 498.537237][T22124] ? __kasan_check_read+0x11/0x20 [ 498.542248][T22124] ? get_mem_cgroup_from_mm+0x156/0x320 [ 498.547778][T22124] mem_cgroup_try_charge+0x136/0x590 [ 498.553055][T22124] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 498.559366][T22124] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 498.565164][T22124] __handle_mm_fault+0x1e34/0x3f20 [ 498.570268][T22124] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 498.575799][T22124] ? __kasan_check_read+0x11/0x20 [ 498.580817][T22124] handle_mm_fault+0x1b5/0x6c0 [ 498.585572][T22124] __do_page_fault+0x536/0xdd0 [ 498.590318][T22124] do_page_fault+0x38/0x590 [ 498.594800][T22124] page_fault+0x39/0x40 [ 498.598943][T22124] RIP: 0033:0x41122f [ 498.602814][T22124] Code: 0f 84 c8 02 00 00 48 83 bd 78 ff ff ff 00 0f 84 f9 04 00 00 48 8b 95 68 ff ff ff 44 89 95 38 ff ff ff 4c 8d ac 10 00 f7 ff ff <49> 89 85 90 06 00 00 49 8d 85 10 03 00 00 49 89 95 98 06 00 00 41 [ 498.622481][T22124] RSP: 002b:00007ffe999ae8a0 EFLAGS: 00010206 [ 498.628526][T22124] RAX: 00007fb5554e1000 RBX: 0000000000020000 RCX: 000000000045993a [ 498.636483][T22124] RDX: 0000000000021000 RSI: 0000000000021000 RDI: 0000000000000000 [ 498.644438][T22124] RBP: 00007ffe999ae980 R08: ffffffffffffffff R09: 0000000000000000 [ 498.652457][T22124] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffe999aea70 [ 498.660421][T22124] R13: 00007fb555501700 R14: 0000000000000002 R15: 000000000075c07c [ 498.669478][T22124] memory: usage 63416kB, limit 0kB, failcnt 32 [ 498.675641][T22124] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 498.682573][T22124] Memory cgroup stats for /syz1: [ 498.682866][T22124] anon 57352192 [ 498.682866][T22124] file 204800 [ 498.682866][T22124] kernel_stack 458752 [ 498.682866][T22124] slab 5570560 [ 498.682866][T22124] sock 53248 [ 498.682866][T22124] shmem 57344 [ 498.682866][T22124] file_mapped 135168 [ 498.682866][T22124] file_dirty 135168 [ 498.682866][T22124] file_writeback 0 [ 498.682866][T22124] anon_thp 52428800 [ 498.682866][T22124] inactive_anon 29048832 [ 498.682866][T22124] active_anon 20213760 [ 498.682866][T22124] inactive_file 135168 [ 498.682866][T22124] active_file 94208 [ 498.682866][T22124] unevictable 8331264 [ 498.682866][T22124] slab_reclaimable 1892352 [ 498.682866][T22124] slab_unreclaimable 3678208 [ 498.682866][T22124] pgfault 49170 [ 498.682866][T22124] pgmajfault 0 [ 498.682866][T22124] workingset_refault 0 [ 498.682866][T22124] workingset_activate 0 [ 498.682866][T22124] workingset_nodereclaim 0 [ 498.682866][T22124] pgrefill 43 [ 498.682866][T22124] pgscan 76 [ 498.682866][T22124] pgsteal 39 08:44:46 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_type(r0, &(0x7f0000000680)='cgroup.type\x00', 0x2, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000001540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@ptr={0x0, 0x0, 0x0, 0x2, 0x2}, @volatile={0x0, 0x0, 0x0, 0x4}]}}, &(0x7f00000002c0)=""/245, 0x32, 0xf5, 0x1}, 0x20) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x42400) openat$cgroup_procs(r2, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000140)=0x2) socket$kcm(0x11, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)={[{0x0, 'cpu'}, {0x2f, 'io'}]}, 0x9) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r2, 0x7, 0x0, 0x6, 0x0}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000003c0)={r3, 0x10, &(0x7f0000000280)={&(0x7f0000000000)=""/31, 0x1f}}, 0x10) write$cgroup_int(r4, 0x0, 0x0) 08:44:46 executing program 3: futex(&(0x7f0000000040)=0x4, 0x0, 0x4, &(0x7f0000000000)={0x77359400}, 0x0, 0x0) timer_create(0x0, &(0x7f0000000200)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r0+30000000}}, 0x0) r1 = gettid() tkill(r1, 0x1000000000016) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r3 = gettid() tkill(r3, 0x1000000000016) futex(&(0x7f0000000280), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 08:44:46 executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000980)='net/sofH\x16tnet_sua') openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='stat\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) preadv(r1, &(0x7f00000017c0), 0x199, 0x0) 08:44:46 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b04, &(0x7f0000000bc0)='wlan1\x00\x0e\xd3UM\xe1\x04\xbeK\x19\xec\x0e\x00\x00\x00\x00\xff\xff\xff\x8d\x02\x01\xe5\xe8\",\x91\x91\x13\x9f\x19\x9e\x02\x00?\x00\xff\x8d\x00\x00\xf6\x00\xd4\xf2\xe7\xf9\x01\x06\x8c\xe2K\x04\xd9\xfd\xbd\x00\x1d})\xa0\xb1\xd2\xe4\x00\x00\x00\x00\x00\xa4]\xbb\x10F\xe4\xa8\xa8\x00\x00\x00\x00\xdfA\x83\xcdx\x90\x9a\x82\xc0)(4\xdf\bL\x7f\xff\xff\xffs\x18Z\xcc\x026\xf4\xb0\x9b@:HX\xbd(\xbfjOc\xcd\x15\xc1K\xab\xe9\xe3\xe8\x05\xda\xce\xed\xa5\xb8<\x9d\x12\x19Z\xb3@o\xc7\xce\xec\x02:a\xad\xef,\xbc (\x02z\x8eni)\xb5i\x0f\xc7\v\x9dz\xfa\x88\x87\xa2\xa8\xd9\x95:E\xfeO\xe7\xf8EX\xe3\xbcf\x02\x98P\x1a\x1f\x16\xb9\b\xa2\xb0\xb1\xc4vCh.\xa3\xd7G0\x92C5\x9d\x17\xd1\x96g\x8d\xd1\x06i\xde<\xf3\xd9\x93M/\x1eQ\xba\xe7\xf4\x9c\x9a\x1a\xde\b\xcaot\xeeKr\xb3\"\xa9\xef\xa2\xd8\x03_\xee=[o\xaa`\x93d\xff9\xfa\r\xbe\x16\xef\xf0\xfeThQ\xb8\xe8\xba7\xd0\xab.\x13L8V\x1d\xa0\x02y\xe4\xef\x00\x8b\xcd\x1b\xe8#\xb4\xea@\x1b\xd0y\x02iE\xb30\xe8\xdb\xb1\xdb/e\xb3X\xe4Tr\xb4w\xba\xa9\xfe\x0f\xdcFc\xd0\x9f\x82\x9d\xae\x9cyQOT\xdc\x86\x82Q\xe0\xab\xc1w\x03;-^(\x02=\xf39#\x9a\xcd\xe0\xd8q\x9a\xcd\xdeAF,\x04\"\x84\xa9O\x97\xf7\xfb\xa2N>\xcb\x9d\xc0\x810\x12\xcc@\x89\xf8F\x82\x88O\x03\xeb\xad\xc7\xee\x17\x1f\xaaX\xeeO\xb5\xcf\xff@\xc09[\xec>\xf1_\xfd\xeb\x1e\x83\xbb\xd7\xdb\xf8\x94\x9d\xdf\xcc\xd8F\x005\xba$\xb3\x9cy\xb4n\xd4\x97\x87}\x8e\x03\x8b\xbbU_\xa4\tG\xbdZWQ\xf2\x91\xcb\xbf\x06\x93N\xf61\x9ea\xc3\xfd\xca\x9e`[\xd4\xb2\xe1\xa2\xc6h\xf8\x0f\xbaDP\x91\x13H\n\xe5F*\xe8\an\xeb\x18\x80A\xfe\xc3\xb4pJ;\xaa\x84*_k\xea\x87x\xda\xe8\xf5+\x89\xdc\x19|:,\xb7b\xc9\x10\x8a\xbe\xc3\x15)\x80\xd0t`7\xed\xe4&\xe25\x98vW\xf1\xdcL=\xf7\xa9\x9b\xe6\x03W^t\'*b\x98:\x8aU\xe0\x99!E\x87@*C\x97|?\xff7\xca\xfc\xaa<\xc8L\xbf/9\x1df\x8c\xa6\x8f3\xcc@g\x80)\xf4\v\xcd\x98[Y\x04\xb6b\xff\x86\xdb\x7f\xb9\x10\xd9\x18j\x1d\x16p\xc3\x02\'\x8eY\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\xd8s\x1a\xc8\xf0z\xfc\xf6\xba*\xfar\xef\x98\xad\xaf\xb6r\xff\xfc\xcf\xebo\x8c\xd9:\x8d\xf2eBcU\xca\x83\x88L\xf6\xa7\xf4|,\xdb\x85y\xfc\xad\xc6\xa0\x8aK\xb40\xfb\xc5\x85') 08:44:46 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000980)='net/sofH\x16tnet_sua') openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='stat\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) preadv(r1, &(0x7f00000017c0), 0x199, 0x0) 08:44:46 executing program 4: unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{0x77359400}, {0x0, 0x1c9c380}}, 0x0) [ 498.779566][T22124] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=18676,uid=0 [ 498.796644][T22124] Memory cgroup out of memory: Killed process 18676 (syz-executor.1) total-vm:72708kB, anon-rss:18232kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:159744kB oom_score_adj:1000 [ 498.830289][ T1065] oom_reaper: reaped process 18676 (syz-executor.1), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB [ 498.905618][T13406] syz-executor.1 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 08:44:46 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_type(r0, &(0x7f0000000680)='cgroup.type\x00', 0x2, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000001540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@ptr={0x0, 0x0, 0x0, 0x2, 0x2}, @volatile={0x0, 0x0, 0x0, 0x4}]}}, &(0x7f00000002c0)=""/245, 0x32, 0xf5, 0x1}, 0x20) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x42400) openat$cgroup_procs(r2, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000140)=0x2) socket$kcm(0x11, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)={[{0x0, 'cpu'}, {0x2f, 'io'}]}, 0x9) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r2, 0x7, 0x0, 0x6, 0x0}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000003c0)={r3, 0x10, &(0x7f0000000280)={&(0x7f0000000000)=""/31, 0x1f}}, 0x10) write$cgroup_int(r4, 0x0, 0x0) [ 498.983624][T13406] CPU: 0 PID: 13406 Comm: syz-executor.1 Not tainted 5.3.0-rc6-next-20190830 #75 [ 498.992800][T13406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 499.002859][T13406] Call Trace: [ 499.006155][T13406] dump_stack+0x172/0x1f0 [ 499.010500][T13406] dump_header+0x177/0x1152 [ 499.015015][T13406] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 499.020823][T13406] ? ___ratelimit+0x2c8/0x595 [ 499.025506][T13406] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 499.031319][T13406] ? lockdep_hardirqs_on+0x418/0x5d0 [ 499.036609][T13406] ? trace_hardirqs_on+0x67/0x240 [ 499.041652][T13406] ? pagefault_out_of_memory+0x11c/0x11c [ 499.047290][T13406] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 499.053098][T13406] ? ___ratelimit+0x60/0x595 [ 499.057788][T13406] ? do_raw_spin_unlock+0x57/0x270 [ 499.063178][T13406] oom_kill_process.cold+0x10/0x15 [ 499.068293][T13406] out_of_memory+0x334/0x1340 [ 499.072969][T13406] ? lock_downgrade+0x920/0x920 [ 499.077823][T13406] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 499.083634][T13406] ? oom_killer_disable+0x280/0x280 [ 499.088845][T13406] mem_cgroup_out_of_memory+0x1d8/0x240 [ 499.094388][T13406] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 499.100026][T13406] ? do_raw_spin_unlock+0x57/0x270 [ 499.105145][T13406] ? _raw_spin_unlock+0x2d/0x50 [ 499.110010][T13406] try_charge+0xf4b/0x1440 [ 499.114440][T13406] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 499.119985][T13406] ? find_held_lock+0x35/0x130 [ 499.124750][T13406] ? get_mem_cgroup_from_mm+0x139/0x320 [ 499.131121][T13406] ? lock_downgrade+0x920/0x920 [ 499.135969][T13406] ? percpu_ref_tryget_live+0x111/0x290 [ 499.141541][T13406] __memcg_kmem_charge_memcg+0x71/0xf0 [ 499.147002][T13406] ? memcg_kmem_put_cache+0x50/0x50 [ 499.152226][T13406] ? get_mem_cgroup_from_mm+0x156/0x320 [ 499.157784][T13406] __memcg_kmem_charge+0x13a/0x3a0 [ 499.162901][T13406] __alloc_pages_nodemask+0x4f7/0x900 [ 499.169235][T13406] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 499.174786][T13406] ? __alloc_pages_slowpath+0x2540/0x2540 [ 499.180532][T13406] ? percpu_ref_put_many+0xb6/0x190 [ 499.185732][T13406] ? lockdep_hardirqs_on+0x418/0x5d0 [ 499.191015][T13406] ? trace_hardirqs_on+0x67/0x240 [ 499.196035][T13406] ? __kasan_check_read+0x11/0x20 [ 499.201062][T13406] copy_process+0x3f8/0x6830 [ 499.205653][T13406] ? __kasan_check_read+0x11/0x20 [ 499.210679][T13406] ? __kasan_check_read+0x11/0x20 [ 499.215702][T13406] ? __lock_acquire+0x16f2/0x4a00 [ 499.220736][T13406] ? __cleanup_sighand+0x60/0x60 [ 499.225673][T13406] ? __might_fault+0x12b/0x1e0 [ 499.230442][T13406] ? __might_fault+0x12b/0x1e0 [ 499.235217][T13406] _do_fork+0x146/0xfa0 [ 499.239463][T13406] ? copy_init_mm+0x20/0x20 [ 499.243975][T13406] ? __kasan_check_read+0x11/0x20 [ 499.249001][T13406] ? _copy_to_user+0x118/0x160 [ 499.253771][T13406] __x64_sys_clone+0x1ab/0x270 [ 499.258528][T13406] ? __ia32_sys_vfork+0xd0/0xd0 [ 499.263387][T13406] ? do_syscall_64+0x26/0x760 [ 499.268058][T13406] ? lockdep_hardirqs_on+0x418/0x5d0 [ 499.273333][T13406] ? trace_hardirqs_on+0x67/0x240 [ 499.278420][T13406] do_syscall_64+0xfa/0x760 08:44:47 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000980)='net/sofH\x16tnet_sua') openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='stat\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) preadv(r1, &(0x7f00000017c0), 0x199, 0x0) [ 499.282928][T13406] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 499.288816][T13406] RIP: 0033:0x457eba [ 499.292723][T13406] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 499.312322][T13406] RSP: 002b:00007ffe999aeaf0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 499.312335][T13406] RAX: ffffffffffffffda RBX: 00007ffe999aeaf0 RCX: 0000000000457eba 08:44:47 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_type(r0, &(0x7f0000000680)='cgroup.type\x00', 0x2, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000001540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@ptr={0x0, 0x0, 0x0, 0x2, 0x2}, @volatile={0x0, 0x0, 0x0, 0x4}]}}, &(0x7f00000002c0)=""/245, 0x32, 0xf5, 0x1}, 0x20) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x42400) openat$cgroup_procs(r2, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000140)=0x2) socket$kcm(0x11, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)={[{0x0, 'cpu'}, {0x2f, 'io'}]}, 0x9) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r2, 0x7, 0x0, 0x6, 0x0}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000003c0)={r3, 0x10, &(0x7f0000000280)={&(0x7f0000000000)=""/31, 0x1f}}, 0x10) write$cgroup_int(r4, 0x0, 0x0) [ 499.312343][T13406] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 499.312350][T13406] RBP: 00007ffe999aeb30 R08: 0000000000000001 R09: 0000555556d37940 [ 499.312363][T13406] R10: 0000555556d37c10 R11: 0000000000000246 R12: 0000000000000001 [ 499.328753][T13406] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe999aeb80 [ 499.590676][T13406] memory: usage 42076kB, limit 0kB, failcnt 42 [ 499.598112][T13406] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 499.635358][T13406] Memory cgroup stats for /syz1: [ 499.635722][T13406] anon 36478976 [ 499.635722][T13406] file 204800 [ 499.635722][T13406] kernel_stack 327680 [ 499.635722][T13406] slab 5005312 [ 499.635722][T13406] sock 53248 [ 499.635722][T13406] shmem 57344 [ 499.635722][T13406] file_mapped 135168 [ 499.635722][T13406] file_dirty 135168 [ 499.635722][T13406] file_writeback 0 [ 499.635722][T13406] anon_thp 33554432 [ 499.635722][T13406] inactive_anon 12365824 [ 499.635722][T13406] active_anon 17940480 [ 499.635722][T13406] inactive_file 135168 [ 499.635722][T13406] active_file 94208 [ 499.635722][T13406] unevictable 6234112 [ 499.635722][T13406] slab_reclaimable 1757184 [ 499.635722][T13406] slab_unreclaimable 3248128 [ 499.635722][T13406] pgfault 49170 [ 499.635722][T13406] pgmajfault 0 [ 499.635722][T13406] workingset_refault 0 [ 499.635722][T13406] workingset_activate 0 [ 499.635722][T13406] workingset_nodereclaim 0 [ 499.635722][T13406] pgrefill 43 [ 499.635722][T13406] pgscan 76 [ 499.635722][T13406] pgsteal 39 08:44:47 executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000980)='net/sofH\x16tnet_sua') openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='stat\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) preadv(r1, &(0x7f00000017c0), 0x199, 0x0) [ 499.744244][T13406] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=18616,uid=0 [ 499.767750][T13406] Memory cgroup out of memory: Killed process 18616 (syz-executor.1) total-vm:72708kB, anon-rss:18232kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:159744kB oom_score_adj:1000 08:44:47 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_type(r0, &(0x7f0000000680)='cgroup.type\x00', 0x2, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000001540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@ptr={0x0, 0x0, 0x0, 0x2, 0x2}, @volatile={0x0, 0x0, 0x0, 0x4}]}}, &(0x7f00000002c0)=""/245, 0x32, 0xf5, 0x1}, 0x20) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x42400) openat$cgroup_procs(r2, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000140)=0x2) socket$kcm(0x11, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)={[{0x0, 'cpu'}, {0x2f, 'io'}]}, 0x9) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r2, 0x7, 0x0, 0x6, 0x0}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000003c0)={r3, 0x10, &(0x7f0000000280)={&(0x7f0000000000)=""/31, 0x1f}}, 0x10) write$cgroup_int(r4, 0x0, 0x0) [ 499.880116][T22202] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 499.905140][T22202] CPU: 1 PID: 22202 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 499.914285][T22202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 499.924342][T22202] Call Trace: [ 499.927650][T22202] dump_stack+0x172/0x1f0 [ 499.932003][T22202] dump_header+0x177/0x1152 [ 499.936519][T22202] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 499.942331][T22202] ? ___ratelimit+0x2c8/0x595 [ 499.947002][T22202] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 499.952812][T22202] ? lockdep_hardirqs_on+0x418/0x5d0 [ 499.958102][T22202] ? trace_hardirqs_on+0x67/0x240 [ 499.963125][T22202] ? pagefault_out_of_memory+0x11c/0x11c [ 499.968740][T22202] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 499.974615][T22202] ? ___ratelimit+0x60/0x595 [ 499.979209][T22202] ? do_raw_spin_unlock+0x57/0x270 [ 499.984321][T22202] oom_kill_process.cold+0x10/0x15 [ 499.989531][T22202] out_of_memory+0x334/0x1340 [ 499.994233][T22202] ? oom_killer_disable+0x280/0x280 [ 499.999453][T22202] mem_cgroup_out_of_memory+0x1d8/0x240 [ 500.005032][T22202] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 500.010682][T22202] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 500.016496][T22202] ? cgroup_file_notify+0x140/0x1b0 [ 500.021786][T22202] memory_max_write+0x262/0x3a0 [ 500.026658][T22202] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 500.033427][T22202] ? lock_acquire+0x190/0x410 [ 500.038216][T22202] ? kernfs_fop_write+0x227/0x480 [ 500.043227][T22202] cgroup_file_write+0x241/0x790 [ 500.048159][T22202] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 500.054925][T22202] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 500.060566][T22202] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 500.066177][T22202] kernfs_fop_write+0x2b8/0x480 [ 500.071013][T22202] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 500.077245][T22202] __vfs_write+0x8a/0x110 [ 500.081579][T22202] ? kernfs_fop_open+0xd80/0xd80 [ 500.086509][T22202] vfs_write+0x268/0x5d0 [ 500.090742][T22202] ksys_write+0x14f/0x290 [ 500.095062][T22202] ? __ia32_sys_read+0xb0/0xb0 [ 500.099833][T22202] ? do_syscall_64+0x26/0x760 [ 500.104500][T22202] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 500.110552][T22202] ? do_syscall_64+0x26/0x760 [ 500.115236][T22202] __x64_sys_write+0x73/0xb0 [ 500.119850][T22202] do_syscall_64+0xfa/0x760 [ 500.124346][T22202] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 500.130215][T22202] RIP: 0033:0x4598e9 [ 500.134088][T22202] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 500.153676][T22202] RSP: 002b:00007f2e72de6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 500.162084][T22202] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004598e9 [ 500.170475][T22202] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 500.178543][T22202] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 500.186505][T22202] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2e72de76d4 [ 500.194493][T22202] R13: 00000000004c9a52 R14: 00000000004e1148 R15: 00000000ffffffff [ 500.210822][T22202] memory: usage 62504kB, limit 0kB, failcnt 0 [ 500.223778][T22202] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 500.234747][T22202] Memory cgroup stats for /syz5: [ 500.234972][T22202] anon 53428224 [ 500.234972][T22202] file 0 [ 500.234972][T22202] kernel_stack 983040 [ 500.234972][T22202] slab 5443584 [ 500.234972][T22202] sock 0 [ 500.234972][T22202] shmem 110592 [ 500.234972][T22202] file_mapped 135168 [ 500.234972][T22202] file_dirty 0 [ 500.234972][T22202] file_writeback 0 [ 500.234972][T22202] anon_thp 50331648 [ 500.234972][T22202] inactive_anon 0 [ 500.234972][T22202] active_anon 53358592 [ 500.234972][T22202] inactive_file 0 [ 500.234972][T22202] active_file 135168 [ 500.234972][T22202] unevictable 0 [ 500.234972][T22202] slab_reclaimable 1622016 [ 500.234972][T22202] slab_unreclaimable 3821568 [ 500.234972][T22202] pgfault 57255 [ 500.234972][T22202] pgmajfault 0 [ 500.234972][T22202] workingset_refault 0 [ 500.234972][T22202] workingset_activate 0 [ 500.234972][T22202] workingset_nodereclaim 0 [ 500.234972][T22202] pgrefill 38 [ 500.234972][T22202] pgscan 33 [ 500.234972][T22202] pgsteal 0 [ 500.234972][T22202] pgactivate 0 08:44:48 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000980)='net/sofH\x16tnet_sua') openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='stat\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) preadv(r1, &(0x7f00000017c0), 0x199, 0x0) [ 500.460623][T22202] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=10486,uid=0 [ 500.551573][T22202] Memory cgroup out of memory: Killed process 10486 (syz-executor.5) total-vm:72708kB, anon-rss:2208kB, file-rss:35928kB, shmem-rss:0kB, UID:0 pgtables:147456kB oom_score_adj:1000 [ 500.701723][T13406] syz-executor.1 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 500.730386][T13406] CPU: 1 PID: 13406 Comm: syz-executor.1 Not tainted 5.3.0-rc6-next-20190830 #75 [ 500.739534][T13406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 500.749600][T13406] Call Trace: [ 500.752871][T13406] dump_stack+0x172/0x1f0 [ 500.757184][T13406] dump_header+0x177/0x1152 [ 500.761672][T13406] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 500.767508][T13406] ? ___ratelimit+0x2c8/0x595 [ 500.772168][T13406] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 500.777962][T13406] ? lockdep_hardirqs_on+0x418/0x5d0 [ 500.783234][T13406] ? trace_hardirqs_on+0x67/0x240 [ 500.788235][T13406] ? pagefault_out_of_memory+0x11c/0x11c [ 500.793892][T13406] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 500.799675][T13406] ? ___ratelimit+0x60/0x595 [ 500.804240][T13406] ? do_raw_spin_unlock+0x57/0x270 [ 500.810057][T13406] oom_kill_process.cold+0x10/0x15 [ 500.815180][T13406] out_of_memory+0x334/0x1340 [ 500.819837][T13406] ? lock_downgrade+0x920/0x920 [ 500.824682][T13406] ? oom_killer_disable+0x280/0x280 [ 500.829880][T13406] mem_cgroup_out_of_memory+0x1d8/0x240 [ 500.835433][T13406] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 500.841070][T13406] ? do_raw_spin_unlock+0x57/0x270 [ 500.846166][T13406] ? _raw_spin_unlock+0x2d/0x50 [ 500.851011][T13406] try_charge+0xf4b/0x1440 [ 500.855433][T13406] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 500.860963][T13406] ? find_held_lock+0x35/0x130 [ 500.865720][T13406] ? get_mem_cgroup_from_mm+0x139/0x320 [ 500.871269][T13406] ? lock_downgrade+0x920/0x920 [ 500.876107][T13406] ? percpu_ref_tryget_live+0x111/0x290 [ 500.881653][T13406] __memcg_kmem_charge_memcg+0x71/0xf0 [ 500.887178][T13406] ? memcg_kmem_put_cache+0x50/0x50 [ 500.892897][T13406] ? get_mem_cgroup_from_mm+0x156/0x320 [ 500.898424][T13406] __memcg_kmem_charge+0x13a/0x3a0 [ 500.903514][T13406] __alloc_pages_nodemask+0x4f7/0x900 [ 500.908872][T13406] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 500.914418][T13406] ? __alloc_pages_slowpath+0x2540/0x2540 [ 500.920124][T13406] ? percpu_ref_put_many+0xb6/0x190 [ 500.925492][T13406] ? lockdep_hardirqs_on+0x418/0x5d0 [ 500.930766][T13406] ? trace_hardirqs_on+0x67/0x240 [ 500.935779][T13406] ? __kasan_check_read+0x11/0x20 [ 500.940797][T13406] copy_process+0x3f8/0x6830 [ 500.945363][T13406] ? __kasan_check_read+0x11/0x20 [ 500.950380][T13406] ? __kasan_check_read+0x11/0x20 [ 500.955469][T13406] ? __lock_acquire+0x16f2/0x4a00 [ 500.960475][T13406] ? __cleanup_sighand+0x60/0x60 [ 500.965388][T13406] ? __might_fault+0x12b/0x1e0 [ 500.970131][T13406] ? __might_fault+0x12b/0x1e0 [ 500.974881][T13406] _do_fork+0x146/0xfa0 [ 500.979017][T13406] ? copy_init_mm+0x20/0x20 [ 500.983507][T13406] ? __kasan_check_read+0x11/0x20 [ 500.988509][T13406] ? _copy_to_user+0x118/0x160 [ 500.993256][T13406] __x64_sys_clone+0x1ab/0x270 [ 500.998001][T13406] ? __ia32_sys_vfork+0xd0/0xd0 [ 501.002835][T13406] ? do_syscall_64+0x26/0x760 [ 501.007502][T13406] ? lockdep_hardirqs_on+0x418/0x5d0 [ 501.012782][T13406] ? trace_hardirqs_on+0x67/0x240 [ 501.017804][T13406] do_syscall_64+0xfa/0x760 [ 501.022306][T13406] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 501.028197][T13406] RIP: 0033:0x457eba [ 501.032074][T13406] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 501.052090][T13406] RSP: 002b:00007ffe999aeaf0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 501.060493][T13406] RAX: ffffffffffffffda RBX: 00007ffe999aeaf0 RCX: 0000000000457eba [ 501.068455][T13406] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 501.076839][T13406] RBP: 00007ffe999aeb30 R08: 0000000000000001 R09: 0000555556d37940 [ 501.084803][T13406] R10: 0000555556d37c10 R11: 0000000000000246 R12: 0000000000000001 [ 501.092766][T13406] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe999aeb80 [ 501.105818][T13406] memory: usage 23652kB, limit 0kB, failcnt 49 [ 501.112410][T13406] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 501.119518][T13406] Memory cgroup stats for /syz1: [ 501.119624][T13406] anon 17809408 [ 501.119624][T13406] file 204800 [ 501.119624][T13406] kernel_stack 327680 [ 501.119624][T13406] slab 5005312 [ 501.119624][T13406] sock 53248 [ 501.119624][T13406] shmem 57344 [ 501.119624][T13406] file_mapped 135168 [ 501.119624][T13406] file_dirty 135168 [ 501.119624][T13406] file_writeback 0 [ 501.119624][T13406] anon_thp 16777216 [ 501.119624][T13406] inactive_anon 0 [ 501.119624][T13406] active_anon 17940480 [ 501.119624][T13406] inactive_file 135168 [ 501.119624][T13406] active_file 94208 [ 501.119624][T13406] unevictable 0 [ 501.119624][T13406] slab_reclaimable 1757184 [ 501.119624][T13406] slab_unreclaimable 3248128 [ 501.119624][T13406] pgfault 49170 [ 501.119624][T13406] pgmajfault 0 [ 501.119624][T13406] workingset_refault 0 [ 501.119624][T13406] workingset_activate 0 [ 501.119624][T13406] workingset_nodereclaim 0 [ 501.119624][T13406] pgrefill 76 [ 501.119624][T13406] pgscan 76 [ 501.119624][T13406] pgsteal 39 [ 501.216091][T13406] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=17414,uid=0 [ 501.232794][T13406] Memory cgroup out of memory: Killed process 17414 (syz-executor.1) total-vm:72576kB, anon-rss:2204kB, file-rss:35808kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 501.252410][ T1065] oom_reaper: reaped process 17414 (syz-executor.1), now anon-rss:0kB, file-rss:34848kB, shmem-rss:0kB [ 501.264355][ T8732] syz-executor.5 invoked oom-killer: gfp_mask=0x40c50(GFP_NOFS|__GFP_COMP|__GFP_RECLAIMABLE), order=0, oom_score_adj=0 [ 501.280552][ T8732] CPU: 1 PID: 8732 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 501.289581][ T8732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 501.299638][ T8732] Call Trace: [ 501.299750][ T8732] dump_stack+0x172/0x1f0 [ 501.307344][ T8732] dump_header+0x177/0x1152 [ 501.312117][ T8732] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 501.317921][ T8732] ? ___ratelimit+0x2c8/0x595 [ 501.322597][ T8732] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 501.328411][ T8732] ? lockdep_hardirqs_on+0x418/0x5d0 [ 501.333704][ T8732] ? trace_hardirqs_on+0x67/0x240 [ 501.338738][ T8732] ? pagefault_out_of_memory+0x11c/0x11c [ 501.344378][ T8732] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 501.350192][ T8732] ? ___ratelimit+0x60/0x595 [ 501.354778][ T8732] ? do_raw_spin_unlock+0x57/0x270 [ 501.359891][ T8732] oom_kill_process.cold+0x10/0x15 [ 501.365010][ T8732] out_of_memory+0x334/0x1340 [ 501.369695][ T8732] ? lock_downgrade+0x920/0x920 [ 501.374550][ T8732] ? oom_killer_disable+0x280/0x280 [ 501.379762][ T8732] mem_cgroup_out_of_memory+0x1d8/0x240 [ 501.385314][ T8732] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 501.390954][ T8732] ? do_raw_spin_unlock+0x57/0x270 [ 501.396068][ T8732] ? _raw_spin_unlock+0x2d/0x50 [ 501.400929][ T8732] try_charge+0xf4b/0x1440 [ 501.405355][ T8732] ? __lock_acquire+0x800/0x4a00 [ 501.410298][ T8732] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 501.415853][ T8732] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 501.421834][ T8732] ? cache_grow_begin+0x122/0xd20 [ 501.426852][ T8732] ? find_held_lock+0x35/0x130 [ 501.431608][ T8732] ? cache_grow_begin+0x122/0xd20 [ 501.436640][ T8732] __memcg_kmem_charge_memcg+0x71/0xf0 [ 501.442081][ T8732] ? memcg_kmem_put_cache+0x50/0x50 [ 501.447260][ T8732] ? __kasan_check_read+0x11/0x20 [ 501.452265][ T8732] cache_grow_begin+0x629/0xd20 [ 501.457094][ T8732] ? __sanitizer_cov_trace_cmp2+0x11/0x20 [ 501.462797][ T8732] ? mempolicy_slab_node+0x139/0x390 [ 501.468080][ T8732] fallback_alloc+0x1fd/0x2d0 [ 501.472759][ T8732] ____cache_alloc_node+0x1bc/0x1d0 [ 501.477942][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 501.484174][ T8732] kmem_cache_alloc+0x1ef/0x710 [ 501.489009][ T8732] ? lock_downgrade+0x920/0x920 [ 501.493842][ T8732] ? rwlock_bug.part.0+0x90/0x90 [ 501.498762][ T8732] ? ratelimit_state_init+0xb0/0xb0 [ 501.503939][ T8732] ext4_alloc_inode+0x1f/0x640 [ 501.508680][ T8732] ? ratelimit_state_init+0xb0/0xb0 [ 501.513861][ T8732] alloc_inode+0x68/0x1e0 [ 501.518168][ T8732] iget_locked+0x1a6/0x4b0 [ 501.522569][ T8732] __ext4_iget+0x265/0x3bb0 [ 501.527058][ T8732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 501.533291][ T8732] ? ext4_get_projid+0x190/0x190 [ 501.538215][ T8732] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 501.543746][ T8732] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 501.549878][ T8732] ? d_alloc_parallel+0xa78/0x1c30 [ 501.554993][ T8732] ext4_lookup+0x3b1/0x7a0 [ 501.559403][ T8732] ? ext4_cross_rename+0x1430/0x1430 [ 501.564679][ T8732] ? __lock_acquire+0x16f2/0x4a00 [ 501.569692][ T8732] ? __kasan_check_read+0x11/0x20 [ 501.574710][ T8732] ? lockdep_init_map+0x1be/0x6d0 [ 501.579731][ T8732] __lookup_slow+0x279/0x500 [ 501.584312][ T8732] ? vfs_unlink+0x620/0x620 [ 501.588808][ T8732] lookup_slow+0x58/0x80 [ 501.593039][ T8732] path_mountpoint+0x5d2/0x1e60 [ 501.597878][ T8732] ? __kasan_check_read+0x11/0x20 [ 501.602934][ T8732] ? __lock_acquire+0x16f2/0x4a00 [ 501.607938][ T8732] ? putname+0xef/0x130 [ 501.612088][ T8732] ? path_openat+0x46d0/0x46d0 [ 501.616881][ T8732] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 501.622500][ T8732] ? find_held_lock+0x35/0x130 [ 501.627247][ T8732] filename_mountpoint+0x190/0x3c0 [ 501.632350][ T8732] ? filename_parentat.isra.0+0x410/0x410 [ 501.638059][ T8732] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 501.644214][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 501.650443][ T8732] ? __phys_addr_symbol+0x30/0x70 [ 501.655456][ T8732] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 501.661173][ T8732] ? __check_object_size+0x3d/0x437 [ 501.666365][ T8732] ? strncpy_from_user+0x2b4/0x400 [ 501.671476][ T8732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 501.677707][ T8732] ? getname_flags+0x277/0x5b0 [ 501.682451][ T8732] user_path_mountpoint_at+0x3a/0x50 [ 501.687715][ T8732] ksys_umount+0x167/0xf00 [ 501.692115][ T8732] ? __ia32_sys_rmdir+0x40/0x40 [ 501.696943][ T8732] ? __detach_mounts+0x2a0/0x2a0 [ 501.701869][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 501.708096][ T8732] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 501.713532][ T8732] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 501.718966][ T8732] ? do_syscall_64+0x26/0x760 [ 501.723638][ T8732] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 501.729689][ T8732] ? do_syscall_64+0x26/0x760 [ 501.734367][ T8732] ? lockdep_hardirqs_on+0x418/0x5d0 [ 501.739644][ T8732] __x64_sys_umount+0x54/0x80 [ 501.744309][ T8732] do_syscall_64+0xfa/0x760 [ 501.748793][ T8732] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 501.754663][ T8732] RIP: 0033:0x45c317 [ 501.758535][ T8732] Code: 64 89 04 25 d0 02 00 00 58 5f ff d0 48 89 c7 e8 2f be ff ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 501.778116][ T8732] RSP: 002b:00007ffd499cd938 EFLAGS: 00000206 ORIG_RAX: 00000000000000a6 [ 501.786515][ T8732] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045c317 [ 501.794484][ T8732] RDX: 0000000000403520 RSI: 0000000000000002 RDI: 00007ffd499cd9e0 [ 501.802433][ T8732] RBP: 00000000000006f3 R08: 0000000000000000 R09: 000000000000000c [ 501.810391][ T8732] R10: 0000000000000006 R11: 0000000000000206 R12: 00007ffd499cea70 [ 501.818348][ T8732] R13: 00005555560f8940 R14: 0000000000000000 R15: 00007ffd499cea70 [ 501.828392][ T8732] memory: usage 59824kB, limit 0kB, failcnt 13 [ 501.834613][ T8732] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 501.841556][ T8732] Memory cgroup stats for /syz5: [ 501.841908][ T8732] anon 51310592 [ 501.841908][ T8732] file 0 [ 501.841908][ T8732] kernel_stack 851968 [ 501.841908][ T8732] slab 5443584 [ 501.841908][ T8732] sock 0 [ 501.841908][ T8732] shmem 110592 [ 501.841908][ T8732] file_mapped 135168 [ 501.841908][ T8732] file_dirty 0 [ 501.841908][ T8732] file_writeback 0 [ 501.841908][ T8732] anon_thp 48234496 [ 501.841908][ T8732] inactive_anon 0 [ 501.841908][ T8732] active_anon 51167232 [ 501.841908][ T8732] inactive_file 0 [ 501.841908][ T8732] active_file 135168 [ 501.841908][ T8732] unevictable 0 [ 501.841908][ T8732] slab_reclaimable 1622016 [ 501.841908][ T8732] slab_unreclaimable 3821568 [ 501.841908][ T8732] pgfault 57255 [ 501.841908][ T8732] pgmajfault 0 [ 501.841908][ T8732] workingset_refault 0 [ 501.841908][ T8732] workingset_activate 0 [ 501.841908][ T8732] workingset_nodereclaim 0 [ 501.841908][ T8732] pgrefill 38 [ 501.841908][ T8732] pgscan 33 [ 501.841908][ T8732] pgsteal 0 [ 501.841908][ T8732] pgactivate 0 [ 501.937786][ T8732] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=10522,uid=0 [ 501.954721][ T8732] Memory cgroup out of memory: Killed process 10522 (syz-executor.5) total-vm:72708kB, anon-rss:2208kB, file-rss:35908kB, shmem-rss:0kB, UID:0 pgtables:147456kB oom_score_adj:1000 [ 501.974876][ T1065] oom_reaper: reaped process 10522 (syz-executor.5), now anon-rss:0kB, file-rss:34948kB, shmem-rss:0kB [ 501.985683][ T8732] syz-executor.5 invoked oom-killer: gfp_mask=0x40c50(GFP_NOFS|__GFP_COMP|__GFP_RECLAIMABLE), order=0, oom_score_adj=0 [ 502.005564][ T8732] CPU: 1 PID: 8732 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 502.014609][ T8732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 502.024655][ T8732] Call Trace: [ 502.027926][ T8732] dump_stack+0x172/0x1f0 [ 502.032238][ T8732] dump_header+0x177/0x1152 [ 502.036719][ T8732] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 502.042499][ T8732] ? ___ratelimit+0x2c8/0x595 [ 502.047153][ T8732] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 502.052936][ T8732] ? lockdep_hardirqs_on+0x418/0x5d0 [ 502.058209][ T8732] ? trace_hardirqs_on+0x67/0x240 [ 502.063227][ T8732] ? pagefault_out_of_memory+0x11c/0x11c [ 502.068846][ T8732] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 502.074638][ T8732] ? ___ratelimit+0x60/0x595 [ 502.079225][ T8732] ? do_raw_spin_unlock+0x57/0x270 [ 502.084325][ T8732] oom_kill_process.cold+0x10/0x15 [ 502.089420][ T8732] out_of_memory+0x334/0x1340 [ 502.094091][ T8732] ? lock_downgrade+0x920/0x920 [ 502.098964][ T8732] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 502.104761][ T8732] ? oom_killer_disable+0x280/0x280 [ 502.109945][ T8732] mem_cgroup_out_of_memory+0x1d8/0x240 [ 502.115472][ T8732] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 502.121088][ T8732] ? do_raw_spin_unlock+0x57/0x270 [ 502.126181][ T8732] ? _raw_spin_unlock+0x2d/0x50 [ 502.131014][ T8732] try_charge+0xf4b/0x1440 [ 502.135410][ T8732] ? __lock_acquire+0x800/0x4a00 [ 502.140327][ T8732] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 502.145852][ T8732] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 502.151810][ T8732] ? cache_grow_begin+0x122/0xd20 [ 502.156819][ T8732] ? find_held_lock+0x35/0x130 [ 502.161561][ T8732] ? cache_grow_begin+0x122/0xd20 [ 502.166584][ T8732] __memcg_kmem_charge_memcg+0x71/0xf0 [ 502.172033][ T8732] ? memcg_kmem_put_cache+0x50/0x50 [ 502.177229][ T8732] ? __kasan_check_read+0x11/0x20 [ 502.182246][ T8732] cache_grow_begin+0x629/0xd20 [ 502.187086][ T8732] ? __sanitizer_cov_trace_cmp2+0x11/0x20 [ 502.192786][ T8732] ? mempolicy_slab_node+0x139/0x390 [ 502.198048][ T8732] fallback_alloc+0x1fd/0x2d0 [ 502.202715][ T8732] ____cache_alloc_node+0x1bc/0x1d0 [ 502.207888][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 502.214107][ T8732] kmem_cache_alloc+0x1ef/0x710 [ 502.218936][ T8732] ? lock_downgrade+0x920/0x920 [ 502.223783][ T8732] ? rwlock_bug.part.0+0x90/0x90 [ 502.228698][ T8732] ? ratelimit_state_init+0xb0/0xb0 [ 502.233889][ T8732] ext4_alloc_inode+0x1f/0x640 [ 502.238635][ T8732] ? ratelimit_state_init+0xb0/0xb0 [ 502.243825][ T8732] alloc_inode+0x68/0x1e0 [ 502.248152][ T8732] iget_locked+0x1a6/0x4b0 [ 502.252570][ T8732] __ext4_iget+0x265/0x3bb0 [ 502.257059][ T8732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 502.263287][ T8732] ? ext4_get_projid+0x190/0x190 [ 502.268210][ T8732] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 502.273739][ T8732] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 502.279710][ T8732] ? d_alloc_parallel+0xa78/0x1c30 [ 502.284807][ T8732] ext4_lookup+0x3b1/0x7a0 [ 502.289207][ T8732] ? ext4_cross_rename+0x1430/0x1430 [ 502.294476][ T8732] ? __lock_acquire+0x16f2/0x4a00 [ 502.299477][ T8732] ? __kasan_check_read+0x11/0x20 [ 502.304480][ T8732] ? lockdep_init_map+0x1be/0x6d0 [ 502.309486][ T8732] __lookup_slow+0x279/0x500 [ 502.314055][ T8732] ? vfs_unlink+0x620/0x620 [ 502.318549][ T8732] lookup_slow+0x58/0x80 [ 502.322768][ T8732] path_mountpoint+0x5d2/0x1e60 [ 502.327597][ T8732] ? __kasan_check_read+0x11/0x20 [ 502.332619][ T8732] ? __lock_acquire+0x16f2/0x4a00 [ 502.337629][ T8732] ? putname+0xef/0x130 [ 502.341768][ T8732] ? path_openat+0x46d0/0x46d0 [ 502.346532][ T8732] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 502.352150][ T8732] ? find_held_lock+0x35/0x130 [ 502.356900][ T8732] filename_mountpoint+0x190/0x3c0 [ 502.361999][ T8732] ? filename_parentat.isra.0+0x410/0x410 [ 502.367700][ T8732] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 502.373839][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 502.380057][ T8732] ? __phys_addr_symbol+0x30/0x70 [ 502.385057][ T8732] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 502.390764][ T8732] ? __check_object_size+0x3d/0x437 [ 502.395944][ T8732] ? strncpy_from_user+0x2b4/0x400 [ 502.401034][ T8732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 502.407256][ T8732] ? getname_flags+0x277/0x5b0 [ 502.412015][ T8732] user_path_mountpoint_at+0x3a/0x50 [ 502.417278][ T8732] ksys_umount+0x167/0xf00 [ 502.421672][ T8732] ? __ia32_sys_rmdir+0x40/0x40 [ 502.426502][ T8732] ? __detach_mounts+0x2a0/0x2a0 [ 502.431419][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 502.437636][ T8732] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 502.443072][ T8732] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 502.448507][ T8732] ? do_syscall_64+0x26/0x760 [ 502.453193][ T8732] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 502.459236][ T8732] ? do_syscall_64+0x26/0x760 [ 502.463891][ T8732] ? lockdep_hardirqs_on+0x418/0x5d0 [ 502.469152][ T8732] __x64_sys_umount+0x54/0x80 [ 502.473807][ T8732] do_syscall_64+0xfa/0x760 [ 502.478289][ T8732] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 502.484157][ T8732] RIP: 0033:0x45c317 [ 502.488028][ T8732] Code: 64 89 04 25 d0 02 00 00 58 5f ff d0 48 89 c7 e8 2f be ff ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 502.507621][ T8732] RSP: 002b:00007ffd499cd938 EFLAGS: 00000206 ORIG_RAX: 00000000000000a6 [ 502.516019][ T8732] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045c317 [ 502.523986][ T8732] RDX: 0000000000403520 RSI: 0000000000000002 RDI: 00007ffd499cd9e0 [ 502.531953][ T8732] RBP: 00000000000006f3 R08: 0000000000000000 R09: 000000000000000c [ 502.539955][ T8732] R10: 0000000000000006 R11: 0000000000000206 R12: 00007ffd499cea70 [ 502.547940][ T8732] R13: 00005555560f8940 R14: 0000000000000000 R15: 00007ffd499cea70 [ 502.556668][ T8732] memory: usage 57468kB, limit 0kB, failcnt 19 [ 502.562884][ T8732] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 502.569779][ T8732] Memory cgroup stats for /syz5: [ 502.569891][ T8732] anon 49053696 [ 502.569891][ T8732] file 0 [ 502.569891][ T8732] kernel_stack 851968 [ 502.569891][ T8732] slab 5443584 [ 502.569891][ T8732] sock 0 [ 502.569891][ T8732] shmem 110592 [ 502.569891][ T8732] file_mapped 135168 [ 502.569891][ T8732] file_dirty 0 [ 502.569891][ T8732] file_writeback 0 [ 502.569891][ T8732] anon_thp 46137344 [ 502.569891][ T8732] inactive_anon 0 [ 502.569891][ T8732] active_anon 48979968 [ 502.569891][ T8732] inactive_file 0 [ 502.569891][ T8732] active_file 135168 [ 502.569891][ T8732] unevictable 0 [ 502.569891][ T8732] slab_reclaimable 1622016 [ 502.569891][ T8732] slab_unreclaimable 3821568 [ 502.569891][ T8732] pgfault 57255 [ 502.569891][ T8732] pgmajfault 0 [ 502.569891][ T8732] workingset_refault 0 [ 502.569891][ T8732] workingset_activate 0 [ 502.569891][ T8732] workingset_nodereclaim 0 [ 502.569891][ T8732] pgrefill 38 [ 502.569891][ T8732] pgscan 33 [ 502.569891][ T8732] pgsteal 0 [ 502.569891][ T8732] pgactivate 0 [ 502.665568][ T8732] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=10566,uid=0 [ 502.681101][ T8732] Memory cgroup out of memory: Killed process 10566 (syz-executor.5) total-vm:72576kB, anon-rss:2200kB, file-rss:35896kB, shmem-rss:0kB, UID:0 pgtables:143360kB oom_score_adj:1000 [ 502.700245][ T1065] oom_reaper: reaped process 10566 (syz-executor.5), now anon-rss:0kB, file-rss:34936kB, shmem-rss:0kB [ 502.711855][T13406] syz-executor.1 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 502.729862][T13406] CPU: 1 PID: 13406 Comm: syz-executor.1 Not tainted 5.3.0-rc6-next-20190830 #75 [ 502.738986][T13406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 502.749473][T13406] Call Trace: [ 502.752774][T13406] dump_stack+0x172/0x1f0 [ 502.757113][T13406] dump_header+0x177/0x1152 [ 502.761612][T13406] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 502.767393][T13406] ? ___ratelimit+0x2c8/0x595 [ 502.772057][T13406] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 502.777851][T13406] ? lockdep_hardirqs_on+0x418/0x5d0 [ 502.783201][T13406] ? trace_hardirqs_on+0x67/0x240 [ 502.788204][T13406] ? pagefault_out_of_memory+0x11c/0x11c [ 502.793826][T13406] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 502.799621][T13406] ? ___ratelimit+0x60/0x595 [ 502.804187][T13406] ? do_raw_spin_unlock+0x57/0x270 [ 502.809291][T13406] oom_kill_process.cold+0x10/0x15 [ 502.814403][T13406] out_of_memory+0x334/0x1340 [ 502.819069][T13406] ? lock_downgrade+0x920/0x920 [ 502.823902][T13406] ? oom_killer_disable+0x280/0x280 [ 502.829082][T13406] mem_cgroup_out_of_memory+0x1d8/0x240 [ 502.834617][T13406] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 502.840255][T13406] ? do_raw_spin_unlock+0x57/0x270 [ 502.845352][T13406] ? _raw_spin_unlock+0x2d/0x50 [ 502.850203][T13406] try_charge+0xf4b/0x1440 [ 502.854645][T13406] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 502.860184][T13406] ? find_held_lock+0x35/0x130 [ 502.864930][T13406] ? get_mem_cgroup_from_mm+0x139/0x320 [ 502.870473][T13406] ? lock_downgrade+0x920/0x920 [ 502.875311][T13406] ? percpu_ref_tryget_live+0x111/0x290 [ 502.880859][T13406] __memcg_kmem_charge_memcg+0x71/0xf0 [ 502.886304][T13406] ? memcg_kmem_put_cache+0x50/0x50 [ 502.891496][T13406] ? get_mem_cgroup_from_mm+0x156/0x320 [ 502.897032][T13406] __memcg_kmem_charge+0x13a/0x3a0 [ 502.902124][T13406] __alloc_pages_nodemask+0x4f7/0x900 [ 502.907477][T13406] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 502.913025][T13406] ? __alloc_pages_slowpath+0x2540/0x2540 [ 502.918731][T13406] ? percpu_ref_put_many+0xb6/0x190 [ 502.923910][T13406] ? lockdep_hardirqs_on+0x418/0x5d0 [ 502.929260][T13406] ? trace_hardirqs_on+0x67/0x240 [ 502.934267][T13406] ? __kasan_check_read+0x11/0x20 [ 502.939281][T13406] copy_process+0x3f8/0x6830 [ 502.943856][T13406] ? __kasan_check_read+0x11/0x20 [ 502.948858][T13406] ? __kasan_check_read+0x11/0x20 [ 502.953869][T13406] ? __lock_acquire+0x16f2/0x4a00 [ 502.958885][T13406] ? __cleanup_sighand+0x60/0x60 [ 502.963802][T13406] ? __might_fault+0x12b/0x1e0 [ 502.968556][T13406] ? __might_fault+0x12b/0x1e0 [ 502.973317][T13406] _do_fork+0x146/0xfa0 [ 502.977462][T13406] ? copy_init_mm+0x20/0x20 [ 502.981951][T13406] ? __kasan_check_read+0x11/0x20 [ 502.986954][T13406] ? _copy_to_user+0x118/0x160 [ 502.991713][T13406] __x64_sys_clone+0x1ab/0x270 [ 502.996466][T13406] ? __ia32_sys_vfork+0xd0/0xd0 [ 503.001304][T13406] ? do_syscall_64+0x26/0x760 [ 503.005957][T13406] ? lockdep_hardirqs_on+0x418/0x5d0 [ 503.011228][T13406] ? trace_hardirqs_on+0x67/0x240 [ 503.016241][T13406] do_syscall_64+0xfa/0x760 [ 503.020743][T13406] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 503.026609][T13406] RIP: 0033:0x457eba [ 503.030505][T13406] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 503.050105][T13406] RSP: 002b:00007ffe999aeaf0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 503.058506][T13406] RAX: ffffffffffffffda RBX: 00007ffe999aeaf0 RCX: 0000000000457eba [ 503.066457][T13406] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 503.074412][T13406] RBP: 00007ffe999aeb30 R08: 0000000000000001 R09: 0000555556d37940 [ 503.082373][T13406] R10: 0000555556d37c10 R11: 0000000000000246 R12: 0000000000000001 [ 503.090328][T13406] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe999aeb80 [ 503.098962][T13406] memory: usage 21336kB, limit 0kB, failcnt 55 [ 503.105162][T13406] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 503.112065][T13406] Memory cgroup stats for /syz1: [ 503.112159][T13406] anon 15638528 [ 503.112159][T13406] file 204800 [ 503.112159][T13406] kernel_stack 262144 [ 503.112159][T13406] slab 5005312 [ 503.112159][T13406] sock 53248 [ 503.112159][T13406] shmem 57344 [ 503.112159][T13406] file_mapped 135168 [ 503.112159][T13406] file_dirty 135168 [ 503.112159][T13406] file_writeback 0 [ 503.112159][T13406] anon_thp 14680064 [ 503.112159][T13406] inactive_anon 0 [ 503.112159][T13406] active_anon 15675392 [ 503.112159][T13406] inactive_file 135168 [ 503.112159][T13406] active_file 94208 [ 503.112159][T13406] unevictable 0 [ 503.112159][T13406] slab_reclaimable 1757184 [ 503.112159][T13406] slab_unreclaimable 3248128 [ 503.112159][T13406] pgfault 49170 [ 503.112159][T13406] pgmajfault 0 [ 503.112159][T13406] workingset_refault 0 [ 503.112159][T13406] workingset_activate 0 [ 503.112159][T13406] workingset_nodereclaim 0 [ 503.112159][T13406] pgrefill 76 [ 503.112159][T13406] pgscan 76 [ 503.112159][T13406] pgsteal 39 [ 503.206190][T13406] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=18896,uid=0 [ 503.221753][T13406] Memory cgroup out of memory: Killed process 18896 (syz-executor.1) total-vm:72576kB, anon-rss:2204kB, file-rss:35804kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 503.241067][ T1065] oom_reaper: reaped process 18896 (syz-executor.1), now anon-rss:0kB, file-rss:34844kB, shmem-rss:0kB [ 503.251146][T13406] syz-executor.1 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 503.270049][T13406] CPU: 1 PID: 13406 Comm: syz-executor.1 Not tainted 5.3.0-rc6-next-20190830 #75 [ 503.279169][T13406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 503.289211][T13406] Call Trace: [ 503.292484][T13406] dump_stack+0x172/0x1f0 [ 503.296795][T13406] dump_header+0x177/0x1152 [ 503.301280][T13406] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 503.307063][T13406] ? ___ratelimit+0x2c8/0x595 [ 503.311716][T13406] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 503.317509][T13406] ? lockdep_hardirqs_on+0x418/0x5d0 [ 503.322784][T13406] ? trace_hardirqs_on+0x67/0x240 [ 503.327801][T13406] ? pagefault_out_of_memory+0x11c/0x11c [ 503.333423][T13406] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 503.339214][T13406] ? ___ratelimit+0x60/0x595 [ 503.343787][T13406] ? do_raw_spin_unlock+0x57/0x270 [ 503.348880][T13406] oom_kill_process.cold+0x10/0x15 [ 503.353977][T13406] out_of_memory+0x334/0x1340 [ 503.358636][T13406] ? lock_downgrade+0x920/0x920 [ 503.363471][T13406] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 503.369259][T13406] ? oom_killer_disable+0x280/0x280 [ 503.374453][T13406] mem_cgroup_out_of_memory+0x1d8/0x240 [ 503.379978][T13406] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 503.385590][T13406] ? do_raw_spin_unlock+0x57/0x270 [ 503.390681][T13406] ? _raw_spin_unlock+0x2d/0x50 [ 503.395510][T13406] try_charge+0xf4b/0x1440 [ 503.399909][T13406] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 503.405432][T13406] ? find_held_lock+0x35/0x130 [ 503.410174][T13406] ? get_mem_cgroup_from_mm+0x139/0x320 [ 503.415702][T13406] ? lock_downgrade+0x920/0x920 [ 503.420530][T13406] ? percpu_ref_tryget_live+0x111/0x290 [ 503.426140][T13406] __memcg_kmem_charge_memcg+0x71/0xf0 [ 503.431600][T13406] ? memcg_kmem_put_cache+0x50/0x50 [ 503.436784][T13406] ? get_mem_cgroup_from_mm+0x156/0x320 [ 503.442322][T13406] __memcg_kmem_charge+0x13a/0x3a0 [ 503.447423][T13406] __alloc_pages_nodemask+0x4f7/0x900 [ 503.452778][T13406] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 503.458302][T13406] ? __alloc_pages_slowpath+0x2540/0x2540 [ 503.464001][T13406] ? percpu_ref_put_many+0xb6/0x190 [ 503.469182][T13406] ? lockdep_hardirqs_on+0x418/0x5d0 [ 503.474452][T13406] ? trace_hardirqs_on+0x67/0x240 [ 503.479455][T13406] ? __kasan_check_read+0x11/0x20 [ 503.484458][T13406] copy_process+0x3f8/0x6830 [ 503.489024][T13406] ? __kasan_check_read+0x11/0x20 [ 503.494028][T13406] ? __kasan_check_read+0x11/0x20 [ 503.499030][T13406] ? __lock_acquire+0x16f2/0x4a00 [ 503.504038][T13406] ? __cleanup_sighand+0x60/0x60 [ 503.508951][T13406] ? __might_fault+0x12b/0x1e0 [ 503.513712][T13406] ? __might_fault+0x12b/0x1e0 [ 503.518458][T13406] _do_fork+0x146/0xfa0 [ 503.522595][T13406] ? copy_init_mm+0x20/0x20 [ 503.527098][T13406] ? __kasan_check_read+0x11/0x20 [ 503.532105][T13406] ? _copy_to_user+0x118/0x160 [ 503.536854][T13406] __x64_sys_clone+0x1ab/0x270 [ 503.541612][T13406] ? __ia32_sys_vfork+0xd0/0xd0 [ 503.546478][T13406] ? do_syscall_64+0x26/0x760 [ 503.551133][T13406] ? lockdep_hardirqs_on+0x418/0x5d0 [ 503.556406][T13406] ? trace_hardirqs_on+0x67/0x240 [ 503.561474][T13406] do_syscall_64+0xfa/0x760 [ 503.565980][T13406] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 503.571850][T13406] RIP: 0033:0x457eba [ 503.575780][T13406] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 503.595392][T13406] RSP: 002b:00007ffe999aeaf0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 503.604131][T13406] RAX: ffffffffffffffda RBX: 00007ffe999aeaf0 RCX: 0000000000457eba [ 503.612083][T13406] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 503.620045][T13406] RBP: 00007ffe999aeb30 R08: 0000000000000001 R09: 0000555556d37940 [ 503.627993][T13406] R10: 0000555556d37c10 R11: 0000000000000246 R12: 0000000000000001 [ 503.635942][T13406] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe999aeb80 [ 503.648454][T13406] memory: usage 18444kB, limit 0kB, failcnt 61 [ 503.654659][T13406] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 503.664800][T13406] Memory cgroup stats for /syz1: [ 503.664868][T13406] anon 13438976 [ 503.664868][T13406] file 204800 [ 503.664868][T13406] kernel_stack 262144 [ 503.664868][T13406] slab 4517888 [ 503.664868][T13406] sock 53248 [ 503.664868][T13406] shmem 57344 [ 503.664868][T13406] file_mapped 135168 [ 503.664868][T13406] file_dirty 135168 [ 503.664868][T13406] file_writeback 0 [ 503.664868][T13406] anon_thp 12582912 [ 503.664868][T13406] inactive_anon 0 [ 503.664868][T13406] active_anon 13475840 [ 503.664868][T13406] inactive_file 135168 [ 503.664868][T13406] active_file 94208 [ 503.664868][T13406] unevictable 0 [ 503.664868][T13406] slab_reclaimable 1757184 [ 503.664868][T13406] slab_unreclaimable 2760704 [ 503.664868][T13406] pgfault 49170 [ 503.664868][T13406] pgmajfault 0 [ 503.664868][T13406] workingset_refault 0 [ 503.664868][T13406] workingset_activate 0 [ 503.664868][T13406] workingset_nodereclaim 0 [ 503.664868][T13406] pgrefill 76 [ 503.664868][T13406] pgscan 76 [ 503.664868][T13406] pgsteal 39 [ 503.759136][T13406] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=18871,uid=0 [ 503.774701][T13406] Memory cgroup out of memory: Killed process 18871 (syz-executor.1) total-vm:72576kB, anon-rss:2204kB, file-rss:35804kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 503.794085][ T1065] oom_reaper: reaped process 18871 (syz-executor.1), now anon-rss:0kB, file-rss:34844kB, shmem-rss:0kB [ 503.801763][ T8732] syz-executor.5 invoked oom-killer: gfp_mask=0x40c50(GFP_NOFS|__GFP_COMP|__GFP_RECLAIMABLE), order=0, oom_score_adj=0 [ 503.818459][ T8732] CPU: 1 PID: 8732 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 503.827485][ T8732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 503.837537][ T8732] Call Trace: [ 503.840835][ T8732] dump_stack+0x172/0x1f0 [ 503.845159][ T8732] dump_header+0x177/0x1152 [ 503.849653][ T8732] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 503.855459][ T8732] ? ___ratelimit+0x2c8/0x595 [ 503.860127][ T8732] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 503.865926][ T8732] ? lockdep_hardirqs_on+0x418/0x5d0 [ 503.871204][ T8732] ? trace_hardirqs_on+0x67/0x240 [ 503.876222][ T8732] ? pagefault_out_of_memory+0x11c/0x11c [ 503.881843][ T8732] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 503.887637][ T8732] ? ___ratelimit+0x60/0x595 [ 503.892204][ T8732] ? do_raw_spin_unlock+0x57/0x270 [ 503.897313][ T8732] oom_kill_process.cold+0x10/0x15 [ 503.902423][ T8732] out_of_memory+0x334/0x1340 [ 503.907093][ T8732] ? lock_downgrade+0x920/0x920 [ 503.911939][ T8732] ? oom_killer_disable+0x280/0x280 [ 503.917124][ T8732] mem_cgroup_out_of_memory+0x1d8/0x240 [ 503.922663][ T8732] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 503.928293][ T8732] ? do_raw_spin_unlock+0x57/0x270 [ 503.933431][ T8732] ? _raw_spin_unlock+0x2d/0x50 [ 503.938280][ T8732] try_charge+0xf4b/0x1440 [ 503.942693][ T8732] ? __lock_acquire+0x800/0x4a00 [ 503.947623][ T8732] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 503.953145][ T8732] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 503.959101][ T8732] ? cache_grow_begin+0x122/0xd20 [ 503.964115][ T8732] ? find_held_lock+0x35/0x130 [ 503.968880][ T8732] ? cache_grow_begin+0x122/0xd20 [ 503.973928][ T8732] __memcg_kmem_charge_memcg+0x71/0xf0 [ 503.979380][ T8732] ? memcg_kmem_put_cache+0x50/0x50 [ 503.984582][ T8732] ? __kasan_check_read+0x11/0x20 [ 503.989604][ T8732] cache_grow_begin+0x629/0xd20 [ 503.994441][ T8732] ? __sanitizer_cov_trace_cmp2+0x11/0x20 [ 504.000152][ T8732] ? mempolicy_slab_node+0x139/0x390 [ 504.005428][ T8732] fallback_alloc+0x1fd/0x2d0 [ 504.010097][ T8732] ____cache_alloc_node+0x1bc/0x1d0 [ 504.015289][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 504.021527][ T8732] kmem_cache_alloc+0x1ef/0x710 [ 504.026371][ T8732] ? lock_downgrade+0x920/0x920 [ 504.031465][ T8732] ? rwlock_bug.part.0+0x90/0x90 [ 504.036435][ T8732] ? ratelimit_state_init+0xb0/0xb0 [ 504.041625][ T8732] ext4_alloc_inode+0x1f/0x640 [ 504.046392][ T8732] ? ratelimit_state_init+0xb0/0xb0 [ 504.051577][ T8732] alloc_inode+0x68/0x1e0 [ 504.055890][ T8732] iget_locked+0x1a6/0x4b0 [ 504.060302][ T8732] __ext4_iget+0x265/0x3bb0 [ 504.064800][ T8732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 504.071118][ T8732] ? ext4_get_projid+0x190/0x190 [ 504.076301][ T8732] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 504.082794][ T8732] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 504.088764][ T8732] ? d_alloc_parallel+0xa78/0x1c30 [ 504.093856][ T8732] ext4_lookup+0x3b1/0x7a0 [ 504.098261][ T8732] ? ext4_cross_rename+0x1430/0x1430 [ 504.103538][ T8732] ? __lock_acquire+0x16f2/0x4a00 [ 504.108577][ T8732] ? __kasan_check_read+0x11/0x20 [ 504.113653][ T8732] ? lockdep_init_map+0x1be/0x6d0 [ 504.118839][ T8732] __lookup_slow+0x279/0x500 [ 504.123423][ T8732] ? vfs_unlink+0x620/0x620 [ 504.127932][ T8732] lookup_slow+0x58/0x80 [ 504.135378][ T8732] path_mountpoint+0x5d2/0x1e60 [ 504.140223][ T8732] ? __kasan_check_read+0x11/0x20 [ 504.145236][ T8732] ? __lock_acquire+0x16f2/0x4a00 [ 504.150237][ T8732] ? putname+0xef/0x130 [ 504.154370][ T8732] ? path_openat+0x46d0/0x46d0 [ 504.159110][ T8732] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 504.164737][ T8732] ? find_held_lock+0x35/0x130 [ 504.169484][ T8732] filename_mountpoint+0x190/0x3c0 [ 504.175267][ T8732] ? filename_parentat.isra.0+0x410/0x410 [ 504.180976][ T8732] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 504.187121][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 504.193340][ T8732] ? __phys_addr_symbol+0x30/0x70 [ 504.198338][ T8732] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 504.204059][ T8732] ? __check_object_size+0x3d/0x437 [ 504.209249][ T8732] ? strncpy_from_user+0x2b4/0x400 [ 504.214349][ T8732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 504.220575][ T8732] ? getname_flags+0x277/0x5b0 [ 504.225327][ T8732] user_path_mountpoint_at+0x3a/0x50 [ 504.230588][ T8732] ksys_umount+0x167/0xf00 [ 504.234979][ T8732] ? __ia32_sys_rmdir+0x40/0x40 [ 504.239991][ T8732] ? __detach_mounts+0x2a0/0x2a0 [ 504.244962][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 504.251203][ T8732] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 504.256636][ T8732] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 504.262080][ T8732] ? do_syscall_64+0x26/0x760 [ 504.266752][ T8732] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 504.272817][ T8732] ? do_syscall_64+0x26/0x760 [ 504.277471][ T8732] ? lockdep_hardirqs_on+0x418/0x5d0 [ 504.282828][ T8732] __x64_sys_umount+0x54/0x80 [ 504.287493][ T8732] do_syscall_64+0xfa/0x760 [ 504.291983][ T8732] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 504.297847][ T8732] RIP: 0033:0x45c317 [ 504.301725][ T8732] Code: 64 89 04 25 d0 02 00 00 58 5f ff d0 48 89 c7 e8 2f be ff ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 504.321329][ T8732] RSP: 002b:00007ffd499cd938 EFLAGS: 00000206 ORIG_RAX: 00000000000000a6 [ 504.329739][ T8732] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045c317 [ 504.337756][ T8732] RDX: 0000000000403520 RSI: 0000000000000002 RDI: 00007ffd499cd9e0 [ 504.345706][ T8732] RBP: 00000000000006f3 R08: 0000000000000000 R09: 000000000000000c [ 504.353656][ T8732] R10: 0000000000000006 R11: 0000000000000206 R12: 00007ffd499cea70 [ 504.361622][ T8732] R13: 00005555560f8940 R14: 0000000000000000 R15: 00007ffd499cea70 [ 504.373057][ T8732] memory: usage 55056kB, limit 0kB, failcnt 26 [ 504.379232][ T8732] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 504.386117][ T8732] Memory cgroup stats for /syz5: [ 504.386228][ T8732] anon 46735360 [ 504.386228][ T8732] file 0 [ 504.386228][ T8732] kernel_stack 786432 [ 504.386228][ T8732] slab 5308416 [ 504.386228][ T8732] sock 0 [ 504.386228][ T8732] shmem 110592 [ 504.386228][ T8732] file_mapped 135168 [ 504.386228][ T8732] file_dirty 0 [ 504.386228][ T8732] file_writeback 0 [ 504.386228][ T8732] anon_thp 44040192 [ 504.386228][ T8732] inactive_anon 0 [ 504.386228][ T8732] active_anon 46796800 [ 504.386228][ T8732] inactive_file 0 [ 504.386228][ T8732] active_file 135168 [ 504.386228][ T8732] unevictable 0 [ 504.386228][ T8732] slab_reclaimable 1622016 [ 504.386228][ T8732] slab_unreclaimable 3686400 [ 504.386228][ T8732] pgfault 57255 [ 504.386228][ T8732] pgmajfault 0 [ 504.386228][ T8732] workingset_refault 0 [ 504.386228][ T8732] workingset_activate 0 [ 504.386228][ T8732] workingset_nodereclaim 0 [ 504.386228][ T8732] pgrefill 38 [ 504.386228][ T8732] pgscan 66 [ 504.386228][ T8732] pgsteal 0 [ 504.386228][ T8732] pgactivate 33 [ 504.482162][ T8732] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=9229,uid=0 [ 504.497608][ T8732] Memory cgroup out of memory: Killed process 9229 (syz-executor.5) total-vm:72576kB, anon-rss:2200kB, file-rss:35892kB, shmem-rss:0kB, UID:0 pgtables:143360kB oom_score_adj:1000 [ 504.517471][ T1065] oom_reaper: reaped process 9229 (syz-executor.5), now anon-rss:0kB, file-rss:34932kB, shmem-rss:0kB [ 504.522424][T13406] syz-executor.1 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 504.547300][T13406] CPU: 0 PID: 13406 Comm: syz-executor.1 Not tainted 5.3.0-rc6-next-20190830 #75 [ 504.556492][T13406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 504.566528][T13406] Call Trace: [ 504.569800][T13406] dump_stack+0x172/0x1f0 [ 504.574115][T13406] dump_header+0x177/0x1152 [ 504.578595][T13406] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 504.584376][T13406] ? ___ratelimit+0x2c8/0x595 [ 504.589030][T13406] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 504.594817][T13406] ? lockdep_hardirqs_on+0x418/0x5d0 [ 504.600077][T13406] ? trace_hardirqs_on+0x67/0x240 [ 504.605075][T13406] ? pagefault_out_of_memory+0x11c/0x11c [ 504.610680][T13406] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 504.616459][T13406] ? ___ratelimit+0x60/0x595 [ 504.621024][T13406] ? do_raw_spin_unlock+0x57/0x270 [ 504.626110][T13406] oom_kill_process.cold+0x10/0x15 [ 504.631207][T13406] out_of_memory+0x334/0x1340 [ 504.635860][T13406] ? lock_downgrade+0x920/0x920 [ 504.640688][T13406] ? oom_killer_disable+0x280/0x280 [ 504.645868][T13406] mem_cgroup_out_of_memory+0x1d8/0x240 [ 504.651387][T13406] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 504.656998][T13406] ? do_raw_spin_unlock+0x57/0x270 [ 504.662098][T13406] ? _raw_spin_unlock+0x2d/0x50 [ 504.667028][T13406] try_charge+0xf4b/0x1440 [ 504.671425][T13406] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 504.676967][T13406] ? find_held_lock+0x35/0x130 [ 504.681706][T13406] ? get_mem_cgroup_from_mm+0x139/0x320 [ 504.687238][T13406] ? lock_downgrade+0x920/0x920 [ 504.692075][T13406] ? percpu_ref_tryget_live+0x111/0x290 [ 504.697609][T13406] __memcg_kmem_charge_memcg+0x71/0xf0 [ 504.703042][T13406] ? memcg_kmem_put_cache+0x50/0x50 [ 504.708215][T13406] ? get_mem_cgroup_from_mm+0x156/0x320 [ 504.713737][T13406] __memcg_kmem_charge+0x13a/0x3a0 [ 504.718824][T13406] __alloc_pages_nodemask+0x4f7/0x900 [ 504.724171][T13406] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 504.729693][T13406] ? __alloc_pages_slowpath+0x2540/0x2540 [ 504.735386][T13406] ? percpu_ref_put_many+0xb6/0x190 [ 504.740569][T13406] ? lockdep_hardirqs_on+0x418/0x5d0 [ 504.745865][T13406] ? trace_hardirqs_on+0x67/0x240 [ 504.750866][T13406] ? __kasan_check_read+0x11/0x20 [ 504.755958][T13406] copy_process+0x3f8/0x6830 [ 504.760522][T13406] ? __kasan_check_read+0x11/0x20 [ 504.765521][T13406] ? __kasan_check_read+0x11/0x20 [ 504.770535][T13406] ? __lock_acquire+0x16f2/0x4a00 [ 504.775537][T13406] ? __cleanup_sighand+0x60/0x60 [ 504.780448][T13406] ? __might_fault+0x12b/0x1e0 [ 504.785445][T13406] ? __might_fault+0x12b/0x1e0 [ 504.790192][T13406] _do_fork+0x146/0xfa0 [ 504.794326][T13406] ? copy_init_mm+0x20/0x20 [ 504.798816][T13406] ? __kasan_check_read+0x11/0x20 [ 504.803813][T13406] ? _copy_to_user+0x118/0x160 [ 504.808567][T13406] __x64_sys_clone+0x1ab/0x270 [ 504.813307][T13406] ? __ia32_sys_vfork+0xd0/0xd0 [ 504.818151][T13406] ? do_syscall_64+0x26/0x760 [ 504.822808][T13406] ? lockdep_hardirqs_on+0x418/0x5d0 [ 504.828067][T13406] ? trace_hardirqs_on+0x67/0x240 [ 504.833067][T13406] do_syscall_64+0xfa/0x760 [ 504.837550][T13406] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 504.843415][T13406] RIP: 0033:0x457eba [ 504.847285][T13406] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 504.866862][T13406] RSP: 002b:00007ffe999aeaf0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 504.875254][T13406] RAX: ffffffffffffffda RBX: 00007ffe999aeaf0 RCX: 0000000000457eba [ 504.883200][T13406] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 504.891151][T13406] RBP: 00007ffe999aeb30 R08: 0000000000000001 R09: 0000555556d37940 [ 504.899098][T13406] R10: 0000555556d37c10 R11: 0000000000000246 R12: 0000000000000001 [ 504.907043][T13406] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe999aeb80 [ 504.917099][T13406] memory: usage 16076kB, limit 0kB, failcnt 67 [ 504.923316][T13406] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 504.930501][T13406] Memory cgroup stats for /syz1: [ 504.930604][T13406] anon 11223040 [ 504.930604][T13406] file 204800 [ 504.930604][T13406] kernel_stack 196608 [ 504.930604][T13406] slab 4517888 [ 504.930604][T13406] sock 53248 [ 504.930604][T13406] shmem 57344 [ 504.930604][T13406] file_mapped 135168 [ 504.930604][T13406] file_dirty 135168 [ 504.930604][T13406] file_writeback 0 [ 504.930604][T13406] anon_thp 10485760 [ 504.930604][T13406] inactive_anon 0 [ 504.930604][T13406] active_anon 11259904 [ 504.930604][T13406] inactive_file 135168 [ 504.930604][T13406] active_file 94208 [ 504.930604][T13406] unevictable 0 [ 504.930604][T13406] slab_reclaimable 1757184 [ 504.930604][T13406] slab_unreclaimable 2760704 [ 504.930604][T13406] pgfault 49170 [ 504.930604][T13406] pgmajfault 0 [ 504.930604][T13406] workingset_refault 0 [ 504.930604][T13406] workingset_activate 0 [ 504.930604][T13406] workingset_nodereclaim 0 [ 504.930604][T13406] pgrefill 76 [ 504.930604][T13406] pgscan 76 [ 504.930604][T13406] pgsteal 39 [ 505.024764][T13406] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=17367,uid=0 [ 505.041694][T13406] Memory cgroup out of memory: Killed process 17367 (syz-executor.1) total-vm:72576kB, anon-rss:2204kB, file-rss:35804kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 505.063387][ T1065] oom_reaper: reaped process 17367 (syz-executor.1), now anon-rss:0kB, file-rss:34844kB, shmem-rss:0kB [ 505.070951][T13406] syz-executor.1 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 505.092316][T13406] CPU: 0 PID: 13406 Comm: syz-executor.1 Not tainted 5.3.0-rc6-next-20190830 #75 [ 505.101427][T13406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 505.111462][T13406] Call Trace: [ 505.114733][T13406] dump_stack+0x172/0x1f0 [ 505.119039][T13406] dump_header+0x177/0x1152 [ 505.123520][T13406] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 505.129302][T13406] ? ___ratelimit+0x2c8/0x595 [ 505.133974][T13406] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 505.139756][T13406] ? lockdep_hardirqs_on+0x418/0x5d0 [ 505.145029][T13406] ? trace_hardirqs_on+0x67/0x240 [ 505.150032][T13406] ? pagefault_out_of_memory+0x11c/0x11c [ 505.155642][T13406] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 505.161420][T13406] ? ___ratelimit+0x60/0x595 [ 505.166024][T13406] ? do_raw_spin_unlock+0x57/0x270 [ 505.171118][T13406] oom_kill_process.cold+0x10/0x15 [ 505.176225][T13406] out_of_memory+0x334/0x1340 [ 505.180879][T13406] ? lock_downgrade+0x920/0x920 [ 505.185704][T13406] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 505.191587][T13406] ? oom_killer_disable+0x280/0x280 [ 505.196778][T13406] mem_cgroup_out_of_memory+0x1d8/0x240 [ 505.202317][T13406] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 505.207926][T13406] ? do_raw_spin_unlock+0x57/0x270 [ 505.213042][T13406] ? _raw_spin_unlock+0x2d/0x50 [ 505.217875][T13406] try_charge+0xf4b/0x1440 [ 505.222275][T13406] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 505.227804][T13406] ? find_held_lock+0x35/0x130 [ 505.232543][T13406] ? get_mem_cgroup_from_mm+0x139/0x320 [ 505.238065][T13406] ? lock_downgrade+0x920/0x920 [ 505.242890][T13406] ? percpu_ref_tryget_live+0x111/0x290 [ 505.248414][T13406] __memcg_kmem_charge_memcg+0x71/0xf0 [ 505.253848][T13406] ? memcg_kmem_put_cache+0x50/0x50 [ 505.259020][T13406] ? get_mem_cgroup_from_mm+0x156/0x320 [ 505.264542][T13406] __memcg_kmem_charge+0x13a/0x3a0 [ 505.269639][T13406] __alloc_pages_nodemask+0x4f7/0x900 [ 505.274996][T13406] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 505.280516][T13406] ? __alloc_pages_slowpath+0x2540/0x2540 [ 505.286380][T13406] ? percpu_ref_put_many+0xb6/0x190 [ 505.291658][T13406] ? lockdep_hardirqs_on+0x418/0x5d0 [ 505.296927][T13406] ? trace_hardirqs_on+0x67/0x240 [ 505.301925][T13406] ? __kasan_check_read+0x11/0x20 [ 505.306926][T13406] copy_process+0x3f8/0x6830 [ 505.311489][T13406] ? __kasan_check_read+0x11/0x20 [ 505.316486][T13406] ? __kasan_check_read+0x11/0x20 [ 505.321485][T13406] ? __lock_acquire+0x16f2/0x4a00 [ 505.326501][T13406] ? __cleanup_sighand+0x60/0x60 [ 505.331411][T13406] ? __might_fault+0x12b/0x1e0 [ 505.336160][T13406] ? __might_fault+0x12b/0x1e0 [ 505.340904][T13406] _do_fork+0x146/0xfa0 [ 505.345035][T13406] ? copy_init_mm+0x20/0x20 [ 505.349519][T13406] ? __kasan_check_read+0x11/0x20 [ 505.354515][T13406] ? _copy_to_user+0x118/0x160 [ 505.359284][T13406] __x64_sys_clone+0x1ab/0x270 [ 505.364037][T13406] ? __ia32_sys_vfork+0xd0/0xd0 [ 505.368867][T13406] ? do_syscall_64+0x26/0x760 [ 505.373527][T13406] ? lockdep_hardirqs_on+0x418/0x5d0 [ 505.378787][T13406] ? trace_hardirqs_on+0x67/0x240 [ 505.383789][T13406] do_syscall_64+0xfa/0x760 [ 505.388281][T13406] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 505.394144][T13406] RIP: 0033:0x457eba [ 505.398014][T13406] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 505.417599][T13406] RSP: 002b:00007ffe999aeaf0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 505.425984][T13406] RAX: ffffffffffffffda RBX: 00007ffe999aeaf0 RCX: 0000000000457eba [ 505.433954][T13406] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 505.442044][T13406] RBP: 00007ffe999aeb30 R08: 0000000000000001 R09: 0000555556d37940 [ 505.449991][T13406] R10: 0000555556d37c10 R11: 0000000000000246 R12: 0000000000000001 [ 505.457949][T13406] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe999aeb80 [ 505.468210][T13406] memory: usage 13760kB, limit 0kB, failcnt 73 [ 505.475590][T13406] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 505.482945][T13406] Memory cgroup stats for /syz1: [ 505.483049][T13406] anon 9015296 [ 505.483049][T13406] file 204800 [ 505.483049][T13406] kernel_stack 196608 [ 505.483049][T13406] slab 4517888 [ 505.483049][T13406] sock 53248 [ 505.483049][T13406] shmem 57344 [ 505.483049][T13406] file_mapped 135168 [ 505.483049][T13406] file_dirty 135168 [ 505.483049][T13406] file_writeback 0 [ 505.483049][T13406] anon_thp 8388608 [ 505.483049][T13406] inactive_anon 0 [ 505.483049][T13406] active_anon 9052160 [ 505.483049][T13406] inactive_file 135168 [ 505.483049][T13406] active_file 94208 [ 505.483049][T13406] unevictable 0 [ 505.483049][T13406] slab_reclaimable 1757184 [ 505.483049][T13406] slab_unreclaimable 2760704 [ 505.483049][T13406] pgfault 49170 [ 505.483049][T13406] pgmajfault 0 [ 505.483049][T13406] workingset_refault 0 [ 505.483049][T13406] workingset_activate 0 [ 505.483049][T13406] workingset_nodereclaim 0 [ 505.483049][T13406] pgrefill 76 [ 505.483049][T13406] pgscan 76 [ 505.483049][T13406] pgsteal 39 [ 505.576928][T13406] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=17341,uid=0 [ 505.592485][T13406] Memory cgroup out of memory: Killed process 17341 (syz-executor.1) total-vm:72708kB, anon-rss:2212kB, file-rss:35796kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 505.611795][ T1065] oom_reaper: reaped process 17341 (syz-executor.1), now anon-rss:0kB, file-rss:34836kB, shmem-rss:0kB [ 505.619097][ T8732] syz-executor.5 invoked oom-killer: gfp_mask=0x40c50(GFP_NOFS|__GFP_COMP|__GFP_RECLAIMABLE), order=0, oom_score_adj=0 [ 505.636137][ T8732] CPU: 1 PID: 8732 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 505.645166][ T8732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 505.655201][ T8732] Call Trace: [ 505.658510][ T8732] dump_stack+0x172/0x1f0 [ 505.662823][ T8732] dump_header+0x177/0x1152 [ 505.667341][ T8732] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 505.673133][ T8732] ? ___ratelimit+0x2c8/0x595 [ 505.677788][ T8732] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 505.683834][ T8732] ? lockdep_hardirqs_on+0x418/0x5d0 [ 505.689094][ T8732] ? trace_hardirqs_on+0x67/0x240 [ 505.694097][ T8732] ? pagefault_out_of_memory+0x11c/0x11c [ 505.699721][ T8732] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 505.705685][ T8732] ? ___ratelimit+0x60/0x595 [ 505.710516][ T8732] ? do_raw_spin_unlock+0x57/0x270 [ 505.716337][ T8732] oom_kill_process.cold+0x10/0x15 [ 505.721427][ T8732] out_of_memory+0x334/0x1340 [ 505.726079][ T8732] ? lock_downgrade+0x920/0x920 [ 505.730938][ T8732] ? oom_killer_disable+0x280/0x280 [ 505.736131][ T8732] mem_cgroup_out_of_memory+0x1d8/0x240 [ 505.741681][ T8732] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 505.747311][ T8732] ? do_raw_spin_unlock+0x57/0x270 [ 505.752419][ T8732] ? _raw_spin_unlock+0x2d/0x50 [ 505.757257][ T8732] try_charge+0xf4b/0x1440 [ 505.761654][ T8732] ? __lock_acquire+0x800/0x4a00 [ 505.766577][ T8732] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 505.772116][ T8732] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 505.778087][ T8732] ? cache_grow_begin+0x122/0xd20 [ 505.783092][ T8732] ? find_held_lock+0x35/0x130 [ 505.787834][ T8732] ? cache_grow_begin+0x122/0xd20 [ 505.792857][ T8732] __memcg_kmem_charge_memcg+0x71/0xf0 [ 505.798324][ T8732] ? memcg_kmem_put_cache+0x50/0x50 [ 505.803500][ T8732] ? __kasan_check_read+0x11/0x20 [ 505.808510][ T8732] cache_grow_begin+0x629/0xd20 [ 505.813352][ T8732] ? __sanitizer_cov_trace_cmp2+0x11/0x20 [ 505.819050][ T8732] ? mempolicy_slab_node+0x139/0x390 [ 505.825967][ T8732] fallback_alloc+0x1fd/0x2d0 [ 505.830640][ T8732] ____cache_alloc_node+0x1bc/0x1d0 [ 505.835931][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 505.842756][ T8732] kmem_cache_alloc+0x1ef/0x710 [ 505.847580][ T8732] ? lock_downgrade+0x920/0x920 [ 505.852425][ T8732] ? rwlock_bug.part.0+0x90/0x90 [ 505.857351][ T8732] ? ratelimit_state_init+0xb0/0xb0 [ 505.862532][ T8732] ext4_alloc_inode+0x1f/0x640 [ 505.867357][ T8732] ? ratelimit_state_init+0xb0/0xb0 [ 505.872540][ T8732] alloc_inode+0x68/0x1e0 [ 505.876856][ T8732] iget_locked+0x1a6/0x4b0 [ 505.881260][ T8732] __ext4_iget+0x265/0x3bb0 [ 505.885756][ T8732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 505.891992][ T8732] ? ext4_get_projid+0x190/0x190 [ 505.896917][ T8732] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 505.902437][ T8732] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 505.908392][ T8732] ? d_alloc_parallel+0xa78/0x1c30 [ 505.913483][ T8732] ext4_lookup+0x3b1/0x7a0 [ 505.917886][ T8732] ? ext4_cross_rename+0x1430/0x1430 [ 505.923151][ T8732] ? __lock_acquire+0x16f2/0x4a00 [ 505.928239][ T8732] ? __kasan_check_read+0x11/0x20 [ 505.933764][ T8732] ? lockdep_init_map+0x1be/0x6d0 [ 505.938785][ T8732] __lookup_slow+0x279/0x500 [ 505.943363][ T8732] ? vfs_unlink+0x620/0x620 [ 505.947857][ T8732] lookup_slow+0x58/0x80 [ 505.952094][ T8732] path_mountpoint+0x5d2/0x1e60 [ 505.956954][ T8732] ? __kasan_check_read+0x11/0x20 [ 505.961956][ T8732] ? __lock_acquire+0x16f2/0x4a00 [ 505.966953][ T8732] ? putname+0xef/0x130 [ 505.971106][ T8732] ? path_openat+0x46d0/0x46d0 [ 505.975857][ T8732] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 505.981464][ T8732] ? find_held_lock+0x35/0x130 [ 505.986205][ T8732] filename_mountpoint+0x190/0x3c0 [ 505.991314][ T8732] ? filename_parentat.isra.0+0x410/0x410 [ 505.997019][ T8732] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 506.003158][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 506.009402][ T8732] ? __phys_addr_symbol+0x30/0x70 [ 506.014411][ T8732] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 506.020117][ T8732] ? __check_object_size+0x3d/0x437 [ 506.025317][ T8732] ? strncpy_from_user+0x2b4/0x400 [ 506.030420][ T8732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 506.036645][ T8732] ? getname_flags+0x277/0x5b0 [ 506.041387][ T8732] user_path_mountpoint_at+0x3a/0x50 [ 506.046647][ T8732] ksys_umount+0x167/0xf00 [ 506.051051][ T8732] ? __ia32_sys_rmdir+0x40/0x40 [ 506.055890][ T8732] ? __detach_mounts+0x2a0/0x2a0 [ 506.060811][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 506.067045][ T8732] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 506.072488][ T8732] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 506.077932][ T8732] ? do_syscall_64+0x26/0x760 [ 506.082582][ T8732] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 506.088622][ T8732] ? do_syscall_64+0x26/0x760 [ 506.093276][ T8732] ? lockdep_hardirqs_on+0x418/0x5d0 [ 506.098537][ T8732] __x64_sys_umount+0x54/0x80 [ 506.104059][ T8732] do_syscall_64+0xfa/0x760 [ 506.108553][ T8732] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 506.114420][ T8732] RIP: 0033:0x45c317 [ 506.118289][ T8732] Code: 64 89 04 25 d0 02 00 00 58 5f ff d0 48 89 c7 e8 2f be ff ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 506.137869][ T8732] RSP: 002b:00007ffd499cd938 EFLAGS: 00000206 ORIG_RAX: 00000000000000a6 [ 506.146263][ T8732] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045c317 [ 506.154218][ T8732] RDX: 0000000000403520 RSI: 0000000000000002 RDI: 00007ffd499cd9e0 [ 506.162164][ T8732] RBP: 00000000000006f3 R08: 0000000000000000 R09: 000000000000000c [ 506.170117][ T8732] R10: 0000000000000006 R11: 0000000000000206 R12: 00007ffd499cea70 [ 506.178079][ T8732] R13: 00005555560f8940 R14: 0000000000000000 R15: 00007ffd499cea70 [ 506.186224][ T8732] memory: usage 54828kB, limit 0kB, failcnt 32 [ 506.192429][ T8732] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 506.199263][ T8732] Memory cgroup stats for /syz5: [ 506.199423][ T8732] anon 46735360 [ 506.199423][ T8732] file 0 [ 506.199423][ T8732] kernel_stack 786432 [ 506.199423][ T8732] slab 5308416 [ 506.199423][ T8732] sock 0 [ 506.199423][ T8732] shmem 110592 [ 506.199423][ T8732] file_mapped 135168 [ 506.199423][ T8732] file_dirty 0 [ 506.199423][ T8732] file_writeback 0 [ 506.199423][ T8732] anon_thp 44040192 [ 506.199423][ T8732] inactive_anon 0 [ 506.199423][ T8732] active_anon 46796800 [ 506.199423][ T8732] inactive_file 0 [ 506.199423][ T8732] active_file 135168 [ 506.199423][ T8732] unevictable 0 [ 506.199423][ T8732] slab_reclaimable 1622016 [ 506.199423][ T8732] slab_unreclaimable 3686400 [ 506.199423][ T8732] pgfault 57255 [ 506.199423][ T8732] pgmajfault 0 [ 506.199423][ T8732] workingset_refault 0 [ 506.199423][ T8732] workingset_activate 0 [ 506.199423][ T8732] workingset_nodereclaim 0 [ 506.199423][ T8732] pgrefill 38 [ 506.199423][ T8732] pgscan 66 [ 506.199423][ T8732] pgsteal 0 [ 506.199423][ T8732] pgactivate 33 [ 506.295968][ T8732] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=9184,uid=0 [ 506.311436][ T8732] Memory cgroup out of memory: Killed process 9184 (syz-executor.5) total-vm:72576kB, anon-rss:2200kB, file-rss:35892kB, shmem-rss:0kB, UID:0 pgtables:143360kB oom_score_adj:1000 [ 506.331163][ T1065] oom_reaper: reaped process 9184 (syz-executor.5), now anon-rss:0kB, file-rss:34932kB, shmem-rss:0kB [ 506.342348][T13406] syz-executor.1 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 506.359427][T13406] CPU: 0 PID: 13406 Comm: syz-executor.1 Not tainted 5.3.0-rc6-next-20190830 #75 [ 506.368545][T13406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 506.378611][T13406] Call Trace: [ 506.381886][T13406] dump_stack+0x172/0x1f0 [ 506.386195][T13406] dump_header+0x177/0x1152 [ 506.390676][T13406] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 506.396458][T13406] ? ___ratelimit+0x2c8/0x595 [ 506.401110][T13406] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 506.406893][T13406] ? lockdep_hardirqs_on+0x418/0x5d0 [ 506.412155][T13406] ? trace_hardirqs_on+0x67/0x240 [ 506.417155][T13406] ? pagefault_out_of_memory+0x11c/0x11c [ 506.422762][T13406] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 506.428554][T13406] ? ___ratelimit+0x60/0x595 [ 506.433118][T13406] ? do_raw_spin_unlock+0x57/0x270 [ 506.438206][T13406] oom_kill_process.cold+0x10/0x15 [ 506.443306][T13406] out_of_memory+0x334/0x1340 [ 506.447958][T13406] ? lock_downgrade+0x920/0x920 [ 506.452786][T13406] ? oom_killer_disable+0x280/0x280 [ 506.457965][T13406] mem_cgroup_out_of_memory+0x1d8/0x240 [ 506.463486][T13406] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 506.469123][T13406] ? do_raw_spin_unlock+0x57/0x270 [ 506.474268][T13406] ? _raw_spin_unlock+0x2d/0x50 [ 506.479115][T13406] try_charge+0xf4b/0x1440 [ 506.483521][T13406] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 506.489043][T13406] ? find_held_lock+0x35/0x130 [ 506.493783][T13406] ? get_mem_cgroup_from_mm+0x139/0x320 [ 506.499318][T13406] ? lock_downgrade+0x920/0x920 [ 506.504202][T13406] ? percpu_ref_tryget_live+0x111/0x290 [ 506.509725][T13406] __memcg_kmem_charge_memcg+0x71/0xf0 [ 506.515281][T13406] ? memcg_kmem_put_cache+0x50/0x50 [ 506.520472][T13406] ? get_mem_cgroup_from_mm+0x156/0x320 [ 506.526005][T13406] __memcg_kmem_charge+0x13a/0x3a0 [ 506.531103][T13406] __alloc_pages_nodemask+0x4f7/0x900 [ 506.536459][T13406] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 506.542037][T13406] ? __alloc_pages_slowpath+0x2540/0x2540 [ 506.547754][T13406] ? percpu_ref_put_many+0xb6/0x190 [ 506.552946][T13406] ? lockdep_hardirqs_on+0x418/0x5d0 [ 506.558204][T13406] ? trace_hardirqs_on+0x67/0x240 [ 506.563225][T13406] ? __kasan_check_read+0x11/0x20 [ 506.568229][T13406] copy_process+0x3f8/0x6830 [ 506.572791][T13406] ? __kasan_check_read+0x11/0x20 [ 506.577801][T13406] ? __kasan_check_read+0x11/0x20 [ 506.582801][T13406] ? __lock_acquire+0x16f2/0x4a00 [ 506.587805][T13406] ? __cleanup_sighand+0x60/0x60 [ 506.592716][T13406] ? __might_fault+0x12b/0x1e0 [ 506.597454][T13406] ? __might_fault+0x12b/0x1e0 [ 506.602196][T13406] _do_fork+0x146/0xfa0 [ 506.606333][T13406] ? copy_init_mm+0x20/0x20 [ 506.610816][T13406] ? __kasan_check_read+0x11/0x20 [ 506.615815][T13406] ? _copy_to_user+0x118/0x160 [ 506.620559][T13406] __x64_sys_clone+0x1ab/0x270 [ 506.625312][T13406] ? __ia32_sys_vfork+0xd0/0xd0 [ 506.630142][T13406] ? do_syscall_64+0x26/0x760 [ 506.634807][T13406] ? lockdep_hardirqs_on+0x418/0x5d0 [ 506.640070][T13406] ? trace_hardirqs_on+0x67/0x240 [ 506.645073][T13406] do_syscall_64+0xfa/0x760 [ 506.649556][T13406] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 506.655420][T13406] RIP: 0033:0x457eba [ 506.659304][T13406] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 506.678899][T13406] RSP: 002b:00007ffe999aeaf0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 506.687287][T13406] RAX: ffffffffffffffda RBX: 00007ffe999aeaf0 RCX: 0000000000457eba [ 506.695244][T13406] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 506.703190][T13406] RBP: 00007ffe999aeb30 R08: 0000000000000001 R09: 0000555556d37940 [ 506.711137][T13406] R10: 0000555556d37c10 R11: 0000000000000246 R12: 0000000000000001 [ 506.719094][T13406] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe999aeb80 [ 506.728312][T13406] memory: usage 11404kB, limit 0kB, failcnt 79 [ 506.734557][T13406] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 506.741465][T13406] Memory cgroup stats for /syz1: [ 506.741569][T13406] anon 6799360 [ 506.741569][T13406] file 204800 [ 506.741569][T13406] kernel_stack 131072 [ 506.741569][T13406] slab 4517888 [ 506.741569][T13406] sock 53248 [ 506.741569][T13406] shmem 57344 [ 506.741569][T13406] file_mapped 135168 [ 506.741569][T13406] file_dirty 135168 [ 506.741569][T13406] file_writeback 0 [ 506.741569][T13406] anon_thp 6291456 [ 506.741569][T13406] inactive_anon 0 [ 506.741569][T13406] active_anon 6836224 [ 506.741569][T13406] inactive_file 135168 [ 506.741569][T13406] active_file 94208 [ 506.741569][T13406] unevictable 0 [ 506.741569][T13406] slab_reclaimable 1757184 [ 506.741569][T13406] slab_unreclaimable 2760704 [ 506.741569][T13406] pgfault 49170 [ 506.741569][T13406] pgmajfault 0 [ 506.741569][T13406] workingset_refault 0 [ 506.741569][T13406] workingset_activate 0 [ 506.741569][T13406] workingset_nodereclaim 0 [ 506.741569][T13406] pgrefill 76 [ 506.741569][T13406] pgscan 76 [ 506.741569][T13406] pgsteal 39 [ 506.835527][T13406] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=15053,uid=0 [ 506.856190][T13406] Memory cgroup out of memory: Killed process 15053 (syz-executor.1) total-vm:72708kB, anon-rss:2212kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:131072kB oom_score_adj:1000 [ 506.880640][ T8732] syz-executor.5 invoked oom-killer: gfp_mask=0x40c50(GFP_NOFS|__GFP_COMP|__GFP_RECLAIMABLE), order=0, oom_score_adj=0 [ 506.896639][ T8732] CPU: 1 PID: 8732 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 506.905657][ T8732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 506.915808][ T8732] Call Trace: [ 506.919077][ T8732] dump_stack+0x172/0x1f0 [ 506.923932][ T8732] dump_header+0x177/0x1152 [ 506.928414][ T8732] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 506.934197][ T8732] ? ___ratelimit+0x2c8/0x595 [ 506.938850][ T8732] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 506.944633][ T8732] ? lockdep_hardirqs_on+0x418/0x5d0 [ 506.949909][ T8732] ? trace_hardirqs_on+0x67/0x240 [ 506.954921][ T8732] ? pagefault_out_of_memory+0x11c/0x11c [ 506.960531][ T8732] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 506.966660][ T8732] ? ___ratelimit+0x60/0x595 [ 506.971236][ T8732] ? do_raw_spin_unlock+0x57/0x270 [ 506.976350][ T8732] oom_kill_process.cold+0x10/0x15 [ 506.981454][ T8732] out_of_memory+0x334/0x1340 [ 506.986110][ T8732] ? lock_downgrade+0x920/0x920 [ 506.990954][ T8732] ? oom_killer_disable+0x280/0x280 [ 506.996144][ T8732] mem_cgroup_out_of_memory+0x1d8/0x240 [ 507.001669][ T8732] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 507.007278][ T8732] ? do_raw_spin_unlock+0x57/0x270 [ 507.012394][ T8732] ? _raw_spin_unlock+0x2d/0x50 [ 507.017233][ T8732] try_charge+0xf4b/0x1440 [ 507.021642][ T8732] ? __lock_acquire+0x800/0x4a00 [ 507.026577][ T8732] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 507.032126][ T8732] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 507.038097][ T8732] ? cache_grow_begin+0x122/0xd20 [ 507.043101][ T8732] ? find_held_lock+0x35/0x130 [ 507.047844][ T8732] ? cache_grow_begin+0x122/0xd20 [ 507.052865][ T8732] __memcg_kmem_charge_memcg+0x71/0xf0 [ 507.058308][ T8732] ? memcg_kmem_put_cache+0x50/0x50 [ 507.063492][ T8732] ? __kasan_check_read+0x11/0x20 [ 507.068496][ T8732] cache_grow_begin+0x629/0xd20 [ 507.073336][ T8732] ? __sanitizer_cov_trace_cmp2+0x11/0x20 [ 507.079044][ T8732] ? mempolicy_slab_node+0x139/0x390 [ 507.084306][ T8732] fallback_alloc+0x1fd/0x2d0 [ 507.088961][ T8732] ____cache_alloc_node+0x1bc/0x1d0 [ 507.094137][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 507.100367][ T8732] kmem_cache_alloc+0x1ef/0x710 [ 507.105194][ T8732] ? lock_downgrade+0x920/0x920 [ 507.110029][ T8732] ? rwlock_bug.part.0+0x90/0x90 [ 507.114959][ T8732] ? ratelimit_state_init+0xb0/0xb0 [ 507.120135][ T8732] ext4_alloc_inode+0x1f/0x640 [ 507.124874][ T8732] ? ratelimit_state_init+0xb0/0xb0 [ 507.130058][ T8732] alloc_inode+0x68/0x1e0 [ 507.134386][ T8732] iget_locked+0x1a6/0x4b0 [ 507.138877][ T8732] __ext4_iget+0x265/0x3bb0 [ 507.143364][ T8732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 507.149601][ T8732] ? ext4_get_projid+0x190/0x190 [ 507.154524][ T8732] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 507.160049][ T8732] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 507.166003][ T8732] ? d_alloc_parallel+0xa78/0x1c30 [ 507.171108][ T8732] ext4_lookup+0x3b1/0x7a0 [ 507.175514][ T8732] ? ext4_cross_rename+0x1430/0x1430 [ 507.180775][ T8732] ? __lock_acquire+0x16f2/0x4a00 [ 507.185775][ T8732] ? __kasan_check_read+0x11/0x20 [ 507.190883][ T8732] ? lockdep_init_map+0x1be/0x6d0 [ 507.195895][ T8732] __lookup_slow+0x279/0x500 [ 507.200462][ T8732] ? vfs_unlink+0x620/0x620 [ 507.204957][ T8732] lookup_slow+0x58/0x80 [ 507.209175][ T8732] path_mountpoint+0x5d2/0x1e60 [ 507.214010][ T8732] ? __kasan_check_read+0x11/0x20 [ 507.219009][ T8732] ? __lock_acquire+0x16f2/0x4a00 [ 507.224006][ T8732] ? putname+0xef/0x130 [ 507.228143][ T8732] ? path_openat+0x46d0/0x46d0 [ 507.232896][ T8732] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 507.238515][ T8732] ? find_held_lock+0x35/0x130 [ 507.243261][ T8732] filename_mountpoint+0x190/0x3c0 [ 507.248350][ T8732] ? filename_parentat.isra.0+0x410/0x410 [ 507.254063][ T8732] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 507.260199][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 507.266414][ T8732] ? __phys_addr_symbol+0x30/0x70 [ 507.271425][ T8732] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 507.277163][ T8732] ? __check_object_size+0x3d/0x437 [ 507.282343][ T8732] ? strncpy_from_user+0x2b4/0x400 [ 507.287518][ T8732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 507.293746][ T8732] ? getname_flags+0x277/0x5b0 [ 507.298500][ T8732] user_path_mountpoint_at+0x3a/0x50 [ 507.303762][ T8732] ksys_umount+0x167/0xf00 [ 507.308157][ T8732] ? __ia32_sys_rmdir+0x40/0x40 [ 507.313026][ T8732] ? __detach_mounts+0x2a0/0x2a0 [ 507.317952][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 507.324166][ T8732] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 507.329612][ T8732] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 507.335096][ T8732] ? do_syscall_64+0x26/0x760 [ 507.339758][ T8732] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 507.345849][ T8732] ? do_syscall_64+0x26/0x760 [ 507.350523][ T8732] ? lockdep_hardirqs_on+0x418/0x5d0 [ 507.355846][ T8732] __x64_sys_umount+0x54/0x80 [ 507.360514][ T8732] do_syscall_64+0xfa/0x760 [ 507.365001][ T8732] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 507.370884][ T8732] RIP: 0033:0x45c317 [ 507.374780][ T8732] Code: 64 89 04 25 d0 02 00 00 58 5f ff d0 48 89 c7 e8 2f be ff ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 507.394364][ T8732] RSP: 002b:00007ffd499cd938 EFLAGS: 00000206 ORIG_RAX: 00000000000000a6 [ 507.402756][ T8732] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045c317 [ 507.410713][ T8732] RDX: 0000000000403520 RSI: 0000000000000002 RDI: 00007ffd499cd9e0 [ 507.418672][ T8732] RBP: 00000000000006f3 R08: 0000000000000000 R09: 000000000000000c [ 507.426623][ T8732] R10: 0000000000000006 R11: 0000000000000206 R12: 00007ffd499cea70 [ 507.434574][ T8732] R13: 00005555560f8940 R14: 0000000000000000 R15: 00007ffd499cea70 [ 507.442851][ T8732] memory: usage 54624kB, limit 0kB, failcnt 38 [ 507.449000][ T8732] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 507.455882][ T8732] Memory cgroup stats for /syz5: [ 507.455987][ T8732] anon 46735360 [ 507.455987][ T8732] file 0 [ 507.455987][ T8732] kernel_stack 720896 [ 507.455987][ T8732] slab 5308416 [ 507.455987][ T8732] sock 0 [ 507.455987][ T8732] shmem 110592 [ 507.455987][ T8732] file_mapped 135168 [ 507.455987][ T8732] file_dirty 0 [ 507.455987][ T8732] file_writeback 0 [ 507.455987][ T8732] anon_thp 44040192 [ 507.455987][ T8732] inactive_anon 0 [ 507.455987][ T8732] active_anon 46796800 [ 507.455987][ T8732] inactive_file 0 [ 507.455987][ T8732] active_file 135168 [ 507.455987][ T8732] unevictable 0 [ 507.455987][ T8732] slab_reclaimable 1622016 [ 507.455987][ T8732] slab_unreclaimable 3686400 [ 507.455987][ T8732] pgfault 57255 [ 507.455987][ T8732] pgmajfault 0 [ 507.455987][ T8732] workingset_refault 0 [ 507.455987][ T8732] workingset_activate 0 [ 507.455987][ T8732] workingset_nodereclaim 0 [ 507.455987][ T8732] pgrefill 71 [ 507.455987][ T8732] pgscan 66 [ 507.455987][ T8732] pgsteal 0 [ 507.455987][ T8732] pgactivate 33 [ 507.551821][ T8732] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=9161,uid=0 [ 507.567270][ T8732] Memory cgroup out of memory: Killed process 9161 (syz-executor.5) total-vm:72576kB, anon-rss:2200kB, file-rss:35876kB, shmem-rss:0kB, UID:0 pgtables:143360kB oom_score_adj:1000 [ 507.586540][ T1065] oom_reaper: reaped process 9161 (syz-executor.5), now anon-rss:0kB, file-rss:34916kB, shmem-rss:0kB [ 507.594181][ T8732] syz-executor.5 invoked oom-killer: gfp_mask=0x40c50(GFP_NOFS|__GFP_COMP|__GFP_RECLAIMABLE), order=0, oom_score_adj=0 [ 507.616540][ T8732] CPU: 0 PID: 8732 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 507.625562][ T8732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 507.635593][ T8732] Call Trace: [ 507.638876][ T8732] dump_stack+0x172/0x1f0 [ 507.643185][ T8732] dump_header+0x177/0x1152 [ 507.647667][ T8732] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 507.653446][ T8732] ? ___ratelimit+0x2c8/0x595 [ 507.658099][ T8732] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 507.664318][ T8732] ? lockdep_hardirqs_on+0x418/0x5d0 [ 507.669581][ T8732] ? trace_hardirqs_on+0x67/0x240 [ 507.674605][ T8732] ? pagefault_out_of_memory+0x11c/0x11c [ 507.680213][ T8732] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 507.686033][ T8732] ? ___ratelimit+0x60/0x595 [ 507.690655][ T8732] ? do_raw_spin_unlock+0x57/0x270 [ 507.695749][ T8732] oom_kill_process.cold+0x10/0x15 [ 507.700838][ T8732] out_of_memory+0x334/0x1340 [ 507.705494][ T8732] ? lock_downgrade+0x920/0x920 [ 507.710325][ T8732] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 507.716114][ T8732] ? oom_killer_disable+0x280/0x280 [ 507.721295][ T8732] mem_cgroup_out_of_memory+0x1d8/0x240 [ 507.726817][ T8732] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 507.732477][ T8732] ? do_raw_spin_unlock+0x57/0x270 [ 507.737565][ T8732] ? _raw_spin_unlock+0x2d/0x50 [ 507.742431][ T8732] try_charge+0xf4b/0x1440 [ 507.746826][ T8732] ? __lock_acquire+0x800/0x4a00 [ 507.751757][ T8732] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 507.757278][ T8732] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 507.763233][ T8732] ? cache_grow_begin+0x122/0xd20 [ 507.768406][ T8732] ? find_held_lock+0x35/0x130 [ 507.773143][ T8732] ? cache_grow_begin+0x122/0xd20 [ 507.778148][ T8732] __memcg_kmem_charge_memcg+0x71/0xf0 [ 507.783670][ T8732] ? memcg_kmem_put_cache+0x50/0x50 [ 507.788868][ T8732] ? __kasan_check_read+0x11/0x20 [ 507.793869][ T8732] cache_grow_begin+0x629/0xd20 [ 507.798705][ T8732] ? __sanitizer_cov_trace_cmp2+0x11/0x20 [ 507.804409][ T8732] ? mempolicy_slab_node+0x139/0x390 [ 507.809678][ T8732] fallback_alloc+0x1fd/0x2d0 [ 507.814426][ T8732] ____cache_alloc_node+0x1bc/0x1d0 [ 507.819597][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 507.825810][ T8732] kmem_cache_alloc+0x1ef/0x710 [ 507.830636][ T8732] ? lock_downgrade+0x920/0x920 [ 507.835460][ T8732] ? rwlock_bug.part.0+0x90/0x90 [ 507.840386][ T8732] ? ratelimit_state_init+0xb0/0xb0 [ 507.845561][ T8732] ext4_alloc_inode+0x1f/0x640 [ 507.850299][ T8732] ? ratelimit_state_init+0xb0/0xb0 [ 507.855471][ T8732] alloc_inode+0x68/0x1e0 [ 507.859864][ T8732] iget_locked+0x1a6/0x4b0 [ 507.864266][ T8732] __ext4_iget+0x265/0x3bb0 [ 507.868748][ T8732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 507.874968][ T8732] ? ext4_get_projid+0x190/0x190 [ 507.879886][ T8732] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 507.885406][ T8732] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 507.891391][ T8732] ? d_alloc_parallel+0xa78/0x1c30 [ 507.896483][ T8732] ext4_lookup+0x3b1/0x7a0 [ 507.900878][ T8732] ? ext4_cross_rename+0x1430/0x1430 [ 507.906227][ T8732] ? __lock_acquire+0x16f2/0x4a00 [ 507.911660][ T8732] ? __kasan_check_read+0x11/0x20 [ 507.916663][ T8732] ? lockdep_init_map+0x1be/0x6d0 [ 507.921666][ T8732] __lookup_slow+0x279/0x500 [ 507.926234][ T8732] ? vfs_unlink+0x620/0x620 [ 507.930726][ T8732] lookup_slow+0x58/0x80 [ 507.935031][ T8732] path_mountpoint+0x5d2/0x1e60 [ 507.939859][ T8732] ? __kasan_check_read+0x11/0x20 [ 507.944870][ T8732] ? __lock_acquire+0x16f2/0x4a00 [ 507.949864][ T8732] ? putname+0xef/0x130 [ 507.953998][ T8732] ? path_openat+0x46d0/0x46d0 [ 507.958746][ T8732] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 507.964352][ T8732] ? find_held_lock+0x35/0x130 [ 507.969098][ T8732] filename_mountpoint+0x190/0x3c0 [ 507.974185][ T8732] ? filename_parentat.isra.0+0x410/0x410 [ 507.979881][ T8732] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 507.986012][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 507.992227][ T8732] ? __phys_addr_symbol+0x30/0x70 [ 507.997228][ T8732] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 508.002919][ T8732] ? __check_object_size+0x3d/0x437 [ 508.008096][ T8732] ? strncpy_from_user+0x2b4/0x400 [ 508.013195][ T8732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 508.019410][ T8732] ? getname_flags+0x277/0x5b0 [ 508.024163][ T8732] user_path_mountpoint_at+0x3a/0x50 [ 508.029429][ T8732] ksys_umount+0x167/0xf00 [ 508.034799][ T8732] ? __ia32_sys_rmdir+0x40/0x40 [ 508.039626][ T8732] ? __detach_mounts+0x2a0/0x2a0 [ 508.044548][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 508.050766][ T8732] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 508.056209][ T8732] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 508.061644][ T8732] ? do_syscall_64+0x26/0x760 [ 508.066295][ T8732] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 508.072335][ T8732] ? do_syscall_64+0x26/0x760 [ 508.076991][ T8732] ? lockdep_hardirqs_on+0x418/0x5d0 [ 508.082263][ T8732] __x64_sys_umount+0x54/0x80 [ 508.086918][ T8732] do_syscall_64+0xfa/0x760 [ 508.091398][ T8732] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 508.097265][ T8732] RIP: 0033:0x45c317 [ 508.101135][ T8732] Code: 64 89 04 25 d0 02 00 00 58 5f ff d0 48 89 c7 e8 2f be ff ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 508.120711][ T8732] RSP: 002b:00007ffd499cd938 EFLAGS: 00000206 ORIG_RAX: 00000000000000a6 [ 508.129096][ T8732] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045c317 [ 508.137041][ T8732] RDX: 0000000000403520 RSI: 0000000000000002 RDI: 00007ffd499cd9e0 [ 508.144991][ T8732] RBP: 00000000000006f3 R08: 0000000000000000 R09: 000000000000000c [ 508.152938][ T8732] R10: 0000000000000006 R11: 0000000000000206 R12: 00007ffd499cea70 [ 508.160897][ T8732] R13: 00005555560f8940 R14: 0000000000000000 R15: 00007ffd499cea70 [ 508.170624][ T8732] memory: usage 52232kB, limit 0kB, failcnt 44 [ 508.176787][ T8732] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 508.183733][ T8732] Memory cgroup stats for /syz5: [ 508.183832][ T8732] anon 44437504 [ 508.183832][ T8732] file 0 [ 508.183832][ T8732] kernel_stack 720896 [ 508.183832][ T8732] slab 5308416 [ 508.183832][ T8732] sock 0 [ 508.183832][ T8732] shmem 110592 [ 508.183832][ T8732] file_mapped 135168 [ 508.183832][ T8732] file_dirty 0 [ 508.183832][ T8732] file_writeback 0 [ 508.183832][ T8732] anon_thp 41943040 [ 508.183832][ T8732] inactive_anon 0 [ 508.183832][ T8732] active_anon 44498944 [ 508.183832][ T8732] inactive_file 0 [ 508.183832][ T8732] active_file 135168 [ 508.183832][ T8732] unevictable 0 [ 508.183832][ T8732] slab_reclaimable 1622016 [ 508.183832][ T8732] slab_unreclaimable 3686400 [ 508.183832][ T8732] pgfault 57255 [ 508.183832][ T8732] pgmajfault 0 [ 508.183832][ T8732] workingset_refault 0 [ 508.183832][ T8732] workingset_activate 0 [ 508.183832][ T8732] workingset_nodereclaim 0 [ 508.183832][ T8732] pgrefill 71 [ 508.183832][ T8732] pgscan 66 [ 508.183832][ T8732] pgsteal 0 [ 508.183832][ T8732] pgactivate 33 [ 508.280540][ T8732] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=16065,uid=0 [ 508.296125][ T8732] Memory cgroup out of memory: Killed process 16065 (syz-executor.5) total-vm:72708kB, anon-rss:2220kB, file-rss:35844kB, shmem-rss:0kB, UID:0 pgtables:147456kB oom_score_adj:1000 [ 508.325396][T13406] syz-executor.1 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 508.337727][T13406] CPU: 1 PID: 13406 Comm: syz-executor.1 Not tainted 5.3.0-rc6-next-20190830 #75 [ 508.346828][T13406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 508.356901][T13406] Call Trace: [ 508.360180][T13406] dump_stack+0x172/0x1f0 [ 508.364507][T13406] dump_header+0x177/0x1152 [ 508.368993][T13406] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 508.374780][T13406] ? ___ratelimit+0x2c8/0x595 [ 508.379446][T13406] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 508.385320][T13406] ? lockdep_hardirqs_on+0x418/0x5d0 [ 508.390591][T13406] ? trace_hardirqs_on+0x67/0x240 [ 508.395593][T13406] ? pagefault_out_of_memory+0x11c/0x11c [ 508.401208][T13406] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 508.406992][T13406] ? ___ratelimit+0x60/0x595 [ 508.411570][T13406] ? do_raw_spin_unlock+0x57/0x270 [ 508.416657][T13406] oom_kill_process.cold+0x10/0x15 [ 508.421747][T13406] out_of_memory+0x334/0x1340 [ 508.426401][T13406] ? lock_downgrade+0x920/0x920 [ 508.431230][T13406] ? oom_killer_disable+0x280/0x280 [ 508.436410][T13406] mem_cgroup_out_of_memory+0x1d8/0x240 [ 508.442104][T13406] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 508.447711][T13406] ? do_raw_spin_unlock+0x57/0x270 [ 508.452800][T13406] ? _raw_spin_unlock+0x2d/0x50 [ 508.457633][T13406] try_charge+0xf4b/0x1440 [ 508.462035][T13406] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 508.467552][T13406] ? find_held_lock+0x35/0x130 [ 508.472289][T13406] ? get_mem_cgroup_from_mm+0x139/0x320 [ 508.477844][T13406] ? lock_downgrade+0x920/0x920 [ 508.482671][T13406] ? percpu_ref_tryget_live+0x111/0x290 [ 508.488206][T13406] __memcg_kmem_charge_memcg+0x71/0xf0 [ 508.493641][T13406] ? memcg_kmem_put_cache+0x50/0x50 [ 508.498831][T13406] ? get_mem_cgroup_from_mm+0x156/0x320 [ 508.504354][T13406] __memcg_kmem_charge+0x13a/0x3a0 [ 508.509447][T13406] __alloc_pages_nodemask+0x4f7/0x900 [ 508.514804][T13406] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 508.520328][T13406] ? __alloc_pages_slowpath+0x2540/0x2540 [ 508.526085][T13406] ? percpu_ref_put_many+0xb6/0x190 [ 508.531285][T13406] ? lockdep_hardirqs_on+0x418/0x5d0 [ 508.536563][T13406] ? trace_hardirqs_on+0x67/0x240 [ 508.541570][T13406] ? __kasan_check_read+0x11/0x20 [ 508.546578][T13406] copy_process+0x3f8/0x6830 [ 508.551147][T13406] ? __kasan_check_read+0x11/0x20 [ 508.556148][T13406] ? __kasan_check_read+0x11/0x20 [ 508.561157][T13406] ? __lock_acquire+0x16f2/0x4a00 [ 508.566184][T13406] ? __cleanup_sighand+0x60/0x60 [ 508.571200][T13406] ? __might_fault+0x12b/0x1e0 [ 508.575967][T13406] ? __might_fault+0x12b/0x1e0 [ 508.580719][T13406] _do_fork+0x146/0xfa0 [ 508.584857][T13406] ? copy_init_mm+0x20/0x20 [ 508.589355][T13406] ? __kasan_check_read+0x11/0x20 [ 508.594363][T13406] ? _copy_to_user+0x118/0x160 [ 508.599108][T13406] __x64_sys_clone+0x1ab/0x270 [ 508.603864][T13406] ? __ia32_sys_vfork+0xd0/0xd0 [ 508.608708][T13406] ? do_syscall_64+0x26/0x760 [ 508.613363][T13406] ? lockdep_hardirqs_on+0x418/0x5d0 [ 508.618624][T13406] ? trace_hardirqs_on+0x67/0x240 [ 508.623717][T13406] do_syscall_64+0xfa/0x760 [ 508.628216][T13406] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 508.634083][T13406] RIP: 0033:0x457eba [ 508.637956][T13406] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 508.657537][T13406] RSP: 002b:00007ffe999aeaf0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 508.665939][T13406] RAX: ffffffffffffffda RBX: 00007ffe999aeaf0 RCX: 0000000000457eba [ 508.673887][T13406] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 508.681836][T13406] RBP: 00007ffe999aeb30 R08: 0000000000000001 R09: 0000555556d37940 [ 508.689788][T13406] R10: 0000555556d37c10 R11: 0000000000000246 R12: 0000000000000001 [ 508.697734][T13406] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe999aeb80 [ 508.708003][T13406] memory: usage 8532kB, limit 0kB, failcnt 85 [ 508.714153][T13406] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 508.721027][T13406] Memory cgroup stats for /syz1: [ 508.721119][T13406] anon 4612096 [ 508.721119][T13406] file 204800 [ 508.721119][T13406] kernel_stack 65536 [ 508.721119][T13406] slab 3862528 [ 508.721119][T13406] sock 53248 [ 508.721119][T13406] shmem 57344 [ 508.721119][T13406] file_mapped 135168 [ 508.721119][T13406] file_dirty 135168 [ 508.721119][T13406] file_writeback 0 [ 508.721119][T13406] anon_thp 4194304 [ 508.721119][T13406] inactive_anon 0 [ 508.721119][T13406] active_anon 4612096 [ 508.721119][T13406] inactive_file 135168 [ 508.721119][T13406] active_file 94208 [ 508.721119][T13406] unevictable 0 [ 508.721119][T13406] slab_reclaimable 1622016 [ 508.721119][T13406] slab_unreclaimable 2240512 [ 508.721119][T13406] pgfault 49170 [ 508.721119][T13406] pgmajfault 0 [ 508.721119][T13406] workingset_refault 0 [ 508.721119][T13406] workingset_activate 0 [ 508.721119][T13406] workingset_nodereclaim 0 [ 508.721119][T13406] pgrefill 76 [ 508.721119][T13406] pgscan 76 [ 508.721119][T13406] pgsteal 39 [ 508.817881][T13406] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=14944,uid=0 [ 508.834509][T13406] Memory cgroup out of memory: Killed process 14944 (syz-executor.1) total-vm:72708kB, anon-rss:2212kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:131072kB oom_score_adj:1000 [ 508.852710][ T8732] syz-executor.5 invoked oom-killer: gfp_mask=0x40c50(GFP_NOFS|__GFP_COMP|__GFP_RECLAIMABLE), order=0, oom_score_adj=0 [ 508.853672][ T1065] oom_reaper: reaped process 14944 (syz-executor.1), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB [ 508.869764][ T8732] CPU: 0 PID: 8732 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 508.887269][ T8732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 508.897314][ T8732] Call Trace: [ 508.900589][ T8732] dump_stack+0x172/0x1f0 [ 508.904907][ T8732] dump_header+0x177/0x1152 [ 508.909388][ T8732] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 508.915168][ T8732] ? ___ratelimit+0x2c8/0x595 [ 508.919836][ T8732] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 508.925626][ T8732] ? lockdep_hardirqs_on+0x418/0x5d0 [ 508.931003][ T8732] ? trace_hardirqs_on+0x67/0x240 [ 508.936000][ T8732] ? pagefault_out_of_memory+0x11c/0x11c [ 508.941609][ T8732] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 508.947401][ T8732] ? ___ratelimit+0x60/0x595 [ 508.951976][ T8732] ? do_raw_spin_unlock+0x57/0x270 [ 508.957062][ T8732] oom_kill_process.cold+0x10/0x15 [ 508.962149][ T8732] out_of_memory+0x334/0x1340 [ 508.966805][ T8732] ? lock_downgrade+0x920/0x920 [ 508.971632][ T8732] ? oom_killer_disable+0x280/0x280 [ 508.979339][ T8732] mem_cgroup_out_of_memory+0x1d8/0x240 [ 508.984861][ T8732] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 508.990480][ T8732] ? do_raw_spin_unlock+0x57/0x270 [ 508.995566][ T8732] ? _raw_spin_unlock+0x2d/0x50 [ 509.000393][ T8732] try_charge+0xf4b/0x1440 [ 509.004800][ T8732] ? __lock_acquire+0x800/0x4a00 [ 509.009711][ T8732] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 509.015230][ T8732] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 509.021184][ T8732] ? cache_grow_begin+0x122/0xd20 [ 509.026180][ T8732] ? find_held_lock+0x35/0x130 [ 509.030929][ T8732] ? cache_grow_begin+0x122/0xd20 [ 509.035964][ T8732] __memcg_kmem_charge_memcg+0x71/0xf0 [ 509.041400][ T8732] ? memcg_kmem_put_cache+0x50/0x50 [ 509.046580][ T8732] ? __kasan_check_read+0x11/0x20 [ 509.051581][ T8732] cache_grow_begin+0x629/0xd20 [ 509.056407][ T8732] ? __sanitizer_cov_trace_cmp2+0x11/0x20 [ 509.062101][ T8732] ? mempolicy_slab_node+0x139/0x390 [ 509.067362][ T8732] fallback_alloc+0x1fd/0x2d0 [ 509.072016][ T8732] ____cache_alloc_node+0x1bc/0x1d0 [ 509.077194][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 509.083430][ T8732] kmem_cache_alloc+0x1ef/0x710 [ 509.088253][ T8732] ? lock_downgrade+0x920/0x920 [ 509.093078][ T8732] ? rwlock_bug.part.0+0x90/0x90 [ 509.098011][ T8732] ? ratelimit_state_init+0xb0/0xb0 [ 509.103200][ T8732] ext4_alloc_inode+0x1f/0x640 [ 509.107950][ T8732] ? ratelimit_state_init+0xb0/0xb0 [ 509.113129][ T8732] alloc_inode+0x68/0x1e0 [ 509.117496][ T8732] iget_locked+0x1a6/0x4b0 [ 509.121893][ T8732] __ext4_iget+0x265/0x3bb0 [ 509.126386][ T8732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 509.132625][ T8732] ? ext4_get_projid+0x190/0x190 [ 509.137576][ T8732] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 509.143110][ T8732] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 509.149066][ T8732] ? d_alloc_parallel+0xa78/0x1c30 [ 509.154175][ T8732] ext4_lookup+0x3b1/0x7a0 [ 509.158579][ T8732] ? ext4_cross_rename+0x1430/0x1430 [ 509.163843][ T8732] ? __lock_acquire+0x16f2/0x4a00 [ 509.168854][ T8732] ? __kasan_check_read+0x11/0x20 [ 509.173860][ T8732] ? lockdep_init_map+0x1be/0x6d0 [ 509.178866][ T8732] __lookup_slow+0x279/0x500 [ 509.183431][ T8732] ? vfs_unlink+0x620/0x620 [ 509.187924][ T8732] lookup_slow+0x58/0x80 [ 509.192143][ T8732] path_mountpoint+0x5d2/0x1e60 [ 509.196968][ T8732] ? __kasan_check_read+0x11/0x20 [ 509.201978][ T8732] ? __lock_acquire+0x16f2/0x4a00 [ 509.206981][ T8732] ? putname+0xef/0x130 [ 509.211116][ T8732] ? path_openat+0x46d0/0x46d0 [ 509.215856][ T8732] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 509.221460][ T8732] ? find_held_lock+0x35/0x130 [ 509.226202][ T8732] filename_mountpoint+0x190/0x3c0 [ 509.231292][ T8732] ? filename_parentat.isra.0+0x410/0x410 [ 509.236998][ T8732] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 509.243131][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 509.249346][ T8732] ? __phys_addr_symbol+0x30/0x70 [ 509.254347][ T8732] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 509.260039][ T8732] ? __check_object_size+0x3d/0x437 [ 509.265213][ T8732] ? strncpy_from_user+0x2b4/0x400 [ 509.270298][ T8732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 509.276510][ T8732] ? getname_flags+0x277/0x5b0 [ 509.281261][ T8732] user_path_mountpoint_at+0x3a/0x50 [ 509.286522][ T8732] ksys_umount+0x167/0xf00 [ 509.290914][ T8732] ? __ia32_sys_rmdir+0x40/0x40 [ 509.295745][ T8732] ? __detach_mounts+0x2a0/0x2a0 [ 509.300655][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 509.306872][ T8732] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 509.312303][ T8732] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 509.317741][ T8732] ? do_syscall_64+0x26/0x760 [ 509.322394][ T8732] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 509.328445][ T8732] ? do_syscall_64+0x26/0x760 [ 509.333096][ T8732] ? lockdep_hardirqs_on+0x418/0x5d0 [ 509.339572][ T8732] __x64_sys_umount+0x54/0x80 [ 509.344233][ T8732] do_syscall_64+0xfa/0x760 [ 509.348713][ T8732] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 509.354591][ T8732] RIP: 0033:0x45c317 [ 509.358481][ T8732] Code: 64 89 04 25 d0 02 00 00 58 5f ff d0 48 89 c7 e8 2f be ff ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 509.378108][ T8732] RSP: 002b:00007ffd499cd938 EFLAGS: 00000206 ORIG_RAX: 00000000000000a6 [ 509.386541][ T8732] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045c317 [ 509.394494][ T8732] RDX: 0000000000403520 RSI: 0000000000000002 RDI: 00007ffd499cd9e0 [ 509.402452][ T8732] RBP: 00000000000006f3 R08: 0000000000000000 R09: 000000000000000c [ 509.410516][ T8732] R10: 0000000000000006 R11: 0000000000000206 R12: 00007ffd499cea70 [ 509.418501][ T8732] R13: 00005555560f8940 R14: 0000000000000000 R15: 00007ffd499cea70 [ 509.427856][ T8732] memory: usage 49896kB, limit 0kB, failcnt 50 [ 509.434431][ T8732] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 509.441783][ T8732] Memory cgroup stats for /syz5: [ 509.441889][ T8732] anon 42246144 [ 509.441889][ T8732] file 0 [ 509.441889][ T8732] kernel_stack 720896 [ 509.441889][ T8732] slab 5308416 [ 509.441889][ T8732] sock 0 [ 509.441889][ T8732] shmem 110592 [ 509.441889][ T8732] file_mapped 135168 [ 509.441889][ T8732] file_dirty 0 [ 509.441889][ T8732] file_writeback 0 [ 509.441889][ T8732] anon_thp 39845888 [ 509.441889][ T8732] inactive_anon 0 [ 509.441889][ T8732] active_anon 42246144 [ 509.441889][ T8732] inactive_file 0 [ 509.441889][ T8732] active_file 135168 [ 509.441889][ T8732] unevictable 0 [ 509.441889][ T8732] slab_reclaimable 1622016 [ 509.441889][ T8732] slab_unreclaimable 3686400 [ 509.441889][ T8732] pgfault 57255 [ 509.441889][ T8732] pgmajfault 0 [ 509.441889][ T8732] workingset_refault 0 [ 509.441889][ T8732] workingset_activate 0 [ 509.441889][ T8732] workingset_nodereclaim 0 [ 509.441889][ T8732] pgrefill 71 [ 509.441889][ T8732] pgscan 66 [ 509.441889][ T8732] pgsteal 0 [ 509.441889][ T8732] pgactivate 33 [ 509.537970][ T8732] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=16034,uid=0 [ 509.554907][ T8732] Memory cgroup out of memory: Killed process 16034 (syz-executor.5) total-vm:72708kB, anon-rss:2220kB, file-rss:35844kB, shmem-rss:0kB, UID:0 pgtables:147456kB oom_score_adj:1000 [ 509.572934][T13406] syz-executor.1 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 509.575106][ T1065] oom_reaper: reaped process 16034 (syz-executor.5), now anon-rss:0kB, file-rss:34884kB, shmem-rss:0kB [ 509.587910][T13406] CPU: 0 PID: 13406 Comm: syz-executor.1 Not tainted 5.3.0-rc6-next-20190830 #75 [ 509.604901][T13406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 509.614948][T13406] Call Trace: [ 509.618217][T13406] dump_stack+0x172/0x1f0 [ 509.622529][T13406] dump_header+0x177/0x1152 [ 509.627025][T13406] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 509.632806][T13406] ? ___ratelimit+0x2c8/0x595 [ 509.637459][T13406] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 509.643243][T13406] ? lockdep_hardirqs_on+0x418/0x5d0 [ 509.648504][T13406] ? trace_hardirqs_on+0x67/0x240 [ 509.653504][T13406] ? pagefault_out_of_memory+0x11c/0x11c [ 509.659110][T13406] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 509.664889][T13406] ? ___ratelimit+0x60/0x595 [ 509.669455][T13406] ? do_raw_spin_unlock+0x57/0x270 [ 509.674542][T13406] oom_kill_process.cold+0x10/0x15 [ 509.679629][T13406] out_of_memory+0x334/0x1340 [ 509.684280][T13406] ? lock_downgrade+0x920/0x920 [ 509.689106][T13406] ? oom_killer_disable+0x280/0x280 [ 509.694287][T13406] mem_cgroup_out_of_memory+0x1d8/0x240 [ 509.699807][T13406] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 509.705414][T13406] ? do_raw_spin_unlock+0x57/0x270 [ 509.710500][T13406] ? _raw_spin_unlock+0x2d/0x50 [ 509.715327][T13406] try_charge+0xf4b/0x1440 [ 509.719722][T13406] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 509.725243][T13406] ? find_held_lock+0x35/0x130 [ 509.729985][T13406] ? get_mem_cgroup_from_mm+0x139/0x320 [ 509.735508][T13406] ? lock_downgrade+0x920/0x920 [ 509.740334][T13406] ? percpu_ref_tryget_live+0x111/0x290 [ 509.745857][T13406] __memcg_kmem_charge_memcg+0x71/0xf0 [ 509.751291][T13406] ? memcg_kmem_put_cache+0x50/0x50 [ 509.756466][T13406] ? get_mem_cgroup_from_mm+0x156/0x320 [ 509.761990][T13406] __memcg_kmem_charge+0x13a/0x3a0 [ 509.767077][T13406] __alloc_pages_nodemask+0x4f7/0x900 [ 509.772438][T13406] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 509.777960][T13406] ? __alloc_pages_slowpath+0x2540/0x2540 [ 509.783656][T13406] ? percpu_ref_put_many+0xb6/0x190 [ 509.788834][T13406] ? lockdep_hardirqs_on+0x418/0x5d0 [ 509.794093][T13406] ? trace_hardirqs_on+0x67/0x240 [ 509.799094][T13406] ? __kasan_check_read+0x11/0x20 [ 509.804107][T13406] copy_process+0x3f8/0x6830 [ 509.808671][T13406] ? __kasan_check_read+0x11/0x20 [ 509.813673][T13406] ? __kasan_check_read+0x11/0x20 [ 509.818687][T13406] ? __lock_acquire+0x16f2/0x4a00 [ 509.823692][T13406] ? __cleanup_sighand+0x60/0x60 [ 509.828614][T13406] ? __might_fault+0x12b/0x1e0 [ 509.833376][T13406] ? __might_fault+0x12b/0x1e0 [ 509.838130][T13406] _do_fork+0x146/0xfa0 [ 509.842278][T13406] ? copy_init_mm+0x20/0x20 [ 509.846764][T13406] ? __kasan_check_read+0x11/0x20 [ 509.851766][T13406] ? _copy_to_user+0x118/0x160 [ 509.856508][T13406] __x64_sys_clone+0x1ab/0x270 [ 509.861253][T13406] ? __ia32_sys_vfork+0xd0/0xd0 [ 509.866198][T13406] ? do_syscall_64+0x26/0x760 [ 509.870859][T13406] ? lockdep_hardirqs_on+0x418/0x5d0 [ 509.876126][T13406] ? trace_hardirqs_on+0x67/0x240 [ 509.881135][T13406] do_syscall_64+0xfa/0x760 [ 509.885623][T13406] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 509.891493][T13406] RIP: 0033:0x457eba [ 509.895368][T13406] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 509.914963][T13406] RSP: 002b:00007ffe999aeaf0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 509.923353][T13406] RAX: ffffffffffffffda RBX: 00007ffe999aeaf0 RCX: 0000000000457eba [ 509.931357][T13406] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 509.939383][T13406] RBP: 00007ffe999aeb30 R08: 0000000000000001 R09: 0000555556d37940 [ 509.947341][T13406] R10: 0000555556d37c10 R11: 0000000000000246 R12: 0000000000000001 [ 509.955292][T13406] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe999aeb80 [ 509.965474][T13406] memory: usage 6200kB, limit 0kB, failcnt 91 [ 509.975554][T13406] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 509.982489][T13406] Memory cgroup stats for /syz1: [ 509.982577][T13406] anon 2371584 [ 509.982577][T13406] file 204800 [ 509.982577][T13406] kernel_stack 65536 [ 509.982577][T13406] slab 3862528 [ 509.982577][T13406] sock 53248 [ 509.982577][T13406] shmem 57344 [ 509.982577][T13406] file_mapped 135168 [ 509.982577][T13406] file_dirty 135168 [ 509.982577][T13406] file_writeback 0 [ 509.982577][T13406] anon_thp 2097152 [ 509.982577][T13406] inactive_anon 0 [ 509.982577][T13406] active_anon 2371584 [ 509.982577][T13406] inactive_file 135168 [ 509.982577][T13406] active_file 94208 [ 509.982577][T13406] unevictable 0 [ 509.982577][T13406] slab_reclaimable 1622016 [ 509.982577][T13406] slab_unreclaimable 2240512 [ 509.982577][T13406] pgfault 49170 [ 509.982577][T13406] pgmajfault 0 [ 509.982577][T13406] workingset_refault 0 [ 509.982577][T13406] workingset_activate 0 [ 509.982577][T13406] workingset_nodereclaim 0 [ 509.982577][T13406] pgrefill 76 [ 509.982577][T13406] pgscan 76 [ 509.982577][T13406] pgsteal 39 [ 510.076568][T13406] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=14995,uid=0 [ 510.092145][T13406] Memory cgroup out of memory: Killed process 14995 (syz-executor.1) total-vm:72576kB, anon-rss:2204kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:131072kB oom_score_adj:1000 [ 510.111244][ T1065] oom_reaper: reaped process 14995 (syz-executor.1), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB [ 510.117219][ T8732] syz-executor.5 invoked oom-killer: gfp_mask=0x40c50(GFP_NOFS|__GFP_COMP|__GFP_RECLAIMABLE), order=0, oom_score_adj=0 [ 510.140839][ T8732] CPU: 0 PID: 8732 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 510.149894][ T8732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 510.159943][ T8732] Call Trace: [ 510.163218][ T8732] dump_stack+0x172/0x1f0 [ 510.167526][ T8732] dump_header+0x177/0x1152 [ 510.172006][ T8732] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 510.177784][ T8732] ? ___ratelimit+0x2c8/0x595 [ 510.182437][ T8732] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 510.188221][ T8732] ? lockdep_hardirqs_on+0x418/0x5d0 [ 510.193486][ T8732] ? trace_hardirqs_on+0x67/0x240 [ 510.198498][ T8732] ? pagefault_out_of_memory+0x11c/0x11c [ 510.204111][ T8732] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 510.209907][ T8732] ? ___ratelimit+0x60/0x595 [ 510.214489][ T8732] ? do_raw_spin_unlock+0x57/0x270 [ 510.219580][ T8732] oom_kill_process.cold+0x10/0x15 [ 510.224669][ T8732] out_of_memory+0x334/0x1340 [ 510.229334][ T8732] ? lock_downgrade+0x920/0x920 [ 510.234173][ T8732] ? oom_killer_disable+0x280/0x280 [ 510.239362][ T8732] mem_cgroup_out_of_memory+0x1d8/0x240 [ 510.244884][ T8732] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 510.250507][ T8732] ? do_raw_spin_unlock+0x57/0x270 [ 510.255597][ T8732] ? _raw_spin_unlock+0x2d/0x50 [ 510.260438][ T8732] try_charge+0xf4b/0x1440 [ 510.264834][ T8732] ? __lock_acquire+0x800/0x4a00 [ 510.269755][ T8732] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 510.275299][ T8732] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 510.281270][ T8732] ? cache_grow_begin+0x122/0xd20 [ 510.286285][ T8732] ? find_held_lock+0x35/0x130 [ 510.291041][ T8732] ? cache_grow_begin+0x122/0xd20 [ 510.296064][ T8732] __memcg_kmem_charge_memcg+0x71/0xf0 [ 510.301507][ T8732] ? memcg_kmem_put_cache+0x50/0x50 [ 510.306689][ T8732] ? __kasan_check_read+0x11/0x20 [ 510.311711][ T8732] cache_grow_begin+0x629/0xd20 [ 510.316546][ T8732] ? __sanitizer_cov_trace_cmp2+0x11/0x20 [ 510.322262][ T8732] ? mempolicy_slab_node+0x139/0x390 [ 510.327542][ T8732] fallback_alloc+0x1fd/0x2d0 [ 510.332248][ T8732] ____cache_alloc_node+0x1bc/0x1d0 [ 510.337428][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 510.343651][ T8732] kmem_cache_alloc+0x1ef/0x710 [ 510.348487][ T8732] ? lock_downgrade+0x920/0x920 [ 510.353327][ T8732] ? rwlock_bug.part.0+0x90/0x90 [ 510.358246][ T8732] ? ratelimit_state_init+0xb0/0xb0 [ 510.363423][ T8732] ext4_alloc_inode+0x1f/0x640 [ 510.368164][ T8732] ? ratelimit_state_init+0xb0/0xb0 [ 510.373341][ T8732] alloc_inode+0x68/0x1e0 [ 510.377651][ T8732] iget_locked+0x1a6/0x4b0 [ 510.382046][ T8732] __ext4_iget+0x265/0x3bb0 [ 510.386536][ T8732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 510.392763][ T8732] ? ext4_get_projid+0x190/0x190 [ 510.397677][ T8732] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 510.403208][ T8732] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 510.409161][ T8732] ? d_alloc_parallel+0xa78/0x1c30 [ 510.414256][ T8732] ext4_lookup+0x3b1/0x7a0 [ 510.418648][ T8732] ? ext4_cross_rename+0x1430/0x1430 [ 510.423911][ T8732] ? __lock_acquire+0x16f2/0x4a00 [ 510.428923][ T8732] ? __kasan_check_read+0x11/0x20 [ 510.433929][ T8732] ? lockdep_init_map+0x1be/0x6d0 [ 510.438934][ T8732] __lookup_slow+0x279/0x500 [ 510.443501][ T8732] ? vfs_unlink+0x620/0x620 [ 510.447994][ T8732] lookup_slow+0x58/0x80 [ 510.452215][ T8732] path_mountpoint+0x5d2/0x1e60 [ 510.457059][ T8732] ? __kasan_check_read+0x11/0x20 [ 510.462062][ T8732] ? __lock_acquire+0x16f2/0x4a00 [ 510.467058][ T8732] ? putname+0xef/0x130 [ 510.471192][ T8732] ? path_openat+0x46d0/0x46d0 [ 510.475933][ T8732] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 510.481547][ T8732] ? find_held_lock+0x35/0x130 [ 510.486303][ T8732] filename_mountpoint+0x190/0x3c0 [ 510.491395][ T8732] ? filename_parentat.isra.0+0x410/0x410 [ 510.497093][ T8732] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 510.503256][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 510.509489][ T8732] ? __phys_addr_symbol+0x30/0x70 [ 510.514495][ T8732] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 510.520193][ T8732] ? __check_object_size+0x3d/0x437 [ 510.525497][ T8732] ? strncpy_from_user+0x2b4/0x400 [ 510.530603][ T8732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 510.536881][ T8732] ? getname_flags+0x277/0x5b0 [ 510.541635][ T8732] user_path_mountpoint_at+0x3a/0x50 [ 510.546903][ T8732] ksys_umount+0x167/0xf00 [ 510.551313][ T8732] ? __ia32_sys_rmdir+0x40/0x40 [ 510.556143][ T8732] ? __detach_mounts+0x2a0/0x2a0 [ 510.561061][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 510.567294][ T8732] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 510.572734][ T8732] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 510.578169][ T8732] ? do_syscall_64+0x26/0x760 [ 510.582825][ T8732] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 510.588882][ T8732] ? do_syscall_64+0x26/0x760 [ 510.593539][ T8732] ? lockdep_hardirqs_on+0x418/0x5d0 [ 510.598801][ T8732] __x64_sys_umount+0x54/0x80 [ 510.603456][ T8732] do_syscall_64+0xfa/0x760 [ 510.607941][ T8732] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 510.613815][ T8732] RIP: 0033:0x45c317 [ 510.617763][ T8732] Code: 64 89 04 25 d0 02 00 00 58 5f ff d0 48 89 c7 e8 2f be ff ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 510.637406][ T8732] RSP: 002b:00007ffd499cd938 EFLAGS: 00000206 ORIG_RAX: 00000000000000a6 [ 510.645799][ T8732] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045c317 [ 510.653757][ T8732] RDX: 0000000000403520 RSI: 0000000000000002 RDI: 00007ffd499cd9e0 [ 510.661775][ T8732] RBP: 00000000000006f3 R08: 0000000000000000 R09: 000000000000000c [ 510.669746][ T8732] R10: 0000000000000006 R11: 0000000000000206 R12: 00007ffd499cea70 [ 510.677699][ T8732] R13: 00005555560f8940 R14: 0000000000000000 R15: 00007ffd499cea70 [ 510.687187][ T8732] memory: usage 47560kB, limit 0kB, failcnt 56 [ 510.693425][ T8732] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 510.700402][ T8732] Memory cgroup stats for /syz5: [ 510.700498][ T8732] anon 40034304 [ 510.700498][ T8732] file 0 [ 510.700498][ T8732] kernel_stack 655360 [ 510.700498][ T8732] slab 5308416 [ 510.700498][ T8732] sock 0 [ 510.700498][ T8732] shmem 110592 [ 510.700498][ T8732] file_mapped 135168 [ 510.700498][ T8732] file_dirty 0 [ 510.700498][ T8732] file_writeback 0 [ 510.700498][ T8732] anon_thp 37748736 [ 510.700498][ T8732] inactive_anon 0 [ 510.700498][ T8732] active_anon 40034304 [ 510.700498][ T8732] inactive_file 0 [ 510.700498][ T8732] active_file 135168 [ 510.700498][ T8732] unevictable 0 [ 510.700498][ T8732] slab_reclaimable 1622016 [ 510.700498][ T8732] slab_unreclaimable 3686400 [ 510.700498][ T8732] pgfault 57255 [ 510.700498][ T8732] pgmajfault 0 [ 510.700498][ T8732] workingset_refault 0 [ 510.700498][ T8732] workingset_activate 0 [ 510.700498][ T8732] workingset_nodereclaim 0 [ 510.700498][ T8732] pgrefill 71 [ 510.700498][ T8732] pgscan 66 [ 510.700498][ T8732] pgsteal 0 [ 510.700498][ T8732] pgactivate 33 [ 510.796562][ T8732] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=15994,uid=0 [ 510.812928][ T8732] Memory cgroup out of memory: Killed process 15994 (syz-executor.5) total-vm:72576kB, anon-rss:2212kB, file-rss:35844kB, shmem-rss:0kB, UID:0 pgtables:143360kB oom_score_adj:1000 [ 510.838553][ T8732] syz-executor.5 invoked oom-killer: gfp_mask=0x40c50(GFP_NOFS|__GFP_COMP|__GFP_RECLAIMABLE), order=0, oom_score_adj=0 [ 510.851241][ T8732] CPU: 1 PID: 8732 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 510.860255][ T8732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 510.870288][ T8732] Call Trace: [ 510.873560][ T8732] dump_stack+0x172/0x1f0 [ 510.877872][ T8732] dump_header+0x177/0x1152 [ 510.882356][ T8732] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 510.888161][ T8732] ? ___ratelimit+0x2c8/0x595 [ 510.892818][ T8732] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 510.898634][ T8732] ? lockdep_hardirqs_on+0x418/0x5d0 [ 510.903902][ T8732] ? trace_hardirqs_on+0x67/0x240 [ 510.908909][ T8732] ? pagefault_out_of_memory+0x11c/0x11c [ 510.914520][ T8732] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 510.920339][ T8732] ? ___ratelimit+0x60/0x595 [ 510.924991][ T8732] ? do_raw_spin_unlock+0x57/0x270 [ 510.930098][ T8732] oom_kill_process.cold+0x10/0x15 [ 510.935203][ T8732] out_of_memory+0x334/0x1340 [ 510.939920][ T8732] ? lock_downgrade+0x920/0x920 [ 510.944757][ T8732] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 510.950547][ T8732] ? oom_killer_disable+0x280/0x280 [ 510.955730][ T8732] mem_cgroup_out_of_memory+0x1d8/0x240 [ 510.961268][ T8732] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 510.966879][ T8732] ? do_raw_spin_unlock+0x57/0x270 [ 510.971977][ T8732] ? _raw_spin_unlock+0x2d/0x50 [ 510.976804][ T8732] try_charge+0xf4b/0x1440 [ 510.981199][ T8732] ? __lock_acquire+0x800/0x4a00 [ 510.986116][ T8732] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 510.991647][ T8732] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 510.997612][ T8732] ? cache_grow_begin+0x122/0xd20 [ 511.002621][ T8732] ? find_held_lock+0x35/0x130 [ 511.007361][ T8732] ? cache_grow_begin+0x122/0xd20 [ 511.012366][ T8732] __memcg_kmem_charge_memcg+0x71/0xf0 [ 511.017801][ T8732] ? memcg_kmem_put_cache+0x50/0x50 [ 511.022989][ T8732] ? __kasan_check_read+0x11/0x20 [ 511.027992][ T8732] cache_grow_begin+0x629/0xd20 [ 511.032901][ T8732] ? __sanitizer_cov_trace_cmp2+0x11/0x20 [ 511.038631][ T8732] ? mempolicy_slab_node+0x139/0x390 [ 511.043921][ T8732] fallback_alloc+0x1fd/0x2d0 [ 511.048589][ T8732] ____cache_alloc_node+0x1bc/0x1d0 [ 511.053867][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 511.060100][ T8732] kmem_cache_alloc+0x1ef/0x710 [ 511.064929][ T8732] ? lock_downgrade+0x920/0x920 [ 511.069755][ T8732] ? rwlock_bug.part.0+0x90/0x90 [ 511.074676][ T8732] ? ratelimit_state_init+0xb0/0xb0 [ 511.079851][ T8732] ext4_alloc_inode+0x1f/0x640 [ 511.084590][ T8732] ? ratelimit_state_init+0xb0/0xb0 [ 511.089767][ T8732] alloc_inode+0x68/0x1e0 [ 511.094084][ T8732] iget_locked+0x1a6/0x4b0 [ 511.098491][ T8732] __ext4_iget+0x265/0x3bb0 [ 511.102985][ T8732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 511.109239][ T8732] ? ext4_get_projid+0x190/0x190 [ 511.114155][ T8732] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 511.119681][ T8732] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 511.125639][ T8732] ? d_alloc_parallel+0xa78/0x1c30 [ 511.130730][ T8732] ext4_lookup+0x3b1/0x7a0 [ 511.135123][ T8732] ? ext4_cross_rename+0x1430/0x1430 [ 511.140397][ T8732] ? __lock_acquire+0x16f2/0x4a00 [ 511.145396][ T8732] ? __kasan_check_read+0x11/0x20 [ 511.150402][ T8732] ? lockdep_init_map+0x1be/0x6d0 [ 511.155407][ T8732] __lookup_slow+0x279/0x500 [ 511.159974][ T8732] ? vfs_unlink+0x620/0x620 [ 511.164468][ T8732] lookup_slow+0x58/0x80 [ 511.168696][ T8732] path_mountpoint+0x5d2/0x1e60 [ 511.173523][ T8732] ? __kasan_check_read+0x11/0x20 [ 511.178536][ T8732] ? __lock_acquire+0x16f2/0x4a00 [ 511.183535][ T8732] ? putname+0xef/0x130 [ 511.187672][ T8732] ? path_openat+0x46d0/0x46d0 [ 511.192412][ T8732] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 511.198036][ T8732] ? find_held_lock+0x35/0x130 [ 511.202779][ T8732] filename_mountpoint+0x190/0x3c0 [ 511.207867][ T8732] ? filename_parentat.isra.0+0x410/0x410 [ 511.213562][ T8732] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 511.219696][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 511.225912][ T8732] ? __phys_addr_symbol+0x30/0x70 [ 511.230918][ T8732] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 511.236611][ T8732] ? __check_object_size+0x3d/0x437 [ 511.241807][ T8732] ? strncpy_from_user+0x2b4/0x400 [ 511.246913][ T8732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 511.253283][ T8732] ? getname_flags+0x277/0x5b0 [ 511.258031][ T8732] user_path_mountpoint_at+0x3a/0x50 [ 511.263298][ T8732] ksys_umount+0x167/0xf00 [ 511.267699][ T8732] ? __ia32_sys_rmdir+0x40/0x40 [ 511.272537][ T8732] ? __detach_mounts+0x2a0/0x2a0 [ 511.277458][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 511.283677][ T8732] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 511.289113][ T8732] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 511.294580][ T8732] ? do_syscall_64+0x26/0x760 [ 511.299241][ T8732] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 511.305290][ T8732] ? do_syscall_64+0x26/0x760 [ 511.309959][ T8732] ? lockdep_hardirqs_on+0x418/0x5d0 [ 511.315239][ T8732] __x64_sys_umount+0x54/0x80 [ 511.319908][ T8732] do_syscall_64+0xfa/0x760 [ 511.324512][ T8732] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 511.330391][ T8732] RIP: 0033:0x45c317 [ 511.334317][ T8732] Code: 64 89 04 25 d0 02 00 00 58 5f ff d0 48 89 c7 e8 2f be ff ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 511.353899][ T8732] RSP: 002b:00007ffd499cd938 EFLAGS: 00000206 ORIG_RAX: 00000000000000a6 [ 511.362287][ T8732] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045c317 [ 511.370237][ T8732] RDX: 0000000000403520 RSI: 0000000000000002 RDI: 00007ffd499cd9e0 [ 511.378184][ T8732] RBP: 00000000000006f3 R08: 0000000000000000 R09: 000000000000000c [ 511.386132][ T8732] R10: 0000000000000006 R11: 0000000000000206 R12: 00007ffd499cea70 [ 511.394080][ T8732] R13: 00005555560f8940 R14: 0000000000000000 R15: 00007ffd499cea70 [ 511.402508][ T8732] memory: usage 45212kB, limit 0kB, failcnt 62 [ 511.408669][ T8732] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 511.415612][ T8732] Memory cgroup stats for /syz5: [ 511.415705][ T8732] anon 37814272 [ 511.415705][ T8732] file 0 [ 511.415705][ T8732] kernel_stack 589824 [ 511.415705][ T8732] slab 5308416 [ 511.415705][ T8732] sock 0 [ 511.415705][ T8732] shmem 110592 [ 511.415705][ T8732] file_mapped 135168 [ 511.415705][ T8732] file_dirty 0 [ 511.415705][ T8732] file_writeback 0 [ 511.415705][ T8732] anon_thp 35651584 [ 511.415705][ T8732] inactive_anon 0 [ 511.415705][ T8732] active_anon 37814272 [ 511.415705][ T8732] inactive_file 0 [ 511.415705][ T8732] active_file 135168 [ 511.415705][ T8732] unevictable 0 [ 511.415705][ T8732] slab_reclaimable 1622016 [ 511.415705][ T8732] slab_unreclaimable 3686400 [ 511.415705][ T8732] pgfault 57255 [ 511.415705][ T8732] pgmajfault 0 [ 511.415705][ T8732] workingset_refault 0 [ 511.415705][ T8732] workingset_activate 0 [ 511.415705][ T8732] workingset_nodereclaim 0 [ 511.415705][ T8732] pgrefill 71 [ 511.415705][ T8732] pgscan 66 [ 511.415705][ T8732] pgsteal 0 [ 511.415705][ T8732] pgactivate 33 [ 511.511718][ T8732] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=10451,uid=0 [ 511.527390][ T8732] Memory cgroup out of memory: Killed process 10451 (syz-executor.5) total-vm:72708kB, anon-rss:2208kB, file-rss:35816kB, shmem-rss:0kB, UID:0 pgtables:147456kB oom_score_adj:1000 [ 511.548351][ T1065] oom_reaper: reaped process 10451 (syz-executor.5), now anon-rss:0kB, file-rss:34856kB, shmem-rss:0kB [ 511.554809][T13406] syz-executor.1 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 511.571397][T13406] CPU: 1 PID: 13406 Comm: syz-executor.1 Not tainted 5.3.0-rc6-next-20190830 #75 [ 511.580497][T13406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 511.590672][T13406] Call Trace: [ 511.593945][T13406] dump_stack+0x172/0x1f0 [ 511.598255][T13406] dump_header+0x177/0x1152 [ 511.602740][T13406] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 511.608559][T13406] ? ___ratelimit+0x2c8/0x595 [ 511.613255][T13406] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 511.619048][T13406] ? lockdep_hardirqs_on+0x418/0x5d0 [ 511.624833][T13406] ? trace_hardirqs_on+0x67/0x240 [ 511.629866][T13406] ? pagefault_out_of_memory+0x11c/0x11c [ 511.635477][T13406] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 511.641262][T13406] ? ___ratelimit+0x60/0x595 [ 511.645851][T13406] ? do_raw_spin_unlock+0x57/0x270 [ 511.650940][T13406] oom_kill_process.cold+0x10/0x15 [ 511.656042][T13406] out_of_memory+0x334/0x1340 [ 511.660694][T13406] ? lock_downgrade+0x920/0x920 [ 511.665541][T13406] ? oom_killer_disable+0x280/0x280 [ 511.670721][T13406] mem_cgroup_out_of_memory+0x1d8/0x240 [ 511.676242][T13406] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 511.681852][T13406] ? do_raw_spin_unlock+0x57/0x270 [ 511.686943][T13406] ? _raw_spin_unlock+0x2d/0x50 [ 511.691772][T13406] try_charge+0xf4b/0x1440 [ 511.696169][T13406] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 511.701688][T13406] ? find_held_lock+0x35/0x130 [ 511.706442][T13406] ? get_mem_cgroup_from_mm+0x139/0x320 [ 511.711969][T13406] ? lock_downgrade+0x920/0x920 [ 511.716793][T13406] ? percpu_ref_tryget_live+0x111/0x290 [ 511.722328][T13406] __memcg_kmem_charge_memcg+0x71/0xf0 [ 511.727765][T13406] ? memcg_kmem_put_cache+0x50/0x50 [ 511.732940][T13406] ? get_mem_cgroup_from_mm+0x156/0x320 [ 511.738464][T13406] __memcg_kmem_charge+0x13a/0x3a0 [ 511.743570][T13406] __alloc_pages_nodemask+0x4f7/0x900 [ 511.748917][T13406] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 511.754701][T13406] ? __alloc_pages_slowpath+0x2540/0x2540 [ 511.760392][T13406] ? percpu_ref_put_many+0xb6/0x190 [ 511.765569][T13406] ? lockdep_hardirqs_on+0x418/0x5d0 [ 511.770829][T13406] ? trace_hardirqs_on+0x67/0x240 [ 511.775827][T13406] ? __kasan_check_read+0x11/0x20 [ 511.780830][T13406] copy_process+0x3f8/0x6830 [ 511.785393][T13406] ? __kasan_check_read+0x11/0x20 [ 511.790395][T13406] ? __kasan_check_read+0x11/0x20 [ 511.795394][T13406] ? __lock_acquire+0x16f2/0x4a00 [ 511.800399][T13406] ? __cleanup_sighand+0x60/0x60 [ 511.805313][T13406] ? __might_fault+0x12b/0x1e0 [ 511.810064][T13406] ? __might_fault+0x12b/0x1e0 [ 511.814807][T13406] _do_fork+0x146/0xfa0 [ 511.818950][T13406] ? copy_init_mm+0x20/0x20 [ 511.823434][T13406] ? __kasan_check_read+0x11/0x20 [ 511.828434][T13406] ? _copy_to_user+0x118/0x160 [ 511.833192][T13406] __x64_sys_clone+0x1ab/0x270 [ 511.837934][T13406] ? __ia32_sys_vfork+0xd0/0xd0 [ 511.842764][T13406] ? do_syscall_64+0x26/0x760 [ 511.847437][T13406] ? lockdep_hardirqs_on+0x418/0x5d0 [ 511.852697][T13406] ? trace_hardirqs_on+0x67/0x240 [ 511.857712][T13406] do_syscall_64+0xfa/0x760 [ 511.862193][T13406] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 511.868071][T13406] RIP: 0033:0x457eba [ 511.871946][T13406] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 511.891523][T13406] RSP: 002b:00007ffe999aeaf0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 511.899907][T13406] RAX: ffffffffffffffda RBX: 00007ffe999aeaf0 RCX: 0000000000457eba [ 511.907853][T13406] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 511.915803][T13406] RBP: 00007ffe999aeb30 R08: 0000000000000001 R09: 0000555556d37940 [ 511.923749][T13406] R10: 0000555556d37c10 R11: 0000000000000246 R12: 0000000000000001 [ 511.931698][T13406] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe999aeb80 [ 511.939925][T13406] memory: usage 3656kB, limit 0kB, failcnt 97 [ 511.946004][T13406] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 511.952978][T13406] Memory cgroup stats for /syz1: [ 511.953071][T13406] anon 147456 [ 511.953071][T13406] file 204800 [ 511.953071][T13406] kernel_stack 0 [ 511.953071][T13406] slab 3727360 [ 511.953071][T13406] sock 53248 [ 511.953071][T13406] shmem 57344 [ 511.953071][T13406] file_mapped 135168 [ 511.953071][T13406] file_dirty 135168 [ 511.953071][T13406] file_writeback 0 [ 511.953071][T13406] anon_thp 0 [ 511.953071][T13406] inactive_anon 0 [ 511.953071][T13406] active_anon 147456 [ 511.953071][T13406] inactive_file 135168 [ 511.953071][T13406] active_file 94208 [ 511.953071][T13406] unevictable 0 [ 511.953071][T13406] slab_reclaimable 1622016 [ 511.953071][T13406] slab_unreclaimable 2105344 [ 511.953071][T13406] pgfault 49170 [ 511.953071][T13406] pgmajfault 0 [ 511.953071][T13406] workingset_refault 0 [ 511.953071][T13406] workingset_activate 0 [ 511.953071][T13406] workingset_nodereclaim 0 [ 511.953071][T13406] pgrefill 76 [ 511.953071][T13406] pgscan 76 [ 511.953071][T13406] pgsteal 39 [ 511.953071][T13406] pgactivate 0 [ 512.048998][T13406] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=13406,uid=0 [ 512.064533][T13406] Memory cgroup out of memory: Killed process 13406 (syz-executor.1) total-vm:72444kB, anon-rss:112kB, file-rss:35776kB, shmem-rss:0kB, UID:0 pgtables:131072kB oom_score_adj:0 [ 512.082323][ T8732] syz-executor.5 invoked oom-killer: gfp_mask=0x40c50(GFP_NOFS|__GFP_COMP|__GFP_RECLAIMABLE), order=0, oom_score_adj=0 [ 512.082738][ T1065] oom_reaper: reaped process 13406 (syz-executor.1), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 512.095298][ T8732] CPU: 1 PID: 8732 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 512.114796][ T8732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 512.124844][ T8732] Call Trace: [ 512.128114][ T8732] dump_stack+0x172/0x1f0 [ 512.132427][ T8732] dump_header+0x177/0x1152 [ 512.136907][ T8732] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 512.142698][ T8732] ? ___ratelimit+0x2c8/0x595 [ 512.147368][ T8732] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 512.153164][ T8732] ? lockdep_hardirqs_on+0x418/0x5d0 [ 512.158424][ T8732] ? trace_hardirqs_on+0x67/0x240 [ 512.163426][ T8732] ? pagefault_out_of_memory+0x11c/0x11c [ 512.169033][ T8732] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 512.174830][ T8732] ? ___ratelimit+0x60/0x595 [ 512.179416][ T8732] ? do_raw_spin_unlock+0x57/0x270 [ 512.184505][ T8732] oom_kill_process.cold+0x10/0x15 [ 512.189602][ T8732] out_of_memory+0x334/0x1340 [ 512.194256][ T8732] ? lock_downgrade+0x920/0x920 [ 512.199084][ T8732] ? oom_killer_disable+0x280/0x280 [ 512.204263][ T8732] mem_cgroup_out_of_memory+0x1d8/0x240 [ 512.209783][ T8732] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 512.215506][ T8732] ? do_raw_spin_unlock+0x57/0x270 [ 512.220601][ T8732] ? _raw_spin_unlock+0x2d/0x50 [ 512.225430][ T8732] try_charge+0xf4b/0x1440 [ 512.229825][ T8732] ? __lock_acquire+0x800/0x4a00 [ 512.234740][ T8732] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 512.240262][ T8732] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 512.246218][ T8732] ? cache_grow_begin+0x122/0xd20 [ 512.251218][ T8732] ? find_held_lock+0x35/0x130 [ 512.255957][ T8732] ? cache_grow_begin+0x122/0xd20 [ 512.260963][ T8732] __memcg_kmem_charge_memcg+0x71/0xf0 [ 512.266398][ T8732] ? memcg_kmem_put_cache+0x50/0x50 [ 512.271574][ T8732] ? __kasan_check_read+0x11/0x20 [ 512.276579][ T8732] cache_grow_begin+0x629/0xd20 [ 512.281430][ T8732] ? __sanitizer_cov_trace_cmp2+0x11/0x20 [ 512.287125][ T8732] ? mempolicy_slab_node+0x139/0x390 [ 512.292386][ T8732] fallback_alloc+0x1fd/0x2d0 [ 512.297062][ T8732] ____cache_alloc_node+0x1bc/0x1d0 [ 512.302237][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 512.308454][ T8732] kmem_cache_alloc+0x1ef/0x710 [ 512.313283][ T8732] ? lock_downgrade+0x920/0x920 [ 512.318127][ T8732] ? rwlock_bug.part.0+0x90/0x90 [ 512.323094][ T8732] ? ratelimit_state_init+0xb0/0xb0 [ 512.328287][ T8732] ext4_alloc_inode+0x1f/0x640 [ 512.333047][ T8732] ? ratelimit_state_init+0xb0/0xb0 [ 512.338227][ T8732] alloc_inode+0x68/0x1e0 [ 512.342588][ T8732] iget_locked+0x1a6/0x4b0 [ 512.346988][ T8732] __ext4_iget+0x265/0x3bb0 [ 512.351483][ T8732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 512.357723][ T8732] ? ext4_get_projid+0x190/0x190 [ 512.362650][ T8732] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 512.368174][ T8732] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 512.374135][ T8732] ? d_alloc_parallel+0xa78/0x1c30 [ 512.379242][ T8732] ext4_lookup+0x3b1/0x7a0 [ 512.383637][ T8732] ? ext4_cross_rename+0x1430/0x1430 [ 512.388902][ T8732] ? __lock_acquire+0x16f2/0x4a00 [ 512.393904][ T8732] ? __kasan_check_read+0x11/0x20 [ 512.398911][ T8732] ? lockdep_init_map+0x1be/0x6d0 [ 512.403919][ T8732] __lookup_slow+0x279/0x500 [ 512.408498][ T8732] ? vfs_unlink+0x620/0x620 [ 512.412993][ T8732] lookup_slow+0x58/0x80 [ 512.417212][ T8732] path_mountpoint+0x5d2/0x1e60 [ 512.422039][ T8732] ? __kasan_check_read+0x11/0x20 [ 512.427037][ T8732] ? __lock_acquire+0x16f2/0x4a00 [ 512.432050][ T8732] ? putname+0xef/0x130 [ 512.436184][ T8732] ? path_openat+0x46d0/0x46d0 [ 512.440937][ T8732] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 512.446546][ T8732] ? find_held_lock+0x35/0x130 [ 512.451293][ T8732] filename_mountpoint+0x190/0x3c0 [ 512.456381][ T8732] ? filename_parentat.isra.0+0x410/0x410 [ 512.462085][ T8732] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 512.468219][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 512.474436][ T8732] ? __phys_addr_symbol+0x30/0x70 [ 512.479439][ T8732] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 512.485137][ T8732] ? __check_object_size+0x3d/0x437 [ 512.490332][ T8732] ? strncpy_from_user+0x2b4/0x400 [ 512.495421][ T8732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 512.501651][ T8732] ? getname_flags+0x277/0x5b0 [ 512.506455][ T8732] user_path_mountpoint_at+0x3a/0x50 [ 512.511740][ T8732] ksys_umount+0x167/0xf00 [ 512.516146][ T8732] ? __ia32_sys_rmdir+0x40/0x40 [ 512.520981][ T8732] ? __detach_mounts+0x2a0/0x2a0 [ 512.525900][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 512.532119][ T8732] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 512.537553][ T8732] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 512.542989][ T8732] ? do_syscall_64+0x26/0x760 [ 512.547659][ T8732] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 512.553717][ T8732] ? do_syscall_64+0x26/0x760 [ 512.558371][ T8732] ? lockdep_hardirqs_on+0x418/0x5d0 [ 512.563655][ T8732] __x64_sys_umount+0x54/0x80 [ 512.568310][ T8732] do_syscall_64+0xfa/0x760 [ 512.572793][ T8732] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 512.578659][ T8732] RIP: 0033:0x45c317 [ 512.582535][ T8732] Code: 64 89 04 25 d0 02 00 00 58 5f ff d0 48 89 c7 e8 2f be ff ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 512.602123][ T8732] RSP: 002b:00007ffd499cd938 EFLAGS: 00000206 ORIG_RAX: 00000000000000a6 [ 512.610602][ T8732] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045c317 [ 512.618550][ T8732] RDX: 0000000000403520 RSI: 0000000000000002 RDI: 00007ffd499cd9e0 [ 512.626499][ T8732] RBP: 00000000000006f3 R08: 0000000000000000 R09: 000000000000000c [ 512.634467][ T8732] R10: 0000000000000006 R11: 0000000000000206 R12: 00007ffd499cea70 [ 512.642430][ T8732] R13: 00005555560f8940 R14: 0000000000000000 R15: 00007ffd499cea70 [ 512.651744][ T8732] memory: usage 44976kB, limit 0kB, failcnt 68 [ 512.664878][ T8732] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 512.671812][ T8732] Memory cgroup stats for /syz5: [ 512.671905][ T8732] anon 37814272 [ 512.671905][ T8732] file 0 [ 512.671905][ T8732] kernel_stack 589824 [ 512.671905][ T8732] slab 5308416 [ 512.671905][ T8732] sock 0 [ 512.671905][ T8732] shmem 110592 [ 512.671905][ T8732] file_mapped 135168 [ 512.671905][ T8732] file_dirty 0 [ 512.671905][ T8732] file_writeback 0 [ 512.671905][ T8732] anon_thp 35651584 [ 512.671905][ T8732] inactive_anon 0 [ 512.671905][ T8732] active_anon 37814272 [ 512.671905][ T8732] inactive_file 0 [ 512.671905][ T8732] active_file 135168 [ 512.671905][ T8732] unevictable 0 [ 512.671905][ T8732] slab_reclaimable 1622016 [ 512.671905][ T8732] slab_unreclaimable 3686400 [ 512.671905][ T8732] pgfault 57255 [ 512.671905][ T8732] pgmajfault 0 [ 512.671905][ T8732] workingset_refault 0 [ 512.671905][ T8732] workingset_activate 0 [ 512.671905][ T8732] workingset_nodereclaim 0 [ 512.671905][ T8732] pgrefill 71 [ 512.671905][ T8732] pgscan 66 [ 512.671905][ T8732] pgsteal 0 [ 512.671905][ T8732] pgactivate 33 [ 512.767713][ T8732] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=19392,uid=0 [ 512.783235][ T8732] Memory cgroup out of memory: Killed process 19392 (syz-executor.5) total-vm:72708kB, anon-rss:2220kB, file-rss:35800kB, shmem-rss:0kB, UID:0 pgtables:147456kB oom_score_adj:1000 [ 512.804365][ T1065] oom_reaper: reaped process 19392 (syz-executor.5), now anon-rss:0kB, file-rss:34840kB, shmem-rss:0kB [ 512.806111][ T8732] syz-executor.5 invoked oom-killer: gfp_mask=0x40c50(GFP_NOFS|__GFP_COMP|__GFP_RECLAIMABLE), order=0, oom_score_adj=0 [ 512.828929][ T8732] CPU: 1 PID: 8732 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 512.837956][ T8732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 512.848014][ T8732] Call Trace: [ 512.851312][ T8732] dump_stack+0x172/0x1f0 [ 512.855646][ T8732] dump_header+0x177/0x1152 [ 512.860154][ T8732] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 512.865957][ T8732] ? ___ratelimit+0x2c8/0x595 [ 512.870632][ T8732] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 512.876435][ T8732] ? lockdep_hardirqs_on+0x418/0x5d0 [ 512.881717][ T8732] ? trace_hardirqs_on+0x67/0x240 [ 512.886743][ T8732] ? pagefault_out_of_memory+0x11c/0x11c [ 512.892374][ T8732] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 512.898174][ T8732] ? ___ratelimit+0x60/0x595 [ 512.902761][ T8732] ? do_raw_spin_unlock+0x57/0x270 [ 512.907868][ T8732] oom_kill_process.cold+0x10/0x15 [ 512.912978][ T8732] out_of_memory+0x334/0x1340 [ 512.917647][ T8732] ? lock_downgrade+0x920/0x920 [ 512.922504][ T8732] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 512.928308][ T8732] ? oom_killer_disable+0x280/0x280 [ 512.933520][ T8732] mem_cgroup_out_of_memory+0x1d8/0x240 [ 512.939063][ T8732] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 512.944694][ T8732] ? do_raw_spin_unlock+0x57/0x270 [ 512.949807][ T8732] ? _raw_spin_unlock+0x2d/0x50 [ 512.954660][ T8732] try_charge+0xf4b/0x1440 [ 512.959076][ T8732] ? __lock_acquire+0x800/0x4a00 [ 512.964018][ T8732] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 512.969555][ T8732] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 512.975528][ T8732] ? cache_grow_begin+0x122/0xd20 [ 512.980546][ T8732] ? find_held_lock+0x35/0x130 [ 512.985303][ T8732] ? cache_grow_begin+0x122/0xd20 [ 512.990334][ T8732] __memcg_kmem_charge_memcg+0x71/0xf0 [ 512.995787][ T8732] ? memcg_kmem_put_cache+0x50/0x50 [ 513.000983][ T8732] ? __kasan_check_read+0x11/0x20 [ 513.006004][ T8732] cache_grow_begin+0x629/0xd20 [ 513.010859][ T8732] ? __sanitizer_cov_trace_cmp2+0x11/0x20 [ 513.016572][ T8732] ? mempolicy_slab_node+0x139/0x390 [ 513.021852][ T8732] fallback_alloc+0x1fd/0x2d0 [ 513.026528][ T8732] ____cache_alloc_node+0x1bc/0x1d0 [ 513.031721][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 513.037955][ T8732] kmem_cache_alloc+0x1ef/0x710 [ 513.042800][ T8732] ? lock_downgrade+0x920/0x920 [ 513.047642][ T8732] ? rwlock_bug.part.0+0x90/0x90 [ 513.052579][ T8732] ? ratelimit_state_init+0xb0/0xb0 [ 513.057861][ T8732] ext4_alloc_inode+0x1f/0x640 [ 513.062619][ T8732] ? ratelimit_state_init+0xb0/0xb0 [ 513.067831][ T8732] alloc_inode+0x68/0x1e0 [ 513.072591][ T8732] iget_locked+0x1a6/0x4b0 [ 513.076988][ T8732] __ext4_iget+0x265/0x3bb0 [ 513.081473][ T8732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 513.087701][ T8732] ? ext4_get_projid+0x190/0x190 [ 513.092630][ T8732] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 513.098163][ T8732] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 513.104122][ T8732] ? d_alloc_parallel+0xa78/0x1c30 [ 513.109219][ T8732] ext4_lookup+0x3b1/0x7a0 [ 513.113613][ T8732] ? ext4_cross_rename+0x1430/0x1430 [ 513.118875][ T8732] ? __lock_acquire+0x16f2/0x4a00 [ 513.123874][ T8732] ? __kasan_check_read+0x11/0x20 [ 513.128884][ T8732] ? lockdep_init_map+0x1be/0x6d0 [ 513.133894][ T8732] __lookup_slow+0x279/0x500 [ 513.138462][ T8732] ? vfs_unlink+0x620/0x620 [ 513.142979][ T8732] lookup_slow+0x58/0x80 [ 513.147211][ T8732] path_mountpoint+0x5d2/0x1e60 [ 513.152040][ T8732] ? __kasan_check_read+0x11/0x20 [ 513.157042][ T8732] ? __lock_acquire+0x16f2/0x4a00 [ 513.162043][ T8732] ? putname+0xef/0x130 [ 513.166179][ T8732] ? path_openat+0x46d0/0x46d0 [ 513.170923][ T8732] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 513.176532][ T8732] ? find_held_lock+0x35/0x130 [ 513.181280][ T8732] filename_mountpoint+0x190/0x3c0 [ 513.186370][ T8732] ? filename_parentat.isra.0+0x410/0x410 [ 513.192065][ T8732] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 513.198201][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 513.204417][ T8732] ? __phys_addr_symbol+0x30/0x70 [ 513.209421][ T8732] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 513.215117][ T8732] ? __check_object_size+0x3d/0x437 [ 513.220307][ T8732] ? strncpy_from_user+0x2b4/0x400 [ 513.225404][ T8732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 513.231619][ T8732] ? getname_flags+0x277/0x5b0 [ 513.236361][ T8732] user_path_mountpoint_at+0x3a/0x50 [ 513.241623][ T8732] ksys_umount+0x167/0xf00 [ 513.246016][ T8732] ? __ia32_sys_rmdir+0x40/0x40 [ 513.250844][ T8732] ? __detach_mounts+0x2a0/0x2a0 [ 513.255775][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 513.261991][ T8732] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 513.267436][ T8732] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 513.272872][ T8732] ? do_syscall_64+0x26/0x760 [ 513.277525][ T8732] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 513.283583][ T8732] ? do_syscall_64+0x26/0x760 [ 513.288259][ T8732] ? lockdep_hardirqs_on+0x418/0x5d0 [ 513.294315][ T8732] __x64_sys_umount+0x54/0x80 [ 513.298978][ T8732] do_syscall_64+0xfa/0x760 [ 513.303470][ T8732] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 513.309347][ T8732] RIP: 0033:0x45c317 [ 513.313228][ T8732] Code: 64 89 04 25 d0 02 00 00 58 5f ff d0 48 89 c7 e8 2f be ff ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 513.332809][ T8732] RSP: 002b:00007ffd499cd938 EFLAGS: 00000206 ORIG_RAX: 00000000000000a6 [ 513.341196][ T8732] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045c317 [ 513.349144][ T8732] RDX: 0000000000403520 RSI: 0000000000000002 RDI: 00007ffd499cd9e0 [ 513.357127][ T8732] RBP: 00000000000006f3 R08: 0000000000000000 R09: 000000000000000c [ 513.365096][ T8732] R10: 0000000000000006 R11: 0000000000000206 R12: 00007ffd499cea70 [ 513.373053][ T8732] R13: 00005555560f8940 R14: 0000000000000000 R15: 00007ffd499cea70 [ 513.381877][ T8732] memory: usage 42640kB, limit 0kB, failcnt 74 [ 513.388067][ T8732] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 513.394973][ T8732] Memory cgroup stats for /syz5: [ 513.395072][ T8732] anon 35569664 [ 513.395072][ T8732] file 0 [ 513.395072][ T8732] kernel_stack 524288 [ 513.395072][ T8732] slab 5308416 [ 513.395072][ T8732] sock 0 [ 513.395072][ T8732] shmem 110592 [ 513.395072][ T8732] file_mapped 135168 [ 513.395072][ T8732] file_dirty 0 [ 513.395072][ T8732] file_writeback 0 [ 513.395072][ T8732] anon_thp 33554432 [ 513.395072][ T8732] inactive_anon 0 [ 513.395072][ T8732] active_anon 35569664 [ 513.395072][ T8732] inactive_file 0 [ 513.395072][ T8732] active_file 135168 [ 513.395072][ T8732] unevictable 0 [ 513.395072][ T8732] slab_reclaimable 1622016 [ 513.395072][ T8732] slab_unreclaimable 3686400 [ 513.395072][ T8732] pgfault 57255 [ 513.395072][ T8732] pgmajfault 0 [ 513.395072][ T8732] workingset_refault 0 [ 513.395072][ T8732] workingset_activate 0 [ 513.395072][ T8732] workingset_nodereclaim 0 [ 513.395072][ T8732] pgrefill 71 [ 513.395072][ T8732] pgscan 66 [ 513.395072][ T8732] pgsteal 0 [ 513.395072][ T8732] pgactivate 33 [ 513.490985][ T8732] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=18846,uid=0 [ 513.491100][ T8732] Memory cgroup out of memory: Killed process 18846 (syz-executor.5) total-vm:72840kB, anon-rss:2228kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:147456kB oom_score_adj:1000 [ 513.526518][ T1065] oom_reaper: reaped process 18846 (syz-executor.5), now anon-rss:0kB, file-rss:34832kB, shmem-rss:0kB [ 513.528624][ T8732] syz-executor.5 invoked oom-killer: gfp_mask=0x40c50(GFP_NOFS|__GFP_COMP|__GFP_RECLAIMABLE), order=0, oom_score_adj=0 [ 513.550865][ T8732] CPU: 1 PID: 8732 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 513.559891][ T8732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 513.559897][ T8732] Call Trace: [ 513.559916][ T8732] dump_stack+0x172/0x1f0 [ 513.559935][ T8732] dump_header+0x177/0x1152 [ 513.559950][ T8732] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 513.559965][ T8732] ? ___ratelimit+0x2c8/0x595 [ 513.582076][ T8732] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 513.592522][ T8732] ? lockdep_hardirqs_on+0x418/0x5d0 [ 513.592537][ T8732] ? trace_hardirqs_on+0x67/0x240 [ 513.592558][ T8732] ? pagefault_out_of_memory+0x11c/0x11c [ 513.603616][ T8732] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 513.614214][ T8732] ? ___ratelimit+0x60/0x595 [ 513.614226][ T8732] ? do_raw_spin_unlock+0x57/0x270 [ 513.614243][ T8732] oom_kill_process.cold+0x10/0x15 [ 513.614264][ T8732] out_of_memory+0x334/0x1340 [ 513.624610][ T8732] ? lock_downgrade+0x920/0x920 [ 513.634796][ T8732] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 513.644269][ T8732] ? oom_killer_disable+0x280/0x280 [ 513.655227][ T8732] mem_cgroup_out_of_memory+0x1d8/0x240 [ 513.660753][ T8732] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 513.666368][ T8732] ? do_raw_spin_unlock+0x57/0x270 [ 513.671460][ T8732] ? _raw_spin_unlock+0x2d/0x50 [ 513.676288][ T8732] try_charge+0xf4b/0x1440 [ 513.680686][ T8732] ? __lock_acquire+0x800/0x4a00 [ 513.685605][ T8732] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 513.691129][ T8732] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 513.697085][ T8732] ? cache_grow_begin+0x122/0xd20 [ 513.702086][ T8732] ? find_held_lock+0x35/0x130 [ 513.706838][ T8732] ? cache_grow_begin+0x122/0xd20 [ 513.711873][ T8732] __memcg_kmem_charge_memcg+0x71/0xf0 [ 513.717311][ T8732] ? memcg_kmem_put_cache+0x50/0x50 [ 513.722485][ T8732] ? __kasan_check_read+0x11/0x20 [ 513.727484][ T8732] cache_grow_begin+0x629/0xd20 [ 513.732312][ T8732] ? __sanitizer_cov_trace_cmp2+0x11/0x20 [ 513.738008][ T8732] ? mempolicy_slab_node+0x139/0x390 [ 513.743269][ T8732] fallback_alloc+0x1fd/0x2d0 [ 513.747923][ T8732] ____cache_alloc_node+0x1bc/0x1d0 [ 513.753096][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 513.759392][ T8732] kmem_cache_alloc+0x1ef/0x710 [ 513.764223][ T8732] ? lock_downgrade+0x920/0x920 [ 513.769049][ T8732] ? rwlock_bug.part.0+0x90/0x90 [ 513.773964][ T8732] ? ratelimit_state_init+0xb0/0xb0 [ 513.779137][ T8732] ext4_alloc_inode+0x1f/0x640 [ 513.783877][ T8732] ? ratelimit_state_init+0xb0/0xb0 [ 513.789049][ T8732] alloc_inode+0x68/0x1e0 [ 513.793361][ T8732] iget_locked+0x1a6/0x4b0 [ 513.797782][ T8732] __ext4_iget+0x265/0x3bb0 [ 513.802265][ T8732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 513.808499][ T8732] ? ext4_get_projid+0x190/0x190 [ 513.813425][ T8732] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 513.818958][ T8732] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 513.824912][ T8732] ? d_alloc_parallel+0xa78/0x1c30 [ 513.830004][ T8732] ext4_lookup+0x3b1/0x7a0 [ 513.834400][ T8732] ? ext4_cross_rename+0x1430/0x1430 [ 513.839677][ T8732] ? __lock_acquire+0x16f2/0x4a00 [ 513.844676][ T8732] ? __kasan_check_read+0x11/0x20 [ 513.850027][ T8732] ? lockdep_init_map+0x1be/0x6d0 [ 513.855031][ T8732] __lookup_slow+0x279/0x500 [ 513.859612][ T8732] ? vfs_unlink+0x620/0x620 [ 513.864107][ T8732] lookup_slow+0x58/0x80 [ 513.868332][ T8732] path_mountpoint+0x5d2/0x1e60 [ 513.873169][ T8732] ? __kasan_check_read+0x11/0x20 [ 513.878169][ T8732] ? __lock_acquire+0x16f2/0x4a00 [ 513.883167][ T8732] ? putname+0xef/0x130 [ 513.887302][ T8732] ? path_openat+0x46d0/0x46d0 [ 513.892042][ T8732] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 513.897652][ T8732] ? find_held_lock+0x35/0x130 [ 513.902409][ T8732] filename_mountpoint+0x190/0x3c0 [ 513.907498][ T8732] ? filename_parentat.isra.0+0x410/0x410 [ 513.913195][ T8732] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 513.919350][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 513.925588][ T8732] ? __phys_addr_symbol+0x30/0x70 [ 513.930587][ T8732] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 513.936282][ T8732] ? __check_object_size+0x3d/0x437 [ 513.941476][ T8732] ? strncpy_from_user+0x2b4/0x400 [ 513.946568][ T8732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 513.952782][ T8732] ? getname_flags+0x277/0x5b0 [ 513.957541][ T8732] user_path_mountpoint_at+0x3a/0x50 [ 513.962820][ T8732] ksys_umount+0x167/0xf00 [ 513.967337][ T8732] ? __ia32_sys_rmdir+0x40/0x40 [ 513.972175][ T8732] ? __detach_mounts+0x2a0/0x2a0 [ 513.977096][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 513.983318][ T8732] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 513.988772][ T8732] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 513.994223][ T8732] ? do_syscall_64+0x26/0x760 [ 513.998880][ T8732] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 514.004942][ T8732] ? do_syscall_64+0x26/0x760 [ 514.009610][ T8732] ? lockdep_hardirqs_on+0x418/0x5d0 [ 514.014876][ T8732] __x64_sys_umount+0x54/0x80 [ 514.019534][ T8732] do_syscall_64+0xfa/0x760 [ 514.024016][ T8732] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 514.029896][ T8732] RIP: 0033:0x45c317 [ 514.033826][ T8732] Code: 64 89 04 25 d0 02 00 00 58 5f ff d0 48 89 c7 e8 2f be ff ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 514.053416][ T8732] RSP: 002b:00007ffd499cd938 EFLAGS: 00000206 ORIG_RAX: 00000000000000a6 [ 514.061820][ T8732] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045c317 [ 514.069780][ T8732] RDX: 0000000000403520 RSI: 0000000000000002 RDI: 00007ffd499cd9e0 [ 514.077736][ T8732] RBP: 00000000000006f3 R08: 0000000000000000 R09: 000000000000000c [ 514.085687][ T8732] R10: 0000000000000006 R11: 0000000000000206 R12: 00007ffd499cea70 [ 514.093636][ T8732] R13: 00005555560f8940 R14: 0000000000000000 R15: 00007ffd499cea70 [ 514.102747][ T8732] memory: usage 40324kB, limit 0kB, failcnt 81 [ 514.108925][ T8732] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 514.115880][ T8732] Memory cgroup stats for /syz5: [ 514.115978][ T8732] anon 33357824 [ 514.115978][ T8732] file 0 [ 514.115978][ T8732] kernel_stack 524288 [ 514.115978][ T8732] slab 5308416 [ 514.115978][ T8732] sock 0 [ 514.115978][ T8732] shmem 110592 [ 514.115978][ T8732] file_mapped 135168 [ 514.115978][ T8732] file_dirty 0 [ 514.115978][ T8732] file_writeback 0 [ 514.115978][ T8732] anon_thp 31457280 [ 514.115978][ T8732] inactive_anon 0 [ 514.115978][ T8732] active_anon 33357824 [ 514.115978][ T8732] inactive_file 0 [ 514.115978][ T8732] active_file 135168 [ 514.115978][ T8732] unevictable 0 [ 514.115978][ T8732] slab_reclaimable 1622016 [ 514.115978][ T8732] slab_unreclaimable 3686400 [ 514.115978][ T8732] pgfault 57255 [ 514.115978][ T8732] pgmajfault 0 [ 514.115978][ T8732] workingset_refault 0 [ 514.115978][ T8732] workingset_activate 0 [ 514.115978][ T8732] workingset_nodereclaim 0 [ 514.115978][ T8732] pgrefill 71 [ 514.115978][ T8732] pgscan 66 [ 514.115978][ T8732] pgsteal 33 [ 514.115978][ T8732] pgactivate 33 [ 514.211954][ T8732] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=19379,uid=0 [ 514.227479][ T8732] Memory cgroup out of memory: Killed process 19379 (syz-executor.5) total-vm:72576kB, anon-rss:2212kB, file-rss:35808kB, shmem-rss:0kB, UID:0 pgtables:143360kB oom_score_adj:1000 [ 514.246684][ T1065] oom_reaper: reaped process 19379 (syz-executor.5), now anon-rss:0kB, file-rss:34848kB, shmem-rss:0kB [ 514.248570][ T8732] syz-executor.5 invoked oom-killer: gfp_mask=0x40c50(GFP_NOFS|__GFP_COMP|__GFP_RECLAIMABLE), order=0, oom_score_adj=0 [ 514.270365][ T8732] CPU: 1 PID: 8732 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 514.279382][ T8732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 514.289467][ T8732] Call Trace: [ 514.292762][ T8732] dump_stack+0x172/0x1f0 [ 514.297070][ T8732] dump_header+0x177/0x1152 [ 514.301552][ T8732] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 514.307345][ T8732] ? ___ratelimit+0x2c8/0x595 [ 514.311999][ T8732] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 514.317805][ T8732] ? lockdep_hardirqs_on+0x418/0x5d0 [ 514.323078][ T8732] ? trace_hardirqs_on+0x67/0x240 [ 514.328128][ T8732] ? pagefault_out_of_memory+0x11c/0x11c [ 514.333744][ T8732] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 514.339618][ T8732] ? ___ratelimit+0x60/0x595 [ 514.344188][ T8732] ? do_raw_spin_unlock+0x57/0x270 [ 514.349304][ T8732] oom_kill_process.cold+0x10/0x15 [ 514.354423][ T8732] out_of_memory+0x334/0x1340 [ 514.359097][ T8732] ? lock_downgrade+0x920/0x920 [ 514.364046][ T8732] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 514.369880][ T8732] ? oom_killer_disable+0x280/0x280 [ 514.375062][ T8732] mem_cgroup_out_of_memory+0x1d8/0x240 [ 514.380586][ T8732] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 514.386201][ T8732] ? do_raw_spin_unlock+0x57/0x270 [ 514.391292][ T8732] ? _raw_spin_unlock+0x2d/0x50 [ 514.396137][ T8732] try_charge+0xf4b/0x1440 [ 514.400537][ T8732] ? __lock_acquire+0x800/0x4a00 [ 514.405454][ T8732] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 514.410979][ T8732] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 514.416934][ T8732] ? cache_grow_begin+0x122/0xd20 [ 514.421934][ T8732] ? find_held_lock+0x35/0x130 [ 514.426672][ T8732] ? cache_grow_begin+0x122/0xd20 [ 514.431678][ T8732] __memcg_kmem_charge_memcg+0x71/0xf0 [ 514.437112][ T8732] ? memcg_kmem_put_cache+0x50/0x50 [ 514.442294][ T8732] ? __kasan_check_read+0x11/0x20 [ 514.447301][ T8732] cache_grow_begin+0x629/0xd20 [ 514.452129][ T8732] ? __sanitizer_cov_trace_cmp2+0x11/0x20 [ 514.457825][ T8732] ? mempolicy_slab_node+0x139/0x390 [ 514.463086][ T8732] fallback_alloc+0x1fd/0x2d0 [ 514.467753][ T8732] ____cache_alloc_node+0x1bc/0x1d0 [ 514.472926][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 514.479142][ T8732] kmem_cache_alloc+0x1ef/0x710 [ 514.483979][ T8732] ? lock_downgrade+0x920/0x920 [ 514.488811][ T8732] ? rwlock_bug.part.0+0x90/0x90 [ 514.493727][ T8732] ? ratelimit_state_init+0xb0/0xb0 [ 514.498907][ T8732] ext4_alloc_inode+0x1f/0x640 [ 514.503646][ T8732] ? ratelimit_state_init+0xb0/0xb0 [ 514.508820][ T8732] alloc_inode+0x68/0x1e0 [ 514.513127][ T8732] iget_locked+0x1a6/0x4b0 [ 514.517524][ T8732] __ext4_iget+0x265/0x3bb0 [ 514.522029][ T8732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 514.528469][ T8732] ? ext4_get_projid+0x190/0x190 [ 514.533396][ T8732] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 514.538921][ T8732] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 514.544883][ T8732] ? d_alloc_parallel+0xa78/0x1c30 [ 514.549977][ T8732] ext4_lookup+0x3b1/0x7a0 [ 514.554373][ T8732] ? ext4_cross_rename+0x1430/0x1430 [ 514.559636][ T8732] ? __lock_acquire+0x16f2/0x4a00 [ 514.564666][ T8732] ? __kasan_check_read+0x11/0x20 [ 514.569679][ T8732] ? lockdep_init_map+0x1be/0x6d0 [ 514.574805][ T8732] __lookup_slow+0x279/0x500 [ 514.579387][ T8732] ? vfs_unlink+0x620/0x620 [ 514.583889][ T8732] lookup_slow+0x58/0x80 [ 514.588115][ T8732] path_mountpoint+0x5d2/0x1e60 [ 514.592963][ T8732] ? __kasan_check_read+0x11/0x20 [ 514.597972][ T8732] ? __lock_acquire+0x16f2/0x4a00 [ 514.602987][ T8732] ? putname+0xef/0x130 [ 514.607124][ T8732] ? path_openat+0x46d0/0x46d0 [ 514.611889][ T8732] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 514.617499][ T8732] ? find_held_lock+0x35/0x130 [ 514.622255][ T8732] filename_mountpoint+0x190/0x3c0 [ 514.627355][ T8732] ? filename_parentat.isra.0+0x410/0x410 [ 514.633065][ T8732] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 514.639323][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 514.645613][ T8732] ? __phys_addr_symbol+0x30/0x70 [ 514.650616][ T8732] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 514.656317][ T8732] ? __check_object_size+0x3d/0x437 [ 514.661566][ T8732] ? strncpy_from_user+0x2b4/0x400 [ 514.666662][ T8732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 514.672885][ T8732] ? getname_flags+0x277/0x5b0 [ 514.677629][ T8732] user_path_mountpoint_at+0x3a/0x50 [ 514.682919][ T8732] ksys_umount+0x167/0xf00 [ 514.687315][ T8732] ? __ia32_sys_rmdir+0x40/0x40 [ 514.692213][ T8732] ? __detach_mounts+0x2a0/0x2a0 [ 514.697138][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 514.703468][ T8732] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 514.708910][ T8732] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 514.714384][ T8732] ? do_syscall_64+0x26/0x760 [ 514.719054][ T8732] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 514.725114][ T8732] ? do_syscall_64+0x26/0x760 [ 514.729774][ T8732] ? lockdep_hardirqs_on+0x418/0x5d0 [ 514.735040][ T8732] __x64_sys_umount+0x54/0x80 [ 514.739697][ T8732] do_syscall_64+0xfa/0x760 [ 514.744199][ T8732] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 514.750070][ T8732] RIP: 0033:0x45c317 [ 514.753941][ T8732] Code: 64 89 04 25 d0 02 00 00 58 5f ff d0 48 89 c7 e8 2f be ff ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 514.773521][ T8732] RSP: 002b:00007ffd499cd938 EFLAGS: 00000206 ORIG_RAX: 00000000000000a6 [ 514.781906][ T8732] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045c317 [ 514.789869][ T8732] RDX: 0000000000403520 RSI: 0000000000000002 RDI: 00007ffd499cd9e0 [ 514.797816][ T8732] RBP: 00000000000006f3 R08: 0000000000000000 R09: 000000000000000c [ 514.805774][ T8732] R10: 0000000000000006 R11: 0000000000000206 R12: 00007ffd499cea70 [ 514.813737][ T8732] R13: 00005555560f8940 R14: 0000000000000000 R15: 00007ffd499cea70 [ 514.822080][ T8732] memory: usage 37960kB, limit 0kB, failcnt 87 [ 514.828244][ T8732] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 514.835447][ T8732] Memory cgroup stats for /syz5: [ 514.835543][ T8732] anon 31129600 [ 514.835543][ T8732] file 0 [ 514.835543][ T8732] kernel_stack 458752 [ 514.835543][ T8732] slab 5308416 [ 514.835543][ T8732] sock 0 [ 514.835543][ T8732] shmem 110592 [ 514.835543][ T8732] file_mapped 135168 [ 514.835543][ T8732] file_dirty 0 [ 514.835543][ T8732] file_writeback 0 [ 514.835543][ T8732] anon_thp 29360128 [ 514.835543][ T8732] inactive_anon 0 [ 514.835543][ T8732] active_anon 31129600 [ 514.835543][ T8732] inactive_file 0 [ 514.835543][ T8732] active_file 135168 [ 514.835543][ T8732] unevictable 0 [ 514.835543][ T8732] slab_reclaimable 1622016 [ 514.835543][ T8732] slab_unreclaimable 3686400 [ 514.835543][ T8732] pgfault 57255 [ 514.835543][ T8732] pgmajfault 0 [ 514.835543][ T8732] workingset_refault 0 [ 514.835543][ T8732] workingset_activate 0 [ 514.835543][ T8732] workingset_nodereclaim 0 [ 514.835543][ T8732] pgrefill 71 [ 514.835543][ T8732] pgscan 66 [ 514.835543][ T8732] pgsteal 33 [ 514.835543][ T8732] pgactivate 33 [ 514.840561][ T8732] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=18869,uid=0 [ 514.947486][ T8732] Memory cgroup out of memory: Killed process 18869 (syz-executor.5) total-vm:72576kB, anon-rss:2212kB, file-rss:35804kB, shmem-rss:0kB, UID:0 pgtables:143360kB oom_score_adj:1000 08:45:02 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_type(r0, &(0x7f0000000680)='cgroup.type\x00', 0x2, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000001540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@ptr={0x0, 0x0, 0x0, 0x2, 0x2}, @volatile={0x0, 0x0, 0x0, 0x4}]}}, &(0x7f00000002c0)=""/245, 0x32, 0xf5, 0x1}, 0x20) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x42400) openat$cgroup_procs(r2, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000140)=0x2) socket$kcm(0x11, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)={[{0x0, 'cpu'}, {0x2f, 'io'}]}, 0x9) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r2, 0x7, 0x0, 0x6, 0x0}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000003c0)={r3, 0x10, &(0x7f0000000280)={&(0x7f0000000000)=""/31, 0x1f}}, 0x10) write$cgroup_int(r4, 0x0, 0x0) 08:45:02 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_type(r0, &(0x7f0000000680)='cgroup.type\x00', 0x2, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000001540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@ptr={0x0, 0x0, 0x0, 0x2, 0x2}, @volatile={0x0, 0x0, 0x0, 0x4}]}}, &(0x7f00000002c0)=""/245, 0x32, 0xf5, 0x1}, 0x20) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x42400) openat$cgroup_procs(r2, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000140)=0x2) socket$kcm(0x11, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)={[{0x0, 'cpu'}, {0x2f, 'io'}]}, 0x9) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r2, 0x7, 0x0, 0x6, 0x0}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000003c0)={r3, 0x10, &(0x7f0000000280)={&(0x7f0000000000)=""/31, 0x1f}}, 0x10) write$cgroup_int(r4, 0x0, 0x0) 08:45:02 executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000980)='net/sofH\x16tnet_sua') openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='stat\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) preadv(r1, &(0x7f00000017c0), 0x199, 0x0) 08:45:02 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_type(r0, &(0x7f0000000680)='cgroup.type\x00', 0x2, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000001540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@ptr={0x0, 0x0, 0x0, 0x2, 0x2}, @volatile={0x0, 0x0, 0x0, 0x4}]}}, &(0x7f00000002c0)=""/245, 0x32, 0xf5, 0x1}, 0x20) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x42400) openat$cgroup_procs(r2, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000140)=0x2) socket$kcm(0x11, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)={[{0x0, 'cpu'}, {0x2f, 'io'}]}, 0x9) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r2, 0x7, 0x0, 0x6, 0x0}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000003c0)={r3, 0x10, &(0x7f0000000280)={&(0x7f0000000000)=""/31, 0x1f}}, 0x10) write$cgroup_int(r4, 0x0, 0x0) 08:45:02 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000980)='net/sofH\x16tnet_sua') openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='stat\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) preadv(r1, &(0x7f00000017c0), 0x199, 0x0) 08:45:02 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_type(r0, &(0x7f0000000680)='cgroup.type\x00', 0x2, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000001540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@ptr={0x0, 0x0, 0x0, 0x2, 0x2}, @volatile={0x0, 0x0, 0x0, 0x4}]}}, &(0x7f00000002c0)=""/245, 0x32, 0xf5, 0x1}, 0x20) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x42400) openat$cgroup_procs(r2, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000140)=0x2) socket$kcm(0x11, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)={[{0x0, 'cpu'}, {0x2f, 'io'}]}, 0x9) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r2, 0x7, 0x0, 0x6, 0x0}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000003c0)={r3, 0x10, &(0x7f0000000280)={&(0x7f0000000000)=""/31, 0x1f}}, 0x10) write$cgroup_int(r4, 0x0, 0x0) [ 514.967109][ T1065] oom_reaper: reaped process 18869 (syz-executor.5), now anon-rss:0kB, file-rss:34844kB, shmem-rss:0kB [ 514.968743][ T8732] syz-executor.5 invoked oom-killer: gfp_mask=0x40c50(GFP_NOFS|__GFP_COMP|__GFP_RECLAIMABLE), order=0, oom_score_adj=0 [ 515.014559][ T8732] CPU: 1 PID: 8732 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 515.023614][ T8732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 515.033664][ T8732] Call Trace: [ 515.036959][ T8732] dump_stack+0x172/0x1f0 [ 515.041297][ T8732] dump_header+0x177/0x1152 [ 515.045803][ T8732] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 515.051608][ T8732] ? ___ratelimit+0x2c8/0x595 [ 515.056301][ T8732] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 08:45:02 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_type(r0, &(0x7f0000000680)='cgroup.type\x00', 0x2, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000001540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@ptr={0x0, 0x0, 0x0, 0x2, 0x2}, @volatile={0x0, 0x0, 0x0, 0x4}]}}, &(0x7f00000002c0)=""/245, 0x32, 0xf5, 0x1}, 0x20) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x42400) openat$cgroup_procs(r2, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000140)=0x2) socket$kcm(0x11, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)={[{0x0, 'cpu'}, {0x2f, 'io'}]}, 0x9) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r2, 0x7, 0x0, 0x6, 0x0}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000003c0)={r3, 0x10, &(0x7f0000000280)={&(0x7f0000000000)=""/31, 0x1f}}, 0x10) write$cgroup_int(r4, 0x0, 0x0) [ 515.062109][ T8732] ? lockdep_hardirqs_on+0x418/0x5d0 [ 515.067396][ T8732] ? trace_hardirqs_on+0x67/0x240 [ 515.072605][ T8732] ? pagefault_out_of_memory+0x11c/0x11c [ 515.078244][ T8732] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 515.084050][ T8732] ? ___ratelimit+0x60/0x595 [ 515.088630][ T8732] ? do_raw_spin_unlock+0x57/0x270 [ 515.093729][ T8732] oom_kill_process.cold+0x10/0x15 [ 515.098819][ T8732] out_of_memory+0x334/0x1340 [ 515.103474][ T8732] ? lock_downgrade+0x920/0x920 [ 515.108480][ T8732] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 515.114266][ T8732] ? oom_killer_disable+0x280/0x280 [ 515.119457][ T8732] mem_cgroup_out_of_memory+0x1d8/0x240 [ 515.124981][ T8732] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 515.130596][ T8732] ? do_raw_spin_unlock+0x57/0x270 [ 515.135690][ T8732] ? _raw_spin_unlock+0x2d/0x50 [ 515.140520][ T8732] try_charge+0xf4b/0x1440 [ 515.145178][ T8732] ? __lock_acquire+0x800/0x4a00 [ 515.150108][ T8732] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 515.155635][ T8732] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 515.161619][ T8732] ? cache_grow_begin+0x122/0xd20 [ 515.166635][ T8732] ? find_held_lock+0x35/0x130 [ 515.171399][ T8732] ? cache_grow_begin+0x122/0xd20 [ 515.176429][ T8732] __memcg_kmem_charge_memcg+0x71/0xf0 [ 515.181891][ T8732] ? memcg_kmem_put_cache+0x50/0x50 [ 515.187097][ T8732] ? __kasan_check_read+0x11/0x20 [ 515.192135][ T8732] cache_grow_begin+0x629/0xd20 [ 515.196997][ T8732] ? __sanitizer_cov_trace_cmp2+0x11/0x20 [ 515.202722][ T8732] ? mempolicy_slab_node+0x139/0x390 [ 515.208004][ T8732] fallback_alloc+0x1fd/0x2d0 [ 515.212683][ T8732] ____cache_alloc_node+0x1bc/0x1d0 [ 515.217877][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 515.224113][ T8732] kmem_cache_alloc+0x1ef/0x710 [ 515.228965][ T8732] ? lock_downgrade+0x920/0x920 [ 515.233811][ T8732] ? rwlock_bug.part.0+0x90/0x90 [ 515.238748][ T8732] ? ratelimit_state_init+0xb0/0xb0 [ 515.243944][ T8732] ext4_alloc_inode+0x1f/0x640 [ 515.248703][ T8732] ? ratelimit_state_init+0xb0/0xb0 [ 515.253898][ T8732] alloc_inode+0x68/0x1e0 [ 515.258223][ T8732] iget_locked+0x1a6/0x4b0 [ 515.262639][ T8732] __ext4_iget+0x265/0x3bb0 [ 515.267143][ T8732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 515.273390][ T8732] ? ext4_get_projid+0x190/0x190 [ 515.278325][ T8732] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 515.283866][ T8732] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 515.289837][ T8732] ? d_alloc_parallel+0xa78/0x1c30 [ 515.294950][ T8732] ext4_lookup+0x3b1/0x7a0 [ 515.299379][ T8732] ? ext4_cross_rename+0x1430/0x1430 [ 515.304663][ T8732] ? __lock_acquire+0x16f2/0x4a00 [ 515.309690][ T8732] ? __kasan_check_read+0x11/0x20 [ 515.314721][ T8732] ? lockdep_init_map+0x1be/0x6d0 [ 515.319751][ T8732] __lookup_slow+0x279/0x500 [ 515.324346][ T8732] ? vfs_unlink+0x620/0x620 [ 515.328871][ T8732] lookup_slow+0x58/0x80 [ 515.333111][ T8732] path_mountpoint+0x5d2/0x1e60 [ 515.337954][ T8732] ? __kasan_check_read+0x11/0x20 [ 515.343002][ T8732] ? __lock_acquire+0x16f2/0x4a00 [ 515.348018][ T8732] ? putname+0xef/0x130 [ 515.352171][ T8732] ? path_openat+0x46d0/0x46d0 [ 515.356929][ T8732] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 515.362570][ T8732] ? find_held_lock+0x35/0x130 [ 515.367344][ T8732] filename_mountpoint+0x190/0x3c0 [ 515.372458][ T8732] ? filename_parentat.isra.0+0x410/0x410 [ 515.378173][ T8732] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 515.384341][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 515.390579][ T8732] ? __phys_addr_symbol+0x30/0x70 [ 515.395594][ T8732] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 515.401308][ T8732] ? __check_object_size+0x3d/0x437 [ 515.406509][ T8732] ? strncpy_from_user+0x2b4/0x400 [ 515.411623][ T8732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 515.417859][ T8732] ? getname_flags+0x277/0x5b0 [ 515.422623][ T8732] user_path_mountpoint_at+0x3a/0x50 [ 515.427904][ T8732] ksys_umount+0x167/0xf00 [ 515.432337][ T8732] ? __ia32_sys_rmdir+0x40/0x40 [ 515.437182][ T8732] ? __detach_mounts+0x2a0/0x2a0 [ 515.442113][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 515.448349][ T8732] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 515.453799][ T8732] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 515.459275][ T8732] ? do_syscall_64+0x26/0x760 [ 515.463952][ T8732] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 515.470033][ T8732] ? do_syscall_64+0x26/0x760 [ 515.474709][ T8732] ? lockdep_hardirqs_on+0x418/0x5d0 [ 515.479994][ T8732] __x64_sys_umount+0x54/0x80 [ 515.484682][ T8732] do_syscall_64+0xfa/0x760 [ 515.489190][ T8732] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 515.495077][ T8732] RIP: 0033:0x45c317 [ 515.498967][ T8732] Code: 64 89 04 25 d0 02 00 00 58 5f ff d0 48 89 c7 e8 2f be ff ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 515.518559][ T8732] RSP: 002b:00007ffd499cd938 EFLAGS: 00000206 ORIG_RAX: 00000000000000a6 [ 515.526959][ T8732] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045c317 [ 515.534933][ T8732] RDX: 0000000000403520 RSI: 0000000000000002 RDI: 00007ffd499cd9e0 [ 515.542907][ T8732] RBP: 00000000000006f3 R08: 0000000000000000 R09: 000000000000000c [ 515.550874][ T8732] R10: 0000000000000006 R11: 0000000000000206 R12: 00007ffd499cea70 [ 515.558841][ T8732] R13: 00005555560f8940 R14: 0000000000000000 R15: 00007ffd499cea70 [ 515.572021][ T8732] memory: usage 35464kB, limit 0kB, failcnt 93 [ 515.599549][ T8732] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 515.606641][ T8732] Memory cgroup stats for /syz5: [ 515.606762][ T8732] anon 28930048 [ 515.606762][ T8732] file 0 [ 515.606762][ T8732] kernel_stack 458752 [ 515.606762][ T8732] slab 5169152 [ 515.606762][ T8732] sock 0 [ 515.606762][ T8732] shmem 110592 [ 515.606762][ T8732] file_mapped 135168 [ 515.606762][ T8732] file_dirty 0 [ 515.606762][ T8732] file_writeback 0 [ 515.606762][ T8732] anon_thp 27262976 [ 515.606762][ T8732] inactive_anon 0 [ 515.606762][ T8732] active_anon 28930048 [ 515.606762][ T8732] inactive_file 0 [ 515.606762][ T8732] active_file 135168 [ 515.606762][ T8732] unevictable 0 [ 515.606762][ T8732] slab_reclaimable 1622016 [ 515.606762][ T8732] slab_unreclaimable 3547136 [ 515.606762][ T8732] pgfault 57255 [ 515.606762][ T8732] pgmajfault 0 [ 515.606762][ T8732] workingset_refault 0 [ 515.606762][ T8732] workingset_activate 0 [ 515.606762][ T8732] workingset_nodereclaim 0 [ 515.606762][ T8732] pgrefill 71 [ 515.606762][ T8732] pgscan 66 [ 515.606762][ T8732] pgsteal 33 [ 515.606762][ T8732] pgactivate 33 [ 515.711740][ T8732] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=18902,uid=0 [ 515.789996][ T8732] Memory cgroup out of memory: Killed process 18902 (syz-executor.5) total-vm:72576kB, anon-rss:2212kB, file-rss:35800kB, shmem-rss:0kB, UID:0 pgtables:143360kB oom_score_adj:1000 [ 515.876294][T13408] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 515.909437][T13408] CPU: 0 PID: 13408 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 515.918586][T13408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 515.928639][T13408] Call Trace: [ 515.931934][T13408] dump_stack+0x172/0x1f0 [ 515.936271][T13408] dump_header+0x177/0x1152 [ 515.940779][T13408] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 515.946590][T13408] ? ___ratelimit+0x2c8/0x595 [ 515.951271][T13408] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 515.957081][T13408] ? lockdep_hardirqs_on+0x418/0x5d0 [ 515.962368][T13408] ? trace_hardirqs_on+0x67/0x240 [ 515.967398][T13408] ? pagefault_out_of_memory+0x11c/0x11c [ 515.973037][T13408] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 515.978846][T13408] ? ___ratelimit+0x60/0x595 [ 515.983435][T13408] ? do_raw_spin_unlock+0x57/0x270 [ 515.988551][T13408] oom_kill_process.cold+0x10/0x15 [ 515.993671][T13408] out_of_memory+0x334/0x1340 [ 515.998350][T13408] ? lock_downgrade+0x920/0x920 [ 516.003209][T13408] ? oom_killer_disable+0x280/0x280 [ 516.008425][T13408] mem_cgroup_out_of_memory+0x1d8/0x240 [ 516.013971][T13408] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 516.019605][T13408] ? do_raw_spin_unlock+0x57/0x270 [ 516.024714][T13408] ? _raw_spin_unlock+0x2d/0x50 [ 516.029600][T13408] try_charge+0xf4b/0x1440 [ 516.034027][T13408] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 516.039572][T13408] ? find_held_lock+0x35/0x130 [ 516.044337][T13408] ? get_mem_cgroup_from_mm+0x139/0x320 [ 516.049892][T13408] ? lock_downgrade+0x920/0x920 [ 516.054736][T13408] ? percpu_ref_tryget_live+0x111/0x290 [ 516.060283][T13408] __memcg_kmem_charge_memcg+0x71/0xf0 [ 516.065743][T13408] ? memcg_kmem_put_cache+0x50/0x50 [ 516.070949][T13408] ? get_mem_cgroup_from_mm+0x156/0x320 [ 516.076499][T13408] __memcg_kmem_charge+0x13a/0x3a0 [ 516.081615][T13408] __alloc_pages_nodemask+0x4f7/0x900 [ 516.086990][T13408] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 516.092539][T13408] ? __alloc_pages_slowpath+0x2540/0x2540 [ 516.098256][T13408] ? percpu_ref_put_many+0xb6/0x190 [ 516.103468][T13408] copy_process+0x3f8/0x6830 [ 516.108059][T13408] ? __kasan_check_read+0x11/0x20 [ 516.113114][T13408] ? __kasan_check_read+0x11/0x20 [ 516.118139][T13408] ? __lock_acquire+0x16f2/0x4a00 [ 516.123170][T13408] ? __cleanup_sighand+0x60/0x60 [ 516.128102][T13408] ? __might_fault+0x12b/0x1e0 [ 516.132866][T13408] ? __might_fault+0x12b/0x1e0 [ 516.137640][T13408] _do_fork+0x146/0xfa0 [ 516.141799][T13408] ? copy_init_mm+0x20/0x20 [ 516.146308][T13408] ? __kasan_check_read+0x11/0x20 [ 516.151331][T13408] ? _copy_to_user+0x118/0x160 [ 516.156101][T13408] __x64_sys_clone+0x1ab/0x270 [ 516.160870][T13408] ? __ia32_sys_vfork+0xd0/0xd0 [ 516.165729][T13408] ? do_syscall_64+0x26/0x760 [ 516.170406][T13408] ? lockdep_hardirqs_on+0x418/0x5d0 [ 516.175711][T13408] ? trace_hardirqs_on+0x67/0x240 [ 516.180741][T13408] do_syscall_64+0xfa/0x760 [ 516.185249][T13408] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 516.191136][T13408] RIP: 0033:0x457eba [ 516.195030][T13408] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 516.214634][T13408] RSP: 002b:00007fff72d20d70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 516.223048][T13408] RAX: ffffffffffffffda RBX: 00007fff72d20d70 RCX: 0000000000457eba [ 516.231020][T13408] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 516.238988][T13408] RBP: 00007fff72d20db0 R08: 0000000000000001 R09: 000055555710c940 [ 516.246983][T13408] R10: 000055555710cc10 R11: 0000000000000246 R12: 0000000000000001 [ 516.254949][T13408] R13: 0000000000000000 R14: 0000000000000000 R15: 00007fff72d20e00 [ 516.290595][T13408] memory: usage 84208kB, limit 0kB, failcnt 9 [ 516.296700][T13408] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 516.318668][T13408] Memory cgroup stats for /syz4: [ 516.318772][T13408] anon 80519168 [ 516.318772][T13408] file 45056 [ 516.318772][T13408] kernel_stack 524288 [ 516.318772][T13408] slab 3203072 [ 516.318772][T13408] sock 0 [ 516.318772][T13408] shmem 0 [ 516.318772][T13408] file_mapped 135168 [ 516.318772][T13408] file_dirty 135168 [ 516.318772][T13408] file_writeback 0 [ 516.318772][T13408] anon_thp 73400320 [ 516.318772][T13408] inactive_anon 49721344 [ 516.318772][T13408] active_anon 24465408 [ 516.318772][T13408] inactive_file 0 [ 516.318772][T13408] active_file 0 [ 516.318772][T13408] unevictable 6291456 [ 516.318772][T13408] slab_reclaimable 1216512 [ 516.318772][T13408] slab_unreclaimable 1986560 [ 516.318772][T13408] pgfault 56595 [ 516.318772][T13408] pgmajfault 0 08:45:04 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000980)='net/sofH\x16tnet_sua') openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='stat\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) preadv(r1, &(0x7f00000017c0), 0x199, 0x0) [ 516.318772][T13408] workingset_refault 0 [ 516.318772][T13408] workingset_activate 0 [ 516.318772][T13408] workingset_nodereclaim 0 [ 516.318772][T13408] pgrefill 33 [ 516.318772][T13408] pgscan 34 [ 516.318772][T13408] pgsteal 0 [ 516.425301][T13408] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=18766,uid=0 08:45:04 executing program 0: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x4, r0, 0xfffffffffffffffd) keyctl$describe(0x6, r0, 0x0, 0x0) [ 516.448072][T13408] Memory cgroup out of memory: Killed process 18766 (syz-executor.4) total-vm:72708kB, anon-rss:18232kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:163840kB oom_score_adj:1000 08:45:04 executing program 0: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x4, r0, 0xfffffffffffffffd) keyctl$describe(0x6, r0, 0x0, 0x0) [ 516.514368][ T8724] syz-executor.3 invoked oom-killer: gfp_mask=0x40cc0(GFP_KERNEL|__GFP_COMP), order=1, oom_score_adj=0 [ 516.549426][ T8724] CPU: 0 PID: 8724 Comm: syz-executor.3 Not tainted 5.3.0-rc6-next-20190830 #75 [ 516.558476][ T8724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 516.568546][ T8724] Call Trace: [ 516.568567][ T8724] dump_stack+0x172/0x1f0 [ 516.568585][ T8724] dump_header+0x177/0x1152 [ 516.568600][ T8724] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 516.568611][ T8724] ? ___ratelimit+0x2c8/0x595 [ 516.568623][ T8724] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 516.568638][ T8724] ? lockdep_hardirqs_on+0x418/0x5d0 [ 516.568653][ T8724] ? trace_hardirqs_on+0x67/0x240 [ 516.568668][ T8724] ? pagefault_out_of_memory+0x11c/0x11c [ 516.568684][ T8724] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 516.568696][ T8724] ? ___ratelimit+0x60/0x595 [ 516.568706][ T8724] ? do_raw_spin_unlock+0x57/0x270 [ 516.568721][ T8724] oom_kill_process.cold+0x10/0x15 [ 516.568737][ T8724] out_of_memory+0x334/0x1340 [ 516.568749][ T8724] ? lock_downgrade+0x920/0x920 [ 516.568768][ T8724] ? oom_killer_disable+0x280/0x280 [ 516.568794][ T8724] mem_cgroup_out_of_memory+0x1d8/0x240 [ 516.568808][ T8724] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 516.568826][ T8724] ? do_raw_spin_unlock+0x57/0x270 [ 516.568842][ T8724] ? _raw_spin_unlock+0x2d/0x50 [ 516.568859][ T8724] try_charge+0xf4b/0x1440 [ 516.568877][ T8724] ? __lock_acquire+0x800/0x4a00 [ 516.678674][ T8724] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 516.684205][ T8724] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 516.690167][ T8724] ? cache_grow_begin+0x122/0xd20 [ 516.695174][ T8724] ? find_held_lock+0x35/0x130 [ 516.699932][ T8724] ? cache_grow_begin+0x122/0xd20 [ 516.704957][ T8724] __memcg_kmem_charge_memcg+0x71/0xf0 [ 516.710400][ T8724] ? memcg_kmem_put_cache+0x50/0x50 [ 516.715580][ T8724] ? __kasan_check_read+0x11/0x20 [ 516.720598][ T8724] cache_grow_begin+0x629/0xd20 [ 516.725433][ T8724] ? __sanitizer_cov_trace_cmp2+0x11/0x20 [ 516.731134][ T8724] ? mempolicy_slab_node+0x139/0x390 [ 516.736415][ T8724] fallback_alloc+0x1fd/0x2d0 [ 516.741077][ T8724] ____cache_alloc_node+0x1bc/0x1d0 [ 516.746263][ T8724] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 516.752486][ T8724] kmem_cache_alloc_node+0xe3/0x740 [ 516.757664][ T8724] ? lockdep_hardirqs_on+0x418/0x5d0 [ 516.762933][ T8724] ? trace_hardirqs_on+0x67/0x240 [ 516.767945][ T8724] copy_process+0x44c4/0x6830 [ 516.772605][ T8724] ? __kasan_check_read+0x11/0x20 [ 516.777613][ T8724] ? __kasan_check_read+0x11/0x20 [ 516.782634][ T8724] ? __lock_acquire+0x16f2/0x4a00 [ 516.787646][ T8724] ? __cleanup_sighand+0x60/0x60 [ 516.792567][ T8724] ? __might_fault+0x12b/0x1e0 [ 516.797313][ T8724] ? __might_fault+0x12b/0x1e0 [ 516.802062][ T8724] _do_fork+0x146/0xfa0 [ 516.806201][ T8724] ? copy_init_mm+0x20/0x20 [ 516.810690][ T8724] ? __kasan_check_read+0x11/0x20 [ 516.815693][ T8724] ? _copy_to_user+0x118/0x160 [ 516.820444][ T8724] __x64_sys_clone+0x1ab/0x270 [ 516.825193][ T8724] ? __ia32_sys_vfork+0xd0/0xd0 [ 516.830033][ T8724] ? do_syscall_64+0x26/0x760 [ 516.834691][ T8724] ? lockdep_hardirqs_on+0x418/0x5d0 [ 516.839956][ T8724] ? trace_hardirqs_on+0x67/0x240 [ 516.844965][ T8724] do_syscall_64+0xfa/0x760 [ 516.849456][ T8724] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 516.855343][ T8724] RIP: 0033:0x457eba [ 516.859224][ T8724] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 516.878806][ T8724] RSP: 002b:00007ffddd578b40 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 516.887196][ T8724] RAX: ffffffffffffffda RBX: 00007ffddd578b40 RCX: 0000000000457eba [ 516.895149][ T8724] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 516.903103][ T8724] RBP: 00007ffddd578b80 R08: 0000000000000001 R09: 0000555556ec8940 [ 516.911057][ T8724] R10: 0000555556ec8c10 R11: 0000000000000246 R12: 0000000000000001 [ 516.919013][ T8724] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffddd578bd0 08:45:04 executing program 0: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x4, r0, 0xfffffffffffffffd) keyctl$describe(0x6, r0, 0x0, 0x0) [ 517.052997][ T8724] memory: usage 55152kB, limit 0kB, failcnt 13 [ 517.059945][ T8724] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 517.066979][ T8724] Memory cgroup stats for /syz3: [ 517.067091][ T8724] anon 46833664 [ 517.067091][ T8724] file 131072 [ 517.067091][ T8724] kernel_stack 786432 [ 517.067091][ T8724] slab 5701632 [ 517.067091][ T8724] sock 0 [ 517.067091][ T8724] shmem 0 [ 517.067091][ T8724] file_mapped 0 [ 517.067091][ T8724] file_dirty 0 [ 517.067091][ T8724] file_writeback 0 [ 517.067091][ T8724] anon_thp 44040192 [ 517.067091][ T8724] inactive_anon 135168 [ 517.067091][ T8724] active_anon 46690304 [ 517.067091][ T8724] inactive_file 0 [ 517.067091][ T8724] active_file 0 [ 517.067091][ T8724] unevictable 0 [ 517.067091][ T8724] slab_reclaimable 2027520 [ 517.067091][ T8724] slab_unreclaimable 3674112 [ 517.067091][ T8724] pgfault 45804 [ 517.067091][ T8724] pgmajfault 0 [ 517.067091][ T8724] workingset_refault 0 [ 517.067091][ T8724] workingset_activate 0 [ 517.067091][ T8724] workingset_nodereclaim 0 [ 517.067091][ T8724] pgrefill 135 08:45:05 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000100)={0x2, &(0x7f0000000000)=[{0x28}, {0x16}]}) [ 517.067091][ T8724] pgscan 104 [ 517.067091][ T8724] pgsteal 34 [ 517.067091][ T8724] pgactivate 66 [ 517.163609][ T8724] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=9137,uid=0 [ 517.180653][ T8724] Memory cgroup out of memory: Killed process 9137 (syz-executor.3) total-vm:72576kB, anon-rss:2196kB, file-rss:35896kB, shmem-rss:0kB, UID:0 pgtables:143360kB oom_score_adj:1000 [ 517.237680][ T8732] syz-executor.5 invoked oom-killer: gfp_mask=0x40c50(GFP_NOFS|__GFP_COMP|__GFP_RECLAIMABLE), order=0, oom_score_adj=0 [ 517.253875][ T8732] CPU: 0 PID: 8732 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 517.262915][ T8732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 517.272971][ T8732] Call Trace: [ 517.276262][ T8732] dump_stack+0x172/0x1f0 [ 517.280596][ T8732] dump_header+0x177/0x1152 [ 517.285099][ T8732] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 517.290899][ T8732] ? ___ratelimit+0x2c8/0x595 [ 517.295574][ T8732] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 517.301381][ T8732] ? lockdep_hardirqs_on+0x418/0x5d0 [ 517.306665][ T8732] ? trace_hardirqs_on+0x67/0x240 [ 517.311686][ T8732] ? pagefault_out_of_memory+0x11c/0x11c [ 517.317314][ T8732] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 517.323122][ T8732] ? ___ratelimit+0x60/0x595 [ 517.327716][ T8732] ? do_raw_spin_unlock+0x57/0x270 [ 517.332823][ T8732] oom_kill_process.cold+0x10/0x15 [ 517.337937][ T8732] out_of_memory+0x334/0x1340 [ 517.342596][ T8732] ? lock_downgrade+0x920/0x920 [ 517.347432][ T8732] ? oom_killer_disable+0x280/0x280 [ 517.352655][ T8732] mem_cgroup_out_of_memory+0x1d8/0x240 [ 517.358194][ T8732] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 517.363817][ T8732] ? do_raw_spin_unlock+0x57/0x270 [ 517.368924][ T8732] ? _raw_spin_unlock+0x2d/0x50 [ 517.373766][ T8732] try_charge+0xf4b/0x1440 [ 517.378174][ T8732] ? __lock_acquire+0x800/0x4a00 [ 517.383099][ T8732] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 517.388625][ T8732] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 517.394587][ T8732] ? cache_grow_begin+0x122/0xd20 [ 517.399592][ T8732] ? find_held_lock+0x35/0x130 [ 517.404349][ T8732] ? cache_grow_begin+0x122/0xd20 [ 517.409365][ T8732] __memcg_kmem_charge_memcg+0x71/0xf0 [ 517.414806][ T8732] ? memcg_kmem_put_cache+0x50/0x50 [ 517.419987][ T8732] ? __kasan_check_read+0x11/0x20 [ 517.424995][ T8732] cache_grow_begin+0x629/0xd20 [ 517.429842][ T8732] ? __sanitizer_cov_trace_cmp2+0x11/0x20 [ 517.435544][ T8732] ? mempolicy_slab_node+0x139/0x390 [ 517.440814][ T8732] fallback_alloc+0x1fd/0x2d0 [ 517.445477][ T8732] ____cache_alloc_node+0x1bc/0x1d0 [ 517.450658][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 517.456879][ T8732] kmem_cache_alloc+0x1ef/0x710 [ 517.461712][ T8732] ? lock_downgrade+0x920/0x920 [ 517.466543][ T8732] ? rwlock_bug.part.0+0x90/0x90 [ 517.471469][ T8732] ? ratelimit_state_init+0xb0/0xb0 [ 517.476648][ T8732] ext4_alloc_inode+0x1f/0x640 [ 517.481395][ T8732] ? ratelimit_state_init+0xb0/0xb0 [ 517.486577][ T8732] alloc_inode+0x68/0x1e0 [ 517.490890][ T8732] iget_locked+0x1a6/0x4b0 [ 517.495379][ T8732] __ext4_iget+0x265/0x3bb0 [ 517.499866][ T8732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 517.506097][ T8732] ? ext4_get_projid+0x190/0x190 [ 517.511147][ T8732] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 517.516712][ T8732] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 517.522702][ T8732] ? d_alloc_parallel+0xa78/0x1c30 [ 517.527838][ T8732] ext4_lookup+0x3b1/0x7a0 [ 517.532353][ T8732] ? ext4_cross_rename+0x1430/0x1430 [ 517.537629][ T8732] ? __lock_acquire+0x16f2/0x4a00 [ 517.542638][ T8732] ? __kasan_check_read+0x11/0x20 [ 517.547653][ T8732] ? lockdep_init_map+0x1be/0x6d0 [ 517.552664][ T8732] __lookup_slow+0x279/0x500 [ 517.557240][ T8732] ? vfs_unlink+0x620/0x620 [ 517.561750][ T8732] lookup_slow+0x58/0x80 [ 517.565976][ T8732] path_mountpoint+0x5d2/0x1e60 [ 517.570810][ T8732] ? __kasan_check_read+0x11/0x20 [ 517.575813][ T8732] ? __lock_acquire+0x16f2/0x4a00 [ 517.580819][ T8732] ? putname+0xef/0x130 [ 517.584961][ T8732] ? path_openat+0x46d0/0x46d0 [ 517.589718][ T8732] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 517.595347][ T8732] ? find_held_lock+0x35/0x130 [ 517.600116][ T8732] filename_mountpoint+0x190/0x3c0 [ 517.605211][ T8732] ? filename_parentat.isra.0+0x410/0x410 [ 517.610913][ T8732] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 517.617054][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 517.623279][ T8732] ? __phys_addr_symbol+0x30/0x70 [ 517.628284][ T8732] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 517.633986][ T8732] ? __check_object_size+0x3d/0x437 [ 517.639173][ T8732] ? strncpy_from_user+0x2b4/0x400 [ 517.644273][ T8732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 517.650494][ T8732] ? getname_flags+0x277/0x5b0 [ 517.655257][ T8732] user_path_mountpoint_at+0x3a/0x50 [ 517.660539][ T8732] ksys_umount+0x167/0xf00 [ 517.664938][ T8732] ? __ia32_sys_rmdir+0x40/0x40 [ 517.669770][ T8732] ? __detach_mounts+0x2a0/0x2a0 [ 517.674689][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 517.680917][ T8732] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 517.686358][ T8732] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 517.691800][ T8732] ? do_syscall_64+0x26/0x760 [ 517.696460][ T8732] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 517.702509][ T8732] ? do_syscall_64+0x26/0x760 [ 517.707172][ T8732] ? lockdep_hardirqs_on+0x418/0x5d0 [ 517.712439][ T8732] __x64_sys_umount+0x54/0x80 [ 517.717099][ T8732] do_syscall_64+0xfa/0x760 [ 517.721590][ T8732] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 517.727462][ T8732] RIP: 0033:0x45c317 [ 517.731343][ T8732] Code: 64 89 04 25 d0 02 00 00 58 5f ff d0 48 89 c7 e8 2f be ff ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 517.750925][ T8732] RSP: 002b:00007ffd499cd938 EFLAGS: 00000206 ORIG_RAX: 00000000000000a6 [ 517.759328][ T8732] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045c317 [ 517.767284][ T8732] RDX: 0000000000403520 RSI: 0000000000000002 RDI: 00007ffd499cd9e0 [ 517.775236][ T8732] RBP: 00000000000006f3 R08: 0000000000000000 R09: 000000000000000c 08:45:05 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f00000002c0)={0x3, 0x0, [{0x7}, {0x1}, {0xa, 0x0, 0x0, 0x5}]}) [ 517.783188][ T8732] R10: 0000000000000006 R11: 0000000000000206 R12: 00007ffd499cea70 [ 517.791143][ T8732] R13: 00005555560f8940 R14: 0000000000000000 R15: 00007ffd499cea70 [ 517.817438][ T8732] memory: usage 32616kB, limit 0kB, failcnt 99 [ 517.826706][ T8732] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 517.866314][ T8732] Memory cgroup stats for /syz5: [ 517.866428][ T8732] anon 26705920 [ 517.866428][ T8732] file 0 [ 517.866428][ T8732] kernel_stack 393216 [ 517.866428][ T8732] slab 4612096 [ 517.866428][ T8732] sock 0 [ 517.866428][ T8732] shmem 110592 [ 517.866428][ T8732] file_mapped 135168 [ 517.866428][ T8732] file_dirty 0 [ 517.866428][ T8732] file_writeback 0 [ 517.866428][ T8732] anon_thp 25165824 [ 517.866428][ T8732] inactive_anon 0 [ 517.866428][ T8732] active_anon 26705920 [ 517.866428][ T8732] inactive_file 0 [ 517.866428][ T8732] active_file 135168 [ 517.866428][ T8732] unevictable 0 [ 517.866428][ T8732] slab_reclaimable 1622016 [ 517.866428][ T8732] slab_unreclaimable 2990080 [ 517.866428][ T8732] pgfault 57255 [ 517.866428][ T8732] pgmajfault 0 [ 517.866428][ T8732] workingset_refault 0 [ 517.866428][ T8732] workingset_activate 0 [ 517.866428][ T8732] workingset_nodereclaim 0 [ 517.866428][ T8732] pgrefill 71 [ 517.866428][ T8732] pgscan 66 [ 517.866428][ T8732] pgsteal 33 [ 517.866428][ T8732] pgactivate 33 [ 517.991828][ T8732] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=17142,uid=0 [ 518.013297][ T8732] Memory cgroup out of memory: Killed process 17142 (syz-executor.5) total-vm:72576kB, anon-rss:2212kB, file-rss:35800kB, shmem-rss:0kB, UID:0 pgtables:143360kB oom_score_adj:1000 [ 518.101944][T13408] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 518.118501][T13408] CPU: 0 PID: 13408 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 518.127637][T13408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 518.137688][T13408] Call Trace: [ 518.140997][T13408] dump_stack+0x172/0x1f0 [ 518.145332][T13408] dump_header+0x177/0x1152 [ 518.149837][T13408] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 518.155638][T13408] ? ___ratelimit+0x2c8/0x595 [ 518.160311][T13408] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 518.166112][T13408] ? lockdep_hardirqs_on+0x418/0x5d0 [ 518.171392][T13408] ? trace_hardirqs_on+0x67/0x240 [ 518.176428][T13408] ? pagefault_out_of_memory+0x11c/0x11c [ 518.182061][T13408] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 518.187860][T13408] ? ___ratelimit+0x60/0x595 [ 518.192446][T13408] ? do_raw_spin_unlock+0x57/0x270 [ 518.197553][T13408] oom_kill_process.cold+0x10/0x15 [ 518.202668][T13408] out_of_memory+0x334/0x1340 [ 518.207345][T13408] ? lock_downgrade+0x920/0x920 [ 518.212193][T13408] ? oom_killer_disable+0x280/0x280 [ 518.217378][T13408] mem_cgroup_out_of_memory+0x1d8/0x240 [ 518.222911][T13408] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 518.228535][T13408] ? do_raw_spin_unlock+0x57/0x270 [ 518.233644][T13408] ? _raw_spin_unlock+0x2d/0x50 [ 518.238496][T13408] try_charge+0xf4b/0x1440 [ 518.242919][T13408] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 518.248468][T13408] ? find_held_lock+0x35/0x130 [ 518.253216][T13408] ? get_mem_cgroup_from_mm+0x139/0x320 [ 518.258747][T13408] ? lock_downgrade+0x920/0x920 [ 518.263632][T13408] ? percpu_ref_tryget_live+0x111/0x290 [ 518.269176][T13408] __memcg_kmem_charge_memcg+0x71/0xf0 [ 518.274619][T13408] ? memcg_kmem_put_cache+0x50/0x50 [ 518.279819][T13408] ? get_mem_cgroup_from_mm+0x156/0x320 [ 518.285360][T13408] __memcg_kmem_charge+0x13a/0x3a0 [ 518.290457][T13408] __alloc_pages_nodemask+0x4f7/0x900 [ 518.295860][T13408] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 518.301402][T13408] ? __alloc_pages_slowpath+0x2540/0x2540 [ 518.307111][T13408] ? percpu_ref_put_many+0xb6/0x190 [ 518.312314][T13408] copy_process+0x3f8/0x6830 [ 518.316886][T13408] ? __kasan_check_read+0x11/0x20 [ 518.321903][T13408] ? __kasan_check_read+0x11/0x20 [ 518.326917][T13408] ? __lock_acquire+0x16f2/0x4a00 [ 518.331925][T13408] ? __cleanup_sighand+0x60/0x60 [ 518.336840][T13408] ? __might_fault+0x12b/0x1e0 [ 518.341594][T13408] ? __might_fault+0x12b/0x1e0 [ 518.346350][T13408] _do_fork+0x146/0xfa0 [ 518.350489][T13408] ? copy_init_mm+0x20/0x20 [ 518.356017][T13408] ? __kasan_check_read+0x11/0x20 [ 518.361040][T13408] ? _copy_to_user+0x118/0x160 [ 518.365796][T13408] __x64_sys_clone+0x1ab/0x270 [ 518.370540][T13408] ? __ia32_sys_vfork+0xd0/0xd0 [ 518.375372][T13408] ? do_syscall_64+0x26/0x760 [ 518.380035][T13408] ? lockdep_hardirqs_on+0x418/0x5d0 [ 518.385308][T13408] ? trace_hardirqs_on+0x67/0x240 [ 518.390326][T13408] do_syscall_64+0xfa/0x760 [ 518.394813][T13408] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 518.400686][T13408] RIP: 0033:0x457eba [ 518.404666][T13408] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 518.424266][T13408] RSP: 002b:00007fff72d20d70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 518.432666][T13408] RAX: ffffffffffffffda RBX: 00007fff72d20d70 RCX: 0000000000457eba [ 518.440622][T13408] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 518.448582][T13408] RBP: 00007fff72d20db0 R08: 0000000000000001 R09: 000055555710c940 [ 518.456529][T13408] R10: 000055555710cc10 R11: 0000000000000246 R12: 0000000000000001 [ 518.464485][T13408] R13: 0000000000000000 R14: 0000000000000000 R15: 00007fff72d20e00 [ 518.473413][T13408] memory: usage 65780kB, limit 0kB, failcnt 16 [ 518.480838][T13408] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 518.487699][T13408] Memory cgroup stats for [ 518.487711][T13408] /syz4: [ 518.487815][T13408] anon 61911040 [ 518.487815][T13408] file 45056 [ 518.487815][T13408] kernel_stack 524288 [ 518.487815][T13408] slab 3203072 [ 518.487815][T13408] sock 0 [ 518.487815][T13408] shmem 0 [ 518.487815][T13408] file_mapped 135168 [ 518.487815][T13408] file_dirty 135168 [ 518.487815][T13408] file_writeback 0 [ 518.487815][T13408] anon_thp 56623104 [ 518.487815][T13408] inactive_anon 33181696 [ 518.487815][T13408] active_anon 24465408 [ 518.487815][T13408] inactive_file 0 [ 518.487815][T13408] active_file 0 [ 518.487815][T13408] unevictable 4194304 [ 518.487815][T13408] slab_reclaimable 1216512 [ 518.487815][T13408] slab_unreclaimable 1986560 [ 518.487815][T13408] pgfault 56595 [ 518.487815][T13408] pgmajfault 0 [ 518.487815][T13408] workingset_refault 0 [ 518.487815][T13408] workingset_activate 0 [ 518.487815][T13408] workingset_nodereclaim 0 [ 518.487815][T13408] pgrefill 33 [ 518.487815][T13408] pgscan 34 [ 518.487815][T13408] pgsteal 0 [ 518.584841][T13408] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=18719,uid=0 [ 518.600937][T13408] Memory cgroup out of memory: Killed process 18719 (syz-executor.4) total-vm:72708kB, anon-rss:18232kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:163840kB oom_score_adj:1000 [ 518.626816][ T1065] oom_reaper: reaped process 18719 (syz-executor.4), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB [ 518.630222][T13408] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 518.649974][T13408] CPU: 1 PID: 13408 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 518.659081][T13408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 518.669130][T13408] Call Trace: [ 518.672469][T13408] dump_stack+0x172/0x1f0 [ 518.676789][T13408] dump_header+0x177/0x1152 [ 518.681275][T13408] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 518.687065][T13408] ? ___ratelimit+0x2c8/0x595 [ 518.691730][T13408] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 518.697516][T13408] ? lockdep_hardirqs_on+0x418/0x5d0 [ 518.702781][T13408] ? trace_hardirqs_on+0x67/0x240 [ 518.707787][T13408] ? pagefault_out_of_memory+0x11c/0x11c [ 518.713437][T13408] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 518.719231][T13408] ? ___ratelimit+0x60/0x595 [ 518.723816][T13408] ? do_raw_spin_unlock+0x57/0x270 [ 518.728928][T13408] oom_kill_process.cold+0x10/0x15 [ 518.734021][T13408] out_of_memory+0x334/0x1340 [ 518.738678][T13408] ? lock_downgrade+0x920/0x920 [ 518.743519][T13408] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 518.749313][T13408] ? oom_killer_disable+0x280/0x280 [ 518.754518][T13408] mem_cgroup_out_of_memory+0x1d8/0x240 [ 518.760124][T13408] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 518.765770][T13408] ? do_raw_spin_unlock+0x57/0x270 [ 518.770872][T13408] ? _raw_spin_unlock+0x2d/0x50 [ 518.775720][T13408] try_charge+0xf4b/0x1440 [ 518.780154][T13408] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 518.785705][T13408] ? find_held_lock+0x35/0x130 [ 518.790455][T13408] ? get_mem_cgroup_from_mm+0x139/0x320 [ 518.795988][T13408] ? lock_downgrade+0x920/0x920 [ 518.800817][T13408] ? percpu_ref_tryget_live+0x111/0x290 [ 518.806433][T13408] __memcg_kmem_charge_memcg+0x71/0xf0 [ 518.811904][T13408] ? memcg_kmem_put_cache+0x50/0x50 [ 518.817085][T13408] ? get_mem_cgroup_from_mm+0x156/0x320 [ 518.822613][T13408] __memcg_kmem_charge+0x13a/0x3a0 [ 518.827709][T13408] __alloc_pages_nodemask+0x4f7/0x900 [ 518.833075][T13408] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 518.838614][T13408] ? __alloc_pages_slowpath+0x2540/0x2540 [ 518.849891][T13408] ? percpu_ref_put_many+0xb6/0x190 [ 518.855096][T13408] copy_process+0x3f8/0x6830 [ 518.859668][T13408] ? __kasan_check_read+0x11/0x20 [ 518.864673][T13408] ? __kasan_check_read+0x11/0x20 [ 518.869676][T13408] ? __lock_acquire+0x16f2/0x4a00 [ 518.875292][T13408] ? __cleanup_sighand+0x60/0x60 [ 518.880208][T13408] ? __might_fault+0x12b/0x1e0 [ 518.884952][T13408] ? __might_fault+0x12b/0x1e0 [ 518.889714][T13408] _do_fork+0x146/0xfa0 [ 518.893868][T13408] ? copy_init_mm+0x20/0x20 [ 518.898377][T13408] ? __kasan_check_read+0x11/0x20 [ 518.903385][T13408] ? _copy_to_user+0x118/0x160 [ 518.908141][T13408] __x64_sys_clone+0x1ab/0x270 [ 518.912890][T13408] ? __ia32_sys_vfork+0xd0/0xd0 [ 518.917729][T13408] ? do_syscall_64+0x26/0x760 [ 518.922388][T13408] ? lockdep_hardirqs_on+0x418/0x5d0 [ 518.927666][T13408] ? trace_hardirqs_on+0x67/0x240 [ 518.932671][T13408] do_syscall_64+0xfa/0x760 [ 518.937161][T13408] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 518.943035][T13408] RIP: 0033:0x457eba [ 518.946919][T13408] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 518.966504][T13408] RSP: 002b:00007fff72d20d70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 518.974898][T13408] RAX: ffffffffffffffda RBX: 00007fff72d20d70 RCX: 0000000000457eba [ 518.982849][T13408] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 518.990808][T13408] RBP: 00007fff72d20db0 R08: 0000000000000001 R09: 000055555710c940 [ 518.998756][T13408] R10: 000055555710cc10 R11: 0000000000000246 R12: 0000000000000001 [ 519.006707][T13408] R13: 0000000000000000 R14: 0000000000000000 R15: 00007fff72d20e00 [ 519.018890][T13408] memory: usage 47356kB, limit 0kB, failcnt 22 [ 519.025208][T13408] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 519.032168][T13408] Memory cgroup stats for /syz4: [ 519.032405][T13408] anon 43151360 [ 519.032405][T13408] file 45056 [ 519.032405][T13408] kernel_stack 458752 [ 519.032405][T13408] slab 3203072 [ 519.032405][T13408] sock 0 [ 519.032405][T13408] shmem 0 [ 519.032405][T13408] file_mapped 135168 [ 519.032405][T13408] file_dirty 135168 [ 519.032405][T13408] file_writeback 0 [ 519.032405][T13408] anon_thp 39845888 [ 519.032405][T13408] inactive_anon 16564224 [ 519.032405][T13408] active_anon 24465408 [ 519.032405][T13408] inactive_file 0 [ 519.032405][T13408] active_file 0 [ 519.032405][T13408] unevictable 2097152 [ 519.032405][T13408] slab_reclaimable 1216512 [ 519.032405][T13408] slab_unreclaimable 1986560 [ 519.032405][T13408] pgfault 56595 [ 519.032405][T13408] pgmajfault 0 [ 519.032405][T13408] workingset_refault 0 [ 519.032405][T13408] workingset_activate 0 [ 519.032405][T13408] workingset_nodereclaim 0 [ 519.032405][T13408] pgrefill 33 [ 519.032405][T13408] pgscan 34 [ 519.032405][T13408] pgsteal 0 [ 519.037446][T13408] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=18674,uid=0 [ 519.037647][T13408] Memory cgroup out of memory: Killed process 18674 (syz-executor.4) total-vm:72708kB, anon-rss:18232kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:163840kB oom_score_adj:1000 [ 519.162547][T22259] IPVS: ftp: loaded support on port[0] = 21 [ 519.178121][ T1065] oom_reaper: reaped process 18674 (syz-executor.4), now anon-rss:0kB, file-rss:34688kB, shmem-rss:0kB [ 519.189512][ T8724] syz-executor.3 invoked oom-killer: gfp_mask=0x40cc0(GFP_KERNEL|__GFP_COMP), order=1, oom_score_adj=0 [ 519.208489][ T8724] CPU: 0 PID: 8724 Comm: syz-executor.3 Not tainted 5.3.0-rc6-next-20190830 #75 [ 519.217528][ T8724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 519.227570][ T8724] Call Trace: [ 519.227589][ T8724] dump_stack+0x172/0x1f0 [ 519.227608][ T8724] dump_header+0x177/0x1152 [ 519.227622][ T8724] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 519.227632][ T8724] ? ___ratelimit+0x2c8/0x595 [ 519.227644][ T8724] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 519.227662][ T8724] ? lockdep_hardirqs_on+0x418/0x5d0 [ 519.235252][ T8724] ? trace_hardirqs_on+0x67/0x240 [ 519.235265][ T8724] ? pagefault_out_of_memory+0x11c/0x11c [ 519.235276][ T8724] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 519.235288][ T8724] ? ___ratelimit+0x60/0x595 [ 519.245759][ T8724] ? do_raw_spin_unlock+0x57/0x270 [ 519.261477][ T8724] oom_kill_process.cold+0x10/0x15 [ 519.272084][ T8724] out_of_memory+0x334/0x1340 [ 519.272098][ T8724] ? lock_downgrade+0x920/0x920 [ 519.272116][ T8724] ? oom_killer_disable+0x280/0x280 [ 519.272138][ T8724] mem_cgroup_out_of_memory+0x1d8/0x240 [ 519.272155][ T8724] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 519.282519][ T8724] ? do_raw_spin_unlock+0x57/0x270 [ 519.282537][ T8724] ? _raw_spin_unlock+0x2d/0x50 [ 519.282554][ T8724] try_charge+0xf4b/0x1440 [ 519.282572][ T8724] ? __lock_acquire+0x800/0x4a00 [ 519.292757][ T8724] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 519.292772][ T8724] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 519.292791][ T8724] ? cache_grow_begin+0x122/0xd20 [ 519.302266][ T8724] ? find_held_lock+0x35/0x130 [ 519.302281][ T8724] ? cache_grow_begin+0x122/0xd20 [ 519.302303][ T8724] __memcg_kmem_charge_memcg+0x71/0xf0 [ 519.302320][ T8724] ? memcg_kmem_put_cache+0x50/0x50 [ 519.313015][ T8724] ? __kasan_check_read+0x11/0x20 [ 519.313033][ T8724] cache_grow_begin+0x629/0xd20 [ 519.313052][ T8724] ? __sanitizer_cov_trace_cmp2+0x11/0x20 [ 519.323741][ T8724] ? mempolicy_slab_node+0x139/0x390 [ 519.323758][ T8724] fallback_alloc+0x1fd/0x2d0 [ 519.323776][ T8724] ____cache_alloc_node+0x1bc/0x1d0 [ 519.323795][ T8724] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 519.333006][ T8724] kmem_cache_alloc_node+0xe3/0x740 [ 519.333021][ T8724] ? lockdep_hardirqs_on+0x418/0x5d0 [ 519.333034][ T8724] ? trace_hardirqs_on+0x67/0x240 [ 519.333055][ T8724] copy_process+0x44c4/0x6830 [ 519.343507][ T8724] ? __kasan_check_read+0x11/0x20 [ 519.343523][ T8724] ? __kasan_check_read+0x11/0x20 [ 519.343536][ T8724] ? __lock_acquire+0x16f2/0x4a00 [ 519.343556][ T8724] ? __cleanup_sighand+0x60/0x60 [ 519.343569][ T8724] ? __might_fault+0x12b/0x1e0 [ 519.343583][ T8724] ? __might_fault+0x12b/0x1e0 [ 519.343603][ T8724] _do_fork+0x146/0xfa0 [ 519.343620][ T8724] ? copy_init_mm+0x20/0x20 [ 519.343639][ T8724] ? __kasan_check_read+0x11/0x20 [ 519.343655][ T8724] ? _copy_to_user+0x118/0x160 [ 519.354633][ T8724] __x64_sys_clone+0x1ab/0x270 [ 519.369855][ T8724] ? __ia32_sys_vfork+0xd0/0xd0 [ 519.380036][ T8724] ? do_syscall_64+0x26/0x760 [ 519.380052][ T8724] ? lockdep_hardirqs_on+0x418/0x5d0 [ 519.380065][ T8724] ? trace_hardirqs_on+0x67/0x240 [ 519.380081][ T8724] do_syscall_64+0xfa/0x760 [ 519.380103][ T8724] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 519.390631][ T8724] RIP: 0033:0x457eba [ 519.390646][ T8724] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 519.390653][ T8724] RSP: 002b:00007ffddd578b40 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 519.390665][ T8724] RAX: ffffffffffffffda RBX: 00007ffddd578b40 RCX: 0000000000457eba [ 519.390672][ T8724] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 519.390685][ T8724] RBP: 00007ffddd578b80 R08: 0000000000000001 R09: 0000555556ec8940 [ 519.400597][ T8724] R10: 0000555556ec8c10 R11: 0000000000000246 R12: 0000000000000001 [ 519.400605][ T8724] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffddd578bd0 [ 519.414111][ T8724] memory: usage 54900kB, limit 0kB, failcnt 20 [ 519.595160][ T8724] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 519.602090][ T8724] Memory cgroup stats for /syz3: [ 519.602186][ T8724] anon 46698496 [ 519.602186][ T8724] file 131072 [ 519.602186][ T8724] kernel_stack 720896 [ 519.602186][ T8724] slab 5701632 [ 519.602186][ T8724] sock 0 [ 519.602186][ T8724] shmem 0 [ 519.602186][ T8724] file_mapped 0 [ 519.602186][ T8724] file_dirty 0 [ 519.602186][ T8724] file_writeback 0 [ 519.602186][ T8724] anon_thp 44040192 [ 519.602186][ T8724] inactive_anon 135168 [ 519.602186][ T8724] active_anon 46690304 [ 519.602186][ T8724] inactive_file 0 [ 519.602186][ T8724] active_file 0 [ 519.602186][ T8724] unevictable 0 [ 519.602186][ T8724] slab_reclaimable 2027520 [ 519.602186][ T8724] slab_unreclaimable 3674112 [ 519.602186][ T8724] pgfault 45804 [ 519.602186][ T8724] pgmajfault 0 [ 519.602186][ T8724] workingset_refault 0 [ 519.602186][ T8724] workingset_activate 0 [ 519.602186][ T8724] workingset_nodereclaim 0 [ 519.602186][ T8724] pgrefill 135 [ 519.602186][ T8724] pgscan 137 [ 519.602186][ T8724] pgsteal 34 [ 519.602186][ T8724] pgactivate 66 [ 519.697814][ T8724] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=9182,uid=0 [ 519.713332][ T8724] Memory cgroup out of memory: Killed process 9182 (syz-executor.3) total-vm:72576kB, anon-rss:2196kB, file-rss:35892kB, shmem-rss:0kB, UID:0 pgtables:143360kB oom_score_adj:1000 [ 519.746330][ T8732] syz-executor.5 invoked oom-killer: gfp_mask=0x40c50(GFP_NOFS|__GFP_COMP|__GFP_RECLAIMABLE), order=0, oom_score_adj=0 [ 519.761837][ T8732] CPU: 0 PID: 8732 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 519.770896][ T8732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 519.770902][ T8732] Call Trace: [ 519.770921][ T8732] dump_stack+0x172/0x1f0 [ 519.770940][ T8732] dump_header+0x177/0x1152 [ 519.770956][ T8732] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 519.770966][ T8732] ? ___ratelimit+0x2c8/0x595 [ 519.770978][ T8732] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 519.770993][ T8732] ? lockdep_hardirqs_on+0x418/0x5d0 [ 519.771007][ T8732] ? trace_hardirqs_on+0x67/0x240 [ 519.771022][ T8732] ? pagefault_out_of_memory+0x11c/0x11c [ 519.771037][ T8732] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 519.771050][ T8732] ? ___ratelimit+0x60/0x595 [ 519.771062][ T8732] ? do_raw_spin_unlock+0x57/0x270 [ 519.771079][ T8732] oom_kill_process.cold+0x10/0x15 [ 519.771095][ T8732] out_of_memory+0x334/0x1340 [ 519.771108][ T8732] ? lock_downgrade+0x920/0x920 [ 519.771128][ T8732] ? oom_killer_disable+0x280/0x280 [ 519.771154][ T8732] mem_cgroup_out_of_memory+0x1d8/0x240 [ 519.771170][ T8732] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 519.771187][ T8732] ? do_raw_spin_unlock+0x57/0x270 [ 519.771204][ T8732] ? _raw_spin_unlock+0x2d/0x50 [ 519.771223][ T8732] try_charge+0xf4b/0x1440 [ 519.771242][ T8732] ? __lock_acquire+0x800/0x4a00 [ 519.771261][ T8732] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 519.771278][ T8732] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 519.771294][ T8732] ? cache_grow_begin+0x122/0xd20 [ 519.771309][ T8732] ? find_held_lock+0x35/0x130 [ 519.771323][ T8732] ? cache_grow_begin+0x122/0xd20 [ 519.771348][ T8732] __memcg_kmem_charge_memcg+0x71/0xf0 [ 519.771363][ T8732] ? memcg_kmem_put_cache+0x50/0x50 [ 519.771376][ T8732] ? __kasan_check_read+0x11/0x20 [ 519.771390][ T8732] cache_grow_begin+0x629/0xd20 [ 519.771405][ T8732] ? __sanitizer_cov_trace_cmp2+0x11/0x20 [ 519.771421][ T8732] ? mempolicy_slab_node+0x139/0x390 [ 519.771437][ T8732] fallback_alloc+0x1fd/0x2d0 [ 519.771457][ T8732] ____cache_alloc_node+0x1bc/0x1d0 [ 519.771472][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 519.771489][ T8732] kmem_cache_alloc+0x1ef/0x710 [ 519.771502][ T8732] ? lock_downgrade+0x920/0x920 [ 519.771515][ T8732] ? rwlock_bug.part.0+0x90/0x90 [ 519.771533][ T8732] ? ratelimit_state_init+0xb0/0xb0 [ 519.771548][ T8732] ext4_alloc_inode+0x1f/0x640 [ 519.771562][ T8732] ? ratelimit_state_init+0xb0/0xb0 [ 519.771575][ T8732] alloc_inode+0x68/0x1e0 [ 519.771594][ T8732] iget_locked+0x1a6/0x4b0 [ 519.799502][ T8732] __ext4_iget+0x265/0x3bb0 [ 519.799522][ T8732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 519.799545][ T8732] ? ext4_get_projid+0x190/0x190 [ 519.799561][ T8732] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 519.799577][ T8732] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 519.799591][ T8732] ? d_alloc_parallel+0xa78/0x1c30 [ 519.799614][ T8732] ext4_lookup+0x3b1/0x7a0 [ 519.799634][ T8732] ? ext4_cross_rename+0x1430/0x1430 [ 519.815349][ T8732] ? __lock_acquire+0x16f2/0x4a00 [ 519.825978][ T8732] ? __kasan_check_read+0x11/0x20 [ 519.836345][ T8732] ? lockdep_init_map+0x1be/0x6d0 [ 519.846525][ T8732] __lookup_slow+0x279/0x500 [ 519.856017][ T8732] ? vfs_unlink+0x620/0x620 [ 519.866735][ T8732] lookup_slow+0x58/0x80 [ 519.877415][ T8732] path_mountpoint+0x5d2/0x1e60 [ 519.891645][ T8732] ? __kasan_check_read+0x11/0x20 [ 519.891660][ T8732] ? __lock_acquire+0x16f2/0x4a00 [ 519.891673][ T8732] ? putname+0xef/0x130 [ 519.891691][ T8732] ? path_openat+0x46d0/0x46d0 [ 519.891707][ T8732] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 519.891722][ T8732] ? find_held_lock+0x35/0x130 [ 519.891741][ T8732] filename_mountpoint+0x190/0x3c0 [ 519.908239][ T8732] ? filename_parentat.isra.0+0x410/0x410 [ 519.918023][ T8732] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 519.933649][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 519.944167][ T8732] ? __phys_addr_symbol+0x30/0x70 [ 519.944180][ T8732] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 519.944195][ T8732] ? __check_object_size+0x3d/0x437 [ 519.944218][ T8732] ? strncpy_from_user+0x2b4/0x400 [ 519.944237][ T8732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 519.944252][ T8732] ? getname_flags+0x277/0x5b0 [ 519.944271][ T8732] user_path_mountpoint_at+0x3a/0x50 [ 519.944290][ T8732] ksys_umount+0x167/0xf00 [ 519.944307][ T8732] ? __ia32_sys_rmdir+0x40/0x40 [ 519.959411][ T8732] ? __detach_mounts+0x2a0/0x2a0 [ 519.959428][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 519.959443][ T8732] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 519.959457][ T8732] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 519.959469][ T8732] ? do_syscall_64+0x26/0x760 [ 519.959482][ T8732] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 519.959498][ T8732] ? do_syscall_64+0x26/0x760 [ 519.970556][ T8732] ? lockdep_hardirqs_on+0x418/0x5d0 [ 519.970575][ T8732] __x64_sys_umount+0x54/0x80 [ 519.970589][ T8732] do_syscall_64+0xfa/0x760 [ 519.970608][ T8732] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 519.970618][ T8732] RIP: 0033:0x45c317 [ 519.970633][ T8732] Code: 64 89 04 25 d0 02 00 00 58 5f ff d0 48 89 c7 e8 2f be ff ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 519.970640][ T8732] RSP: 002b:00007ffd499cd938 EFLAGS: 00000206 ORIG_RAX: 00000000000000a6 [ 519.970653][ T8732] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045c317 [ 519.970661][ T8732] RDX: 0000000000403520 RSI: 0000000000000002 RDI: 00007ffd499cd9e0 [ 519.970669][ T8732] RBP: 00000000000006f3 R08: 0000000000000000 R09: 000000000000000c [ 519.970676][ T8732] R10: 0000000000000006 R11: 0000000000000206 R12: 00007ffd499cea70 [ 519.970687][ T8732] R13: 00005555560f8940 R14: 0000000000000000 R15: 00007ffd499cea70 [ 519.986816][ T8732] memory: usage 30296kB, limit 0kB, failcnt 105 [ 519.995634][ T8732] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 520.004468][ T8732] Memory cgroup stats for /syz5: [ 520.004569][ T8732] anon 24498176 [ 520.004569][ T8732] file 0 [ 520.004569][ T8732] kernel_stack 393216 [ 520.004569][ T8732] slab 4612096 [ 520.004569][ T8732] sock 0 [ 520.004569][ T8732] shmem 110592 [ 520.004569][ T8732] file_mapped 135168 [ 520.004569][ T8732] file_dirty 0 [ 520.004569][ T8732] file_writeback 0 [ 520.004569][ T8732] anon_thp 23068672 [ 520.004569][ T8732] inactive_anon 0 [ 520.004569][ T8732] active_anon 24498176 [ 520.004569][ T8732] inactive_file 0 [ 520.004569][ T8732] active_file 135168 [ 520.004569][ T8732] unevictable 0 [ 520.004569][ T8732] slab_reclaimable 1622016 [ 520.004569][ T8732] slab_unreclaimable 2990080 [ 520.004569][ T8732] pgfault 57255 [ 520.004569][ T8732] pgmajfault 0 [ 520.004569][ T8732] workingset_refault 0 [ 520.004569][ T8732] workingset_activate 0 [ 520.004569][ T8732] workingset_nodereclaim 0 [ 520.004569][ T8732] pgrefill 71 [ 520.004569][ T8732] pgscan 66 [ 520.004569][ T8732] pgsteal 33 [ 520.004569][ T8732] pgactivate 33 [ 520.015239][ T8732] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=17126,uid=0 [ 520.015354][ T8732] Memory cgroup out of memory: Killed process 17126 (syz-executor.5) total-vm:72576kB, anon-rss:2212kB, file-rss:35800kB, shmem-rss:0kB, UID:0 pgtables:143360kB oom_score_adj:1000 [ 520.453678][T13408] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 520.454853][ T1065] oom_reaper: reaped process 17126 (syz-executor.5), now anon-rss:0kB, file-rss:34840kB, shmem-rss:0kB [ 520.468939][T13408] CPU: 0 PID: 13408 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 520.485658][T13408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 520.495705][T13408] Call Trace: [ 520.495724][T13408] dump_stack+0x172/0x1f0 [ 520.495742][T13408] dump_header+0x177/0x1152 [ 520.495757][T13408] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 520.495767][T13408] ? ___ratelimit+0x2c8/0x595 [ 520.495780][T13408] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 520.495800][T13408] ? lockdep_hardirqs_on+0x418/0x5d0 [ 520.495816][T13408] ? trace_hardirqs_on+0x67/0x240 [ 520.495832][T13408] ? pagefault_out_of_memory+0x11c/0x11c [ 520.503409][T13408] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 520.503423][T13408] ? ___ratelimit+0x60/0x595 [ 520.503434][T13408] ? do_raw_spin_unlock+0x57/0x270 [ 520.503451][T13408] oom_kill_process.cold+0x10/0x15 [ 520.503467][T13408] out_of_memory+0x334/0x1340 [ 520.503480][T13408] ? lock_downgrade+0x920/0x920 [ 520.503498][T13408] ? oom_killer_disable+0x280/0x280 [ 520.503521][T13408] mem_cgroup_out_of_memory+0x1d8/0x240 [ 520.503538][T13408] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 520.519029][T13408] ? do_raw_spin_unlock+0x57/0x270 [ 520.530080][T13408] ? _raw_spin_unlock+0x2d/0x50 [ 520.530099][T13408] try_charge+0xf4b/0x1440 [ 520.530121][T13408] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 520.530134][T13408] ? find_held_lock+0x35/0x130 [ 520.530150][T13408] ? get_mem_cgroup_from_mm+0x139/0x320 [ 520.530172][T13408] ? lock_downgrade+0x920/0x920 [ 520.530184][T13408] ? percpu_ref_tryget_live+0x111/0x290 [ 520.530204][T13408] __memcg_kmem_charge_memcg+0x71/0xf0 [ 520.540820][T13408] ? memcg_kmem_put_cache+0x50/0x50 [ 520.551169][T13408] ? get_mem_cgroup_from_mm+0x156/0x320 [ 520.551187][T13408] __memcg_kmem_charge+0x13a/0x3a0 [ 520.551204][T13408] __alloc_pages_nodemask+0x4f7/0x900 [ 520.551219][T13408] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 520.551236][T13408] ? __alloc_pages_slowpath+0x2540/0x2540 [ 520.551249][T13408] ? percpu_ref_put_many+0xb6/0x190 [ 520.551279][T13408] copy_process+0x3f8/0x6830 [ 520.561451][T13408] ? __kasan_check_read+0x11/0x20 [ 520.561468][T13408] ? __kasan_check_read+0x11/0x20 [ 520.561483][T13408] ? __lock_acquire+0x16f2/0x4a00 [ 520.561502][T13408] ? __cleanup_sighand+0x60/0x60 [ 520.561519][T13408] ? __might_fault+0x12b/0x1e0 [ 520.576192][T13408] ? __might_fault+0x12b/0x1e0 [ 520.587326][T13408] _do_fork+0x146/0xfa0 [ 520.597238][T13408] ? copy_init_mm+0x20/0x20 [ 520.607152][T13408] ? __kasan_check_read+0x11/0x20 [ 520.617425][T13408] ? _copy_to_user+0x118/0x160 [ 520.627790][T13408] __x64_sys_clone+0x1ab/0x270 [ 520.638392][T13408] ? __ia32_sys_vfork+0xd0/0xd0 [ 520.649006][T13408] ? do_syscall_64+0x26/0x760 [ 520.659867][T13408] ? lockdep_hardirqs_on+0x418/0x5d0 [ 520.659882][T13408] ? trace_hardirqs_on+0x67/0x240 [ 520.659901][T13408] do_syscall_64+0xfa/0x760 [ 520.659927][T13408] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 520.659938][T13408] RIP: 0033:0x457eba [ 520.659954][T13408] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 520.670810][T13408] RSP: 002b:00007fff72d20d70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 520.680396][T13408] RAX: ffffffffffffffda RBX: 00007fff72d20d70 RCX: 0000000000457eba [ 520.680404][T13408] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 520.680412][T13408] RBP: 00007fff72d20db0 R08: 0000000000000001 R09: 000055555710c940 [ 520.680421][T13408] R10: 000055555710cc10 R11: 0000000000000246 R12: 0000000000000001 [ 520.680428][T13408] R13: 0000000000000000 R14: 0000000000000000 R15: 00007fff72d20e00 [ 520.684887][T13408] memory: usage 28888kB, limit 0kB, failcnt 28 [ 520.695471][T13408] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 520.843428][T13408] Memory cgroup stats for /syz4: [ 520.843559][T13408] anon 24481792 [ 520.843559][T13408] file 45056 [ 520.843559][T13408] kernel_stack 393216 [ 520.843559][T13408] slab 3203072 [ 520.843559][T13408] sock 0 [ 520.843559][T13408] shmem 0 [ 520.843559][T13408] file_mapped 135168 [ 520.843559][T13408] file_dirty 135168 [ 520.843559][T13408] file_writeback 0 [ 520.843559][T13408] anon_thp 23068672 [ 520.843559][T13408] inactive_anon 0 [ 520.843559][T13408] active_anon 24465408 [ 520.843559][T13408] inactive_file 0 [ 520.843559][T13408] active_file 0 [ 520.843559][T13408] unevictable 0 [ 520.843559][T13408] slab_reclaimable 1216512 [ 520.843559][T13408] slab_unreclaimable 1986560 [ 520.843559][T13408] pgfault 56595 [ 520.843559][T13408] pgmajfault 0 [ 520.843559][T13408] workingset_refault 0 [ 520.843559][T13408] workingset_activate 0 [ 520.843559][T13408] workingset_nodereclaim 0 [ 520.843559][T13408] pgrefill 33 [ 520.843559][T13408] pgscan 34 [ 520.843559][T13408] pgsteal 0 [ 520.843559][T13408] pgactivate 0 [ 520.940070][T13408] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=16068,uid=0 [ 520.955648][T13408] Memory cgroup out of memory: Killed process 16068 (syz-executor.4) total-vm:72708kB, anon-rss:2204kB, file-rss:35840kB, shmem-rss:0kB, UID:0 pgtables:143360kB oom_score_adj:1000 [ 520.984101][T13408] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 521.003119][T13408] CPU: 0 PID: 13408 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 521.012243][T13408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 521.012249][T13408] Call Trace: [ 521.012268][T13408] dump_stack+0x172/0x1f0 [ 521.012287][T13408] dump_header+0x177/0x1152 [ 521.012303][T13408] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 521.012313][T13408] ? ___ratelimit+0x2c8/0x595 [ 521.012325][T13408] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 521.012340][T13408] ? lockdep_hardirqs_on+0x418/0x5d0 [ 521.012356][T13408] ? trace_hardirqs_on+0x67/0x240 [ 521.025669][T13408] ? pagefault_out_of_memory+0x11c/0x11c [ 521.034452][T13408] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 521.044896][T13408] ? ___ratelimit+0x60/0x595 [ 521.055940][T13408] ? do_raw_spin_unlock+0x57/0x270 [ 521.066544][T13408] oom_kill_process.cold+0x10/0x15 [ 521.076903][T13408] out_of_memory+0x334/0x1340 [ 521.087073][T13408] ? lock_downgrade+0x920/0x920 [ 521.096567][T13408] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 521.102363][T13408] ? oom_killer_disable+0x280/0x280 [ 521.102388][T13408] mem_cgroup_out_of_memory+0x1d8/0x240 [ 521.102405][T13408] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 521.113119][T13408] ? do_raw_spin_unlock+0x57/0x270 [ 521.113137][T13408] ? _raw_spin_unlock+0x2d/0x50 [ 521.113160][T13408] try_charge+0xf4b/0x1440 [ 521.123871][T13408] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 521.133347][T13408] ? find_held_lock+0x35/0x130 [ 521.144127][T13408] ? get_mem_cgroup_from_mm+0x139/0x320 [ 521.149668][T13408] ? lock_downgrade+0x920/0x920 [ 521.149682][T13408] ? percpu_ref_tryget_live+0x111/0x290 [ 521.149701][T13408] __memcg_kmem_charge_memcg+0x71/0xf0 [ 521.149723][T13408] ? memcg_kmem_put_cache+0x50/0x50 [ 521.160075][T13408] ? get_mem_cgroup_from_mm+0x156/0x320 [ 521.160095][T13408] __memcg_kmem_charge+0x13a/0x3a0 [ 521.160113][T13408] __alloc_pages_nodemask+0x4f7/0x900 [ 521.170806][T13408] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 521.170823][T13408] ? __alloc_pages_slowpath+0x2540/0x2540 [ 521.170836][T13408] ? percpu_ref_put_many+0xb6/0x190 [ 521.170865][T13408] copy_process+0x3f8/0x6830 [ 521.181459][T13408] ? __kasan_check_read+0x11/0x20 [ 521.181477][T13408] ? __kasan_check_read+0x11/0x20 [ 521.181495][T13408] ? __lock_acquire+0x16f2/0x4a00 [ 521.192366][T13408] ? __cleanup_sighand+0x60/0x60 [ 521.192381][T13408] ? __might_fault+0x12b/0x1e0 [ 521.192396][T13408] ? __might_fault+0x12b/0x1e0 [ 521.192418][T13408] _do_fork+0x146/0xfa0 [ 521.203304][T13408] ? copy_init_mm+0x20/0x20 [ 521.203324][T13408] ? __kasan_check_read+0x11/0x20 [ 521.203339][T13408] ? _copy_to_user+0x118/0x160 [ 521.212997][T13408] __x64_sys_clone+0x1ab/0x270 [ 521.213014][T13408] ? __ia32_sys_vfork+0xd0/0xd0 [ 521.213034][T13408] ? do_syscall_64+0x26/0x760 [ 521.213047][T13408] ? lockdep_hardirqs_on+0x418/0x5d0 [ 521.213060][T13408] ? trace_hardirqs_on+0x67/0x240 [ 521.213078][T13408] do_syscall_64+0xfa/0x760 [ 521.223094][T13408] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 521.232743][T13408] RIP: 0033:0x457eba [ 521.232758][T13408] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 521.232766][T13408] RSP: 002b:00007fff72d20d70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 521.232778][T13408] RAX: ffffffffffffffda RBX: 00007fff72d20d70 RCX: 0000000000457eba [ 521.232785][T13408] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 521.232793][T13408] RBP: 00007fff72d20db0 R08: 0000000000000001 R09: 000055555710c940 [ 521.232805][T13408] R10: 000055555710cc10 R11: 0000000000000246 R12: 0000000000000001 [ 521.246174][T13408] R13: 0000000000000000 R14: 0000000000000000 R15: 00007fff72d20e00 [ 521.279614][T13408] memory: usage 26556kB, limit 0kB, failcnt 34 [ 521.285087][T13408] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 521.300372][T13408] Memory cgroup stats for /syz4: [ 521.300475][T13408] anon 22306816 [ 521.300475][T13408] file 45056 [ 521.300475][T13408] kernel_stack 393216 [ 521.300475][T13408] slab 3203072 [ 521.300475][T13408] sock 0 [ 521.300475][T13408] shmem 0 [ 521.300475][T13408] file_mapped 135168 [ 521.300475][T13408] file_dirty 135168 [ 521.300475][T13408] file_writeback 0 [ 521.300475][T13408] anon_thp 20971520 [ 521.300475][T13408] inactive_anon 0 [ 521.300475][T13408] active_anon 22269952 [ 521.300475][T13408] inactive_file 0 [ 521.300475][T13408] active_file 0 [ 521.300475][T13408] unevictable 0 [ 521.300475][T13408] slab_reclaimable 1216512 [ 521.300475][T13408] slab_unreclaimable 1986560 [ 521.300475][T13408] pgfault 56595 [ 521.300475][T13408] pgmajfault 0 [ 521.300475][T13408] workingset_refault 0 [ 521.300475][T13408] workingset_activate 0 [ 521.300475][T13408] workingset_nodereclaim 0 [ 521.300475][T13408] pgrefill 33 [ 521.300475][T13408] pgscan 34 [ 521.300475][T13408] pgsteal 0 [ 521.300475][T13408] pgactivate 0 [ 521.328487][T13408] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=16929,uid=0 [ 521.339261][T13408] Memory cgroup out of memory: Killed process 16929 (syz-executor.4) total-vm:72576kB, anon-rss:2204kB, file-rss:35816kB, shmem-rss:0kB, UID:0 pgtables:143360kB oom_score_adj:1000 [ 521.528973][ T8724] syz-executor.3 invoked oom-killer: gfp_mask=0x40cc0(GFP_KERNEL|__GFP_COMP), order=1, oom_score_adj=0 [ 521.549381][ T8724] CPU: 0 PID: 8724 Comm: syz-executor.3 Not tainted 5.3.0-rc6-next-20190830 #75 [ 521.558413][ T8724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 521.568463][ T8724] Call Trace: [ 521.571756][ T8724] dump_stack+0x172/0x1f0 [ 521.576093][ T8724] dump_header+0x177/0x1152 [ 521.580618][ T8724] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 521.586413][ T8724] ? ___ratelimit+0x2c8/0x595 [ 521.591085][ T8724] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 521.596894][ T8724] ? lockdep_hardirqs_on+0x418/0x5d0 [ 521.602173][ T8724] ? trace_hardirqs_on+0x67/0x240 [ 521.607196][ T8724] ? pagefault_out_of_memory+0x11c/0x11c [ 521.612825][ T8724] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 521.618634][ T8724] ? ___ratelimit+0x60/0x595 [ 521.623231][ T8724] ? do_raw_spin_unlock+0x57/0x270 [ 521.628475][ T8724] oom_kill_process.cold+0x10/0x15 [ 521.633580][ T8724] out_of_memory+0x334/0x1340 [ 521.638329][ T8724] ? lock_downgrade+0x920/0x920 [ 521.643178][ T8724] ? oom_killer_disable+0x280/0x280 [ 521.648365][ T8724] mem_cgroup_out_of_memory+0x1d8/0x240 [ 521.653898][ T8724] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 521.659528][ T8724] ? do_raw_spin_unlock+0x57/0x270 [ 521.665500][ T8724] ? _raw_spin_unlock+0x2d/0x50 [ 521.670344][ T8724] try_charge+0xf4b/0x1440 [ 521.674755][ T8724] ? __lock_acquire+0x800/0x4a00 [ 521.679684][ T8724] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 521.685236][ T8724] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 521.691205][ T8724] ? cache_grow_begin+0x122/0xd20 [ 521.696215][ T8724] ? find_held_lock+0x35/0x130 [ 521.700955][ T8724] ? cache_grow_begin+0x122/0xd20 [ 521.705961][ T8724] __memcg_kmem_charge_memcg+0x71/0xf0 [ 521.711582][ T8724] ? memcg_kmem_put_cache+0x50/0x50 [ 521.716767][ T8724] ? __kasan_check_read+0x11/0x20 [ 521.721772][ T8724] cache_grow_begin+0x629/0xd20 [ 521.726600][ T8724] ? __sanitizer_cov_trace_cmp2+0x11/0x20 [ 521.732298][ T8724] ? mempolicy_slab_node+0x139/0x390 [ 521.737580][ T8724] fallback_alloc+0x1fd/0x2d0 [ 521.742298][ T8724] ____cache_alloc_node+0x1bc/0x1d0 [ 521.747530][ T8724] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 521.753760][ T8724] kmem_cache_alloc_node+0xe3/0x740 [ 521.758943][ T8724] ? lockdep_hardirqs_on+0x418/0x5d0 [ 521.764211][ T8724] ? trace_hardirqs_on+0x67/0x240 [ 521.769336][ T8724] copy_process+0x44c4/0x6830 [ 521.774022][ T8724] ? __kasan_check_read+0x11/0x20 [ 521.779031][ T8724] ? __kasan_check_read+0x11/0x20 [ 521.784041][ T8724] ? __lock_acquire+0x16f2/0x4a00 [ 521.789053][ T8724] ? __cleanup_sighand+0x60/0x60 [ 521.793974][ T8724] ? __might_fault+0x12b/0x1e0 [ 521.798720][ T8724] ? __might_fault+0x12b/0x1e0 [ 521.803542][ T8724] _do_fork+0x146/0xfa0 [ 521.807689][ T8724] ? copy_init_mm+0x20/0x20 [ 521.812180][ T8724] ? __kasan_check_read+0x11/0x20 [ 521.817183][ T8724] ? _copy_to_user+0x118/0x160 [ 521.821938][ T8724] __x64_sys_clone+0x1ab/0x270 [ 521.827566][ T8724] ? __ia32_sys_vfork+0xd0/0xd0 [ 521.832415][ T8724] ? do_syscall_64+0x26/0x760 [ 521.837078][ T8724] ? lockdep_hardirqs_on+0x418/0x5d0 [ 521.842344][ T8724] ? trace_hardirqs_on+0x67/0x240 [ 521.847353][ T8724] do_syscall_64+0xfa/0x760 [ 521.851861][ T8724] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 521.857742][ T8724] RIP: 0033:0x457eba [ 521.861617][ T8724] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 521.881287][ T8724] RSP: 002b:00007ffddd578b40 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 521.889687][ T8724] RAX: ffffffffffffffda RBX: 00007ffddd578b40 RCX: 0000000000457eba [ 521.897648][ T8724] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 521.905604][ T8724] RBP: 00007ffddd578b80 R08: 0000000000000001 R09: 0000555556ec8940 [ 521.913565][ T8724] R10: 0000555556ec8c10 R11: 0000000000000246 R12: 0000000000000001 [ 521.921513][ T8724] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffddd578bd0 [ 521.932618][ T8724] memory: usage 54648kB, limit 0kB, failcnt 26 [ 521.947525][ T8724] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 521.954626][ T8724] Memory cgroup stats for /syz3: [ 521.954732][ T8724] anon 46698496 [ 521.954732][ T8724] file 131072 [ 521.954732][ T8724] kernel_stack 720896 [ 521.954732][ T8724] slab 5566464 [ 521.954732][ T8724] sock 0 [ 521.954732][ T8724] shmem 0 [ 521.954732][ T8724] file_mapped 0 [ 521.954732][ T8724] file_dirty 0 [ 521.954732][ T8724] file_writeback 0 [ 521.954732][ T8724] anon_thp 44040192 [ 521.954732][ T8724] inactive_anon 135168 [ 521.954732][ T8724] active_anon 46690304 [ 521.954732][ T8724] inactive_file 0 [ 521.954732][ T8724] active_file 0 [ 521.954732][ T8724] unevictable 0 [ 521.954732][ T8724] slab_reclaimable 1892352 [ 521.954732][ T8724] slab_unreclaimable 3674112 [ 521.954732][ T8724] pgfault 45804 [ 521.954732][ T8724] pgmajfault 0 [ 521.954732][ T8724] workingset_refault 0 [ 521.954732][ T8724] workingset_activate 0 [ 521.954732][ T8724] workingset_nodereclaim 0 [ 521.954732][ T8724] pgrefill 135 [ 521.954732][ T8724] pgscan 137 [ 521.954732][ T8724] pgsteal 34 [ 521.954732][ T8724] pgactivate 66 [ 522.050873][ T8724] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=9113,uid=0 [ 522.067153][ T8724] Memory cgroup out of memory: Killed process 9113 (syz-executor.3) total-vm:72576kB, anon-rss:2196kB, file-rss:35892kB, shmem-rss:0kB, UID:0 pgtables:143360kB oom_score_adj:1000 [ 522.098814][ T8732] syz-executor.5 invoked oom-killer: gfp_mask=0x40c50(GFP_NOFS|__GFP_COMP|__GFP_RECLAIMABLE), order=0, oom_score_adj=0 [ 522.114164][ T8732] CPU: 0 PID: 8732 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 522.123183][ T8732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 522.133227][ T8732] Call Trace: [ 522.133248][ T8732] dump_stack+0x172/0x1f0 [ 522.133268][ T8732] dump_header+0x177/0x1152 [ 522.133283][ T8732] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 522.133294][ T8732] ? ___ratelimit+0x2c8/0x595 [ 522.133308][ T8732] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 522.133325][ T8732] ? lockdep_hardirqs_on+0x418/0x5d0 [ 522.133340][ T8732] ? trace_hardirqs_on+0x67/0x240 [ 522.133354][ T8732] ? pagefault_out_of_memory+0x11c/0x11c [ 522.133368][ T8732] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 522.133383][ T8732] ? ___ratelimit+0x60/0x595 [ 522.145458][ T8732] ? do_raw_spin_unlock+0x57/0x270 [ 522.155920][ T8732] oom_kill_process.cold+0x10/0x15 [ 522.166968][ T8732] out_of_memory+0x334/0x1340 [ 522.183359][ T8732] ? lock_downgrade+0x920/0x920 [ 522.183379][ T8732] ? oom_killer_disable+0x280/0x280 [ 522.183404][ T8732] mem_cgroup_out_of_memory+0x1d8/0x240 [ 522.183419][ T8732] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 522.183436][ T8732] ? do_raw_spin_unlock+0x57/0x270 [ 522.198187][ T8732] ? _raw_spin_unlock+0x2d/0x50 [ 522.207674][ T8732] try_charge+0xf4b/0x1440 [ 522.224008][ T8732] ? __lock_acquire+0x800/0x4a00 [ 522.224028][ T8732] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 522.224042][ T8732] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 522.224057][ T8732] ? cache_grow_begin+0x122/0xd20 [ 522.224075][ T8732] ? find_held_lock+0x35/0x130 [ 522.238393][ T8732] ? cache_grow_begin+0x122/0xd20 [ 522.248846][ T8732] __memcg_kmem_charge_memcg+0x71/0xf0 [ 522.264546][ T8732] ? memcg_kmem_put_cache+0x50/0x50 [ 522.274985][ T8732] ? __kasan_check_read+0x11/0x20 [ 522.285158][ T8732] cache_grow_begin+0x629/0xd20 [ 522.290002][ T8732] ? __sanitizer_cov_trace_cmp2+0x11/0x20 [ 522.290016][ T8732] ? mempolicy_slab_node+0x139/0x390 [ 522.290032][ T8732] fallback_alloc+0x1fd/0x2d0 [ 522.290050][ T8732] ____cache_alloc_node+0x1bc/0x1d0 [ 522.290065][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 522.290082][ T8732] kmem_cache_alloc+0x1ef/0x710 [ 522.290097][ T8732] ? lock_downgrade+0x920/0x920 [ 522.290109][ T8732] ? rwlock_bug.part.0+0x90/0x90 [ 522.290128][ T8732] ? ratelimit_state_init+0xb0/0xb0 [ 522.305751][ T8732] ext4_alloc_inode+0x1f/0x640 [ 522.317144][ T8732] ? ratelimit_state_init+0xb0/0xb0 [ 522.326804][ T8732] alloc_inode+0x68/0x1e0 [ 522.336894][ T8732] iget_locked+0x1a6/0x4b0 [ 522.346826][ T8732] __ext4_iget+0x265/0x3bb0 [ 522.355534][ T8732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 522.366238][ T8732] ? ext4_get_projid+0x190/0x190 [ 522.371176][ T8732] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 522.371191][ T8732] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 522.371204][ T8732] ? d_alloc_parallel+0xa78/0x1c30 [ 522.371225][ T8732] ext4_lookup+0x3b1/0x7a0 [ 522.371241][ T8732] ? ext4_cross_rename+0x1430/0x1430 [ 522.371258][ T8732] ? __lock_acquire+0x16f2/0x4a00 [ 522.371271][ T8732] ? __kasan_check_read+0x11/0x20 [ 522.371295][ T8732] ? lockdep_init_map+0x1be/0x6d0 [ 522.371317][ T8732] __lookup_slow+0x279/0x500 [ 522.387906][ T8732] ? vfs_unlink+0x620/0x620 [ 522.397674][ T8732] lookup_slow+0x58/0x80 [ 522.407657][ T8732] path_mountpoint+0x5d2/0x1e60 [ 522.417225][ T8732] ? __kasan_check_read+0x11/0x20 [ 522.425945][ T8732] ? __lock_acquire+0x16f2/0x4a00 [ 522.435768][ T8732] ? putname+0xef/0x130 [ 522.444918][ T8732] ? path_openat+0x46d0/0x46d0 [ 522.449672][ T8732] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 522.449694][ T8732] ? find_held_lock+0x35/0x130 [ 522.449714][ T8732] filename_mountpoint+0x190/0x3c0 [ 522.449731][ T8732] ? filename_parentat.isra.0+0x410/0x410 [ 522.449747][ T8732] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 522.449775][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 522.460158][ T8732] ? __phys_addr_symbol+0x30/0x70 [ 522.460174][ T8732] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 522.460188][ T8732] ? __check_object_size+0x3d/0x437 [ 522.460209][ T8732] ? strncpy_from_user+0x2b4/0x400 [ 522.460228][ T8732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 522.460243][ T8732] ? getname_flags+0x277/0x5b0 [ 522.460262][ T8732] user_path_mountpoint_at+0x3a/0x50 [ 522.460280][ T8732] ksys_umount+0x167/0xf00 [ 522.477235][ T8732] ? __ia32_sys_rmdir+0x40/0x40 [ 522.488458][ T8732] ? __detach_mounts+0x2a0/0x2a0 [ 522.499343][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 522.499359][ T8732] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 522.499373][ T8732] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 522.499386][ T8732] ? do_syscall_64+0x26/0x760 [ 522.499402][ T8732] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 522.499414][ T8732] ? do_syscall_64+0x26/0x760 [ 522.499429][ T8732] ? lockdep_hardirqs_on+0x418/0x5d0 [ 522.499449][ T8732] __x64_sys_umount+0x54/0x80 [ 522.499465][ T8732] do_syscall_64+0xfa/0x760 [ 522.499482][ T8732] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 522.499493][ T8732] RIP: 0033:0x45c317 [ 522.499506][ T8732] Code: 64 89 04 25 d0 02 00 00 58 5f ff d0 48 89 c7 e8 2f be ff ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 522.499512][ T8732] RSP: 002b:00007ffd499cd938 EFLAGS: 00000206 ORIG_RAX: 00000000000000a6 [ 522.499529][ T8732] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045c317 [ 522.515577][ T8732] RDX: 0000000000403520 RSI: 0000000000000002 RDI: 00007ffd499cd9e0 [ 522.515584][ T8732] RBP: 00000000000006f3 R08: 0000000000000000 R09: 000000000000000c [ 522.515591][ T8732] R10: 0000000000000006 R11: 0000000000000206 R12: 00007ffd499cea70 [ 522.515603][ T8732] R13: 00005555560f8940 R14: 0000000000000000 R15: 00007ffd499cea70 [ 522.526381][ T8732] memory: usage 27936kB, limit 0kB, failcnt 111 [ 522.535244][ T8732] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 522.546932][ T8732] Memory cgroup stats for /syz5: [ 522.547036][ T8732] anon 22298624 [ 522.547036][ T8732] file 0 [ 522.547036][ T8732] kernel_stack 327680 [ 522.547036][ T8732] slab 4612096 [ 522.547036][ T8732] sock 0 [ 522.547036][ T8732] shmem 110592 [ 522.547036][ T8732] file_mapped 135168 [ 522.547036][ T8732] file_dirty 0 [ 522.547036][ T8732] file_writeback 0 [ 522.547036][ T8732] anon_thp 20971520 [ 522.547036][ T8732] inactive_anon 0 [ 522.547036][ T8732] active_anon 22298624 [ 522.547036][ T8732] inactive_file 0 [ 522.547036][ T8732] active_file 135168 [ 522.547036][ T8732] unevictable 0 [ 522.547036][ T8732] slab_reclaimable 1622016 [ 522.547036][ T8732] slab_unreclaimable 2990080 [ 522.547036][ T8732] pgfault 57255 [ 522.547036][ T8732] pgmajfault 0 [ 522.547036][ T8732] workingset_refault 0 [ 522.547036][ T8732] workingset_activate 0 [ 522.547036][ T8732] workingset_nodereclaim 0 [ 522.547036][ T8732] pgrefill 71 [ 522.547036][ T8732] pgscan 66 [ 522.547036][ T8732] pgsteal 33 [ 522.547036][ T8732] pgactivate 33 [ 522.557239][ T8732] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=17105,uid=0 [ 522.573253][ T8732] Memory cgroup out of memory: Killed process 17105 (syz-executor.5) total-vm:72708kB, anon-rss:2220kB, file-rss:35788kB, shmem-rss:0kB, UID:0 pgtables:147456kB oom_score_adj:1000 [ 522.597966][T13408] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 522.631286][T13408] CPU: 0 PID: 13408 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 522.644139][T13408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 522.660061][T13408] Call Trace: [ 522.660081][T13408] dump_stack+0x172/0x1f0 [ 522.660100][T13408] dump_header+0x177/0x1152 [ 522.660115][T13408] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 522.660128][T13408] ? ___ratelimit+0x2c8/0x595 [ 522.660142][T13408] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 522.660160][T13408] ? lockdep_hardirqs_on+0x418/0x5d0 [ 522.673201][T13408] ? trace_hardirqs_on+0x67/0x240 [ 522.673218][T13408] ? pagefault_out_of_memory+0x11c/0x11c [ 522.673237][T13408] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 522.673250][T13408] ? ___ratelimit+0x60/0x595 [ 522.673262][T13408] ? do_raw_spin_unlock+0x57/0x270 [ 522.673280][T13408] oom_kill_process.cold+0x10/0x15 [ 522.673294][T13408] out_of_memory+0x334/0x1340 [ 522.673311][T13408] ? lock_downgrade+0x920/0x920 [ 522.769118][T13408] ? oom_killer_disable+0x280/0x280 [ 522.769142][T13408] mem_cgroup_out_of_memory+0x1d8/0x240 [ 522.769157][T13408] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 522.769173][T13408] ? do_raw_spin_unlock+0x57/0x270 [ 522.769189][T13408] ? _raw_spin_unlock+0x2d/0x50 [ 522.769215][T13408] try_charge+0xf4b/0x1440 [ 522.769240][T13408] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 522.769255][T13408] ? find_held_lock+0x35/0x130 [ 522.769268][T13408] ? get_mem_cgroup_from_mm+0x139/0x320 [ 522.769292][T13408] ? lock_downgrade+0x920/0x920 [ 522.802320][T13408] ? percpu_ref_tryget_live+0x111/0x290 [ 522.802341][T13408] __memcg_kmem_charge_memcg+0x71/0xf0 [ 522.802356][T13408] ? memcg_kmem_put_cache+0x50/0x50 [ 522.802374][T13408] ? get_mem_cgroup_from_mm+0x156/0x320 [ 522.802393][T13408] __memcg_kmem_charge+0x13a/0x3a0 [ 522.802410][T13408] __alloc_pages_nodemask+0x4f7/0x900 [ 522.802429][T13408] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 522.823549][T13408] ? __alloc_pages_slowpath+0x2540/0x2540 [ 522.841343][T13408] ? percpu_ref_put_many+0xb6/0x190 [ 522.841375][T13408] copy_process+0x3f8/0x6830 [ 522.841389][T13408] ? __kasan_check_read+0x11/0x20 [ 522.841406][T13408] ? __kasan_check_read+0x11/0x20 [ 522.841419][T13408] ? __lock_acquire+0x16f2/0x4a00 [ 522.841439][T13408] ? __cleanup_sighand+0x60/0x60 [ 522.851692][T13408] ? __might_fault+0x12b/0x1e0 [ 522.851710][T13408] ? __might_fault+0x12b/0x1e0 [ 522.851733][T13408] _do_fork+0x146/0xfa0 [ 522.851751][T13408] ? copy_init_mm+0x20/0x20 [ 522.851772][T13408] ? __kasan_check_read+0x11/0x20 [ 522.851787][T13408] ? _copy_to_user+0x118/0x160 [ 522.862243][T13408] __x64_sys_clone+0x1ab/0x270 [ 522.872513][T13408] ? __ia32_sys_vfork+0xd0/0xd0 [ 522.872536][T13408] ? do_syscall_64+0x26/0x760 [ 522.872552][T13408] ? lockdep_hardirqs_on+0x418/0x5d0 [ 522.872567][T13408] ? trace_hardirqs_on+0x67/0x240 [ 522.872587][T13408] do_syscall_64+0xfa/0x760 [ 522.884005][T13408] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 522.893656][T13408] RIP: 0033:0x457eba [ 522.893672][T13408] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 522.893680][T13408] RSP: 002b:00007fff72d20d70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 522.893692][T13408] RAX: ffffffffffffffda RBX: 00007fff72d20d70 RCX: 0000000000457eba [ 522.893700][T13408] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 522.893707][T13408] RBP: 00007fff72d20db0 R08: 0000000000000001 R09: 000055555710c940 [ 522.893715][T13408] R10: 000055555710cc10 R11: 0000000000000246 R12: 0000000000000001 [ 522.893721][T13408] R13: 0000000000000000 R14: 0000000000000000 R15: 00007fff72d20e00 [ 522.896077][T13408] memory: usage 24216kB, limit 0kB, failcnt 40 [ 522.908481][T13408] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 522.919434][T13408] Memory cgroup stats for /syz4: [ 522.919530][T13408] anon 20086784 [ 522.919530][T13408] file 45056 [ 522.919530][T13408] kernel_stack 327680 [ 522.919530][T13408] slab 3203072 [ 522.919530][T13408] sock 0 [ 522.919530][T13408] shmem 0 [ 522.919530][T13408] file_mapped 135168 [ 522.919530][T13408] file_dirty 135168 [ 522.919530][T13408] file_writeback 0 [ 522.919530][T13408] anon_thp 18874368 [ 522.919530][T13408] inactive_anon 0 [ 522.919530][T13408] active_anon 20049920 [ 522.919530][T13408] inactive_file 0 [ 522.919530][T13408] active_file 0 [ 522.919530][T13408] unevictable 0 [ 522.919530][T13408] slab_reclaimable 1216512 [ 522.919530][T13408] slab_unreclaimable 1986560 [ 522.919530][T13408] pgfault 56595 [ 522.919530][T13408] pgmajfault 0 [ 522.919530][T13408] workingset_refault 0 [ 522.919530][T13408] workingset_activate 0 [ 522.919530][T13408] workingset_nodereclaim 0 [ 522.919530][T13408] pgrefill 33 [ 522.919530][T13408] pgscan 34 [ 522.919530][T13408] pgsteal 0 [ 522.919530][T13408] pgactivate 0 [ 522.935064][T13408] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=16001,uid=0 [ 522.945073][T13408] Memory cgroup out of memory: Killed process 16001 (syz-executor.4) total-vm:72576kB, anon-rss:2196kB, file-rss:35824kB, shmem-rss:0kB, UID:0 pgtables:143360kB oom_score_adj:1000 [ 522.969109][ T8724] syz-executor.3 invoked oom-killer: gfp_mask=0x40cc0(GFP_KERNEL|__GFP_COMP), order=1, oom_score_adj=0 [ 522.984589][ T8724] CPU: 0 PID: 8724 Comm: syz-executor.3 Not tainted 5.3.0-rc6-next-20190830 #75 [ 522.992374][ T8724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 522.992380][ T8724] Call Trace: [ 522.992399][ T8724] dump_stack+0x172/0x1f0 [ 522.992419][ T8724] dump_header+0x177/0x1152 [ 522.992434][ T8724] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 522.992446][ T8724] ? ___ratelimit+0x2c8/0x595 [ 522.992459][ T8724] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 522.992475][ T8724] ? lockdep_hardirqs_on+0x418/0x5d0 [ 522.992490][ T8724] ? trace_hardirqs_on+0x67/0x240 [ 522.992509][ T8724] ? pagefault_out_of_memory+0x11c/0x11c [ 523.003739][ T8724] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 523.013498][ T8724] ? ___ratelimit+0x60/0x595 [ 523.013518][ T8724] ? do_raw_spin_unlock+0x57/0x270 [ 523.013537][ T8724] oom_kill_process.cold+0x10/0x15 [ 523.013552][ T8724] out_of_memory+0x334/0x1340 [ 523.013566][ T8724] ? lock_downgrade+0x920/0x920 [ 523.013585][ T8724] ? oom_killer_disable+0x280/0x280 [ 523.028618][ T8724] mem_cgroup_out_of_memory+0x1d8/0x240 [ 523.038273][ T8724] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 523.051622][ T8724] ? do_raw_spin_unlock+0x57/0x270 [ 523.051641][ T8724] ? _raw_spin_unlock+0x2d/0x50 [ 523.051659][ T8724] try_charge+0xf4b/0x1440 [ 523.051679][ T8724] ? __lock_acquire+0x800/0x4a00 [ 523.061437][ T8724] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 523.061452][ T8724] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 523.061466][ T8724] ? cache_grow_begin+0x122/0xd20 [ 523.061481][ T8724] ? find_held_lock+0x35/0x130 [ 523.061496][ T8724] ? cache_grow_begin+0x122/0xd20 [ 523.061524][ T8724] __memcg_kmem_charge_memcg+0x71/0xf0 [ 523.061542][ T8724] ? memcg_kmem_put_cache+0x50/0x50 [ 523.071121][ T8724] ? __kasan_check_read+0x11/0x20 [ 523.081029][ T8724] cache_grow_begin+0x629/0xd20 [ 523.081046][ T8724] ? __sanitizer_cov_trace_cmp2+0x11/0x20 [ 523.081061][ T8724] ? mempolicy_slab_node+0x139/0x390 [ 523.081077][ T8724] fallback_alloc+0x1fd/0x2d0 [ 523.081096][ T8724] ____cache_alloc_node+0x1bc/0x1d0 [ 523.081109][ T8724] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 523.081125][ T8724] kmem_cache_alloc_node+0xe3/0x740 [ 523.096730][ T8724] ? lockdep_hardirqs_on+0x418/0x5d0 [ 523.120353][ T8724] ? trace_hardirqs_on+0x67/0x240 [ 523.120376][ T8724] copy_process+0x44c4/0x6830 [ 523.120389][ T8724] ? __kasan_check_read+0x11/0x20 [ 523.120406][ T8724] ? __kasan_check_read+0x11/0x20 [ 523.120421][ T8724] ? __lock_acquire+0x16f2/0x4a00 [ 523.120442][ T8724] ? __cleanup_sighand+0x60/0x60 [ 523.120456][ T8724] ? __might_fault+0x12b/0x1e0 [ 523.120474][ T8724] ? __might_fault+0x12b/0x1e0 [ 523.120497][ T8724] _do_fork+0x146/0xfa0 [ 523.120519][ T8724] ? copy_init_mm+0x20/0x20 [ 523.137499][ T8724] ? __kasan_check_read+0x11/0x20 [ 523.153401][ T8724] ? _copy_to_user+0x118/0x160 [ 523.169661][ T8724] __x64_sys_clone+0x1ab/0x270 [ 523.169679][ T8724] ? __ia32_sys_vfork+0xd0/0xd0 [ 523.169702][ T8724] ? do_syscall_64+0x26/0x760 [ 523.169721][ T8724] ? lockdep_hardirqs_on+0x418/0x5d0 [ 523.182754][ T8724] ? trace_hardirqs_on+0x67/0x240 [ 523.182775][ T8724] do_syscall_64+0xfa/0x760 [ 523.182796][ T8724] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 523.182807][ T8724] RIP: 0033:0x457eba [ 523.182821][ T8724] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 523.182828][ T8724] RSP: 002b:00007ffddd578b40 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 523.182846][ T8724] RAX: ffffffffffffffda RBX: 00007ffddd578b40 RCX: 0000000000457eba [ 523.279837][ T8724] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 523.279846][ T8724] RBP: 00007ffddd578b80 R08: 0000000000000001 R09: 0000555556ec8940 [ 523.279853][ T8724] R10: 0000555556ec8c10 R11: 0000000000000246 R12: 0000000000000001 [ 523.279859][ T8724] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffddd578bd0 [ 523.281907][ T8724] memory: usage 54408kB, limit 0kB, failcnt 32 [ 523.313638][ T8724] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 523.333543][ T8724] Memory cgroup stats for /syz3: [ 523.333641][ T8724] anon 46698496 [ 523.333641][ T8724] file 131072 [ 523.333641][ T8724] kernel_stack 655360 [ 523.333641][ T8724] slab 5566464 [ 523.333641][ T8724] sock 0 [ 523.333641][ T8724] shmem 0 [ 523.333641][ T8724] file_mapped 0 [ 523.333641][ T8724] file_dirty 0 [ 523.333641][ T8724] file_writeback 0 [ 523.333641][ T8724] anon_thp 44040192 [ 523.333641][ T8724] inactive_anon 135168 [ 523.333641][ T8724] active_anon 46555136 [ 523.333641][ T8724] inactive_file 0 [ 523.333641][ T8724] active_file 0 [ 523.333641][ T8724] unevictable 0 [ 523.333641][ T8724] slab_reclaimable 1892352 [ 523.333641][ T8724] slab_unreclaimable 3674112 [ 523.333641][ T8724] pgfault 45804 [ 523.333641][ T8724] pgmajfault 0 [ 523.333641][ T8724] workingset_refault 0 [ 523.333641][ T8724] workingset_activate 0 [ 523.333641][ T8724] workingset_nodereclaim 0 [ 523.333641][ T8724] pgrefill 135 [ 523.333641][ T8724] pgscan 137 [ 523.333641][ T8724] pgsteal 34 [ 523.333641][ T8724] pgactivate 66 [ 523.351345][ T8724] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=9091,uid=0 [ 523.362377][ T8724] Memory cgroup out of memory: Killed process 9091 (syz-executor.3) total-vm:72840kB, anon-rss:2212kB, file-rss:35872kB, shmem-rss:0kB, UID:0 pgtables:143360kB oom_score_adj:1000 [ 523.386802][ T8732] syz-executor.5 invoked oom-killer: gfp_mask=0x40c50(GFP_NOFS|__GFP_COMP|__GFP_RECLAIMABLE), order=0, oom_score_adj=0 [ 523.397374][ T8732] CPU: 0 PID: 8732 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 523.404367][ T8732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 523.418942][ T8732] Call Trace: [ 523.429647][ T8732] dump_stack+0x172/0x1f0 [ 523.429667][ T8732] dump_header+0x177/0x1152 [ 523.429682][ T8732] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 523.429694][ T8732] ? ___ratelimit+0x2c8/0x595 [ 523.429708][ T8732] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 523.429725][ T8732] ? lockdep_hardirqs_on+0x418/0x5d0 [ 523.429743][ T8732] ? trace_hardirqs_on+0x67/0x240 [ 523.440440][ T8732] ? pagefault_out_of_memory+0x11c/0x11c [ 523.449736][ T8732] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 523.449750][ T8732] ? ___ratelimit+0x60/0x595 [ 523.449761][ T8732] ? do_raw_spin_unlock+0x57/0x270 [ 523.449777][ T8732] oom_kill_process.cold+0x10/0x15 [ 523.449794][ T8732] out_of_memory+0x334/0x1340 [ 523.449808][ T8732] ? lock_downgrade+0x920/0x920 [ 523.449827][ T8732] ? oom_killer_disable+0x280/0x280 [ 523.460352][ T8732] mem_cgroup_out_of_memory+0x1d8/0x240 [ 523.471304][ T8732] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 523.471323][ T8732] ? do_raw_spin_unlock+0x57/0x270 [ 523.471340][ T8732] ? _raw_spin_unlock+0x2d/0x50 [ 523.471358][ T8732] try_charge+0xf4b/0x1440 [ 523.471377][ T8732] ? __lock_acquire+0x800/0x4a00 [ 523.471400][ T8732] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 523.482538][ T8732] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 523.493132][ T8732] ? cache_grow_begin+0x122/0xd20 [ 523.493148][ T8732] ? find_held_lock+0x35/0x130 [ 523.493162][ T8732] ? cache_grow_begin+0x122/0xd20 [ 523.493186][ T8732] __memcg_kmem_charge_memcg+0x71/0xf0 [ 523.493208][ T8732] ? memcg_kmem_put_cache+0x50/0x50 [ 523.508757][ T8732] ? __kasan_check_read+0x11/0x20 [ 523.518681][ T8732] cache_grow_begin+0x629/0xd20 [ 523.530074][ T8732] ? __sanitizer_cov_trace_cmp2+0x11/0x20 [ 523.530091][ T8732] ? mempolicy_slab_node+0x139/0x390 [ 523.530107][ T8732] fallback_alloc+0x1fd/0x2d0 [ 523.530131][ T8732] ____cache_alloc_node+0x1bc/0x1d0 [ 523.540575][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 523.540592][ T8732] kmem_cache_alloc+0x1ef/0x710 [ 523.540605][ T8732] ? lock_downgrade+0x920/0x920 [ 523.540618][ T8732] ? rwlock_bug.part.0+0x90/0x90 [ 523.540636][ T8732] ? ratelimit_state_init+0xb0/0xb0 [ 523.540652][ T8732] ext4_alloc_inode+0x1f/0x640 [ 523.540671][ T8732] ? ratelimit_state_init+0xb0/0xb0 [ 523.540684][ T8732] alloc_inode+0x68/0x1e0 [ 523.540698][ T8732] iget_locked+0x1a6/0x4b0 [ 523.540716][ T8732] __ext4_iget+0x265/0x3bb0 [ 523.540738][ T8732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 523.550398][ T8732] ? ext4_get_projid+0x190/0x190 [ 523.560493][ T8732] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 523.560508][ T8732] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 523.560522][ T8732] ? d_alloc_parallel+0xa78/0x1c30 [ 523.560546][ T8732] ext4_lookup+0x3b1/0x7a0 [ 523.560562][ T8732] ? ext4_cross_rename+0x1430/0x1430 [ 523.560577][ T8732] ? __lock_acquire+0x16f2/0x4a00 [ 523.560593][ T8732] ? __kasan_check_read+0x11/0x20 [ 523.575259][ T8732] ? lockdep_init_map+0x1be/0x6d0 [ 523.584128][ T8732] __lookup_slow+0x279/0x500 [ 523.593611][ T8732] ? vfs_unlink+0x620/0x620 [ 523.593655][ T8732] lookup_slow+0x58/0x80 [ 523.593672][ T8732] path_mountpoint+0x5d2/0x1e60 [ 523.593689][ T8732] ? __kasan_check_read+0x11/0x20 [ 523.607997][ T8732] ? __lock_acquire+0x16f2/0x4a00 [ 523.617902][ T8732] ? putname+0xef/0x130 [ 523.617921][ T8732] ? path_openat+0x46d0/0x46d0 [ 523.633280][ T8732] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 523.656727][ T8732] ? find_held_lock+0x35/0x130 [ 523.656748][ T8732] filename_mountpoint+0x190/0x3c0 [ 523.656764][ T8732] ? filename_parentat.isra.0+0x410/0x410 [ 523.656780][ T8732] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 523.656806][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 523.656819][ T8732] ? __phys_addr_symbol+0x30/0x70 [ 523.656837][ T8732] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 523.673180][ T8732] ? __check_object_size+0x3d/0x437 [ 523.689103][ T8732] ? strncpy_from_user+0x2b4/0x400 [ 524.248347][ T8732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 524.254584][ T8732] ? getname_flags+0x277/0x5b0 [ 524.259340][ T8732] user_path_mountpoint_at+0x3a/0x50 [ 524.264618][ T8732] ksys_umount+0x167/0xf00 [ 524.269012][ T8732] ? __ia32_sys_rmdir+0x40/0x40 [ 524.273841][ T8732] ? __detach_mounts+0x2a0/0x2a0 [ 524.278756][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 524.284993][ T8732] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 524.290448][ T8732] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 524.295888][ T8732] ? do_syscall_64+0x26/0x760 [ 524.300559][ T8732] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 524.306618][ T8732] ? do_syscall_64+0x26/0x760 [ 524.311323][ T8732] ? lockdep_hardirqs_on+0x418/0x5d0 [ 524.316593][ T8732] __x64_sys_umount+0x54/0x80 [ 524.321260][ T8732] do_syscall_64+0xfa/0x760 [ 524.325757][ T8732] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 524.331626][ T8732] RIP: 0033:0x45c317 [ 524.335499][ T8732] Code: 64 89 04 25 d0 02 00 00 58 5f ff d0 48 89 c7 e8 2f be ff ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 524.355081][ T8732] RSP: 002b:00007ffd499cd938 EFLAGS: 00000206 ORIG_RAX: 00000000000000a6 [ 524.363477][ T8732] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045c317 [ 524.371437][ T8732] RDX: 0000000000403520 RSI: 0000000000000002 RDI: 00007ffd499cd9e0 [ 524.379392][ T8732] RBP: 00000000000006f3 R08: 0000000000000000 R09: 000000000000000c [ 524.387370][ T8732] R10: 0000000000000006 R11: 0000000000000206 R12: 00007ffd499cea70 [ 524.395346][ T8732] R13: 00005555560f8940 R14: 0000000000000000 R15: 00007ffd499cea70 [ 524.404954][ T8732] memory: usage 25568kB, limit 0kB, failcnt 117 [ 524.411528][ T8732] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 524.418371][ T8732] Memory cgroup stats for /syz5: [ 524.418481][ T8732] anon 20078592 [ 524.418481][ T8732] file 0 [ 524.418481][ T8732] kernel_stack 327680 [ 524.418481][ T8732] slab 4612096 [ 524.418481][ T8732] sock 0 [ 524.418481][ T8732] shmem 110592 [ 524.418481][ T8732] file_mapped 135168 [ 524.418481][ T8732] file_dirty 0 [ 524.418481][ T8732] file_writeback 0 [ 524.418481][ T8732] anon_thp 18874368 [ 524.418481][ T8732] inactive_anon 0 [ 524.418481][ T8732] active_anon 20078592 [ 524.418481][ T8732] inactive_file 0 [ 524.418481][ T8732] active_file 135168 [ 524.418481][ T8732] unevictable 0 [ 524.418481][ T8732] slab_reclaimable 1622016 [ 524.418481][ T8732] slab_unreclaimable 2990080 [ 524.418481][ T8732] pgfault 57255 [ 524.418481][ T8732] pgmajfault 0 [ 524.418481][ T8732] workingset_refault 0 [ 524.418481][ T8732] workingset_activate 0 [ 524.418481][ T8732] workingset_nodereclaim 0 [ 524.418481][ T8732] pgrefill 71 [ 524.418481][ T8732] pgscan 66 [ 524.418481][ T8732] pgsteal 33 [ 524.418481][ T8732] pgactivate 33 [ 524.515415][ T8732] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=9495,uid=0 [ 524.531917][ T8732] Memory cgroup out of memory: Killed process 9495 (syz-executor.5) total-vm:73724kB, anon-rss:2208kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:147456kB oom_score_adj:1000 [ 524.563152][T22259] chnl_net:caif_netlink_parms(): no params data found [ 524.564455][T13408] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 524.586104][T13408] CPU: 0 PID: 13408 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 524.595237][T13408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 524.595242][T13408] Call Trace: [ 524.595261][T13408] dump_stack+0x172/0x1f0 [ 524.595280][T13408] dump_header+0x177/0x1152 [ 524.595295][T13408] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 524.595305][T13408] ? ___ratelimit+0x2c8/0x595 [ 524.595318][T13408] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 524.595333][T13408] ? lockdep_hardirqs_on+0x418/0x5d0 [ 524.595348][T13408] ? trace_hardirqs_on+0x67/0x240 [ 524.595364][T13408] ? pagefault_out_of_memory+0x11c/0x11c [ 524.595378][T13408] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 524.595389][T13408] ? ___ratelimit+0x60/0x595 [ 524.595399][T13408] ? do_raw_spin_unlock+0x57/0x270 [ 524.595416][T13408] oom_kill_process.cold+0x10/0x15 [ 524.595432][T13408] out_of_memory+0x334/0x1340 [ 524.595445][T13408] ? lock_downgrade+0x920/0x920 [ 524.595464][T13408] ? oom_killer_disable+0x280/0x280 [ 524.595490][T13408] mem_cgroup_out_of_memory+0x1d8/0x240 [ 524.595506][T13408] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 524.595523][T13408] ? do_raw_spin_unlock+0x57/0x270 [ 524.595540][T13408] ? _raw_spin_unlock+0x2d/0x50 [ 524.617650][T13408] try_charge+0xf4b/0x1440 [ 524.628127][T13408] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 524.639160][T13408] ? find_held_lock+0x35/0x130 [ 524.649767][T13408] ? get_mem_cgroup_from_mm+0x139/0x320 [ 524.649790][T13408] ? lock_downgrade+0x920/0x920 [ 524.649803][T13408] ? percpu_ref_tryget_live+0x111/0x290 [ 524.649823][T13408] __memcg_kmem_charge_memcg+0x71/0xf0 [ 524.649839][T13408] ? memcg_kmem_put_cache+0x50/0x50 [ 524.649856][T13408] ? get_mem_cgroup_from_mm+0x156/0x320 [ 524.649874][T13408] __memcg_kmem_charge+0x13a/0x3a0 [ 524.665323][T13408] __alloc_pages_nodemask+0x4f7/0x900 [ 524.675072][T13408] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 524.685069][T13408] ? __alloc_pages_slowpath+0x2540/0x2540 [ 524.696196][T13408] ? percpu_ref_put_many+0xb6/0x190 [ 524.706140][T13408] copy_process+0x3f8/0x6830 [ 524.716041][T13408] ? __kasan_check_read+0x11/0x20 [ 524.726302][T13408] ? __kasan_check_read+0x11/0x20 [ 524.736652][T13408] ? __lock_acquire+0x16f2/0x4a00 [ 524.752788][T13408] ? __cleanup_sighand+0x60/0x60 [ 524.752803][T13408] ? __might_fault+0x12b/0x1e0 [ 524.752819][T13408] ? __might_fault+0x12b/0x1e0 [ 524.752842][T13408] _do_fork+0x146/0xfa0 [ 524.752859][T13408] ? copy_init_mm+0x20/0x20 [ 524.752881][T13408] ? __kasan_check_read+0x11/0x20 [ 524.752899][T13408] ? _copy_to_user+0x118/0x160 [ 524.768871][T13408] __x64_sys_clone+0x1ab/0x270 [ 524.779733][T13408] ? __ia32_sys_vfork+0xd0/0xd0 [ 524.779758][T13408] ? do_syscall_64+0x26/0x760 [ 524.779773][T13408] ? lockdep_hardirqs_on+0x418/0x5d0 [ 524.779788][T13408] ? trace_hardirqs_on+0x67/0x240 [ 524.779807][T13408] do_syscall_64+0xfa/0x760 [ 524.779826][T13408] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 524.779840][T13408] RIP: 0033:0x457eba [ 524.794441][T13408] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 524.804364][T13408] RSP: 002b:00007fff72d20d70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 524.813844][T13408] RAX: ffffffffffffffda RBX: 00007fff72d20d70 RCX: 0000000000457eba [ 524.813852][T13408] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 524.813859][T13408] RBP: 00007fff72d20db0 R08: 0000000000000001 R09: 000055555710c940 [ 524.813866][T13408] R10: 000055555710cc10 R11: 0000000000000246 R12: 0000000000000001 [ 524.813873][T13408] R13: 0000000000000000 R14: 0000000000000000 R15: 00007fff72d20e00 [ 524.816649][T13408] memory: usage 21836kB, limit 0kB, failcnt 46 [ 524.828507][T13408] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 524.844145][T13408] Memory cgroup stats for /syz4: [ 524.844565][T13408] anon 17903616 [ 524.844565][T13408] file 45056 [ 524.844565][T13408] kernel_stack 327680 [ 524.844565][T13408] slab 3203072 [ 524.844565][T13408] sock 0 [ 524.844565][T13408] shmem 0 [ 524.844565][T13408] file_mapped 135168 [ 524.844565][T13408] file_dirty 135168 [ 524.844565][T13408] file_writeback 0 [ 524.844565][T13408] anon_thp 16777216 [ 524.844565][T13408] inactive_anon 0 [ 524.844565][T13408] active_anon 17903616 [ 524.844565][T13408] inactive_file 0 [ 524.844565][T13408] active_file 0 [ 524.844565][T13408] unevictable 0 [ 524.844565][T13408] slab_reclaimable 1216512 [ 524.844565][T13408] slab_unreclaimable 1986560 [ 524.844565][T13408] pgfault 56595 [ 524.844565][T13408] pgmajfault 0 [ 524.844565][T13408] workingset_refault 0 [ 524.844565][T13408] workingset_activate 0 [ 524.844565][T13408] workingset_nodereclaim 0 [ 524.844565][T13408] pgrefill 33 [ 524.844565][T13408] pgscan 34 [ 524.844565][T13408] pgsteal 0 [ 524.844565][T13408] pgactivate 0 [ 524.858358][T13408] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=19377,uid=0 [ 524.867752][T13408] Memory cgroup out of memory: Killed process 19377 (syz-executor.4) total-vm:72708kB, anon-rss:2212kB, file-rss:35800kB, shmem-rss:0kB, UID:0 pgtables:143360kB oom_score_adj:1000 [ 525.086521][ T8724] syz-executor.3 invoked oom-killer: gfp_mask=0x40cc0(GFP_KERNEL|__GFP_COMP), order=1, oom_score_adj=0 [ 525.090515][ T1065] oom_reaper: reaped process 19377 (syz-executor.4), now anon-rss:0kB, file-rss:34840kB, shmem-rss:0kB [ 525.100331][ T8724] CPU: 0 PID: 8724 Comm: syz-executor.3 Not tainted 5.3.0-rc6-next-20190830 #75 [ 525.117578][ T8724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 525.127631][ T8724] Call Trace: [ 525.130923][ T8724] dump_stack+0x172/0x1f0 [ 525.135258][ T8724] dump_header+0x177/0x1152 [ 525.139762][ T8724] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 525.145563][ T8724] ? ___ratelimit+0x2c8/0x595 [ 525.150237][ T8724] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 525.156040][ T8724] ? lockdep_hardirqs_on+0x418/0x5d0 [ 525.161330][ T8724] ? trace_hardirqs_on+0x67/0x240 [ 525.166355][ T8724] ? pagefault_out_of_memory+0x11c/0x11c [ 525.172003][ T8724] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 525.177809][ T8724] ? ___ratelimit+0x60/0x595 [ 525.182393][ T8724] ? do_raw_spin_unlock+0x57/0x270 [ 525.187503][ T8724] oom_kill_process.cold+0x10/0x15 [ 525.192610][ T8724] out_of_memory+0x334/0x1340 [ 525.197281][ T8724] ? lock_downgrade+0x920/0x920 [ 525.202134][ T8724] ? oom_killer_disable+0x280/0x280 [ 525.207340][ T8724] mem_cgroup_out_of_memory+0x1d8/0x240 [ 525.212886][ T8724] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 525.218520][ T8724] ? do_raw_spin_unlock+0x57/0x270 [ 525.223634][ T8724] ? _raw_spin_unlock+0x2d/0x50 [ 525.228487][ T8724] try_charge+0xf4b/0x1440 [ 525.232913][ T8724] ? __lock_acquire+0x800/0x4a00 [ 525.237853][ T8724] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 525.243402][ T8724] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 525.249378][ T8724] ? cache_grow_begin+0x122/0xd20 [ 525.254396][ T8724] ? find_held_lock+0x35/0x130 [ 525.259139][ T8724] ? cache_grow_begin+0x122/0xd20 [ 525.264162][ T8724] __memcg_kmem_charge_memcg+0x71/0xf0 [ 525.269612][ T8724] ? memcg_kmem_put_cache+0x50/0x50 [ 525.274793][ T8724] ? __kasan_check_read+0x11/0x20 [ 525.279821][ T8724] cache_grow_begin+0x629/0xd20 [ 525.284679][ T8724] ? __sanitizer_cov_trace_cmp2+0x11/0x20 [ 525.290402][ T8724] ? mempolicy_slab_node+0x139/0x390 [ 525.295676][ T8724] fallback_alloc+0x1fd/0x2d0 [ 525.300368][ T8724] ____cache_alloc_node+0x1bc/0x1d0 [ 525.305570][ T8724] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 525.311804][ T8724] kmem_cache_alloc_node+0xe3/0x740 [ 525.316985][ T8724] ? lockdep_hardirqs_on+0x418/0x5d0 [ 525.322270][ T8724] ? trace_hardirqs_on+0x67/0x240 [ 525.327292][ T8724] copy_process+0x44c4/0x6830 [ 525.331952][ T8724] ? __kasan_check_read+0x11/0x20 [ 525.336959][ T8724] ? __kasan_check_read+0x11/0x20 [ 525.341975][ T8724] ? __lock_acquire+0x16f2/0x4a00 [ 525.347007][ T8724] ? __cleanup_sighand+0x60/0x60 [ 525.351930][ T8724] ? __might_fault+0x12b/0x1e0 [ 525.356674][ T8724] ? __might_fault+0x12b/0x1e0 [ 525.361437][ T8724] _do_fork+0x146/0xfa0 [ 525.365594][ T8724] ? copy_init_mm+0x20/0x20 [ 525.370091][ T8724] ? __kasan_check_read+0x11/0x20 [ 525.375102][ T8724] ? _copy_to_user+0x118/0x160 [ 525.379863][ T8724] __x64_sys_clone+0x1ab/0x270 [ 525.384628][ T8724] ? __ia32_sys_vfork+0xd0/0xd0 [ 525.389472][ T8724] ? do_syscall_64+0x26/0x760 [ 525.394127][ T8724] ? lockdep_hardirqs_on+0x418/0x5d0 [ 525.399401][ T8724] ? trace_hardirqs_on+0x67/0x240 [ 525.404425][ T8724] do_syscall_64+0xfa/0x760 [ 525.408921][ T8724] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 525.414788][ T8724] RIP: 0033:0x457eba [ 525.418660][ T8724] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 525.438259][ T8724] RSP: 002b:00007ffddd578b40 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 525.446649][ T8724] RAX: ffffffffffffffda RBX: 00007ffddd578b40 RCX: 0000000000457eba [ 525.454599][ T8724] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 525.462554][ T8724] RBP: 00007ffddd578b80 R08: 0000000000000001 R09: 0000555556ec8940 [ 525.470513][ T8724] R10: 0000555556ec8c10 R11: 0000000000000246 R12: 0000000000000001 [ 525.478467][ T8724] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffddd578bd0 [ 525.487847][ T8724] memory: usage 52016kB, limit 0kB, failcnt 38 [ 525.494077][ T8724] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 525.501002][ T8724] Memory cgroup stats for /syz3: [ 525.501112][ T8724] anon 44417024 [ 525.501112][ T8724] file 131072 [ 525.501112][ T8724] kernel_stack 655360 [ 525.501112][ T8724] slab 5427200 [ 525.501112][ T8724] sock 0 [ 525.501112][ T8724] shmem 0 [ 525.501112][ T8724] file_mapped 0 [ 525.501112][ T8724] file_dirty 0 [ 525.501112][ T8724] file_writeback 0 [ 525.501112][ T8724] anon_thp 41943040 [ 525.501112][ T8724] inactive_anon 135168 [ 525.501112][ T8724] active_anon 44343296 [ 525.501112][ T8724] inactive_file 0 [ 525.501112][ T8724] active_file 0 [ 525.501112][ T8724] unevictable 0 [ 525.501112][ T8724] slab_reclaimable 1892352 [ 525.501112][ T8724] slab_unreclaimable 3534848 [ 525.501112][ T8724] pgfault 45804 [ 525.501112][ T8724] pgmajfault 0 [ 525.501112][ T8724] workingset_refault 0 [ 525.501112][ T8724] workingset_activate 0 [ 525.501112][ T8724] workingset_nodereclaim 0 [ 525.501112][ T8724] pgrefill 135 [ 525.501112][ T8724] pgscan 137 [ 525.501112][ T8724] pgsteal 34 [ 525.501112][ T8724] pgactivate 99 [ 525.501129][ T8724] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=9221,uid=0 [ 525.597076][ T8724] Memory cgroup out of memory: Killed process 9221 (syz-executor.3) total-vm:72708kB, anon-rss:2204kB, file-rss:35872kB, shmem-rss:0kB, UID:0 pgtables:143360kB oom_score_adj:1000 [ 525.647157][T22259] bridge0: port 1(bridge_slave_0) entered blocking state [ 525.655030][T22259] bridge0: port 1(bridge_slave_0) entered disabled state [ 525.663177][T22259] device bridge_slave_0 entered promiscuous mode [ 525.676636][ T8732] syz-executor.5 invoked oom-killer: gfp_mask=0x40c50(GFP_NOFS|__GFP_COMP|__GFP_RECLAIMABLE), order=0, oom_score_adj=0 [ 525.692315][ T8732] CPU: 0 PID: 8732 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 525.701338][ T8732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 525.701345][ T8732] Call Trace: [ 525.701365][ T8732] dump_stack+0x172/0x1f0 [ 525.701384][ T8732] dump_header+0x177/0x1152 [ 525.701400][ T8732] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 525.701416][ T8732] ? ___ratelimit+0x2c8/0x595 [ 525.701430][ T8732] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 525.701446][ T8732] ? lockdep_hardirqs_on+0x418/0x5d0 [ 525.701460][ T8732] ? trace_hardirqs_on+0x67/0x240 [ 525.701473][ T8732] ? pagefault_out_of_memory+0x11c/0x11c [ 525.701491][ T8732] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 525.712133][T22259] bridge0: port 2(bridge_slave_1) entered blocking state [ 525.714807][ T8732] ? ___ratelimit+0x60/0x595 [ 525.719226][T22259] bridge0: port 2(bridge_slave_1) entered disabled state [ 525.723609][ T8732] ? do_raw_spin_unlock+0x57/0x270 [ 525.723627][ T8732] oom_kill_process.cold+0x10/0x15 [ 525.723644][ T8732] out_of_memory+0x334/0x1340 [ 525.723658][ T8732] ? lock_downgrade+0x920/0x920 [ 525.723678][ T8732] ? oom_killer_disable+0x280/0x280 [ 525.739917][ T8732] mem_cgroup_out_of_memory+0x1d8/0x240 [ 525.739932][ T8732] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 525.739950][ T8732] ? do_raw_spin_unlock+0x57/0x270 [ 525.739966][ T8732] ? _raw_spin_unlock+0x2d/0x50 [ 525.739984][ T8732] try_charge+0xf4b/0x1440 [ 525.750253][ T8732] ? __lock_acquire+0x800/0x4a00 [ 525.750271][ T8732] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 525.750284][ T8732] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 525.750298][ T8732] ? cache_grow_begin+0x122/0xd20 [ 525.750312][ T8732] ? find_held_lock+0x35/0x130 [ 525.750326][ T8732] ? cache_grow_begin+0x122/0xd20 [ 525.750351][ T8732] __memcg_kmem_charge_memcg+0x71/0xf0 [ 525.750365][ T8732] ? memcg_kmem_put_cache+0x50/0x50 [ 525.750384][ T8732] ? __kasan_check_read+0x11/0x20 [ 525.761773][ T8732] cache_grow_begin+0x629/0xd20 [ 525.775146][T22259] device bridge_slave_1 entered promiscuous mode [ 525.781204][ T8732] ? __sanitizer_cov_trace_cmp2+0x11/0x20 [ 525.781220][ T8732] ? mempolicy_slab_node+0x139/0x390 [ 525.781235][ T8732] fallback_alloc+0x1fd/0x2d0 [ 525.781254][ T8732] ____cache_alloc_node+0x1bc/0x1d0 [ 525.781266][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 525.781282][ T8732] kmem_cache_alloc+0x1ef/0x710 [ 525.800972][ T8732] ? lock_downgrade+0x920/0x920 [ 525.800986][ T8732] ? rwlock_bug.part.0+0x90/0x90 [ 525.801003][ T8732] ? ratelimit_state_init+0xb0/0xb0 [ 525.801020][ T8732] ext4_alloc_inode+0x1f/0x640 [ 525.811716][ T8732] ? ratelimit_state_init+0xb0/0xb0 [ 525.811731][ T8732] alloc_inode+0x68/0x1e0 [ 525.811746][ T8732] iget_locked+0x1a6/0x4b0 [ 525.811764][ T8732] __ext4_iget+0x265/0x3bb0 [ 525.811783][ T8732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 525.811807][ T8732] ? ext4_get_projid+0x190/0x190 [ 525.811822][ T8732] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 525.811842][ T8732] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 525.982000][ T8732] ? d_alloc_parallel+0xa78/0x1c30 [ 525.987107][ T8732] ext4_lookup+0x3b1/0x7a0 [ 525.991507][ T8732] ? ext4_cross_rename+0x1430/0x1430 [ 525.996773][ T8732] ? __lock_acquire+0x16f2/0x4a00 [ 526.001780][ T8732] ? __kasan_check_read+0x11/0x20 [ 526.006808][ T8732] ? lockdep_init_map+0x1be/0x6d0 [ 526.011817][ T8732] __lookup_slow+0x279/0x500 [ 526.016399][ T8732] ? vfs_unlink+0x620/0x620 [ 526.020921][ T8732] lookup_slow+0x58/0x80 [ 526.025163][ T8732] path_mountpoint+0x5d2/0x1e60 [ 526.030005][ T8732] ? __kasan_check_read+0x11/0x20 [ 526.035016][ T8732] ? __lock_acquire+0x16f2/0x4a00 [ 526.040024][ T8732] ? putname+0xef/0x130 [ 526.044173][ T8732] ? path_openat+0x46d0/0x46d0 [ 526.048916][ T8732] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 526.054528][ T8732] ? find_held_lock+0x35/0x130 [ 526.059285][ T8732] filename_mountpoint+0x190/0x3c0 [ 526.064386][ T8732] ? filename_parentat.isra.0+0x410/0x410 [ 526.070094][ T8732] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 526.076252][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 526.082477][ T8732] ? __phys_addr_symbol+0x30/0x70 [ 526.087503][ T8732] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 526.093203][ T8732] ? __check_object_size+0x3d/0x437 [ 526.098392][ T8732] ? strncpy_from_user+0x2b4/0x400 [ 526.103502][ T8732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 526.109739][ T8732] ? getname_flags+0x277/0x5b0 [ 526.114508][ T8732] user_path_mountpoint_at+0x3a/0x50 [ 526.119793][ T8732] ksys_umount+0x167/0xf00 [ 526.124213][ T8732] ? __ia32_sys_rmdir+0x40/0x40 [ 526.129088][ T8732] ? __detach_mounts+0x2a0/0x2a0 [ 526.134011][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 526.140249][ T8732] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 526.145708][ T8732] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 526.151161][ T8732] ? do_syscall_64+0x26/0x760 [ 526.155834][ T8732] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 526.161893][ T8732] ? do_syscall_64+0x26/0x760 [ 526.166564][ T8732] ? lockdep_hardirqs_on+0x418/0x5d0 [ 526.171833][ T8732] __x64_sys_umount+0x54/0x80 [ 526.176491][ T8732] do_syscall_64+0xfa/0x760 [ 526.180990][ T8732] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 526.186869][ T8732] RIP: 0033:0x45c317 [ 526.190755][ T8732] Code: 64 89 04 25 d0 02 00 00 58 5f ff d0 48 89 c7 e8 2f be ff ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 526.210355][ T8732] RSP: 002b:00007ffd499cd938 EFLAGS: 00000206 ORIG_RAX: 00000000000000a6 [ 526.218765][ T8732] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045c317 [ 526.226714][ T8732] RDX: 0000000000403520 RSI: 0000000000000002 RDI: 00007ffd499cd9e0 [ 526.234676][ T8732] RBP: 00000000000006f3 R08: 0000000000000000 R09: 000000000000000c [ 526.242635][ T8732] R10: 0000000000000006 R11: 0000000000000206 R12: 00007ffd499cea70 [ 526.250607][ T8732] R13: 00005555560f8940 R14: 0000000000000000 R15: 00007ffd499cea70 [ 526.259753][ T8732] memory: usage 23148kB, limit 0kB, failcnt 123 [ 526.266011][ T8732] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 526.273198][ T8732] Memory cgroup stats for /syz5: [ 526.273317][ T8732] anon 17866752 [ 526.273317][ T8732] file 0 [ 526.273317][ T8732] kernel_stack 262144 [ 526.273317][ T8732] slab 4612096 [ 526.273317][ T8732] sock 0 [ 526.273317][ T8732] shmem 110592 [ 526.273317][ T8732] file_mapped 135168 [ 526.273317][ T8732] file_dirty 0 [ 526.273317][ T8732] file_writeback 0 [ 526.273317][ T8732] anon_thp 16777216 [ 526.273317][ T8732] inactive_anon 0 [ 526.273317][ T8732] active_anon 17866752 [ 526.273317][ T8732] inactive_file 0 [ 526.273317][ T8732] active_file 135168 [ 526.273317][ T8732] unevictable 0 [ 526.273317][ T8732] slab_reclaimable 1622016 [ 526.273317][ T8732] slab_unreclaimable 2990080 [ 526.273317][ T8732] pgfault 57255 [ 526.273317][ T8732] pgmajfault 0 [ 526.273317][ T8732] workingset_refault 0 [ 526.273317][ T8732] workingset_activate 0 [ 526.273317][ T8732] workingset_nodereclaim 0 [ 526.273317][ T8732] pgrefill 71 [ 526.273317][ T8732] pgscan 66 [ 526.273317][ T8732] pgsteal 33 [ 526.273317][ T8732] pgactivate 33 [ 526.369779][ T8732] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=10452,uid=0 [ 526.385353][ T8732] Memory cgroup out of memory: Killed process 10452 (syz-executor.5) total-vm:72708kB, anon-rss:2208kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 526.404395][T13408] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 526.405281][ T1065] oom_reaper: reaped process 10452 (syz-executor.5), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB [ 526.419296][T13408] CPU: 0 PID: 13408 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 526.436372][T13408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 526.446427][T13408] Call Trace: [ 526.449728][T13408] dump_stack+0x172/0x1f0 [ 526.454063][T13408] dump_header+0x177/0x1152 [ 526.458558][T13408] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 526.464345][T13408] ? ___ratelimit+0x2c8/0x595 [ 526.468999][T13408] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 526.474787][T13408] ? lockdep_hardirqs_on+0x418/0x5d0 [ 526.480063][T13408] ? trace_hardirqs_on+0x67/0x240 [ 526.485090][T13408] ? pagefault_out_of_memory+0x11c/0x11c [ 526.490735][T13408] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 526.496659][T13408] ? ___ratelimit+0x60/0x595 [ 526.501248][T13408] ? do_raw_spin_unlock+0x57/0x270 [ 526.506355][T13408] oom_kill_process.cold+0x10/0x15 [ 526.511461][T13408] out_of_memory+0x334/0x1340 [ 526.516130][T13408] ? lock_downgrade+0x920/0x920 [ 526.520975][T13408] ? oom_killer_disable+0x280/0x280 [ 526.526162][T13408] mem_cgroup_out_of_memory+0x1d8/0x240 [ 526.531702][T13408] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 526.537335][T13408] ? do_raw_spin_unlock+0x57/0x270 [ 526.542445][T13408] ? _raw_spin_unlock+0x2d/0x50 [ 526.547278][T13408] try_charge+0xf4b/0x1440 [ 526.551697][T13408] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 526.557231][T13408] ? find_held_lock+0x35/0x130 [ 526.561979][T13408] ? get_mem_cgroup_from_mm+0x139/0x320 [ 526.567504][T13408] ? lock_downgrade+0x920/0x920 [ 526.572342][T13408] ? percpu_ref_tryget_live+0x111/0x290 [ 526.578140][T13408] __memcg_kmem_charge_memcg+0x71/0xf0 [ 526.583578][T13408] ? memcg_kmem_put_cache+0x50/0x50 [ 526.588755][T13408] ? get_mem_cgroup_from_mm+0x156/0x320 [ 526.594291][T13408] __memcg_kmem_charge+0x13a/0x3a0 [ 526.599408][T13408] __alloc_pages_nodemask+0x4f7/0x900 [ 526.604768][T13408] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 526.610303][T13408] ? __alloc_pages_slowpath+0x2540/0x2540 [ 526.616008][T13408] ? percpu_ref_put_many+0xb6/0x190 [ 526.621194][T13408] copy_process+0x3f8/0x6830 [ 526.625786][T13408] ? __kasan_check_read+0x11/0x20 [ 526.630806][T13408] ? __kasan_check_read+0x11/0x20 [ 526.635819][T13408] ? __lock_acquire+0x16f2/0x4a00 [ 526.640847][T13408] ? __cleanup_sighand+0x60/0x60 [ 526.645801][T13408] ? __might_fault+0x12b/0x1e0 [ 526.650560][T13408] ? __might_fault+0x12b/0x1e0 [ 526.655316][T13408] _do_fork+0x146/0xfa0 [ 526.659466][T13408] ? copy_init_mm+0x20/0x20 [ 526.663967][T13408] ? __kasan_check_read+0x11/0x20 [ 526.668967][T13408] ? _copy_to_user+0x118/0x160 [ 526.673729][T13408] __x64_sys_clone+0x1ab/0x270 [ 526.678481][T13408] ? __ia32_sys_vfork+0xd0/0xd0 [ 526.683315][T13408] ? do_syscall_64+0x26/0x760 [ 526.687968][T13408] ? lockdep_hardirqs_on+0x418/0x5d0 [ 526.693243][T13408] ? trace_hardirqs_on+0x67/0x240 [ 526.698258][T13408] do_syscall_64+0xfa/0x760 [ 526.702745][T13408] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 526.708613][T13408] RIP: 0033:0x457eba [ 526.712492][T13408] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 526.732092][T13408] RSP: 002b:00007fff72d20d70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 526.740498][T13408] RAX: ffffffffffffffda RBX: 00007fff72d20d70 RCX: 0000000000457eba [ 526.748470][T13408] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 526.756423][T13408] RBP: 00007fff72d20db0 R08: 0000000000000001 R09: 000055555710c940 [ 526.764376][T13408] R10: 000055555710cc10 R11: 0000000000000246 R12: 0000000000000001 [ 526.772333][T13408] R13: 0000000000000000 R14: 0000000000000000 R15: 00007fff72d20e00 [ 526.783461][T13408] memory: usage 19476kB, limit 0kB, failcnt 52 [ 526.789698][T13408] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 526.789704][T13408] Memory cgroup stats for /syz4: [ 526.789809][T13408] anon 15675392 [ 526.789809][T13408] file 45056 [ 526.789809][T13408] kernel_stack 327680 [ 526.789809][T13408] slab 3203072 [ 526.789809][T13408] sock 0 [ 526.789809][T13408] shmem 0 [ 526.789809][T13408] file_mapped 135168 [ 526.789809][T13408] file_dirty 135168 [ 526.789809][T13408] file_writeback 0 [ 526.789809][T13408] anon_thp 14680064 [ 526.789809][T13408] inactive_anon 0 [ 526.789809][T13408] active_anon 15675392 [ 526.789809][T13408] inactive_file 0 [ 526.789809][T13408] active_file 0 [ 526.789809][T13408] unevictable 0 [ 526.789809][T13408] slab_reclaimable 1216512 [ 526.789809][T13408] slab_unreclaimable 1986560 [ 526.789809][T13408] pgfault 56595 [ 526.789809][T13408] pgmajfault 0 [ 526.789809][T13408] workingset_refault 0 [ 526.789809][T13408] workingset_activate 0 [ 526.789809][T13408] workingset_nodereclaim 0 [ 526.789809][T13408] pgrefill 33 [ 526.789809][T13408] pgscan 34 [ 526.789809][T13408] pgsteal 0 [ 526.789809][T13408] pgactivate 0 [ 526.892361][T13408] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=21026,uid=0 [ 526.907894][T13408] Memory cgroup out of memory: Killed process 21026 (syz-executor.4) total-vm:72576kB, anon-rss:2204kB, file-rss:35800kB, shmem-rss:0kB, UID:0 pgtables:143360kB oom_score_adj:1000 [ 526.941692][ T8724] syz-executor.3 invoked oom-killer: gfp_mask=0x40cc0(GFP_KERNEL|__GFP_COMP), order=1, oom_score_adj=0 [ 526.955582][ T8724] CPU: 0 PID: 8724 Comm: syz-executor.3 Not tainted 5.3.0-rc6-next-20190830 #75 [ 526.964597][ T8724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 526.964603][ T8724] Call Trace: [ 526.964622][ T8724] dump_stack+0x172/0x1f0 [ 526.964641][ T8724] dump_header+0x177/0x1152 [ 526.964657][ T8724] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 526.964668][ T8724] ? ___ratelimit+0x2c8/0x595 [ 526.964682][ T8724] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 526.964697][ T8724] ? lockdep_hardirqs_on+0x418/0x5d0 [ 526.964711][ T8724] ? trace_hardirqs_on+0x67/0x240 [ 526.964726][ T8724] ? pagefault_out_of_memory+0x11c/0x11c [ 526.964740][ T8724] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 526.964752][ T8724] ? ___ratelimit+0x60/0x595 [ 526.964768][ T8724] ? do_raw_spin_unlock+0x57/0x270 [ 526.986996][ T8724] oom_kill_process.cold+0x10/0x15 [ 526.997446][ T8724] out_of_memory+0x334/0x1340 [ 527.008514][ T8724] ? lock_downgrade+0x920/0x920 [ 527.019235][ T8724] ? oom_killer_disable+0x280/0x280 [ 527.029601][ T8724] mem_cgroup_out_of_memory+0x1d8/0x240 [ 527.029617][ T8724] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 527.029637][ T8724] ? do_raw_spin_unlock+0x57/0x270 [ 527.029655][ T8724] ? _raw_spin_unlock+0x2d/0x50 [ 527.029677][ T8724] try_charge+0xf4b/0x1440 [ 527.044513][ T8724] ? __lock_acquire+0x800/0x4a00 [ 527.054518][ T8724] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 527.065733][ T8724] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 527.075644][ T8724] ? cache_grow_begin+0x122/0xd20 [ 527.084950][ T8724] ? find_held_lock+0x35/0x130 [ 527.096434][ T8724] ? cache_grow_begin+0x122/0xd20 [ 527.106184][ T8724] __memcg_kmem_charge_memcg+0x71/0xf0 [ 527.116623][ T8724] ? memcg_kmem_put_cache+0x50/0x50 [ 527.121816][ T8724] ? __kasan_check_read+0x11/0x20 [ 527.121834][ T8724] cache_grow_begin+0x629/0xd20 [ 527.121850][ T8724] ? __sanitizer_cov_trace_cmp2+0x11/0x20 [ 527.121863][ T8724] ? mempolicy_slab_node+0x139/0x390 [ 527.121880][ T8724] fallback_alloc+0x1fd/0x2d0 [ 527.121900][ T8724] ____cache_alloc_node+0x1bc/0x1d0 [ 527.121914][ T8724] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 527.121929][ T8724] kmem_cache_alloc_node+0xe3/0x740 [ 527.121946][ T8724] ? lockdep_hardirqs_on+0x418/0x5d0 [ 527.137490][ T8724] ? trace_hardirqs_on+0x67/0x240 [ 527.152585][ T8724] copy_process+0x44c4/0x6830 [ 527.152600][ T8724] ? __kasan_check_read+0x11/0x20 [ 527.152617][ T8724] ? __kasan_check_read+0x11/0x20 [ 527.152632][ T8724] ? __lock_acquire+0x16f2/0x4a00 [ 527.152653][ T8724] ? __cleanup_sighand+0x60/0x60 [ 527.152666][ T8724] ? __might_fault+0x12b/0x1e0 [ 527.152683][ T8724] ? __might_fault+0x12b/0x1e0 [ 527.169348][ T8724] _do_fork+0x146/0xfa0 [ 527.169366][ T8724] ? copy_init_mm+0x20/0x20 [ 527.169387][ T8724] ? __kasan_check_read+0x11/0x20 [ 527.169403][ T8724] ? _copy_to_user+0x118/0x160 [ 527.179083][ T8724] __x64_sys_clone+0x1ab/0x270 [ 527.194098][ T8724] ? __ia32_sys_vfork+0xd0/0xd0 [ 527.203749][ T8724] ? do_syscall_64+0x26/0x760 [ 527.203765][ T8724] ? lockdep_hardirqs_on+0x418/0x5d0 [ 527.203780][ T8724] ? trace_hardirqs_on+0x67/0x240 [ 527.203799][ T8724] do_syscall_64+0xfa/0x760 [ 527.203820][ T8724] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 527.203830][ T8724] RIP: 0033:0x457eba [ 527.203847][ T8724] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 527.217210][ T8724] RSP: 002b:00007ffddd578b40 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 527.226956][ T8724] RAX: ffffffffffffffda RBX: 00007ffddd578b40 RCX: 0000000000457eba [ 527.241190][ T8724] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 527.241199][ T8724] RBP: 00007ffddd578b80 R08: 0000000000000001 R09: 0000555556ec8940 [ 527.241207][ T8724] R10: 0000555556ec8c10 R11: 0000000000000246 R12: 0000000000000001 [ 527.241215][ T8724] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffddd578bd0 [ 527.334683][ T8724] memory: usage 49676kB, limit 0kB, failcnt 44 [ 527.340923][ T8724] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 527.347829][ T8724] Memory cgroup stats for /syz3: [ 527.347939][ T8724] anon 42188800 [ 527.347939][ T8724] file 131072 [ 527.347939][ T8724] kernel_stack 589824 [ 527.347939][ T8724] slab 5427200 [ 527.347939][ T8724] sock 0 [ 527.347939][ T8724] shmem 0 [ 527.347939][ T8724] file_mapped 0 [ 527.347939][ T8724] file_dirty 0 [ 527.347939][ T8724] file_writeback 0 [ 527.347939][ T8724] anon_thp 39845888 [ 527.347939][ T8724] inactive_anon 135168 [ 527.347939][ T8724] active_anon 42115072 [ 527.347939][ T8724] inactive_file 0 [ 527.347939][ T8724] active_file 0 [ 527.347939][ T8724] unevictable 0 [ 527.347939][ T8724] slab_reclaimable 1892352 [ 527.347939][ T8724] slab_unreclaimable 3534848 [ 527.347939][ T8724] pgfault 45804 [ 527.347939][ T8724] pgmajfault 0 [ 527.347939][ T8724] workingset_refault 0 [ 527.347939][ T8724] workingset_activate 0 [ 527.347939][ T8724] workingset_nodereclaim 0 [ 527.347939][ T8724] pgrefill 135 [ 527.347939][ T8724] pgscan 137 [ 527.347939][ T8724] pgsteal 34 [ 527.347939][ T8724] pgactivate 99 [ 527.352960][ T8724] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=16017,uid=0 [ 527.353073][ T8724] Memory cgroup out of memory: Killed process 16017 (syz-executor.3) total-vm:72708kB, anon-rss:2212kB, file-rss:35844kB, shmem-rss:0kB, UID:0 pgtables:143360kB oom_score_adj:1000 [ 527.482570][T22259] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 527.492806][ T8732] syz-executor.5 invoked oom-killer: gfp_mask=0x40c50(GFP_NOFS|__GFP_COMP|__GFP_RECLAIMABLE), order=0, oom_score_adj=0 [ 527.505501][T22259] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 527.508211][ T8732] CPU: 0 PID: 8732 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 527.523541][ T8732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 527.523554][ T8732] Call Trace: [ 527.536882][ T8732] dump_stack+0x172/0x1f0 [ 527.541214][ T8732] dump_header+0x177/0x1152 [ 527.541232][ T8732] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 527.541243][ T8732] ? ___ratelimit+0x2c8/0x595 [ 527.541255][ T8732] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 527.541270][ T8732] ? lockdep_hardirqs_on+0x418/0x5d0 [ 527.541285][ T8732] ? trace_hardirqs_on+0x67/0x240 [ 527.541300][ T8732] ? pagefault_out_of_memory+0x11c/0x11c [ 527.541315][ T8732] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 527.541327][ T8732] ? ___ratelimit+0x60/0x595 [ 527.541338][ T8732] ? do_raw_spin_unlock+0x57/0x270 [ 527.541359][ T8732] oom_kill_process.cold+0x10/0x15 [ 527.556302][ T8732] out_of_memory+0x334/0x1340 [ 527.567351][ T8732] ? lock_downgrade+0x920/0x920 [ 527.577976][ T8732] ? oom_killer_disable+0x280/0x280 [ 527.588333][ T8732] mem_cgroup_out_of_memory+0x1d8/0x240 [ 527.598504][ T8732] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 527.608000][ T8732] ? do_raw_spin_unlock+0x57/0x270 [ 527.618707][ T8732] ? _raw_spin_unlock+0x2d/0x50 [ 527.629414][ T8732] try_charge+0xf4b/0x1440 [ 527.629435][ T8732] ? __lock_acquire+0x800/0x4a00 [ 527.629453][ T8732] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 527.629468][ T8732] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 527.629483][ T8732] ? cache_grow_begin+0x122/0xd20 [ 527.629497][ T8732] ? find_held_lock+0x35/0x130 [ 527.629511][ T8732] ? cache_grow_begin+0x122/0xd20 [ 527.629535][ T8732] __memcg_kmem_charge_memcg+0x71/0xf0 [ 527.643673][ T8732] ? memcg_kmem_put_cache+0x50/0x50 [ 527.655165][ T8732] ? __kasan_check_read+0x11/0x20 [ 527.655182][ T8732] cache_grow_begin+0x629/0xd20 [ 527.655198][ T8732] ? __sanitizer_cov_trace_cmp2+0x11/0x20 [ 527.655213][ T8732] ? mempolicy_slab_node+0x139/0x390 [ 527.655229][ T8732] fallback_alloc+0x1fd/0x2d0 [ 527.655249][ T8732] ____cache_alloc_node+0x1bc/0x1d0 [ 527.655264][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 527.655280][ T8732] kmem_cache_alloc+0x1ef/0x710 [ 527.655294][ T8732] ? lock_downgrade+0x920/0x920 [ 527.655309][ T8732] ? rwlock_bug.part.0+0x90/0x90 [ 527.670098][ T8732] ? ratelimit_state_init+0xb0/0xb0 [ 527.670114][ T8732] ext4_alloc_inode+0x1f/0x640 [ 527.670128][ T8732] ? ratelimit_state_init+0xb0/0xb0 [ 527.670141][ T8732] alloc_inode+0x68/0x1e0 [ 527.670155][ T8732] iget_locked+0x1a6/0x4b0 [ 527.670174][ T8732] __ext4_iget+0x265/0x3bb0 [ 527.680802][ T8732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 527.680827][ T8732] ? ext4_get_projid+0x190/0x190 [ 527.680844][ T8732] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 527.680859][ T8732] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 527.680874][ T8732] ? d_alloc_parallel+0xa78/0x1c30 [ 527.680898][ T8732] ext4_lookup+0x3b1/0x7a0 [ 527.680914][ T8732] ? ext4_cross_rename+0x1430/0x1430 [ 527.680930][ T8732] ? __lock_acquire+0x16f2/0x4a00 [ 527.680943][ T8732] ? __kasan_check_read+0x11/0x20 [ 527.680968][ T8732] ? lockdep_init_map+0x1be/0x6d0 [ 527.696503][ T8732] __lookup_slow+0x279/0x500 [ 527.711593][ T8732] ? vfs_unlink+0x620/0x620 [ 527.711634][ T8732] lookup_slow+0x58/0x80 [ 527.711657][ T8732] path_mountpoint+0x5d2/0x1e60 [ 527.711673][ T8732] ? __kasan_check_read+0x11/0x20 [ 527.711690][ T8732] ? __lock_acquire+0x16f2/0x4a00 [ 527.727568][ T8732] ? putname+0xef/0x130 [ 527.737665][ T8732] ? path_openat+0x46d0/0x46d0 [ 527.751886][ T8732] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 527.751902][ T8732] ? find_held_lock+0x35/0x130 [ 527.751923][ T8732] filename_mountpoint+0x190/0x3c0 [ 527.751941][ T8732] ? filename_parentat.isra.0+0x410/0x410 [ 527.751960][ T8732] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 527.760839][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 527.760854][ T8732] ? __phys_addr_symbol+0x30/0x70 [ 527.760868][ T8732] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 527.760883][ T8732] ? __check_object_size+0x3d/0x437 [ 527.760906][ T8732] ? strncpy_from_user+0x2b4/0x400 [ 527.760925][ T8732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 527.760939][ T8732] ? getname_flags+0x277/0x5b0 [ 527.760958][ T8732] user_path_mountpoint_at+0x3a/0x50 [ 527.760976][ T8732] ksys_umount+0x167/0xf00 [ 527.772116][ T8732] ? __ia32_sys_rmdir+0x40/0x40 [ 527.772134][ T8732] ? __detach_mounts+0x2a0/0x2a0 [ 527.772149][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 527.772163][ T8732] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 527.772178][ T8732] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 527.772195][ T8732] ? do_syscall_64+0x26/0x760 [ 527.788855][ T8732] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 527.798513][ T8732] ? do_syscall_64+0x26/0x760 [ 527.813515][ T8732] ? lockdep_hardirqs_on+0x418/0x5d0 [ 527.822556][ T8732] __x64_sys_umount+0x54/0x80 [ 527.822572][ T8732] do_syscall_64+0xfa/0x760 [ 527.822593][ T8732] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 527.822604][ T8732] RIP: 0033:0x45c317 [ 527.822619][ T8732] Code: 64 89 04 25 d0 02 00 00 58 5f ff d0 48 89 c7 e8 2f be ff ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 527.822632][ T8732] RSP: 002b:00007ffd499cd938 EFLAGS: 00000206 ORIG_RAX: 00000000000000a6 [ 527.822645][ T8732] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045c317 [ 527.822654][ T8732] RDX: 0000000000403520 RSI: 0000000000000002 RDI: 00007ffd499cd9e0 [ 527.822665][ T8732] RBP: 00000000000006f3 R08: 0000000000000000 R09: 000000000000000c [ 527.822672][ T8732] R10: 0000000000000006 R11: 0000000000000206 R12: 00007ffd499cea70 [ 527.822681][ T8732] R13: 00005555560f8940 R14: 0000000000000000 R15: 00007ffd499cea70 [ 527.841194][ T8732] memory: usage 20792kB, limit 0kB, failcnt 129 [ 527.846241][ T8732] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 528.074321][ T8732] Memory cgroup stats for /syz5: [ 528.074445][ T8732] anon 15650816 [ 528.074445][ T8732] file 0 [ 528.074445][ T8732] kernel_stack 262144 [ 528.074445][ T8732] slab 4612096 [ 528.074445][ T8732] sock 0 [ 528.074445][ T8732] shmem 110592 [ 528.074445][ T8732] file_mapped 135168 [ 528.074445][ T8732] file_dirty 0 [ 528.074445][ T8732] file_writeback 0 [ 528.074445][ T8732] anon_thp 14680064 [ 528.074445][ T8732] inactive_anon 0 [ 528.074445][ T8732] active_anon 15650816 [ 528.074445][ T8732] inactive_file 0 [ 528.074445][ T8732] active_file 135168 [ 528.074445][ T8732] unevictable 0 [ 528.074445][ T8732] slab_reclaimable 1622016 [ 528.074445][ T8732] slab_unreclaimable 2990080 [ 528.074445][ T8732] pgfault 57255 [ 528.074445][ T8732] pgmajfault 0 [ 528.074445][ T8732] workingset_refault 0 [ 528.074445][ T8732] workingset_activate 0 [ 528.074445][ T8732] workingset_nodereclaim 0 [ 528.074445][ T8732] pgrefill 71 [ 528.074445][ T8732] pgscan 66 [ 528.074445][ T8732] pgsteal 33 [ 528.074445][ T8732] pgactivate 33 [ 528.170673][ T8732] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=9605,uid=0 [ 528.186106][ T8732] Memory cgroup out of memory: Killed process 9605 (syz-executor.5) total-vm:73592kB, anon-rss:2200kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:143360kB oom_score_adj:1000 [ 528.204818][ T1065] oom_reaper: reaped process 9605 (syz-executor.5), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB [ 528.216706][T13408] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 528.241687][T13408] CPU: 0 PID: 13408 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 528.250835][T13408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 528.250841][T13408] Call Trace: [ 528.250861][T13408] dump_stack+0x172/0x1f0 [ 528.250880][T13408] dump_header+0x177/0x1152 [ 528.250899][T13408] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 528.264229][T13408] ? ___ratelimit+0x2c8/0x595 [ 528.273026][T13408] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 528.273041][T13408] ? lockdep_hardirqs_on+0x418/0x5d0 [ 528.273054][T13408] ? trace_hardirqs_on+0x67/0x240 [ 528.273070][T13408] ? pagefault_out_of_memory+0x11c/0x11c [ 528.273085][T13408] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 528.273106][T13408] ? ___ratelimit+0x60/0x595 [ 528.283527][T13408] ? do_raw_spin_unlock+0x57/0x270 [ 528.283545][T13408] oom_kill_process.cold+0x10/0x15 [ 528.283561][T13408] out_of_memory+0x334/0x1340 [ 528.283573][T13408] ? lock_downgrade+0x920/0x920 [ 528.283590][T13408] ? oom_killer_disable+0x280/0x280 [ 528.283616][T13408] mem_cgroup_out_of_memory+0x1d8/0x240 [ 528.294653][T13408] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 528.305258][T13408] ? do_raw_spin_unlock+0x57/0x270 [ 528.315610][T13408] ? _raw_spin_unlock+0x2d/0x50 [ 528.325782][T13408] try_charge+0xf4b/0x1440 [ 528.335281][T13408] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 528.346000][T13408] ? find_held_lock+0x35/0x130 [ 528.356724][T13408] ? get_mem_cgroup_from_mm+0x139/0x320 [ 528.365949][T13408] ? lock_downgrade+0x920/0x920 [ 528.376211][T13408] ? percpu_ref_tryget_live+0x111/0x290 [ 528.386578][T13408] __memcg_kmem_charge_memcg+0x71/0xf0 [ 528.397528][T13408] ? memcg_kmem_put_cache+0x50/0x50 [ 528.402722][T13408] ? get_mem_cgroup_from_mm+0x156/0x320 [ 528.402741][T13408] __memcg_kmem_charge+0x13a/0x3a0 [ 528.402757][T13408] __alloc_pages_nodemask+0x4f7/0x900 [ 528.402776][T13408] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 528.413382][T13408] ? __alloc_pages_slowpath+0x2540/0x2540 [ 528.413396][T13408] ? percpu_ref_put_many+0xb6/0x190 [ 528.413425][T13408] copy_process+0x3f8/0x6830 [ 528.413441][T13408] ? __kasan_check_read+0x11/0x20 [ 528.424308][T13408] ? __kasan_check_read+0x11/0x20 [ 528.424323][T13408] ? __lock_acquire+0x16f2/0x4a00 [ 528.424342][T13408] ? __cleanup_sighand+0x60/0x60 [ 528.424356][T13408] ? __might_fault+0x12b/0x1e0 [ 528.424373][T13408] ? __might_fault+0x12b/0x1e0 [ 528.424396][T13408] _do_fork+0x146/0xfa0 [ 528.435267][T13408] ? copy_init_mm+0x20/0x20 [ 528.444834][T13408] ? __kasan_check_read+0x11/0x20 [ 528.454848][T13408] ? _copy_to_user+0x118/0x160 [ 528.464506][T13408] __x64_sys_clone+0x1ab/0x270 [ 528.473370][T13408] ? __ia32_sys_vfork+0xd0/0xd0 [ 528.482852][T13408] ? do_syscall_64+0x26/0x760 [ 528.482867][T13408] ? lockdep_hardirqs_on+0x418/0x5d0 [ 528.482882][T13408] ? trace_hardirqs_on+0x67/0x240 [ 528.482904][T13408] do_syscall_64+0xfa/0x760 [ 528.492410][T13408] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 528.492421][T13408] RIP: 0033:0x457eba [ 528.492436][T13408] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 528.492443][T13408] RSP: 002b:00007fff72d20d70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 528.492456][T13408] RAX: ffffffffffffffda RBX: 00007fff72d20d70 RCX: 0000000000457eba [ 528.492470][T13408] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 528.501956][T13408] RBP: 00007fff72d20db0 R08: 0000000000000001 R09: 000055555710c940 [ 528.501965][T13408] R10: 000055555710cc10 R11: 0000000000000246 R12: 0000000000000001 [ 528.501972][T13408] R13: 0000000000000000 R14: 0000000000000000 R15: 00007fff72d20e00 [ 528.506182][T13408] memory: usage 17156kB, limit 0kB, failcnt 58 [ 528.517404][T22259] team0: Port device team_slave_0 added [ 528.523676][T13408] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 528.613509][T13408] Memory cgroup stats for /syz4: [ 528.613630][T13408] anon 13475840 [ 528.613630][T13408] file 45056 [ 528.613630][T13408] kernel_stack 262144 [ 528.613630][T13408] slab 3067904 [ 528.613630][T13408] sock 0 [ 528.613630][T13408] shmem 0 [ 528.613630][T13408] file_mapped 135168 [ 528.613630][T13408] file_dirty 135168 [ 528.613630][T13408] file_writeback 0 [ 528.613630][T13408] anon_thp 12582912 [ 528.613630][T13408] inactive_anon 0 [ 528.613630][T13408] active_anon 13475840 [ 528.613630][T13408] inactive_file 0 [ 528.613630][T13408] active_file 0 [ 528.613630][T13408] unevictable 0 [ 528.613630][T13408] slab_reclaimable 1216512 [ 528.613630][T13408] slab_unreclaimable 1851392 [ 528.613630][T13408] pgfault 56595 [ 528.613630][T13408] pgmajfault 0 [ 528.613630][T13408] workingset_refault 0 [ 528.613630][T13408] workingset_activate 0 [ 528.613630][T13408] workingset_nodereclaim 0 [ 528.613630][T13408] pgrefill 33 [ 528.613630][T13408] pgscan 34 [ 528.613630][T13408] pgsteal 0 [ 528.613630][T13408] pgactivate 0 [ 528.711279][T22259] team0: Port device team_slave_1 added [ 528.713744][T13408] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=21006,uid=0 [ 528.739753][T13408] Memory cgroup out of memory: Killed process 21006 (syz-executor.4) total-vm:72708kB, anon-rss:2212kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:143360kB oom_score_adj:1000 [ 528.773688][ T8724] syz-executor.3 invoked oom-killer: gfp_mask=0x40cc0(GFP_KERNEL|__GFP_COMP), order=1, oom_score_adj=0 [ 528.787345][ T8724] CPU: 0 PID: 8724 Comm: syz-executor.3 Not tainted 5.3.0-rc6-next-20190830 #75 [ 528.796367][ T8724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 528.806413][ T8724] Call Trace: [ 528.809689][ T8724] dump_stack+0x172/0x1f0 [ 528.814001][ T8724] dump_header+0x177/0x1152 [ 528.818486][ T8724] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 528.824268][ T8724] ? ___ratelimit+0x2c8/0x595 [ 528.828924][ T8724] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 528.834708][ T8724] ? lockdep_hardirqs_on+0x418/0x5d0 [ 528.839974][ T8724] ? trace_hardirqs_on+0x67/0x240 [ 528.844974][ T8724] ? pagefault_out_of_memory+0x11c/0x11c [ 528.850584][ T8724] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 528.856376][ T8724] ? ___ratelimit+0x60/0x595 [ 528.860960][ T8724] ? do_raw_spin_unlock+0x57/0x270 [ 528.866052][ T8724] oom_kill_process.cold+0x10/0x15 [ 528.871141][ T8724] out_of_memory+0x334/0x1340 [ 528.875793][ T8724] ? lock_downgrade+0x920/0x920 [ 528.880627][ T8724] ? oom_killer_disable+0x280/0x280 [ 528.885819][ T8724] mem_cgroup_out_of_memory+0x1d8/0x240 [ 528.891340][ T8724] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 528.896950][ T8724] ? do_raw_spin_unlock+0x57/0x270 [ 528.902054][ T8724] ? _raw_spin_unlock+0x2d/0x50 [ 528.906892][ T8724] try_charge+0xf4b/0x1440 [ 528.911299][ T8724] ? __lock_acquire+0x800/0x4a00 [ 528.916219][ T8724] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 528.921749][ T8724] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 528.927713][ T8724] ? cache_grow_begin+0x122/0xd20 [ 528.932715][ T8724] ? find_held_lock+0x35/0x130 [ 528.937458][ T8724] ? cache_grow_begin+0x122/0xd20 [ 528.942468][ T8724] __memcg_kmem_charge_memcg+0x71/0xf0 [ 528.947905][ T8724] ? memcg_kmem_put_cache+0x50/0x50 [ 528.953082][ T8724] ? __kasan_check_read+0x11/0x20 [ 528.958103][ T8724] cache_grow_begin+0x629/0xd20 [ 528.962936][ T8724] ? __sanitizer_cov_trace_cmp2+0x11/0x20 [ 528.968631][ T8724] ? mempolicy_slab_node+0x139/0x390 [ 528.973894][ T8724] fallback_alloc+0x1fd/0x2d0 [ 528.978550][ T8724] ____cache_alloc_node+0x1bc/0x1d0 [ 528.983733][ T8724] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 528.990041][ T8724] kmem_cache_alloc_node+0xe3/0x740 [ 528.995216][ T8724] ? lockdep_hardirqs_on+0x418/0x5d0 [ 529.000476][ T8724] ? trace_hardirqs_on+0x67/0x240 [ 529.005479][ T8724] copy_process+0x44c4/0x6830 [ 529.010133][ T8724] ? __kasan_check_read+0x11/0x20 [ 529.015163][ T8724] ? __kasan_check_read+0x11/0x20 [ 529.020164][ T8724] ? __lock_acquire+0x16f2/0x4a00 [ 529.025170][ T8724] ? __cleanup_sighand+0x60/0x60 [ 529.030084][ T8724] ? __might_fault+0x12b/0x1e0 [ 529.034824][ T8724] ? __might_fault+0x12b/0x1e0 [ 529.039569][ T8724] _do_fork+0x146/0xfa0 [ 529.043705][ T8724] ? copy_init_mm+0x20/0x20 [ 529.048188][ T8724] ? __kasan_check_read+0x11/0x20 [ 529.053192][ T8724] ? _copy_to_user+0x118/0x160 [ 529.057949][ T8724] __x64_sys_clone+0x1ab/0x270 [ 529.062692][ T8724] ? __ia32_sys_vfork+0xd0/0xd0 [ 529.067534][ T8724] ? do_syscall_64+0x26/0x760 [ 529.072189][ T8724] ? lockdep_hardirqs_on+0x418/0x5d0 [ 529.077458][ T8724] ? trace_hardirqs_on+0x67/0x240 [ 529.082462][ T8724] do_syscall_64+0xfa/0x760 [ 529.086944][ T8724] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 529.092811][ T8724] RIP: 0033:0x457eba [ 529.096682][ T8724] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 529.116263][ T8724] RSP: 002b:00007ffddd578b40 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 529.124649][ T8724] RAX: ffffffffffffffda RBX: 00007ffddd578b40 RCX: 0000000000457eba [ 529.132595][ T8724] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 529.140553][ T8724] RBP: 00007ffddd578b80 R08: 0000000000000001 R09: 0000555556ec8940 [ 529.148507][ T8724] R10: 0000555556ec8c10 R11: 0000000000000246 R12: 0000000000000001 [ 529.156466][ T8724] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffddd578bd0 [ 529.165781][ T8724] memory: usage 47320kB, limit 0kB, failcnt 51 [ 529.172036][ T8724] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 529.178867][ T8724] Memory cgroup stats for /syz3: [ 529.178971][ T8724] anon 39968768 [ 529.178971][ T8724] file 131072 [ 529.178971][ T8724] kernel_stack 589824 [ 529.178971][ T8724] slab 5427200 [ 529.178971][ T8724] sock 0 [ 529.178971][ T8724] shmem 0 [ 529.178971][ T8724] file_mapped 0 [ 529.178971][ T8724] file_dirty 0 [ 529.178971][ T8724] file_writeback 0 [ 529.178971][ T8724] anon_thp 37748736 [ 529.178971][ T8724] inactive_anon 135168 [ 529.178971][ T8724] active_anon 39895040 [ 529.178971][ T8724] inactive_file 0 [ 529.178971][ T8724] active_file 0 [ 529.178971][ T8724] unevictable 0 [ 529.178971][ T8724] slab_reclaimable 1892352 [ 529.178971][ T8724] slab_unreclaimable 3534848 [ 529.178971][ T8724] pgfault 45804 [ 529.178971][ T8724] pgmajfault 0 [ 529.178971][ T8724] workingset_refault 0 [ 529.178971][ T8724] workingset_activate 0 [ 529.178971][ T8724] workingset_nodereclaim 0 [ 529.178971][ T8724] pgrefill 135 [ 529.178971][ T8724] pgscan 137 [ 529.178971][ T8724] pgsteal 34 [ 529.178971][ T8724] pgactivate 99 [ 529.183968][ T8724] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=10557,uid=0 [ 529.184093][ T8724] Memory cgroup out of memory: Killed process 10557 (syz-executor.3) total-vm:72576kB, anon-rss:2204kB, file-rss:35852kB, shmem-rss:0kB, UID:0 pgtables:143360kB oom_score_adj:1000 [ 529.299615][ T8732] syz-executor.5 invoked oom-killer: gfp_mask=0x40c50(GFP_NOFS|__GFP_COMP|__GFP_RECLAIMABLE), order=0, oom_score_adj=0 [ 529.315402][ T1065] [ 529.322404][ T8732] CPU: 0 PID: 8732 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 529.322948][ T1065] ============================================ [ 529.331945][ T8732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 529.338076][ T1065] WARNING: possible recursive locking detected [ 529.348103][ T8732] Call Trace: [ 529.354225][ T1065] 5.3.0-rc6-next-20190830 #75 Not tainted [ 529.357492][ T8732] dump_stack+0x172/0x1f0 [ 529.363166][ T1065] -------------------------------------------- [ 529.367472][ T8732] dump_header+0x177/0x1152 [ 529.373690][ T1065] oom_reaper/1065 is trying to acquire lock: [ 529.378171][ T8732] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 529.384113][ T1065] ffffffff8904ff60 (mmu_notifier_invalidate_range_start){+.+.}, at: __mmu_notifier_invalidate_range_end+0x0/0x360 [ 529.389909][ T8732] ? ___ratelimit+0x2c8/0x595 [ 529.401839][ T1065] [ 529.401839][ T1065] but task is already holding lock: [ 529.406493][ T8732] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 529.413821][ T1065] ffffffff8904ff60 (mmu_notifier_invalidate_range_start){+.+.}, at: __oom_reap_task_mm+0x196/0x490 [ 529.419605][ T8732] ? lockdep_hardirqs_on+0x418/0x5d0 [ 529.430234][ T1065] [ 529.430234][ T1065] other info that might help us debug this: [ 529.435499][ T8732] ? trace_hardirqs_on+0x67/0x240 [ 529.443520][ T1065] Possible unsafe locking scenario: [ 529.443520][ T1065] [ 529.448522][ T8732] ? pagefault_out_of_memory+0x11c/0x11c [ 529.455937][ T1065] CPU0 [ 529.461557][ T8732] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 529.464804][ T1065] ---- [ 529.470584][ T8732] ? ___ratelimit+0x60/0x595 [ 529.473832][ T1065] lock(mmu_notifier_invalidate_range_start); [ 529.478429][ T8732] ? do_raw_spin_unlock+0x57/0x270 [ 529.484558][ T1065] lock(mmu_notifier_invalidate_range_start); [ 529.489663][ T8732] oom_kill_process.cold+0x10/0x15 [ 529.495775][ T1065] [ 529.495775][ T1065] *** DEADLOCK *** [ 529.495775][ T1065] [ 529.500867][ T8732] out_of_memory+0x334/0x1340 [ 529.508972][ T1065] May be due to missing lock nesting notation [ 529.508972][ T1065] [ 529.508985][ T1065] 2 locks held by oom_reaper/1065: [ 529.513657][ T8732] ? lock_downgrade+0x920/0x920 [ 529.521936][ T1065] #0: ffff8880a8522810 (&mm->mmap_sem#2){++++}, at: oom_reaper+0x3a7/0x1320 [ 529.527097][ T8732] ? oom_killer_disable+0x280/0x280 [ 529.527119][ T8732] mem_cgroup_out_of_memory+0x1d8/0x240 [ 529.531954][ T1065] #1: ffffffff8904ff60 (mmu_notifier_invalidate_range_start){+.+.}, at: __oom_reap_task_mm+0x196/0x490 [ 529.540725][ T8732] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 529.545881][ T1065] [ 529.545881][ T1065] stack backtrace: [ 529.551404][ T8732] ? do_raw_spin_unlock+0x57/0x270 [ 529.579049][ T8732] ? _raw_spin_unlock+0x2d/0x50 [ 529.583886][ T8732] try_charge+0xf4b/0x1440 [ 529.588290][ T8732] ? __lock_acquire+0x800/0x4a00 [ 529.593215][ T8732] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 529.598746][ T8732] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 529.604708][ T8732] ? cache_grow_begin+0x122/0xd20 [ 529.609716][ T8732] ? find_held_lock+0x35/0x130 [ 529.614489][ T8732] ? cache_grow_begin+0x122/0xd20 [ 529.619505][ T8732] __memcg_kmem_charge_memcg+0x71/0xf0 [ 529.624954][ T8732] ? memcg_kmem_put_cache+0x50/0x50 [ 529.630138][ T8732] ? __kasan_check_read+0x11/0x20 [ 529.635147][ T8732] cache_grow_begin+0x629/0xd20 [ 529.639986][ T8732] ? __sanitizer_cov_trace_cmp2+0x11/0x20 [ 529.645693][ T8732] ? mempolicy_slab_node+0x139/0x390 [ 529.650970][ T8732] fallback_alloc+0x1fd/0x2d0 [ 529.656069][ T8732] ____cache_alloc_node+0x1bc/0x1d0 [ 529.661254][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 529.667479][ T8732] kmem_cache_alloc+0x1ef/0x710 [ 529.672316][ T8732] ? lock_downgrade+0x920/0x920 [ 529.677149][ T8732] ? rwlock_bug.part.0+0x90/0x90 [ 529.682072][ T8732] ? ratelimit_state_init+0xb0/0xb0 [ 529.687253][ T8732] ext4_alloc_inode+0x1f/0x640 [ 529.692002][ T8732] ? ratelimit_state_init+0xb0/0xb0 [ 529.697183][ T8732] alloc_inode+0x68/0x1e0 [ 529.701499][ T8732] iget_locked+0x1a6/0x4b0 [ 529.705903][ T8732] __ext4_iget+0x265/0x3bb0 [ 529.710394][ T8732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 529.716623][ T8732] ? ext4_get_projid+0x190/0x190 [ 529.721547][ T8732] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 529.727078][ T8732] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 529.733041][ T8732] ? d_alloc_parallel+0xa78/0x1c30 [ 529.738142][ T8732] ext4_lookup+0x3b1/0x7a0 [ 529.742545][ T8732] ? ext4_cross_rename+0x1430/0x1430 [ 529.747814][ T8732] ? __lock_acquire+0x16f2/0x4a00 [ 529.752820][ T8732] ? __kasan_check_read+0x11/0x20 [ 529.757833][ T8732] ? lockdep_init_map+0x1be/0x6d0 [ 529.762848][ T8732] __lookup_slow+0x279/0x500 [ 529.767424][ T8732] ? vfs_unlink+0x620/0x620 [ 529.771949][ T8732] lookup_slow+0x58/0x80 [ 529.776179][ T8732] path_mountpoint+0x5d2/0x1e60 [ 529.781014][ T8732] ? __kasan_check_read+0x11/0x20 [ 529.786021][ T8732] ? __lock_acquire+0x16f2/0x4a00 [ 529.791031][ T8732] ? putname+0xef/0x130 [ 529.795173][ T8732] ? path_openat+0x46d0/0x46d0 [ 529.799924][ T8732] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 529.805547][ T8732] ? find_held_lock+0x35/0x130 [ 529.810320][ T8732] filename_mountpoint+0x190/0x3c0 [ 529.815421][ T8732] ? filename_parentat.isra.0+0x410/0x410 [ 529.821124][ T8732] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 529.827266][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 529.833489][ T8732] ? __phys_addr_symbol+0x30/0x70 [ 529.838501][ T8732] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 529.844206][ T8732] ? __check_object_size+0x3d/0x437 [ 529.849495][ T8732] ? strncpy_from_user+0x2b4/0x400 [ 529.854593][ T8732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 529.860816][ T8732] ? getname_flags+0x277/0x5b0 [ 529.865568][ T8732] user_path_mountpoint_at+0x3a/0x50 [ 529.870837][ T8732] ksys_umount+0x167/0xf00 [ 529.875239][ T8732] ? __ia32_sys_rmdir+0x40/0x40 [ 529.880073][ T8732] ? __detach_mounts+0x2a0/0x2a0 [ 529.884997][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 529.891225][ T8732] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 529.896672][ T8732] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 529.902115][ T8732] ? do_syscall_64+0x26/0x760 [ 529.906777][ T8732] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 529.912827][ T8732] ? do_syscall_64+0x26/0x760 [ 529.917490][ T8732] ? lockdep_hardirqs_on+0x418/0x5d0 [ 529.922764][ T8732] __x64_sys_umount+0x54/0x80 [ 529.927428][ T8732] do_syscall_64+0xfa/0x760 [ 529.931919][ T8732] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 529.937800][ T8732] RIP: 0033:0x45c317 [ 529.941679][ T8732] Code: 64 89 04 25 d0 02 00 00 58 5f ff d0 48 89 c7 e8 2f be ff ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 529.962135][ T8732] RSP: 002b:00007ffd499cd938 EFLAGS: 00000206 ORIG_RAX: 00000000000000a6 [ 529.970528][ T8732] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045c317 [ 529.978487][ T8732] RDX: 0000000000403520 RSI: 0000000000000002 RDI: 00007ffd499cd9e0 [ 529.986441][ T8732] RBP: 00000000000006f3 R08: 0000000000000000 R09: 000000000000000c [ 529.994410][ T8732] R10: 0000000000000006 R11: 0000000000000206 R12: 00007ffd499cea70 [ 530.002380][ T8732] R13: 00005555560f8940 R14: 0000000000000000 R15: 00007ffd499cea70 [ 530.010350][ T1065] CPU: 1 PID: 1065 Comm: oom_reaper Not tainted 5.3.0-rc6-next-20190830 #75 [ 530.011718][ T8732] memory: usage 18404kB, limit 0kB, failcnt 135 [ 530.019033][ T1065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 530.025265][ T8732] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 530.035268][ T1065] Call Trace: [ 530.035287][ T1065] dump_stack+0x172/0x1f0 [ 530.035302][ T1065] __lock_acquire.cold+0x15d/0x385 [ 530.035320][ T1065] ? mark_held_locks+0xf0/0xf0 [ 530.042284][ T8732] Memory cgroup stats for /syz5: [ 530.042384][ T8732] anon 13422592 [ 530.042384][ T8732] file 0 [ 530.042384][ T8732] kernel_stack 196608 [ 530.042384][ T8732] slab 4612096 [ 530.042384][ T8732] sock 0 [ 530.042384][ T8732] shmem 110592 [ 530.042384][ T8732] file_mapped 135168 [ 530.042384][ T8732] file_dirty 0 [ 530.042384][ T8732] file_writeback 0 [ 530.042384][ T8732] anon_thp 12582912 [ 530.042384][ T8732] inactive_anon 0 [ 530.042384][ T8732] active_anon 13422592 [ 530.042384][ T8732] inactive_file 0 [ 530.042384][ T8732] active_file 135168 [ 530.042384][ T8732] unevictable 0 [ 530.042384][ T8732] slab_reclaimable 1622016 [ 530.042384][ T8732] slab_unreclaimable 2990080 [ 530.042384][ T8732] pgfault 57255 [ 530.042384][ T8732] pgmajfault 0 [ 530.042384][ T8732] workingset_refault 0 [ 530.042384][ T8732] workingset_activate 0 [ 530.042384][ T8732] workingset_nodereclaim 0 [ 530.042384][ T8732] pgrefill 71 [ 530.042384][ T8732] pgscan 66 [ 530.042384][ T8732] pgsteal 33 [ 530.042384][ T8732] pgactivate 33 [ 530.045423][ T1065] ? unmap_page_range+0x1df4/0x2380 [ 530.049839][ T8732] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=9567,uid=0 [ 530.054806][ T1065] lock_acquire+0x190/0x410 [ 530.059653][ T8732] Memory cgroup out of memory: Killed process 9567 (syz-executor.5) total-vm:73592kB, anon-rss:2200kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:143360kB oom_score_adj:1000 [ 530.064455][ T1065] ? __mmu_notifier_invalidate_range_start+0x210/0x210 [ 530.165790][T13408] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 530.175986][ T1065] __mmu_notifier_invalidate_range_end+0x3c/0x360 [ 530.175998][ T1065] ? __mmu_notifier_invalidate_range_start+0x210/0x210 [ 530.176016][ T1065] ? __mmu_notifier_invalidate_range_start+0x1a5/0x210 [ 530.236724][ T1065] __oom_reap_task_mm+0x3fa/0x490 [ 530.241748][ T1065] ? process_shares_mm+0x130/0x130 [ 530.246855][ T1065] ? oom_reaper+0x3a7/0x1320 [ 530.251434][ T1065] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 530.257667][ T1065] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 530.263634][ T1065] ? __kasan_check_read+0x11/0x20 [ 530.268646][ T1065] ? do_raw_spin_unlock+0x57/0x270 [ 530.273741][ T1065] oom_reaper+0x2b2/0x1320 [ 530.278147][ T1065] ? __oom_reap_task_mm+0x490/0x490 [ 530.283332][ T1065] ? trace_hardirqs_on+0x67/0x240 [ 530.288359][ T1065] ? finish_wait+0x260/0x260 [ 530.292936][ T1065] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 530.299161][ T1065] ? __kthread_parkme+0x108/0x1c0 [ 530.304171][ T1065] ? __kasan_check_read+0x11/0x20 [ 530.309209][ T1065] kthread+0x361/0x430 [ 530.313281][ T1065] ? __oom_reap_task_mm+0x490/0x490 [ 530.318473][ T1065] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 530.324704][ T1065] ret_from_fork+0x24/0x30 [ 530.329115][T13408] CPU: 0 PID: 13408 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 530.338228][T13408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 530.341776][ T9369] kobject: 'ieee80211': free name [ 530.348292][T13408] Call Trace: [ 530.356234][ T9369] kobject: 'hwsim10' (00000000588957ce): kobject_uevent_env [ 530.356729][T13408] dump_stack+0x172/0x1f0 [ 530.364049][ T9369] kobject: 'hwsim10' (00000000588957ce): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim10' [ 530.368302][T13408] dump_header+0x177/0x1152 [ 530.384037][T13408] ? ___ratelimit+0xf8/0x595 [ 530.386979][ T9369] kobject: 'hwsim10' (00000000588957ce): kobject_uevent_env [ 530.388626][T13408] ? trace_hardirqs_on+0x67/0x240 [ 530.395942][ T9369] kobject: 'hwsim10' (00000000588957ce): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim10' [ 530.400891][T13408] ? pagefault_out_of_memory+0x11c/0x11c [ 530.400905][T13408] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 530.400916][T13408] ? ___ratelimit+0x60/0x595 [ 530.400926][T13408] ? do_raw_spin_unlock+0x57/0x270 [ 530.400939][T13408] oom_kill_process.cold+0x10/0x15 [ 530.400951][T13408] out_of_memory+0x334/0x1340 [ 530.400968][T13408] ? lock_downgrade+0x920/0x920 [ 530.416056][ T9369] kobject: 'hwsim10' (00000000588957ce): kobject_cleanup, parent 00000000ca0b622f [ 530.417844][T13408] ? oom_killer_disable+0x280/0x280 [ 530.423661][ T9369] kobject: 'hwsim10' (00000000588957ce): calling ktype release [ 530.428195][T13408] mem_cgroup_out_of_memory+0x1d8/0x240 [ 530.435797][ T9369] kobject: 'hwsim10': free name [ 530.438378][T13408] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 530.443095][ T9369] kobject: 'phy11' (00000000dd41d4a5): kobject_cleanup, parent 00000000ca0b622f [ 530.447859][T13408] ? do_raw_spin_unlock+0x57/0x270 [ 530.459560][ T9369] kobject: 'phy11' (00000000dd41d4a5): calling ktype release [ 530.462198][T13408] ? _raw_spin_unlock+0x2d/0x50 [ 530.471827][ T9369] kobject: 'rfkill13' (00000000ccc88006): kobject_cleanup, parent 00000000ca0b622f [ 530.475228][T13408] try_charge+0xf4b/0x1440 [ 530.480438][ T9369] kobject: 'rfkill13' (00000000ccc88006): calling ktype release [ 530.485655][T13408] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 530.496787][ T9369] kobject: 'rfkill13': free name [ 530.499737][T13408] ? find_held_lock+0x35/0x130 [ 530.499753][T13408] ? get_mem_cgroup_from_mm+0x139/0x320 [ 530.499768][T13408] ? lock_downgrade+0x920/0x920 [ 530.499784][T13408] ? percpu_ref_tryget_live+0x111/0x290 [ 530.508293][ T9369] kobject: 'phy11': free name [ 530.511963][T13408] __memcg_kmem_charge_memcg+0x71/0xf0 [ 530.511976][T13408] ? memcg_kmem_put_cache+0x50/0x50 [ 530.511990][T13408] ? get_mem_cgroup_from_mm+0x156/0x320 [ 530.512005][T13408] __memcg_kmem_charge+0x13a/0x3a0 [ 530.512017][T13408] __alloc_pages_nodemask+0x4f7/0x900 [ 530.512035][T13408] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 530.524198][ T1065] oom_reaper: reaped process 10557 (syz-executor.3), now anon-rss:0kB, file-rss:34892kB, shmem-rss:0kB [ 530.525686][T13408] ? __alloc_pages_slowpath+0x2540/0x2540 [ 530.617800][T13408] ? percpu_ref_put_many+0xb6/0x190 [ 530.622983][T13408] copy_process+0x3f8/0x6830 [ 530.627548][T13408] ? __kasan_check_read+0x11/0x20 [ 530.632547][T13408] ? __kasan_check_read+0x11/0x20 [ 530.637567][T13408] ? __lock_acquire+0x16f2/0x4a00 [ 530.642586][T13408] ? __cleanup_sighand+0x60/0x60 [ 530.647509][T13408] ? __might_fault+0x12b/0x1e0 [ 530.652266][T13408] ? __might_fault+0x12b/0x1e0 [ 530.657006][T13408] _do_fork+0x146/0xfa0 [ 530.661148][T13408] ? copy_init_mm+0x20/0x20 [ 530.665638][T13408] ? __kasan_check_read+0x11/0x20 [ 530.670637][T13408] ? _copy_to_user+0x118/0x160 [ 530.675379][T13408] __x64_sys_clone+0x1ab/0x270 [ 530.680130][T13408] ? __ia32_sys_vfork+0xd0/0xd0 [ 530.684969][T13408] ? do_syscall_64+0x26/0x760 [ 530.689624][T13408] ? lockdep_hardirqs_on+0x418/0x5d0 [ 530.694885][T13408] ? trace_hardirqs_on+0x67/0x240 [ 530.699900][T13408] do_syscall_64+0xfa/0x760 [ 530.704395][T13408] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 530.710259][T13408] RIP: 0033:0x457eba [ 530.714142][T13408] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 530.733721][T13408] RSP: 002b:00007fff72d20d70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 530.742117][T13408] RAX: ffffffffffffffda RBX: 00007fff72d20d70 RCX: 0000000000457eba [ 530.750068][T13408] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 530.758017][T13408] RBP: 00007fff72d20db0 R08: 0000000000000001 R09: 000055555710c940 [ 530.765967][T13408] R10: 000055555710cc10 R11: 0000000000000246 R12: 0000000000000001 [ 530.773969][T13408] R13: 0000000000000000 R14: 0000000000000000 R15: 00007fff72d20e00 [ 530.782725][T13408] memory: usage 14788kB, limit 0kB, failcnt 64 [ 530.788892][T13408] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 530.792297][T10557] kobject: 'kvm' (000000004c6f30a4): kobject_uevent_env [ 530.796133][T22259] kobject: 'hsr0' (000000000c30e4db): kobject_add_internal: parent: 'net', set: 'devices' [ 530.802728][T10557] kobject: 'kvm' (000000004c6f30a4): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 530.815911][T13408] Memory cgroup stats for /syz4: [ 530.816006][T13408] anon 11272192 [ 530.816006][T13408] file 45056 [ 530.816006][T13408] kernel_stack 196608 [ 530.816006][T13408] slab 3067904 [ 530.816006][T13408] sock 0 [ 530.816006][T13408] shmem 0 [ 530.816006][T13408] file_mapped 135168 [ 530.816006][T13408] file_dirty 135168 [ 530.816006][T13408] file_writeback 0 [ 530.816006][T13408] anon_thp 10485760 [ 530.816006][T13408] inactive_anon 0 [ 530.816006][T13408] active_anon 11272192 [ 530.816006][T13408] inactive_file 0 [ 530.816006][T13408] active_file 0 [ 530.816006][T13408] unevictable 0 [ 530.816006][T13408] slab_reclaimable 1216512 [ 530.816006][T13408] slab_unreclaimable 1851392 [ 530.816006][T13408] pgfault 56595 [ 530.816006][T13408] pgmajfault 0 [ 530.816006][T13408] workingset_refault 0 [ 530.816006][T13408] workingset_activate 0 [ 530.816006][T13408] workingset_nodereclaim 0 [ 530.816006][T13408] pgrefill 33 [ 530.816006][T13408] pgscan 34 [ 530.816006][T13408] pgsteal 0 [ 530.816006][T13408] pgactivate 0 [ 530.840289][T22259] kobject: 'hsr0' (000000000c30e4db): kobject_uevent_env [ 530.918629][T13408] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=15361,uid=0 [ 530.936601][T22259] kobject: 'hsr0' (000000000c30e4db): fill_kobj_path: path = '/devices/virtual/net/hsr0' [ 530.942956][T13408] Memory cgroup out of memory: Killed process 15361 (syz-executor.4) total-vm:72972kB, anon-rss:2220kB, file-rss:35784kB, shmem-rss:0kB, UID:0 pgtables:143360kB oom_score_adj:1000 [ 530.950674][T22259] kobject: 'queues' (000000004929f4a5): kobject_add_internal: parent: 'hsr0', set: '' [ 530.969345][ T1065] oom_reaper: reaped process 15361 (syz-executor.4), now anon-rss:0kB, file-rss:34824kB, shmem-rss:0kB [ 530.981030][T22259] kobject: 'queues' (000000004929f4a5): kobject_uevent_env [ 530.990721][T13408] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 531.008665][T22259] kobject: 'queues' (000000004929f4a5): kobject_uevent_env: filter function caused the event to drop! [ 531.019860][T22259] kobject: 'rx-0' (00000000587ce3d4): kobject_add_internal: parent: 'queues', set: 'queues' [ 531.020439][T13408] CPU: 1 PID: 13408 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 531.030239][T22259] kobject: 'rx-0' (00000000587ce3d4): kobject_uevent_env [ 531.039008][T13408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 531.046282][T22259] kobject: 'rx-0' (00000000587ce3d4): fill_kobj_path: path = '/devices/virtual/net/hsr0/queues/rx-0' [ 531.056028][T13408] Call Trace: [ 531.056047][T13408] dump_stack+0x172/0x1f0 [ 531.056068][T13408] dump_header+0x177/0x1152 [ 531.067181][T22259] kobject: 'tx-0' (0000000072617217): kobject_add_internal: parent: 'queues', set: 'queues' [ 531.070146][T13408] ? ___ratelimit+0xf8/0x595 [ 531.070159][T13408] ? trace_hardirqs_on+0x67/0x240 [ 531.070176][T13408] ? pagefault_out_of_memory+0x11c/0x11c [ 531.075064][T22259] kobject: 'tx-0' (0000000072617217): kobject_uevent_env [ 531.078979][T13408] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 531.089247][T22259] kobject: 'tx-0' (0000000072617217): fill_kobj_path: path = '/devices/virtual/net/hsr0/queues/tx-0' [ 531.093594][T13408] ? ___ratelimit+0x60/0x595 [ 531.093606][T13408] ? do_raw_spin_unlock+0x57/0x270 [ 531.093623][T13408] oom_kill_process.cold+0x10/0x15 [ 531.099877][T22259] kobject: 'batman_adv' (000000003461c68d): kobject_add_internal: parent: 'hsr0', set: '' [ 531.104236][T13408] out_of_memory+0x334/0x1340 [ 531.111756][T22259] device hsr_slave_0 entered promiscuous mode [ 531.117016][T13408] ? lock_downgrade+0x920/0x920 [ 531.168456][T13408] ? oom_killer_disable+0x280/0x280 [ 531.173634][T13408] mem_cgroup_out_of_memory+0x1d8/0x240 [ 531.179154][T13408] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 531.184760][T13408] ? do_raw_spin_unlock+0x57/0x270 [ 531.189849][T13408] ? _raw_spin_unlock+0x2d/0x50 [ 531.194672][T13408] try_charge+0xf4b/0x1440 [ 531.199065][T13408] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 531.204599][T13408] ? find_held_lock+0x35/0x130 [ 531.209340][T13408] ? get_mem_cgroup_from_mm+0x139/0x320 [ 531.214878][T13408] ? lock_downgrade+0x920/0x920 [ 531.219710][T13408] ? percpu_ref_tryget_live+0x111/0x290 [ 531.225304][T13408] __memcg_kmem_charge_memcg+0x71/0xf0 [ 531.230752][T13408] ? memcg_kmem_put_cache+0x50/0x50 [ 531.235932][T13408] ? get_mem_cgroup_from_mm+0x156/0x320 [ 531.241502][T13408] __memcg_kmem_charge+0x13a/0x3a0 [ 531.246596][T13408] __alloc_pages_nodemask+0x4f7/0x900 [ 531.251947][T13408] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 531.257468][T13408] ? __alloc_pages_slowpath+0x2540/0x2540 [ 531.263161][T13408] ? percpu_ref_put_many+0xb6/0x190 [ 531.268339][T13408] copy_process+0x3f8/0x6830 [ 531.272907][T13408] ? __kasan_check_read+0x11/0x20 [ 531.277907][T13408] ? __kasan_check_read+0x11/0x20 [ 531.282919][T13408] ? __lock_acquire+0x16f2/0x4a00 [ 531.287920][T13408] ? __cleanup_sighand+0x60/0x60 [ 531.292832][T13408] ? __might_fault+0x12b/0x1e0 [ 531.297568][T13408] ? __might_fault+0x12b/0x1e0 [ 531.302655][T13408] _do_fork+0x146/0xfa0 [ 531.306806][T13408] ? copy_init_mm+0x20/0x20 [ 531.311295][T13408] ? __kasan_check_read+0x11/0x20 [ 531.316304][T13408] ? _copy_to_user+0x118/0x160 [ 531.321057][T13408] __x64_sys_clone+0x1ab/0x270 [ 531.325796][T13408] ? __ia32_sys_vfork+0xd0/0xd0 [ 531.330629][T13408] ? do_syscall_64+0x26/0x760 [ 531.335284][T13408] ? lockdep_hardirqs_on+0x418/0x5d0 [ 531.340542][T13408] ? trace_hardirqs_on+0x67/0x240 [ 531.345541][T13408] do_syscall_64+0xfa/0x760 [ 531.350023][T13408] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 531.355903][T13408] RIP: 0033:0x457eba [ 531.359893][T13408] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 531.379471][T13408] RSP: 002b:00007fff72d20d70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 531.387894][T13408] RAX: ffffffffffffffda RBX: 00007fff72d20d70 RCX: 0000000000457eba [ 531.395868][T13408] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 531.403826][T13408] RBP: 00007fff72d20db0 R08: 0000000000000001 R09: 000055555710c940 [ 531.411785][T13408] R10: 000055555710cc10 R11: 0000000000000246 R12: 0000000000000001 [ 531.419740][T13408] R13: 0000000000000000 R14: 0000000000000000 R15: 00007fff72d20e00 [ 531.427983][T13408] memory: usage 12408kB, limit 0kB, failcnt 70 [ 531.434171][T13408] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 531.441055][T13408] Memory cgroup stats for /syz4: [ 531.441153][T13408] anon 9052160 [ 531.441153][T13408] file 45056 [ 531.441153][T13408] kernel_stack 196608 [ 531.441153][T13408] slab 3067904 [ 531.441153][T13408] sock 0 [ 531.441153][T13408] shmem 0 [ 531.441153][T13408] file_mapped 135168 [ 531.441153][T13408] file_dirty 135168 [ 531.441153][T13408] file_writeback 0 [ 531.441153][T13408] anon_thp 8388608 [ 531.441153][T13408] inactive_anon 0 [ 531.441153][T13408] active_anon 9052160 [ 531.441153][T13408] inactive_file 0 [ 531.441153][T13408] active_file 0 [ 531.441153][T13408] unevictable 0 [ 531.441153][T13408] slab_reclaimable 1216512 [ 531.441153][T13408] slab_unreclaimable 1851392 [ 531.441153][T13408] pgfault 56595 [ 531.441153][T13408] pgmajfault 0 [ 531.441153][T13408] workingset_refault 0 [ 531.441153][T13408] workingset_activate 0 [ 531.441153][T13408] workingset_nodereclaim 0 [ 531.441153][T13408] pgrefill 33 [ 531.441153][T13408] pgscan 34 [ 531.441153][T13408] pgsteal 0 [ 531.441153][T13408] pgactivate 0 [ 531.536721][T13408] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=21048,uid=0 [ 531.540265][T22259] device hsr_slave_1 entered promiscuous mode [ 531.552238][T13408] Memory cgroup out of memory: Killed process 21048 (syz-executor.4) total-vm:72576kB, anon-rss:2204kB, file-rss:35796kB, shmem-rss:0kB, UID:0 pgtables:143360kB oom_score_adj:1000 [ 531.576692][ T1065] oom_reaper: reaped process 21048 (syz-executor.4), now anon-rss:0kB, file-rss:34836kB, shmem-rss:0kB [ 531.587839][ T8724] syz-executor.3 invoked oom-killer: gfp_mask=0x40cc0(GFP_KERNEL|__GFP_COMP), order=1, oom_score_adj=0 [ 531.603241][ T8724] CPU: 0 PID: 8724 Comm: syz-executor.3 Not tainted 5.3.0-rc6-next-20190830 #75 [ 531.612403][ T8724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 531.622436][ T8724] Call Trace: [ 531.625708][ T8724] dump_stack+0x172/0x1f0 [ 531.630031][ T8724] dump_header+0x177/0x1152 [ 531.634513][ T8724] ? ___ratelimit+0xf8/0x595 [ 531.639079][ T8724] ? trace_hardirqs_on+0x67/0x240 [ 531.644080][ T8724] ? pagefault_out_of_memory+0x11c/0x11c [ 531.649699][ T8724] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 531.655488][ T8724] ? ___ratelimit+0x60/0x595 [ 531.660063][ T8724] ? do_raw_spin_unlock+0x57/0x270 [ 531.665161][ T8724] oom_kill_process.cold+0x10/0x15 [ 531.670247][ T8724] out_of_memory+0x334/0x1340 [ 531.674898][ T8724] ? lock_downgrade+0x920/0x920 [ 531.679731][ T8724] ? oom_killer_disable+0x280/0x280 [ 531.684912][ T8724] ? __kasan_check_read+0x11/0x20 [ 531.689915][ T8724] mem_cgroup_out_of_memory+0x1d8/0x240 [ 531.695435][ T8724] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 531.701051][ T8724] ? do_raw_spin_unlock+0x57/0x270 [ 531.706159][ T8724] ? _raw_spin_unlock+0x2d/0x50 [ 531.710998][ T8724] try_charge+0xf4b/0x1440 [ 531.715392][ T8724] ? __lock_acquire+0x800/0x4a00 [ 531.720315][ T8724] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 531.725845][ T8724] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 531.731802][ T8724] ? cache_grow_begin+0x122/0xd20 [ 531.736809][ T8724] ? find_held_lock+0x35/0x130 [ 531.741564][ T8724] ? cache_grow_begin+0x122/0xd20 [ 531.746565][ T8724] __memcg_kmem_charge_memcg+0x71/0xf0 [ 531.751999][ T8724] ? memcg_kmem_put_cache+0x50/0x50 [ 531.757172][ T8724] ? __kasan_check_read+0x11/0x20 [ 531.762187][ T8724] cache_grow_begin+0x629/0xd20 [ 531.767014][ T8724] ? __sanitizer_cov_trace_cmp2+0x11/0x20 [ 531.772718][ T8724] ? mempolicy_slab_node+0x139/0x390 [ 531.777981][ T8724] fallback_alloc+0x1fd/0x2d0 [ 531.782638][ T8724] ____cache_alloc_node+0x1bc/0x1d0 [ 531.787815][ T8724] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 531.794033][ T8724] kmem_cache_alloc_node+0xe3/0x740 [ 531.799224][ T8724] ? lockdep_hardirqs_on+0x418/0x5d0 [ 531.804487][ T8724] ? trace_hardirqs_on+0x67/0x240 [ 531.809501][ T8724] copy_process+0x44c4/0x6830 [ 531.814163][ T8724] ? __kasan_check_read+0x11/0x20 [ 531.819180][ T8724] ? __kasan_check_read+0x11/0x20 [ 531.824186][ T8724] ? __lock_acquire+0x16f2/0x4a00 [ 531.829207][ T8724] ? __cleanup_sighand+0x60/0x60 [ 531.834119][ T8724] ? __might_fault+0x12b/0x1e0 [ 531.838859][ T8724] ? __might_fault+0x12b/0x1e0 [ 531.843602][ T8724] _do_fork+0x146/0xfa0 [ 531.847732][ T8724] ? copy_init_mm+0x20/0x20 [ 531.852213][ T8724] ? __kasan_check_read+0x11/0x20 [ 531.857213][ T8724] ? _copy_to_user+0x118/0x160 [ 531.861968][ T8724] __x64_sys_clone+0x1ab/0x270 [ 531.866736][ T8724] ? __ia32_sys_vfork+0xd0/0xd0 [ 531.871565][ T8724] ? do_syscall_64+0x26/0x760 [ 531.876214][ T8724] ? lockdep_hardirqs_on+0x418/0x5d0 [ 531.881473][ T8724] ? trace_hardirqs_on+0x67/0x240 [ 531.886472][ T8724] do_syscall_64+0xfa/0x760 [ 531.890969][ T8724] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 531.896834][ T8724] RIP: 0033:0x457eba [ 531.900712][ T8724] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 531.920304][ T8724] RSP: 002b:00007ffddd578b40 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 531.928699][ T8724] RAX: ffffffffffffffda RBX: 00007ffddd578b40 RCX: 0000000000457eba [ 531.936660][ T8724] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 531.944610][ T8724] RBP: 00007ffddd578b80 R08: 0000000000000001 R09: 0000555556ec8940 [ 531.952558][ T8724] R10: 0000555556ec8c10 R11: 0000000000000246 R12: 0000000000000001 [ 531.960513][ T8724] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffddd578bd0 [ 531.969637][ T8724] memory: usage 44944kB, limit 0kB, failcnt 57 [ 531.975806][ T8724] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 531.980055][ T9369] kobject: 'batman_adv' (0000000085b249a1): kobject_uevent_env [ 531.982687][ T8724] Memory cgroup stats for /syz3: [ 531.982782][ T8724] anon 37761024 [ 531.982782][ T8724] file 131072 [ 531.982782][ T8724] kernel_stack 524288 [ 531.982782][ T8724] slab 5427200 [ 531.982782][ T8724] sock 0 [ 531.982782][ T8724] shmem 0 [ 531.982782][ T8724] file_mapped 0 [ 531.982782][ T8724] file_dirty 0 [ 531.982782][ T8724] file_writeback 0 [ 531.982782][ T8724] anon_thp 35651584 [ 531.982782][ T8724] inactive_anon 135168 [ 531.982782][ T8724] active_anon 37687296 [ 531.982782][ T8724] inactive_file 0 [ 531.982782][ T8724] active_file 0 [ 531.982782][ T8724] unevictable 0 [ 531.982782][ T8724] slab_reclaimable 1892352 [ 531.982782][ T8724] slab_unreclaimable 3534848 [ 531.982782][ T8724] pgfault 45804 [ 531.982782][ T8724] pgmajfault 0 [ 531.982782][ T8724] workingset_refault 0 [ 531.982782][ T8724] workingset_activate 0 [ 531.982782][ T8724] workingset_nodereclaim 0 [ 531.982782][ T8724] pgrefill 135 [ 531.982782][ T8724] pgscan 137 [ 531.982782][ T8724] pgsteal 34 [ 531.982782][ T8724] pgactivate 99 [ 531.993250][ T9369] kobject: 'batman_adv' (0000000085b249a1): kobject_uevent_env: filter function caused the event to drop! [ 531.995107][ T8724] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=10537,uid=0 [ 532.089033][ T9369] kobject: 'batman_adv' (0000000085b249a1): kobject_cleanup, parent 00000000ca0b622f [ 532.097663][ T8724] Memory cgroup out of memory: Killed process 10537 (syz-executor.3) total-vm:72576kB, anon-rss:2204kB, file-rss:35852kB, shmem-rss:0kB, UID:0 pgtables:143360kB oom_score_adj:1000 [ 532.116392][ T9369] kobject: 'batman_adv' (0000000085b249a1): calling ktype release [ 532.129551][ T8732] syz-executor.5 invoked oom-killer: gfp_mask=0x40c50(GFP_NOFS|__GFP_COMP|__GFP_RECLAIMABLE), order=0, oom_score_adj=0 [ 532.141405][ T1065] oom_reaper: reaped process 10537 (syz-executor.3), now anon-rss:0kB, file-rss:34892kB, shmem-rss:0kB [ 532.149080][ T8732] CPU: 0 PID: 8732 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 532.163133][ T9369] kobject: (0000000085b249a1): dynamic_kobj_release [ 532.171410][ T8732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 532.171414][ T8732] Call Trace: [ 532.171434][ T8732] dump_stack+0x172/0x1f0 [ 532.171449][ T8732] dump_header+0x177/0x1152 [ 532.171464][ T8732] ? ___ratelimit+0xf8/0x595 [ 532.185020][ T9369] kobject: 'batman_adv': free name [ 532.187024][ T8732] ? trace_hardirqs_on+0x67/0x240 [ 532.197788][ T9369] kobject: 'rx-0' (000000007da9be80): kobject_cleanup, parent 000000004df9b64b [ 532.200330][ T8732] ? pagefault_out_of_memory+0x11c/0x11c [ 532.200345][ T8732] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 532.200356][ T8732] ? ___ratelimit+0x60/0x595 [ 532.200368][ T8732] ? do_raw_spin_unlock+0x57/0x270 [ 532.200380][ T8732] oom_kill_process.cold+0x10/0x15 [ 532.200392][ T8732] out_of_memory+0x334/0x1340 [ 532.200409][ T8732] ? lock_downgrade+0x920/0x920 [ 532.208070][ T9369] kobject: 'rx-0' (000000007da9be80): auto cleanup 'remove' event [ 532.209220][ T8732] ? oom_killer_disable+0x280/0x280 [ 532.214022][ T9369] kobject: 'rx-0' (000000007da9be80): kobject_uevent_env [ 532.218876][ T8732] mem_cgroup_out_of_memory+0x1d8/0x240 [ 532.226615][ T9369] kobject: 'rx-0' (000000007da9be80): kobject_uevent_env: uevent_suppress caused the event to drop! [ 532.232803][ T8732] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 532.232819][ T8732] ? do_raw_spin_unlock+0x57/0x270 [ 532.232839][ T8732] ? _raw_spin_unlock+0x2d/0x50 [ 532.238926][ T9369] kobject: 'rx-0' (000000007da9be80): auto cleanup kobject_del [ 532.244226][ T8732] try_charge+0xf4b/0x1440 [ 532.244243][ T8732] ? __lock_acquire+0x800/0x4a00 [ 532.244257][ T8732] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 532.244270][ T8732] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 532.244282][ T8732] ? cache_grow_begin+0x122/0xd20 [ 532.244294][ T8732] ? find_held_lock+0x35/0x130 [ 532.244303][ T8732] ? cache_grow_begin+0x122/0xd20 [ 532.244324][ T8732] __memcg_kmem_charge_memcg+0x71/0xf0 [ 532.252403][ T9369] kobject: 'rx-0' (000000007da9be80): calling ktype release [ 532.253979][ T8732] ? memcg_kmem_put_cache+0x50/0x50 [ 532.259051][ T9369] kobject: 'rx-0': free name [ 532.263713][ T8732] ? __kasan_check_read+0x11/0x20 [ 532.263727][ T8732] cache_grow_begin+0x629/0xd20 [ 532.263747][ T8732] ? __sanitizer_cov_trace_cmp2+0x11/0x20 [ 532.263764][ T8732] ? mempolicy_slab_node+0x139/0x390 [ 532.271932][ T9369] kobject: 'tx-3' (000000004bdfbe57): kobject_cleanup, parent 000000004df9b64b [ 532.276370][ T8732] fallback_alloc+0x1fd/0x2d0 [ 532.281769][ T9369] kobject: 'tx-3' (000000004bdfbe57): auto cleanup 'remove' event [ 532.288544][ T8732] ____cache_alloc_node+0x1bc/0x1d0 [ 532.296923][ T9369] kobject: 'tx-3' (000000004bdfbe57): kobject_uevent_env [ 532.304801][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 532.304814][ T8732] kmem_cache_alloc+0x1ef/0x710 [ 532.304827][ T8732] ? lock_downgrade+0x920/0x920 [ 532.304842][ T8732] ? rwlock_bug.part.0+0x90/0x90 [ 532.313168][ T9369] kobject: 'tx-3' (000000004bdfbe57): kobject_uevent_env: uevent_suppress caused the event to drop! [ 532.315562][ T8732] ? ratelimit_state_init+0xb0/0xb0 [ 532.320596][ T9369] kobject: 'tx-3' (000000004bdfbe57): auto cleanup kobject_del [ 532.327910][ T8732] ext4_alloc_inode+0x1f/0x640 [ 532.335984][ T9369] kobject: 'tx-3' (000000004bdfbe57): calling ktype release [ 532.338177][ T8732] ? ratelimit_state_init+0xb0/0xb0 [ 532.344193][ T9369] kobject: 'tx-3': free name [ 532.349659][ T8732] alloc_inode+0x68/0x1e0 [ 532.349673][ T8732] iget_locked+0x1a6/0x4b0 [ 532.349687][ T8732] __ext4_iget+0x265/0x3bb0 [ 532.349704][ T8732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 532.349721][ T8732] ? ext4_get_projid+0x190/0x190 [ 532.349735][ T8732] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 532.349747][ T8732] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 532.349758][ T8732] ? d_alloc_parallel+0xa78/0x1c30 [ 532.349776][ T8732] ext4_lookup+0x3b1/0x7a0 [ 532.358577][ T9369] kobject: 'tx-2' (000000002d04cd51): kobject_cleanup, parent 000000004df9b64b [ 532.359612][ T8732] ? ext4_cross_rename+0x1430/0x1430 [ 532.359627][ T8732] ? __lock_acquire+0x16f2/0x4a00 [ 532.359639][ T8732] ? __kasan_check_read+0x11/0x20 [ 532.359656][ T8732] ? lockdep_init_map+0x1be/0x6d0 [ 532.364655][ T9369] kobject: 'tx-2' (000000002d04cd51): auto cleanup 'remove' event [ 532.370095][ T8732] __lookup_slow+0x279/0x500 [ 532.370108][ T8732] ? vfs_unlink+0x620/0x620 [ 532.370131][ T8732] lookup_slow+0x58/0x80 [ 532.370144][ T8732] path_mountpoint+0x5d2/0x1e60 [ 532.370156][ T8732] ? __kasan_check_read+0x11/0x20 [ 532.370166][ T8732] ? __lock_acquire+0x16f2/0x4a00 [ 532.370175][ T8732] ? putname+0xef/0x130 [ 532.370192][ T8732] ? path_openat+0x46d0/0x46d0 [ 532.381486][ T9369] kobject: 'tx-2' (000000002d04cd51): kobject_uevent_env [ 532.382646][ T8732] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 532.387202][ T9369] kobject: 'tx-2' (000000002d04cd51): kobject_uevent_env: uevent_suppress caused the event to drop! [ 532.392193][ T8732] ? find_held_lock+0x35/0x130 [ 532.392208][ T8732] filename_mountpoint+0x190/0x3c0 [ 532.392222][ T8732] ? filename_parentat.isra.0+0x410/0x410 [ 532.392237][ T8732] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 532.392260][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 532.398154][ T9369] kobject: 'tx-2' (000000002d04cd51): auto cleanup kobject_del [ 532.402856][ T8732] ? __phys_addr_symbol+0x30/0x70 [ 532.402870][ T8732] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 532.402883][ T8732] ? __check_object_size+0x3d/0x437 [ 532.402901][ T8732] ? strncpy_from_user+0x2b4/0x400 [ 532.402916][ T8732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 532.402932][ T8732] ? getname_flags+0x277/0x5b0 [ 532.411546][ T9369] kobject: 'tx-2' (000000002d04cd51): calling ktype release [ 532.417212][ T8732] user_path_mountpoint_at+0x3a/0x50 [ 532.422796][ T9369] kobject: 'tx-2': free name [ 532.429722][ T8732] ksys_umount+0x167/0xf00 [ 532.429736][ T8732] ? __ia32_sys_rmdir+0x40/0x40 [ 532.429749][ T8732] ? __detach_mounts+0x2a0/0x2a0 [ 532.429764][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 532.429777][ T8732] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 532.429794][ T8732] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 532.437613][ T9369] kobject: 'tx-1' (00000000365448f0): kobject_cleanup, parent 000000004df9b64b [ 532.441965][ T8732] ? do_syscall_64+0x26/0x760 [ 532.441980][ T8732] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 532.441992][ T8732] ? do_syscall_64+0x26/0x760 [ 532.442005][ T8732] ? lockdep_hardirqs_on+0x418/0x5d0 [ 532.442022][ T8732] __x64_sys_umount+0x54/0x80 [ 532.449034][ T9369] kobject: 'tx-1' (00000000365448f0): auto cleanup 'remove' event [ 532.453061][ T8732] do_syscall_64+0xfa/0x760 [ 532.453078][ T8732] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 532.453088][ T8732] RIP: 0033:0x45c317 [ 532.453101][ T8732] Code: 64 89 04 25 d0 02 00 00 58 5f ff d0 48 89 c7 e8 2f be ff ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 532.453107][ T8732] RSP: 002b:00007ffd499cd938 EFLAGS: 00000206 ORIG_RAX: 00000000000000a6 [ 532.461672][ T9369] kobject: 'tx-1' (00000000365448f0): kobject_uevent_env [ 532.462851][ T8732] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045c317 [ 532.475090][ T9369] kobject: 'tx-1' (00000000365448f0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 532.478953][ T8732] RDX: 0000000000403520 RSI: 0000000000000002 RDI: 00007ffd499cd9e0 [ 532.488366][ T9369] kobject: 'tx-1' (00000000365448f0): auto cleanup kobject_del [ 532.491210][ T8732] RBP: 00000000000006f3 R08: 0000000000000000 R09: 000000000000000c [ 532.491218][ T8732] R10: 0000000000000006 R11: 0000000000000206 R12: 00007ffd499cea70 [ 532.491224][ T8732] R13: 00005555560f8940 R14: 0000000000000000 R15: 00007ffd499cea70 [ 532.500625][T10537] kobject: 'kvm' (000000004c6f30a4): kobject_uevent_env [ 532.507838][ T8732] memory: usage 16048kB, limit 0kB, failcnt 141 [ 532.508338][T10537] kobject: 'kvm' (000000004c6f30a4): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 532.515542][ T8732] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 532.539768][ T9369] kobject: 'tx-1' (00000000365448f0): calling ktype release [ 532.547902][ T8732] Memory cgroup stats for /syz5: [ 532.547995][ T8732] anon 11182080 [ 532.547995][ T8732] file 0 [ 532.547995][ T8732] kernel_stack 196608 [ 532.547995][ T8732] slab 4612096 [ 532.547995][ T8732] sock 0 [ 532.547995][ T8732] shmem 110592 [ 532.547995][ T8732] file_mapped 135168 [ 532.547995][ T8732] file_dirty 0 [ 532.547995][ T8732] file_writeback 0 [ 532.547995][ T8732] anon_thp 10485760 [ 532.547995][ T8732] inactive_anon 0 [ 532.547995][ T8732] active_anon 11182080 [ 532.547995][ T8732] inactive_file 0 [ 532.547995][ T8732] active_file 135168 [ 532.547995][ T8732] unevictable 0 [ 532.547995][ T8732] slab_reclaimable 1622016 [ 532.547995][ T8732] slab_unreclaimable 2990080 [ 532.547995][ T8732] pgfault 57255 [ 532.547995][ T8732] pgmajfault 0 [ 532.547995][ T8732] workingset_refault 0 [ 532.547995][ T8732] workingset_activate 0 [ 532.547995][ T8732] workingset_nodereclaim 0 [ 532.547995][ T8732] pgrefill 71 [ 532.547995][ T8732] pgscan 66 [ 532.547995][ T8732] pgsteal 33 [ 532.547995][ T8732] pgactivate 33 [ 532.550601][ T9369] kobject: 'tx-1': free name [ 532.554466][ T8732] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=9522,uid=0 [ 532.563938][ T9369] kobject: 'tx-0' (0000000003b31a7b): kobject_cleanup, parent 000000004df9b64b [ 532.571414][ T8732] Memory cgroup out of memory: Killed process 9522 (syz-executor.5) total-vm:73592kB, anon-rss:2200kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:143360kB oom_score_adj:1000 [ 532.574154][ T9369] kobject: 'tx-0' (0000000003b31a7b): auto cleanup 'remove' event [ 532.579776][ T1065] oom_reaper: reaped process 9522 (syz-executor.5), now anon-rss:0kB, file-rss:34688kB, shmem-rss:0kB [ 532.584609][ T9369] kobject: 'tx-0' (0000000003b31a7b): kobject_uevent_env [ 532.591754][T13408] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 532.596529][ T9369] kobject: 'tx-0' (0000000003b31a7b): kobject_uevent_env: uevent_suppress caused the event to drop! [ 532.604306][T13408] CPU: 1 PID: 13408 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 532.605267][ T9369] kobject: 'tx-0' (0000000003b31a7b): auto cleanup kobject_del [ 532.609778][T13408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 532.609783][T13408] Call Trace: [ 532.609802][T13408] dump_stack+0x172/0x1f0 [ 532.609820][T13408] dump_header+0x177/0x1152 [ 532.615381][ T9369] kobject: 'tx-0' (0000000003b31a7b): calling ktype release [ 532.620070][T13408] ? ___ratelimit+0xf8/0x595 [ 532.620084][T13408] ? trace_hardirqs_on+0x67/0x240 [ 532.620101][T13408] ? pagefault_out_of_memory+0x11c/0x11c [ 532.624661][ T9369] kobject: 'tx-0': free name [ 532.629759][T13408] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 532.629769][T13408] ? ___ratelimit+0x60/0x595 [ 532.629785][T13408] ? do_raw_spin_unlock+0x57/0x270 [ 532.636885][ T9369] kobject: 'queues' (000000004df9b64b): kobject_cleanup, parent 00000000ca0b622f [ 532.642387][T13408] oom_kill_process.cold+0x10/0x15 [ 532.642406][T13408] out_of_memory+0x334/0x1340 [ 532.654211][ T9369] kobject: 'queues' (000000004df9b64b): calling ktype release [ 532.658134][T13408] ? lock_downgrade+0x920/0x920 [ 532.663474][ T9369] kobject: 'queues' (000000004df9b64b): kset_release [ 532.668934][T13408] ? oom_killer_disable+0x280/0x280 [ 532.675264][ T9369] kobject: 'queues': free name [ 532.681282][T13408] mem_cgroup_out_of_memory+0x1d8/0x240 [ 532.681294][T13408] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 532.681310][T13408] ? do_raw_spin_unlock+0x57/0x270 [ 532.689233][ T9369] kobject: 'wlan3' (000000000286ebdb): kobject_uevent_env [ 532.693839][T13408] ? _raw_spin_unlock+0x2d/0x50 [ 532.693858][T13408] try_charge+0xf4b/0x1440 [ 532.700348][ T9369] kobject: 'wlan3' (000000000286ebdb): kobject_uevent_env: uevent_suppress caused the event to drop! [ 532.704743][T13408] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 532.710039][ T9369] kobject: 'net' (00000000d1e53273): kobject_cleanup, parent 00000000ca0b622f [ 532.716048][T13408] ? find_held_lock+0x35/0x130 [ 532.720949][ T9369] kobject: 'net' (00000000d1e53273): calling ktype release [ 532.728036][T13408] ? get_mem_cgroup_from_mm+0x139/0x320 [ 532.733461][ T9369] kobject: 'net': free name [ 532.737852][T13408] ? lock_downgrade+0x920/0x920 [ 533.365289][T13408] ? percpu_ref_tryget_live+0x111/0x290 [ 533.370817][T13408] __memcg_kmem_charge_memcg+0x71/0xf0 [ 533.376252][T13408] ? memcg_kmem_put_cache+0x50/0x50 [ 533.381427][T13408] ? get_mem_cgroup_from_mm+0x156/0x320 [ 533.386948][T13408] __memcg_kmem_charge+0x13a/0x3a0 [ 533.393043][T13408] __alloc_pages_nodemask+0x4f7/0x900 [ 533.398389][T13408] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 533.403947][T13408] ? __alloc_pages_slowpath+0x2540/0x2540 [ 533.409639][T13408] ? percpu_ref_put_many+0xb6/0x190 [ 533.414815][T13408] copy_process+0x3f8/0x6830 [ 533.420015][T13408] ? __kasan_check_read+0x11/0x20 [ 533.425114][T13408] ? __kasan_check_read+0x11/0x20 [ 533.430116][T13408] ? __lock_acquire+0x16f2/0x4a00 [ 533.435125][T13408] ? __cleanup_sighand+0x60/0x60 [ 533.440299][T13408] ? __might_fault+0x12b/0x1e0 [ 533.445076][T13408] ? __might_fault+0x12b/0x1e0 [ 533.449846][T13408] _do_fork+0x146/0xfa0 [ 533.453977][T13408] ? copy_init_mm+0x20/0x20 [ 533.458483][T13408] ? __kasan_check_read+0x11/0x20 [ 533.463495][T13408] ? _copy_to_user+0x118/0x160 [ 533.468235][T13408] __x64_sys_clone+0x1ab/0x270 [ 533.472976][T13408] ? __ia32_sys_vfork+0xd0/0xd0 [ 533.477823][T13408] ? do_syscall_64+0x26/0x760 [ 533.482475][T13408] ? lockdep_hardirqs_on+0x418/0x5d0 [ 533.487740][T13408] ? trace_hardirqs_on+0x67/0x240 [ 533.492743][T13408] do_syscall_64+0xfa/0x760 [ 533.497225][T13408] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 533.503093][T13408] RIP: 0033:0x457eba [ 533.507013][T13408] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 533.527562][T13408] RSP: 002b:00007fff72d20d70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 533.536071][T13408] RAX: ffffffffffffffda RBX: 00007fff72d20d70 RCX: 0000000000457eba [ 533.544203][T13408] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 533.552158][T13408] RBP: 00007fff72d20db0 R08: 0000000000000001 R09: 000055555710c940 [ 533.560118][T13408] R10: 000055555710cc10 R11: 0000000000000246 R12: 0000000000000001 [ 533.568079][T13408] R13: 0000000000000000 R14: 0000000000000000 R15: 00007fff72d20e00 [ 533.582798][T13408] memory: usage 10048kB, limit 0kB, failcnt 76 [ 533.589033][T13408] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 533.598611][T13408] Memory cgroup stats for /syz4: [ 533.598706][T13408] anon 6828032 [ 533.598706][T13408] file 45056 [ 533.598706][T13408] kernel_stack 131072 [ 533.598706][T13408] slab 3067904 [ 533.598706][T13408] sock 0 [ 533.598706][T13408] shmem 0 [ 533.598706][T13408] file_mapped 135168 [ 533.598706][T13408] file_dirty 135168 [ 533.598706][T13408] file_writeback 0 [ 533.598706][T13408] anon_thp 6291456 [ 533.598706][T13408] inactive_anon 0 [ 533.598706][T13408] active_anon 6828032 [ 533.598706][T13408] inactive_file 0 [ 533.598706][T13408] active_file 0 [ 533.598706][T13408] unevictable 0 [ 533.598706][T13408] slab_reclaimable 1216512 [ 533.598706][T13408] slab_unreclaimable 1851392 [ 533.598706][T13408] pgfault 56595 [ 533.598706][T13408] pgmajfault 0 [ 533.598706][T13408] workingset_refault 0 [ 533.598706][T13408] workingset_activate 0 [ 533.598706][T13408] workingset_nodereclaim 0 [ 533.598706][T13408] pgrefill 33 [ 533.598706][T13408] pgscan 34 [ 533.598706][T13408] pgsteal 0 [ 533.598706][T13408] pgactivate 0 [ 533.607521][T22259] 8021q: adding VLAN 0 to HW filter on device bond0 [ 533.696840][T13408] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=15450,uid=0 [ 533.706776][ T8733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 533.720280][T13408] Memory cgroup out of memory: Killed process 15450 (syz-executor.4) total-vm:72708kB, anon-rss:2204kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:143360kB oom_score_adj:1000 [ 533.744090][ T8733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 533.746868][T13408] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 533.752787][ T1065] oom_reaper: reaped process 15450 (syz-executor.4), now anon-rss:0kB, file-rss:34832kB, shmem-rss:0kB [ 533.766472][T13408] CPU: 1 PID: 13408 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 533.783717][T13408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 533.789845][ T9369] kobject: 'wlan3' (000000000286ebdb): kobject_cleanup, parent 00000000ca0b622f [ 533.793766][T13408] Call Trace: [ 533.804831][T22259] 8021q: adding VLAN 0 to HW filter on device team0 [ 533.806079][T13408] dump_stack+0x172/0x1f0 [ 533.816986][T13408] dump_header+0x177/0x1152 [ 533.821484][T13408] ? ___ratelimit+0xf8/0x595 [ 533.821863][ T8733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 533.826079][T13408] ? trace_hardirqs_on+0x67/0x240 [ 533.834412][ T9369] kobject: 'wlan3' (000000000286ebdb): calling ktype release [ 533.839180][T13408] ? pagefault_out_of_memory+0x11c/0x11c [ 533.852227][T13408] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 533.858105][T13408] ? ___ratelimit+0x60/0x595 [ 533.859893][ T8733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 533.862742][T13408] ? do_raw_spin_unlock+0x57/0x270 [ 533.870748][ T9369] kobject: 'wlan3': free name [ 533.875792][T13408] oom_kill_process.cold+0x10/0x15 [ 533.885530][T13408] out_of_memory+0x334/0x1340 [ 533.889676][ T8733] bridge0: port 1(bridge_slave_0) entered blocking state [ 533.890200][T13408] ? lock_downgrade+0x920/0x920 [ 533.897224][ T8733] bridge0: port 1(bridge_slave_0) entered forwarding state [ 533.902042][T13408] ? oom_killer_disable+0x280/0x280 [ 533.902064][T13408] mem_cgroup_out_of_memory+0x1d8/0x240 [ 533.902081][T13408] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 533.925585][T13408] ? do_raw_spin_unlock+0x57/0x270 [ 533.930694][T13408] ? _raw_spin_unlock+0x2d/0x50 [ 533.935549][T13408] try_charge+0xf4b/0x1440 [ 533.939979][T13408] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 533.945526][T13408] ? find_held_lock+0x35/0x130 [ 533.949529][ T9369] kobject: 'rfkill12' (0000000040aaf1c1): kobject_uevent_env [ 533.950283][T13408] ? get_mem_cgroup_from_mm+0x139/0x320 [ 533.957815][ T9369] kobject: 'rfkill12' (0000000040aaf1c1): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim9/ieee80211/phy10/rfkill12' [ 533.963375][T13408] ? lock_downgrade+0x920/0x920 [ 533.963386][T13408] ? percpu_ref_tryget_live+0x111/0x290 [ 533.963404][T13408] __memcg_kmem_charge_memcg+0x71/0xf0 [ 533.977228][T13580] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 533.981704][T13408] ? memcg_kmem_put_cache+0x50/0x50 [ 533.981722][T13408] ? get_mem_cgroup_from_mm+0x156/0x320 [ 533.988141][T13580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 533.992732][T13408] __memcg_kmem_charge+0x13a/0x3a0 [ 533.992752][T13408] __alloc_pages_nodemask+0x4f7/0x900 [ 534.009795][T13580] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 534.012571][T13408] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 534.039710][T13580] bridge0: port 2(bridge_slave_1) entered blocking state [ 534.044704][T13408] ? __alloc_pages_slowpath+0x2540/0x2540 [ 534.051746][T13580] bridge0: port 2(bridge_slave_1) entered forwarding state [ 534.057405][T13408] ? percpu_ref_put_many+0xb6/0x190 [ 534.070284][T13408] copy_process+0x3f8/0x6830 [ 534.074901][T13408] ? __kasan_check_read+0x11/0x20 [ 534.079918][T13408] ? __kasan_check_read+0x11/0x20 [ 534.084934][T13408] ? __lock_acquire+0x16f2/0x4a00 [ 534.089616][T13580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 534.089961][T13408] ? __cleanup_sighand+0x60/0x60 [ 534.098494][T13580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 534.102751][T13408] ? __might_fault+0x12b/0x1e0 [ 534.102763][T13408] ? __might_fault+0x12b/0x1e0 [ 534.102781][T13408] _do_fork+0x146/0xfa0 [ 534.124462][T13408] ? copy_init_mm+0x20/0x20 [ 534.128958][T13408] ? __kasan_check_read+0x11/0x20 [ 534.130039][T13580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 534.133976][T13408] ? _copy_to_user+0x118/0x160 [ 534.146729][T13408] __x64_sys_clone+0x1ab/0x270 [ 534.151485][T13408] ? __ia32_sys_vfork+0xd0/0xd0 [ 534.156424][T13408] ? do_syscall_64+0x26/0x760 [ 534.159978][T13580] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 534.161100][T13408] ? lockdep_hardirqs_on+0x418/0x5d0 [ 534.174367][T13408] ? trace_hardirqs_on+0x67/0x240 [ 534.179389][T13408] do_syscall_64+0xfa/0x760 [ 534.179661][T13580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 534.184075][T13408] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 534.197816][T13408] RIP: 0033:0x457eba [ 534.199959][T13580] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 534.201822][T13408] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 534.219924][T13580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 534.229283][T13408] RSP: 002b:00007fff72d20d70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 534.246000][T13408] RAX: ffffffffffffffda RBX: 00007fff72d20d70 RCX: 0000000000457eba [ 534.254313][T13408] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 534.259850][T13580] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 534.262365][T13408] RBP: 00007fff72d20db0 R08: 0000000000000001 R09: 000055555710c940 [ 534.278058][T13408] R10: 000055555710cc10 R11: 0000000000000246 R12: 0000000000000001 [ 534.282562][T22259] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 534.286260][T13408] R13: 0000000000000000 R14: 0000000000000000 R15: 00007fff72d20e00 [ 534.305664][T22259] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 534.316045][T13408] memory: usage 7884kB, limit 0kB, failcnt 82 [ 534.325388][T13408] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 534.332561][T13408] Memory cgroup stats for /syz4: [ 534.332659][T13408] anon 4554752 [ 534.332659][T13408] file 45056 [ 534.332659][T13408] kernel_stack 131072 [ 534.332659][T13408] slab 3067904 [ 534.332659][T13408] sock 0 [ 534.332659][T13408] shmem 0 [ 534.332659][T13408] file_mapped 135168 [ 534.332659][T13408] file_dirty 135168 [ 534.332659][T13408] file_writeback 0 [ 534.332659][T13408] anon_thp 4194304 [ 534.332659][T13408] inactive_anon 0 [ 534.332659][T13408] active_anon 4554752 [ 534.332659][T13408] inactive_file 0 [ 534.332659][T13408] active_file 0 [ 534.332659][T13408] unevictable 0 [ 534.332659][T13408] slab_reclaimable 1216512 [ 534.332659][T13408] slab_unreclaimable 1851392 [ 534.332659][T13408] pgfault 56595 [ 534.332659][T13408] pgmajfault 0 [ 534.332659][T13408] workingset_refault 0 [ 534.332659][T13408] workingset_activate 0 [ 534.332659][T13408] workingset_nodereclaim 0 [ 534.332659][T13408] pgrefill 33 [ 534.332659][T13408] pgscan 34 [ 534.332659][T13408] pgsteal 0 [ 534.332659][T13408] pgactivate 0 [ 534.429728][T13408] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=15413,uid=0 [ 534.439869][ T9369] kobject: 'phy10' (0000000083689677): kobject_uevent_env [ 534.445248][T13408] Memory cgroup out of memory: Killed process 15413 (syz-executor.4) total-vm:72708kB, anon-rss:2204kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:143360kB oom_score_adj:1000 [ 534.470503][ T9369] kobject: 'phy10' (0000000083689677): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim9/ieee80211/phy10' [ 534.484385][ T8724] syz-executor.3 invoked oom-killer: gfp_mask=0x40cc0(GFP_KERNEL|__GFP_COMP), order=1, oom_score_adj=0 [ 534.487672][ T9369] kobject: 'ieee80211' (000000004ac7259d): kobject_cleanup, parent 00000000ca0b622f [ 534.495512][ T8724] CPU: 0 PID: 8724 Comm: syz-executor.3 Not tainted 5.3.0-rc6-next-20190830 #75 [ 534.508836][ T9369] kobject: 'ieee80211' (000000004ac7259d): calling ktype release [ 534.514083][ T8724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 534.514088][ T8724] Call Trace: [ 534.514109][ T8724] dump_stack+0x172/0x1f0 [ 534.514125][ T8724] dump_header+0x177/0x1152 [ 534.514135][ T8724] ? ___ratelimit+0xf8/0x595 [ 534.514153][ T8724] ? trace_hardirqs_on+0x67/0x240 [ 534.525059][ T9369] kobject: 'ieee80211': free name [ 534.532154][ T8724] ? pagefault_out_of_memory+0x11c/0x11c [ 534.532169][ T8724] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 534.532179][ T8724] ? ___ratelimit+0x60/0x595 [ 534.532190][ T8724] ? do_raw_spin_unlock+0x57/0x270 [ 534.532202][ T8724] oom_kill_process.cold+0x10/0x15 [ 534.532219][ T8724] out_of_memory+0x334/0x1340 [ 534.536614][ T9369] kobject: 'hwsim9' (00000000cc0cf83f): kobject_uevent_env [ 534.540109][ T8724] ? lock_downgrade+0x920/0x920 [ 534.540124][ T8724] ? oom_killer_disable+0x280/0x280 [ 534.540137][ T8724] ? __kasan_check_read+0x11/0x20 [ 534.540153][ T8724] mem_cgroup_out_of_memory+0x1d8/0x240 [ 534.540166][ T8724] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 534.540179][ T8724] ? do_raw_spin_unlock+0x57/0x270 [ 534.540193][ T8724] ? _raw_spin_unlock+0x2d/0x50 [ 534.540206][ T8724] try_charge+0xf4b/0x1440 [ 534.540221][ T8724] ? __lock_acquire+0x800/0x4a00 [ 534.540234][ T8724] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 534.540246][ T8724] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 534.540258][ T8724] ? cache_grow_begin+0x122/0xd20 [ 534.540269][ T8724] ? find_held_lock+0x35/0x130 [ 534.540281][ T8724] ? cache_grow_begin+0x122/0xd20 [ 534.540296][ T8724] __memcg_kmem_charge_memcg+0x71/0xf0 [ 534.540313][ T8724] ? memcg_kmem_put_cache+0x50/0x50 [ 534.549466][ T9369] kobject: 'hwsim9' (00000000cc0cf83f): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim9' [ 534.554510][ T8724] ? __kasan_check_read+0x11/0x20 [ 534.562384][ T9369] kobject: 'hwsim9' (00000000cc0cf83f): kobject_uevent_env [ 534.565141][ T8724] cache_grow_begin+0x629/0xd20 [ 534.571291][ T9369] kobject: 'hwsim9' (00000000cc0cf83f): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim9' [ 534.575686][ T8724] ? __sanitizer_cov_trace_cmp2+0x11/0x20 [ 534.583655][ T9369] kobject: 'hwsim9' (00000000cc0cf83f): kobject_cleanup, parent 00000000ca0b622f [ 534.585873][ T8724] ? mempolicy_slab_node+0x139/0x390 [ 534.590779][ T9369] kobject: 'hwsim9' (00000000cc0cf83f): calling ktype release [ 534.597708][ T8724] fallback_alloc+0x1fd/0x2d0 [ 534.605371][ T9369] kobject: 'hwsim9': free name [ 534.607733][ T8724] ____cache_alloc_node+0x1bc/0x1d0 [ 534.613040][ T9369] kobject: 'phy10' (0000000083689677): kobject_cleanup, parent 00000000ca0b622f [ 534.618275][ T8724] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 534.626634][ T9369] kobject: 'phy10' (0000000083689677): calling ktype release [ 534.628984][ T8724] kmem_cache_alloc_node+0xe3/0x740 [ 534.635916][ T9369] kobject: 'rfkill12' (0000000040aaf1c1): kobject_cleanup, parent 00000000ca0b622f [ 534.638223][ T8724] ? lockdep_hardirqs_on+0x418/0x5d0 [ 534.646601][ T9369] kobject: 'rfkill12' (0000000040aaf1c1): calling ktype release [ 534.648848][ T8724] ? trace_hardirqs_on+0x67/0x240 [ 534.655371][ T9369] kobject: 'rfkill12': free name [ 534.660101][ T8724] copy_process+0x44c4/0x6830 [ 534.660114][ T8724] ? __kasan_check_read+0x11/0x20 [ 534.660126][ T8724] ? __kasan_check_read+0x11/0x20 [ 534.660140][ T8724] ? __lock_acquire+0x16f2/0x4a00 [ 534.660155][ T8724] ? __cleanup_sighand+0x60/0x60 [ 534.660167][ T8724] ? __might_fault+0x12b/0x1e0 [ 534.660181][ T8724] ? __might_fault+0x12b/0x1e0 [ 534.660198][ T8724] _do_fork+0x146/0xfa0 [ 534.660216][ T8724] ? copy_init_mm+0x20/0x20 [ 534.671764][ T9369] kobject: 'phy10': free name [ 534.675670][ T8724] ? __kasan_check_read+0x11/0x20 [ 534.876636][ T8724] ? _copy_to_user+0x118/0x160 [ 534.881495][ T8724] __x64_sys_clone+0x1ab/0x270 [ 534.886333][ T8724] ? __ia32_sys_vfork+0xd0/0xd0 [ 534.891229][ T8724] ? do_syscall_64+0x26/0x760 [ 534.896010][ T8724] ? lockdep_hardirqs_on+0x418/0x5d0 [ 534.901284][ T8724] ? trace_hardirqs_on+0x67/0x240 [ 534.906342][ T8724] do_syscall_64+0xfa/0x760 [ 534.910848][ T8724] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 534.916762][ T8724] RIP: 0033:0x457eba [ 534.920667][ T8724] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 534.940478][ T8724] RSP: 002b:00007ffddd578b40 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 534.948883][ T8724] RAX: ffffffffffffffda RBX: 00007ffddd578b40 RCX: 0000000000457eba [ 534.957017][ T8724] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 534.965018][ T8724] RBP: 00007ffddd578b80 R08: 0000000000000001 R09: 0000555556ec8940 [ 534.972977][ T8724] R10: 0000555556ec8c10 R11: 0000000000000246 R12: 0000000000000001 [ 534.980978][ T8724] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffddd578bd0 [ 534.992880][ T8733] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 535.001632][ T8733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 535.010079][ T8733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 535.018749][ T8724] memory: usage 42540kB, limit 0kB, failcnt 63 [ 535.026700][ T8724] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 535.028679][T22259] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 535.040739][ T8724] Memory cgroup stats for /syz3: [ 535.040834][ T8724] anon 35516416 [ 535.040834][ T8724] file 131072 [ 535.040834][ T8724] kernel_stack 524288 [ 535.040834][ T8724] slab 5427200 [ 535.040834][ T8724] sock 0 [ 535.040834][ T8724] shmem 0 [ 535.040834][ T8724] file_mapped 0 [ 535.040834][ T8724] file_dirty 0 [ 535.040834][ T8724] file_writeback 0 [ 535.040834][ T8724] anon_thp 33554432 [ 535.040834][ T8724] inactive_anon 135168 [ 535.040834][ T8724] active_anon 35516416 [ 535.040834][ T8724] inactive_file 0 [ 535.040834][ T8724] active_file 0 [ 535.040834][ T8724] unevictable 0 [ 535.040834][ T8724] slab_reclaimable 1892352 [ 535.040834][ T8724] slab_unreclaimable 3534848 [ 535.040834][ T8724] pgfault 45804 [ 535.040834][ T8724] pgmajfault 0 [ 535.040834][ T8724] workingset_refault 0 [ 535.040834][ T8724] workingset_activate 0 [ 535.040834][ T8724] workingset_nodereclaim 0 [ 535.040834][ T8724] pgrefill 135 [ 535.040834][ T8724] pgscan 137 [ 535.040834][ T8724] pgsteal 34 [ 535.040834][ T8724] pgactivate 99 [ 535.044113][T22259] kobject: 'vlan0' (0000000003bc7f9f): kobject_add_internal: parent: 'mesh', set: '' [ 535.045780][ T8724] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=10508,uid=0 [ 535.164891][ T8724] Memory cgroup out of memory: Killed process 10508 (syz-executor.3) total-vm:72576kB, anon-rss:2204kB, file-rss:35852kB, shmem-rss:0kB, UID:0 pgtables:143360kB oom_score_adj:1000 [ 535.190269][ T1065] oom_reaper: reaped process 10508 (syz-executor.3), now anon-rss:0kB, file-rss:34892kB, shmem-rss:0kB [ 535.201598][ T8732] syz-executor.5 invoked oom-killer: gfp_mask=0x40c50(GFP_NOFS|__GFP_COMP|__GFP_RECLAIMABLE), order=0, oom_score_adj=0 [ 535.214789][ T8732] CPU: 1 PID: 8732 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 535.218406][T10508] kobject: 'kvm' (000000004c6f30a4): kobject_uevent_env [ 535.223810][ T8732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 535.223814][ T8732] Call Trace: [ 535.223833][ T8732] dump_stack+0x172/0x1f0 [ 535.223848][ T8732] dump_header+0x177/0x1152 [ 535.223859][ T8732] ? ___ratelimit+0xf8/0x595 [ 535.223877][ T8732] ? trace_hardirqs_on+0x67/0x240 [ 535.230859][T10508] kobject: 'kvm' (000000004c6f30a4): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 535.241012][ T8732] ? pagefault_out_of_memory+0x11c/0x11c [ 535.241026][ T8732] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 535.241040][ T8732] ? ___ratelimit+0x60/0x595 [ 535.289062][ T8732] ? do_raw_spin_unlock+0x57/0x270 [ 535.294168][ T8732] oom_kill_process.cold+0x10/0x15 [ 535.299272][ T8732] out_of_memory+0x334/0x1340 [ 535.304026][ T8732] ? lock_downgrade+0x920/0x920 [ 535.308863][ T8732] ? oom_killer_disable+0x280/0x280 [ 535.314053][ T8732] mem_cgroup_out_of_memory+0x1d8/0x240 [ 535.320372][ T8732] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 535.326110][ T8732] ? do_raw_spin_unlock+0x57/0x270 [ 535.331340][ T8732] ? _raw_spin_unlock+0x2d/0x50 [ 535.336180][ T8732] try_charge+0xf4b/0x1440 [ 535.340715][ T8732] ? __lock_acquire+0x800/0x4a00 [ 535.345643][ T8732] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 535.351303][ T8732] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 535.357278][ T8732] ? cache_grow_begin+0x122/0xd20 [ 535.362300][ T8732] ? find_held_lock+0x35/0x130 [ 535.367059][ T8732] ? cache_grow_begin+0x122/0xd20 [ 535.372541][ T8732] __memcg_kmem_charge_memcg+0x71/0xf0 [ 535.378617][ T8732] ? memcg_kmem_put_cache+0x50/0x50 [ 535.383806][ T8732] ? __kasan_check_read+0x11/0x20 [ 535.388987][ T8732] cache_grow_begin+0x629/0xd20 [ 535.393838][ T8732] ? __sanitizer_cov_trace_cmp2+0x11/0x20 [ 535.399711][ T8732] ? mempolicy_slab_node+0x139/0x390 [ 535.404994][ T8732] fallback_alloc+0x1fd/0x2d0 [ 535.409665][ T8732] ____cache_alloc_node+0x1bc/0x1d0 [ 535.414855][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 535.421224][ T8732] kmem_cache_alloc+0x1ef/0x710 [ 535.426068][ T8732] ? lock_downgrade+0x920/0x920 [ 535.431826][ T8732] ? rwlock_bug.part.0+0x90/0x90 [ 535.436753][ T8732] ? ratelimit_state_init+0xb0/0xb0 [ 535.441975][ T8732] ext4_alloc_inode+0x1f/0x640 [ 535.446734][ T8732] ? ratelimit_state_init+0xb0/0xb0 [ 535.452012][ T8732] alloc_inode+0x68/0x1e0 [ 535.456440][ T8732] iget_locked+0x1a6/0x4b0 [ 535.461064][ T8732] __ext4_iget+0x265/0x3bb0 [ 535.465594][ T8732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 535.471858][ T8732] ? ext4_get_projid+0x190/0x190 [ 535.476784][ T8732] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 535.482364][ T8732] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 535.488332][ T8732] ? d_alloc_parallel+0xa78/0x1c30 [ 535.493436][ T8732] ext4_lookup+0x3b1/0x7a0 [ 535.497840][ T8732] ? ext4_cross_rename+0x1430/0x1430 [ 535.503113][ T8732] ? __lock_acquire+0x16f2/0x4a00 [ 535.508232][ T8732] ? __kasan_check_read+0x11/0x20 [ 535.516206][ T8732] ? lockdep_init_map+0x1be/0x6d0 [ 535.521613][ T8732] __lookup_slow+0x279/0x500 [ 535.526209][ T8732] ? vfs_unlink+0x620/0x620 [ 535.530738][ T8732] lookup_slow+0x58/0x80 [ 535.535040][ T8732] path_mountpoint+0x5d2/0x1e60 [ 535.540059][ T8732] ? __kasan_check_read+0x11/0x20 [ 535.545159][ T8732] ? __lock_acquire+0x16f2/0x4a00 [ 535.550169][ T8732] ? putname+0xef/0x130 [ 535.554317][ T8732] ? path_openat+0x46d0/0x46d0 [ 535.559110][ T8732] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 535.564907][ T8732] ? find_held_lock+0x35/0x130 [ 535.569664][ T8732] filename_mountpoint+0x190/0x3c0 [ 535.575005][ T8732] ? filename_parentat.isra.0+0x410/0x410 [ 535.580719][ T8732] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 535.586955][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 535.593188][ T8732] ? __phys_addr_symbol+0x30/0x70 [ 535.598201][ T8732] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 535.603908][ T8732] ? __check_object_size+0x3d/0x437 [ 535.609098][ T8732] ? strncpy_from_user+0x2b4/0x400 [ 535.614200][ T8732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 535.620443][ T8732] ? getname_flags+0x277/0x5b0 [ 535.625249][ T8732] user_path_mountpoint_at+0x3a/0x50 [ 535.630583][ T8732] ksys_umount+0x167/0xf00 [ 535.635164][ T8732] ? __ia32_sys_rmdir+0x40/0x40 [ 535.640933][ T8732] ? __detach_mounts+0x2a0/0x2a0 [ 535.646015][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 535.652258][ T8732] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 535.657975][ T8732] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 535.663531][ T8732] ? do_syscall_64+0x26/0x760 [ 535.668201][ T8732] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 535.674260][ T8732] ? do_syscall_64+0x26/0x760 [ 535.679110][ T8732] ? lockdep_hardirqs_on+0x418/0x5d0 [ 535.684428][ T8732] __x64_sys_umount+0x54/0x80 [ 535.689095][ T8732] do_syscall_64+0xfa/0x760 [ 535.693708][ T8732] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 535.699676][ T8732] RIP: 0033:0x45c317 [ 535.703567][ T8732] Code: 64 89 04 25 d0 02 00 00 58 5f ff d0 48 89 c7 e8 2f be ff ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 535.723292][ T8732] RSP: 002b:00007ffd499cd938 EFLAGS: 00000206 ORIG_RAX: 00000000000000a6 [ 535.731689][ T8732] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045c317 [ 535.739656][ T8732] RDX: 0000000000403520 RSI: 0000000000000002 RDI: 00007ffd499cd9e0 [ 535.747614][ T8732] RBP: 00000000000006f3 R08: 0000000000000000 R09: 000000000000000c [ 535.755777][ T8732] R10: 0000000000000006 R11: 0000000000000206 R12: 00007ffd499cea70 [ 535.763826][ T8732] R13: 00005555560f8940 R14: 0000000000000000 R15: 00007ffd499cea70 [ 535.774976][ T9369] kobject: 'batman_adv' (000000000bdc635b): kobject_uevent_env [ 535.784112][ T8732] memory: usage 13708kB, limit 0kB, failcnt 147 [ 535.790503][ T8732] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 535.798152][ T8732] Memory cgroup stats for /syz5: [ 535.798255][ T8732] anon 8998912 [ 535.798255][ T8732] file 0 [ 535.798255][ T8732] kernel_stack 131072 [ 535.798255][ T8732] slab 4612096 [ 535.798255][ T8732] sock 0 [ 535.798255][ T8732] shmem 110592 [ 535.798255][ T8732] file_mapped 135168 [ 535.798255][ T8732] file_dirty 0 [ 535.798255][ T8732] file_writeback 0 [ 535.798255][ T8732] anon_thp 8388608 [ 535.798255][ T8732] inactive_anon 0 [ 535.798255][ T8732] active_anon 8998912 [ 535.798255][ T8732] inactive_file 0 [ 535.798255][ T8732] active_file 135168 [ 535.798255][ T8732] unevictable 0 [ 535.798255][ T8732] slab_reclaimable 1622016 [ 535.798255][ T8732] slab_unreclaimable 2990080 [ 535.798255][ T8732] pgfault 57255 [ 535.798255][ T8732] pgmajfault 0 [ 535.798255][ T8732] workingset_refault 0 [ 535.798255][ T8732] workingset_activate 0 [ 535.798255][ T8732] workingset_nodereclaim 0 [ 535.798255][ T8732] pgrefill 71 [ 535.798255][ T8732] pgscan 66 [ 535.798255][ T8732] pgsteal 33 [ 535.798255][ T8732] pgactivate 33 [ 535.799257][ T9369] kobject: 'batman_adv' (000000000bdc635b): kobject_uevent_env: filter function caused the event to drop! [ 535.803274][ T8732] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=9493,uid=0 [ 535.803352][ T8732] Memory cgroup out of memory: Killed process 9493 (syz-executor.5) total-vm:73592kB, anon-rss:2200kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:143360kB oom_score_adj:1000 [ 535.803654][T13408] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 535.908458][ T9369] kobject: 'batman_adv' (000000000bdc635b): kobject_cleanup, parent 00000000ca0b622f [ 535.923238][T13408] CPU: 1 PID: 13408 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 535.943053][ T9369] kobject: 'batman_adv' (000000000bdc635b): calling ktype release [ 535.951487][T13408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 535.951492][T13408] Call Trace: [ 535.951512][T13408] dump_stack+0x172/0x1f0 [ 535.951533][T13408] dump_header+0x177/0x1152 [ 535.961288][ T9369] kobject: (000000000bdc635b): dynamic_kobj_release [ 535.970063][T13408] ? ___ratelimit+0xf8/0x595 [ 535.970077][T13408] ? trace_hardirqs_on+0x67/0x240 [ 535.970095][T13408] ? pagefault_out_of_memory+0x11c/0x11c [ 535.978019][ T9369] kobject: 'batman_adv': free name [ 535.988049][T13408] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 535.988065][T13408] ? ___ratelimit+0x60/0x595 [ 535.992672][ T9369] kobject: 'rx-0' (00000000c695d75b): kobject_cleanup, parent 00000000f43d1826 [ 535.995653][T13408] ? do_raw_spin_unlock+0x57/0x270 [ 536.000352][ T9369] kobject: 'rx-0' (00000000c695d75b): auto cleanup 'remove' event [ 536.006718][T13408] oom_kill_process.cold+0x10/0x15 [ 536.011539][ T9369] kobject: 'rx-0' (00000000c695d75b): kobject_uevent_env [ 536.016491][T13408] out_of_memory+0x334/0x1340 [ 536.022427][ T9369] kobject: 'rx-0' (00000000c695d75b): kobject_uevent_env: uevent_suppress caused the event to drop! [ 536.027332][T13408] ? lock_downgrade+0x920/0x920 [ 536.033317][ T9369] kobject: 'rx-0' (00000000c695d75b): auto cleanup kobject_del [ 536.037692][T13408] ? oom_killer_disable+0x280/0x280 [ 536.046824][ T9369] kobject: 'rx-0' (00000000c695d75b): calling ktype release [ 536.051788][T13408] mem_cgroup_out_of_memory+0x1d8/0x240 [ 536.051805][T13408] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 536.059932][ T9369] kobject: 'rx-0': free name [ 536.064825][T13408] ? do_raw_spin_unlock+0x57/0x270 [ 536.072062][ T9369] kobject: 'tx-3' (00000000ccd0b54a): kobject_cleanup, parent 00000000f43d1826 [ 536.076490][T13408] ? _raw_spin_unlock+0x2d/0x50 [ 536.087557][ T9369] kobject: 'tx-3' (00000000ccd0b54a): auto cleanup 'remove' event [ 536.092321][T13408] try_charge+0xf4b/0x1440 [ 536.092345][T13408] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 536.100275][ T9369] kobject: 'tx-3' (00000000ccd0b54a): kobject_uevent_env [ 536.105263][T13408] ? find_held_lock+0x35/0x130 [ 536.112752][ T9369] kobject: 'tx-3' (00000000ccd0b54a): kobject_uevent_env: uevent_suppress caused the event to drop! [ 536.118060][T13408] ? get_mem_cgroup_from_mm+0x139/0x320 [ 536.124037][ T9369] kobject: 'tx-3' (00000000ccd0b54a): auto cleanup kobject_del [ 536.128416][T13408] ? lock_downgrade+0x920/0x920 [ 536.133876][ T9369] kobject: 'tx-3' (00000000ccd0b54a): calling ktype release [ 536.142537][T13408] ? percpu_ref_tryget_live+0x111/0x290 [ 536.142553][T13408] __memcg_kmem_charge_memcg+0x71/0xf0 [ 536.142570][T13408] ? memcg_kmem_put_cache+0x50/0x50 [ 536.147847][ T9369] kobject: 'tx-3': free name [ 536.155214][T13408] ? get_mem_cgroup_from_mm+0x156/0x320 [ 536.155229][T13408] __memcg_kmem_charge+0x13a/0x3a0 [ 536.155245][T13408] __alloc_pages_nodemask+0x4f7/0x900 [ 536.159956][ T9369] kobject: 'tx-2' (00000000da579faf): kobject_cleanup, parent 00000000f43d1826 [ 536.165210][T13408] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 536.172731][ T9369] kobject: 'tx-2' (00000000da579faf): auto cleanup 'remove' event [ 536.177294][T13408] ? __alloc_pages_slowpath+0x2540/0x2540 [ 536.188368][ T9369] kobject: 'tx-2' (00000000da579faf): kobject_uevent_env [ 536.193794][T13408] ? percpu_ref_put_many+0xb6/0x190 [ 536.193814][T13408] copy_process+0x3f8/0x6830 [ 536.193832][T13408] ? __kasan_check_read+0x11/0x20 [ 536.201697][ T9369] kobject: 'tx-2' (00000000da579faf): kobject_uevent_env: uevent_suppress caused the event to drop! [ 536.206363][T13408] ? __kasan_check_read+0x11/0x20 [ 536.214048][ T9369] kobject: 'tx-2' (00000000da579faf): auto cleanup kobject_del [ 536.219438][T13408] ? __lock_acquire+0x16f2/0x4a00 [ 536.219454][T13408] ? __cleanup_sighand+0x60/0x60 [ 536.219471][T13408] ? __might_fault+0x12b/0x1e0 [ 536.225409][ T9369] kobject: 'tx-2' (00000000da579faf): calling ktype release [ 536.230101][T13408] ? __might_fault+0x12b/0x1e0 [ 536.230117][T13408] _do_fork+0x146/0xfa0 [ 536.230134][T13408] ? copy_init_mm+0x20/0x20 [ 536.235472][ T9369] kobject: 'tx-2': free name [ 536.240534][T13408] ? __kasan_check_read+0x11/0x20 [ 536.240545][T13408] ? _copy_to_user+0x118/0x160 [ 536.240565][T13408] __x64_sys_clone+0x1ab/0x270 [ 536.246164][ T9369] kobject: 'tx-1' (00000000bd2a7f2b): kobject_cleanup, parent 00000000f43d1826 [ 536.251020][T13408] ? __ia32_sys_vfork+0xd0/0xd0 [ 536.251037][T13408] ? do_syscall_64+0x26/0x760 [ 536.251055][T13408] ? lockdep_hardirqs_on+0x418/0x5d0 [ 536.260320][ T9369] kobject: 'tx-1' (00000000bd2a7f2b): auto cleanup 'remove' event [ 536.265625][T13408] ? trace_hardirqs_on+0x67/0x240 [ 536.273969][ T9369] kobject: 'tx-1' (00000000bd2a7f2b): kobject_uevent_env [ 536.279583][T13408] do_syscall_64+0xfa/0x760 [ 536.279602][T13408] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 536.279617][T13408] RIP: 0033:0x457eba [ 536.286766][ T9369] kobject: 'tx-1' (00000000bd2a7f2b): kobject_uevent_env: uevent_suppress caused the event to drop! [ 536.291881][T13408] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 536.291887][T13408] RSP: 002b:00007fff72d20d70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 536.291898][T13408] RAX: ffffffffffffffda RBX: 00007fff72d20d70 RCX: 0000000000457eba [ 536.291910][T13408] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 536.296925][ T9369] kobject: 'tx-1' (00000000bd2a7f2b): auto cleanup kobject_del [ 536.302011][T13408] RBP: 00007fff72d20db0 R08: 0000000000000001 R09: 000055555710c940 [ 536.302017][T13408] R10: 000055555710cc10 R11: 0000000000000246 R12: 0000000000000001 [ 536.302023][T13408] R13: 0000000000000000 R14: 0000000000000000 R15: 00007fff72d20e00 [ 536.302684][T13408] memory: usage 5372kB, limit 0kB, failcnt 88 [ 536.314322][ T9369] kobject: 'tx-1' (00000000bd2a7f2b): calling ktype release [ 536.319409][T13408] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 536.326044][ T9369] kobject: 'tx-1': free name [ 536.333723][T13408] Memory cgroup stats for /syz4: [ 536.333822][T13408] anon 2379776 [ 536.333822][T13408] file 45056 [ 536.333822][T13408] kernel_stack 65536 [ 536.333822][T13408] slab 3067904 [ 536.333822][T13408] sock 0 [ 536.333822][T13408] shmem 0 [ 536.333822][T13408] file_mapped 135168 [ 536.333822][T13408] file_dirty 135168 [ 536.333822][T13408] file_writeback 0 [ 536.333822][T13408] anon_thp 2097152 [ 536.333822][T13408] inactive_anon 0 [ 536.333822][T13408] active_anon 2379776 [ 536.333822][T13408] inactive_file 0 [ 536.333822][T13408] active_file 0 [ 536.333822][T13408] unevictable 0 [ 536.333822][T13408] slab_reclaimable 1216512 [ 536.333822][T13408] slab_unreclaimable 1851392 [ 536.333822][T13408] pgfault 56595 [ 536.333822][T13408] pgmajfault 0 [ 536.333822][T13408] workingset_refault 0 [ 536.333822][T13408] workingset_activate 0 [ 536.333822][T13408] workingset_nodereclaim 0 [ 536.333822][T13408] pgrefill 33 [ 536.333822][T13408] pgscan 34 [ 536.333822][T13408] pgsteal 0 [ 536.333822][T13408] pgactivate 0 [ 536.336257][ T9369] kobject: 'tx-0' (00000000a2e9e4a6): kobject_cleanup, parent 00000000f43d1826 [ 536.340966][T13408] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=15377,uid=0 [ 536.348814][ T9369] kobject: 'tx-0' (00000000a2e9e4a6): auto cleanup 'remove' event [ 536.355835][T13408] Memory cgroup out of memory: Killed process 15377 (syz-executor.4) total-vm:72708kB, anon-rss:2204kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:143360kB oom_score_adj:1000 [ 536.357578][ T9369] kobject: 'tx-0' (00000000a2e9e4a6): kobject_uevent_env [ 536.373388][T13408] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 536.399367][ T9369] kobject: 'tx-0' (00000000a2e9e4a6): kobject_uevent_env: uevent_suppress caused the event to drop! [ 536.404835][T13408] CPU: 1 PID: 13408 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 536.405266][ T9369] kobject: 'tx-0' (00000000a2e9e4a6): auto cleanup kobject_del [ 536.413049][T13408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 536.413053][T13408] Call Trace: [ 536.413069][T13408] dump_stack+0x172/0x1f0 [ 536.413084][T13408] dump_header+0x177/0x1152 [ 536.413095][T13408] ? ___ratelimit+0xf8/0x595 [ 536.413112][T13408] ? trace_hardirqs_on+0x67/0x240 [ 536.439369][ T9369] kobject: 'tx-0' (00000000a2e9e4a6): calling ktype release [ 536.439526][T13408] ? pagefault_out_of_memory+0x11c/0x11c [ 536.459324][ T9369] kobject: 'tx-0': free name [ 536.470429][T13408] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 536.470445][T13408] ? ___ratelimit+0x60/0x595 [ 536.499349][ T9369] kobject: 'queues' (00000000f43d1826): kobject_cleanup, parent 00000000ca0b622f [ 536.503849][T13408] ? do_raw_spin_unlock+0x57/0x270 [ 536.519364][ T9369] kobject: 'queues' (00000000f43d1826): calling ktype release [ 536.520667][T13408] oom_kill_process.cold+0x10/0x15 [ 536.528965][ T9369] kobject: 'queues' (00000000f43d1826): kset_release [ 536.535027][T13408] out_of_memory+0x334/0x1340 [ 536.535041][T13408] ? lock_downgrade+0x920/0x920 [ 536.535059][T13408] ? oom_killer_disable+0x280/0x280 [ 536.569341][ T9369] kobject: 'queues': free name [ 536.650480][T13408] mem_cgroup_out_of_memory+0x1d8/0x240 [ 536.650499][T13408] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 536.749649][ T9369] kobject: 'wlan2' (000000008bdf8368): kobject_uevent_env [ 536.758047][T13408] ? do_raw_spin_unlock+0x57/0x270 [ 536.769338][ T9369] kobject: 'wlan2' (000000008bdf8368): kobject_uevent_env: uevent_suppress caused the event to drop! [ 536.770227][T13408] ? _raw_spin_unlock+0x2d/0x50 [ 536.774992][ T9369] kobject: 'net' (00000000ce97befa): kobject_cleanup, parent 00000000ca0b622f [ 536.780114][T13408] try_charge+0xf4b/0x1440 [ 536.780137][T13408] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 536.809331][ T9369] kobject: 'net' (00000000ce97befa): calling ktype release [ 536.818070][T13408] ? find_held_lock+0x35/0x130 [ 536.839328][ T9369] kobject: 'net': free name [ 536.842965][T13408] ? get_mem_cgroup_from_mm+0x139/0x320 [ 536.942118][T13408] ? lock_downgrade+0x920/0x920 [ 536.946962][T13408] ? percpu_ref_tryget_live+0x111/0x290 [ 536.952497][T13408] __memcg_kmem_charge_memcg+0x71/0xf0 [ 536.957948][T13408] ? memcg_kmem_put_cache+0x50/0x50 [ 536.963137][T13408] ? get_mem_cgroup_from_mm+0x156/0x320 [ 536.968709][T13408] __memcg_kmem_charge+0x13a/0x3a0 [ 536.973814][T13408] __alloc_pages_nodemask+0x4f7/0x900 [ 536.979174][T13408] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 536.984712][T13408] ? __alloc_pages_slowpath+0x2540/0x2540 [ 536.990423][T13408] ? percpu_ref_put_many+0xb6/0x190 [ 536.995619][T13408] copy_process+0x3f8/0x6830 [ 537.000212][T13408] ? __kasan_check_read+0x11/0x20 [ 537.005225][T13408] ? __kasan_check_read+0x11/0x20 [ 537.010241][T13408] ? __lock_acquire+0x16f2/0x4a00 [ 537.015256][T13408] ? __cleanup_sighand+0x60/0x60 [ 537.020227][T13408] ? __might_fault+0x12b/0x1e0 [ 537.025012][T13408] ? __might_fault+0x12b/0x1e0 [ 537.029770][T13408] _do_fork+0x146/0xfa0 [ 537.033915][T13408] ? copy_init_mm+0x20/0x20 [ 537.038458][T13408] ? __kasan_check_read+0x11/0x20 [ 537.043475][T13408] ? _copy_to_user+0x118/0x160 [ 537.048233][T13408] __x64_sys_clone+0x1ab/0x270 [ 537.052985][T13408] ? __ia32_sys_vfork+0xd0/0xd0 [ 537.057826][T13408] ? do_syscall_64+0x26/0x760 [ 537.062656][T13408] ? lockdep_hardirqs_on+0x418/0x5d0 [ 537.067931][T13408] ? trace_hardirqs_on+0x67/0x240 [ 537.072944][T13408] do_syscall_64+0xfa/0x760 [ 537.077441][T13408] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 537.083342][T13408] RIP: 0033:0x457eba [ 537.087229][T13408] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 537.106909][T13408] RSP: 002b:00007fff72d20d70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 537.115306][T13408] RAX: ffffffffffffffda RBX: 00007fff72d20d70 RCX: 0000000000457eba [ 537.123323][T13408] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 537.131296][T13408] RBP: 00007fff72d20db0 R08: 0000000000000001 R09: 000055555710c940 [ 537.139264][T13408] R10: 000055555710cc10 R11: 0000000000000246 R12: 0000000000000001 [ 537.147347][T13408] R13: 0000000000000000 R14: 0000000000000000 R15: 00007fff72d20e00 [ 537.166454][T13408] memory: usage 2968kB, limit 0kB, failcnt 94 [ 537.172728][T13408] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 537.179997][T13408] Memory cgroup stats for /syz4: [ 537.180084][T13408] anon 151552 [ 537.180084][T13408] file 45056 [ 537.180084][T13408] kernel_stack 65536 [ 537.180084][T13408] slab 3067904 [ 537.180084][T13408] sock 0 [ 537.180084][T13408] shmem 0 [ 537.180084][T13408] file_mapped 135168 [ 537.180084][T13408] file_dirty 135168 [ 537.180084][T13408] file_writeback 0 [ 537.180084][T13408] anon_thp 0 [ 537.180084][T13408] inactive_anon 0 [ 537.180084][T13408] active_anon 151552 [ 537.180084][T13408] inactive_file 0 [ 537.180084][T13408] active_file 0 [ 537.180084][T13408] unevictable 0 [ 537.180084][T13408] slab_reclaimable 1216512 [ 537.180084][T13408] slab_unreclaimable 1851392 [ 537.180084][T13408] pgfault 56595 [ 537.180084][T13408] pgmajfault 0 [ 537.180084][T13408] workingset_refault 0 [ 537.180084][T13408] workingset_activate 0 [ 537.180084][T13408] workingset_nodereclaim 0 [ 537.180084][T13408] pgrefill 33 [ 537.180084][T13408] pgscan 34 [ 537.180084][T13408] pgsteal 0 [ 537.180084][T13408] pgactivate 0 [ 537.180092][ T9369] kobject: 'wlan2' (000000008bdf8368): kobject_cleanup, parent 00000000ca0b622f [ 537.180103][ T9369] kobject: 'wlan2' (000000008bdf8368): calling ktype release [ 537.185140][T13408] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=13408,uid=0 [ 537.285661][ T9369] kobject: 'wlan2': free name [ 537.292551][T13408] Memory cgroup out of memory: Killed process 13408 (syz-executor.4) total-vm:72444kB, anon-rss:112kB, file-rss:35776kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:0 [ 537.297860][ T9369] kobject: 'rfkill11' (000000008bdc4614): kobject_uevent_env [ 537.341749][ T8724] syz-executor.3 invoked oom-killer: gfp_mask=0x40cc0(GFP_KERNEL|__GFP_COMP), order=1, oom_score_adj=0 [ 537.344045][ T9369] kobject: 'rfkill11' (000000008bdc4614): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim8/ieee80211/phy9/rfkill11' [ 537.352874][ T8724] CPU: 0 PID: 8724 Comm: syz-executor.3 Not tainted 5.3.0-rc6-next-20190830 #75 [ 537.375575][ T8724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 537.385758][ T8724] Call Trace: [ 537.389129][ T8724] dump_stack+0x172/0x1f0 [ 537.393665][ T8724] dump_header+0x177/0x1152 [ 537.398154][ T8724] ? ___ratelimit+0xf8/0x595 [ 537.402729][ T8724] ? trace_hardirqs_on+0x67/0x240 [ 537.407741][ T8724] ? pagefault_out_of_memory+0x11c/0x11c [ 537.413360][ T8724] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 537.419145][ T8724] ? ___ratelimit+0x60/0x595 [ 537.424369][ T8724] ? do_raw_spin_unlock+0x57/0x270 [ 537.429754][ T8724] oom_kill_process.cold+0x10/0x15 [ 537.434991][ T8724] out_of_memory+0x334/0x1340 [ 537.439794][ T8724] ? lock_downgrade+0x920/0x920 [ 537.444767][ T8724] ? oom_killer_disable+0x280/0x280 [ 537.449957][ T8724] ? __kasan_check_read+0x11/0x20 [ 537.454968][ T8724] mem_cgroup_out_of_memory+0x1d8/0x240 [ 537.460510][ T8724] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 537.466273][ T8724] ? do_raw_spin_unlock+0x57/0x270 [ 537.471375][ T8724] ? _raw_spin_unlock+0x2d/0x50 [ 537.476209][ T8724] try_charge+0xf4b/0x1440 [ 537.480631][ T8724] ? __lock_acquire+0x800/0x4a00 [ 537.485563][ T8724] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 537.491252][ T8724] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 537.497406][ T8724] ? cache_grow_begin+0x122/0xd20 [ 537.502527][ T8724] ? find_held_lock+0x35/0x130 [ 537.507478][ T8724] ? cache_grow_begin+0x122/0xd20 [ 537.512664][ T8724] __memcg_kmem_charge_memcg+0x71/0xf0 [ 537.518407][ T8724] ? memcg_kmem_put_cache+0x50/0x50 [ 537.523605][ T8724] ? __kasan_check_read+0x11/0x20 [ 537.528715][ T8724] cache_grow_begin+0x629/0xd20 [ 537.533675][ T8724] ? __sanitizer_cov_trace_cmp2+0x11/0x20 [ 537.539565][ T8724] ? mempolicy_slab_node+0x139/0x390 [ 537.544847][ T8724] fallback_alloc+0x1fd/0x2d0 [ 537.549519][ T8724] ____cache_alloc_node+0x1bc/0x1d0 [ 537.554711][ T8724] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 537.561120][ T8724] kmem_cache_alloc_node+0xe3/0x740 [ 537.566399][ T8724] ? lockdep_hardirqs_on+0x418/0x5d0 [ 537.571669][ T8724] ? trace_hardirqs_on+0x67/0x240 [ 537.576675][ T8724] copy_process+0x44c4/0x6830 [ 537.581343][ T8724] ? __kasan_check_read+0x11/0x20 [ 537.586360][ T8724] ? __kasan_check_read+0x11/0x20 [ 537.591369][ T8724] ? __lock_acquire+0x16f2/0x4a00 [ 537.596376][ T8724] ? __cleanup_sighand+0x60/0x60 [ 537.601445][ T8724] ? __might_fault+0x12b/0x1e0 [ 537.606204][ T8724] ? __might_fault+0x12b/0x1e0 [ 537.610978][ T8724] _do_fork+0x146/0xfa0 [ 537.615364][ T8724] ? copy_init_mm+0x20/0x20 [ 537.619868][ T8724] ? __kasan_check_read+0x11/0x20 [ 537.624891][ T8724] ? _copy_to_user+0x118/0x160 [ 537.629740][ T8724] __x64_sys_clone+0x1ab/0x270 [ 537.634497][ T8724] ? __ia32_sys_vfork+0xd0/0xd0 [ 537.639793][ T8724] ? do_syscall_64+0x26/0x760 [ 537.644492][ T8724] ? lockdep_hardirqs_on+0x418/0x5d0 [ 537.649766][ T8724] ? trace_hardirqs_on+0x67/0x240 [ 537.654919][ T8724] do_syscall_64+0xfa/0x760 [ 537.659425][ T8724] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 537.665481][ T8724] RIP: 0033:0x457eba [ 537.669514][ T8724] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 537.689257][ T8724] RSP: 002b:00007ffddd578b40 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 537.697742][ T8724] RAX: ffffffffffffffda RBX: 00007ffddd578b40 RCX: 0000000000457eba [ 537.705867][ T8724] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 537.713913][ T8724] RBP: 00007ffddd578b80 R08: 0000000000000001 R09: 0000555556ec8940 [ 537.721872][ T8724] R10: 0000555556ec8c10 R11: 0000000000000246 R12: 0000000000000001 [ 537.729976][ T8724] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffddd578bd0 [ 537.739933][ T8724] memory: usage 40104kB, limit 0kB, failcnt 69 [ 537.746104][ T8724] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 537.753141][ T8724] Memory cgroup stats for /syz3: [ 537.753225][ T8724] anon 33304576 [ 537.753225][ T8724] file 131072 [ 537.753225][ T8724] kernel_stack 458752 [ 537.753225][ T8724] slab 5427200 [ 537.753225][ T8724] sock 0 [ 537.753225][ T8724] shmem 0 [ 537.753225][ T8724] file_mapped 0 [ 537.753225][ T8724] file_dirty 0 [ 537.753225][ T8724] file_writeback 0 [ 537.753225][ T8724] anon_thp 31457280 [ 537.753225][ T8724] inactive_anon 135168 [ 537.753225][ T8724] active_anon 33304576 [ 537.753225][ T8724] inactive_file 0 [ 537.753225][ T8724] active_file 0 [ 537.753225][ T8724] unevictable 0 [ 537.753225][ T8724] slab_reclaimable 1892352 [ 537.753225][ T8724] slab_unreclaimable 3534848 [ 537.753225][ T8724] pgfault 45804 [ 537.753225][ T8724] pgmajfault 0 [ 537.753225][ T8724] workingset_refault 0 [ 537.753225][ T8724] workingset_activate 0 [ 537.753225][ T8724] workingset_nodereclaim 0 [ 537.753225][ T8724] pgrefill 135 [ 537.753225][ T8724] pgscan 137 [ 537.753225][ T8724] pgsteal 34 [ 537.753225][ T8724] pgactivate 99 [ 537.765724][ T3891] kobject: 'loop1' (000000002ff5109a): kobject_uevent_env [ 537.850342][ T8724] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=16045,uid=0 [ 537.859829][ T9369] kobject: 'phy9' (000000005568c674): kobject_uevent_env [ 537.876013][ T8724] Memory cgroup out of memory: Killed process 16045 (syz-executor.3) total-vm:72708kB, anon-rss:2212kB, file-rss:35840kB, shmem-rss:0kB, UID:0 pgtables:143360kB oom_score_adj:1000 [ 537.899392][ T9369] kobject: 'phy9' (000000005568c674): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim8/ieee80211/phy9' [ 537.911618][ T8732] syz-executor.5 invoked oom-killer: gfp_mask=0x40c50(GFP_NOFS|__GFP_COMP|__GFP_RECLAIMABLE), order=0, oom_score_adj=0 [ 537.928826][ T8732] CPU: 0 PID: 8732 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 537.937871][ T8732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 537.947932][ T8732] Call Trace: [ 537.949552][ T9369] kobject: 'ieee80211' (00000000e92170eb): kobject_cleanup, parent 00000000ca0b622f [ 537.951229][ T8732] dump_stack+0x172/0x1f0 [ 537.951247][ T8732] dump_header+0x177/0x1152 [ 537.969582][ T8732] ? ___ratelimit+0xf8/0x595 [ 537.974179][ T8732] ? trace_hardirqs_on+0x67/0x240 [ 537.974542][ T9369] kobject: 'ieee80211' (00000000e92170eb): calling ktype release [ 537.979208][ T8732] ? pagefault_out_of_memory+0x11c/0x11c [ 537.979233][ T8732] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 537.987410][ T9369] kobject: 'ieee80211': free name [ 537.992562][ T8732] ? ___ratelimit+0x60/0x595 [ 537.992574][ T8732] ? do_raw_spin_unlock+0x57/0x270 [ 537.992589][ T8732] oom_kill_process.cold+0x10/0x15 [ 537.992604][ T8732] out_of_memory+0x334/0x1340 [ 537.999006][ T9369] kobject: 'hwsim8' (000000006ce8854f): kobject_uevent_env [ 538.003697][ T8732] ? lock_downgrade+0x920/0x920 [ 538.003713][ T8732] ? oom_killer_disable+0x280/0x280 [ 538.003731][ T8732] mem_cgroup_out_of_memory+0x1d8/0x240 [ 538.003748][ T8732] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 538.008995][ T9369] kobject: 'hwsim8' (000000006ce8854f): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim8' [ 538.013581][ T8732] ? do_raw_spin_unlock+0x57/0x270 [ 538.013597][ T8732] ? _raw_spin_unlock+0x2d/0x50 [ 538.013610][ T8732] try_charge+0xf4b/0x1440 [ 538.013627][ T8732] ? __lock_acquire+0x800/0x4a00 [ 538.028016][ T9369] kobject: 'hwsim8' (000000006ce8854f): kobject_uevent_env [ 538.030702][ T8732] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 538.030716][ T8732] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 538.030727][ T8732] ? cache_grow_begin+0x122/0xd20 [ 538.030744][ T8732] ? find_held_lock+0x35/0x130 [ 538.040874][ T9369] kobject: 'hwsim8' (000000006ce8854f): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim8' [ 538.041315][ T8732] ? cache_grow_begin+0x122/0xd20 [ 538.056577][ T9369] kobject: 'hwsim8' (000000006ce8854f): kobject_cleanup, parent 00000000ca0b622f [ 538.064113][ T8732] __memcg_kmem_charge_memcg+0x71/0xf0 [ 538.064128][ T8732] ? memcg_kmem_put_cache+0x50/0x50 [ 538.064141][ T8732] ? __kasan_check_read+0x11/0x20 [ 538.064158][ T8732] cache_grow_begin+0x629/0xd20 [ 538.086855][ T9369] kobject: 'hwsim8' (000000006ce8854f): calling ktype release [ 538.090886][ T8732] ? __sanitizer_cov_trace_cmp2+0x11/0x20 [ 538.090901][ T8732] ? mempolicy_slab_node+0x139/0x390 [ 538.090912][ T8732] fallback_alloc+0x1fd/0x2d0 [ 538.090927][ T8732] ____cache_alloc_node+0x1bc/0x1d0 [ 538.102809][ T3891] kobject: 'loop1' (000000002ff5109a): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 538.107628][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 538.107644][ T8732] kmem_cache_alloc+0x1ef/0x710 [ 538.112973][ T9369] kobject: 'hwsim8': free name [ 538.124239][ T8732] ? lock_downgrade+0x920/0x920 [ 538.124251][ T8732] ? rwlock_bug.part.0+0x90/0x90 [ 538.124266][ T8732] ? ratelimit_state_init+0xb0/0xb0 [ 538.124277][ T8732] ext4_alloc_inode+0x1f/0x640 [ 538.124294][ T8732] ? ratelimit_state_init+0xb0/0xb0 [ 538.167515][ T9369] kobject: 'phy9' (000000005568c674): kobject_cleanup, parent 00000000ca0b622f [ 538.172458][ T8732] alloc_inode+0x68/0x1e0 [ 538.172473][ T8732] iget_locked+0x1a6/0x4b0 [ 538.172492][ T8732] __ext4_iget+0x265/0x3bb0 [ 538.187446][ T9369] kobject: 'phy9' (000000005568c674): calling ktype release [ 538.187936][ T8732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 538.187954][ T8732] ? ext4_get_projid+0x190/0x190 [ 538.218588][ T9369] kobject: 'rfkill11' (000000008bdc4614): kobject_cleanup, parent 00000000ca0b622f [ 538.219264][ T8732] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 538.224572][ T9369] kobject: 'rfkill11' (000000008bdc4614): calling ktype release [ 538.229814][ T8732] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 538.229828][ T8732] ? d_alloc_parallel+0xa78/0x1c30 [ 538.229845][ T8732] ext4_lookup+0x3b1/0x7a0 [ 538.229860][ T8732] ? ext4_cross_rename+0x1430/0x1430 [ 538.235027][ T9369] kobject: 'rfkill11': free name [ 538.240074][ T8732] ? __lock_acquire+0x16f2/0x4a00 [ 538.240086][ T8732] ? __kasan_check_read+0x11/0x20 [ 538.240102][ T8732] ? lockdep_init_map+0x1be/0x6d0 [ 538.240116][ T8732] __lookup_slow+0x279/0x500 [ 538.240132][ T8732] ? vfs_unlink+0x620/0x620 [ 538.249241][ T9369] kobject: 'phy9': free name [ 538.253453][ T8732] lookup_slow+0x58/0x80 [ 538.253467][ T8732] path_mountpoint+0x5d2/0x1e60 [ 538.253484][ T8732] ? __kasan_check_read+0x11/0x20 [ 538.373282][ T8732] ? __lock_acquire+0x16f2/0x4a00 [ 538.378353][ T8732] ? putname+0xef/0x130 [ 538.382497][ T8732] ? path_openat+0x46d0/0x46d0 [ 538.387278][ T8732] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 538.392984][ T8732] ? find_held_lock+0x35/0x130 [ 538.397841][ T8732] filename_mountpoint+0x190/0x3c0 [ 538.403004][ T8732] ? filename_parentat.isra.0+0x410/0x410 [ 538.408805][ T8732] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 538.414975][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 538.421335][ T8732] ? __phys_addr_symbol+0x30/0x70 [ 538.426361][ T8732] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 538.432127][ T8732] ? __check_object_size+0x3d/0x437 [ 538.437713][ T8732] ? strncpy_from_user+0x2b4/0x400 [ 538.442913][ T8732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 538.449421][ T8732] ? getname_flags+0x277/0x5b0 [ 538.454196][ T8732] user_path_mountpoint_at+0x3a/0x50 [ 538.459644][ T8732] ksys_umount+0x167/0xf00 [ 538.464194][ T8732] ? __ia32_sys_rmdir+0x40/0x40 [ 538.469056][ T8732] ? __detach_mounts+0x2a0/0x2a0 [ 538.474154][ T8732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 538.480457][ T8732] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 538.486334][ T8732] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 538.491873][ T8732] ? do_syscall_64+0x26/0x760 [ 538.496555][ T8732] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 538.503044][ T8732] ? do_syscall_64+0x26/0x760 [ 538.507719][ T8732] ? lockdep_hardirqs_on+0x418/0x5d0 [ 538.513229][ T8732] __x64_sys_umount+0x54/0x80 [ 538.517908][ T8732] do_syscall_64+0xfa/0x760 [ 538.522586][ T8732] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 538.528553][ T8732] RIP: 0033:0x45c317 [ 538.533315][ T8732] Code: 64 89 04 25 d0 02 00 00 58 5f ff d0 48 89 c7 e8 2f be ff ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 538.553454][ T8732] RSP: 002b:00007ffd499cd938 EFLAGS: 00000206 ORIG_RAX: 00000000000000a6 [ 538.561857][ T8732] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045c317 [ 538.569913][ T8732] RDX: 0000000000403520 RSI: 0000000000000002 RDI: 00007ffd499cd9e0 [ 538.578079][ T8732] RBP: 00000000000006f3 R08: 0000000000000000 R09: 000000000000000c [ 538.586044][ T8732] R10: 0000000000000006 R11: 0000000000000206 R12: 00007ffd499cea70 [ 538.594089][ T8732] R13: 00005555560f8940 R14: 0000000000000000 R15: 00007ffd499cea70 [ 538.604339][ T8732] memory: usage 11328kB, limit 0kB, failcnt 153 [ 538.610653][ T8732] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 538.618801][ T8732] Memory cgroup stats for /syz5: [ 538.618901][ T8732] anon 6787072 [ 538.618901][ T8732] file 0 [ 538.618901][ T8732] kernel_stack 131072 [ 538.618901][ T8732] slab 4341760 [ 538.618901][ T8732] sock 0 [ 538.618901][ T8732] shmem 110592 [ 538.618901][ T8732] file_mapped 135168 [ 538.618901][ T8732] file_dirty 0 [ 538.618901][ T8732] file_writeback 0 [ 538.618901][ T8732] anon_thp 6291456 [ 538.618901][ T8732] inactive_anon 0 [ 538.618901][ T8732] active_anon 6787072 [ 538.618901][ T8732] inactive_file 0 [ 538.618901][ T8732] active_file 135168 [ 538.618901][ T8732] unevictable 0 [ 538.618901][ T8732] slab_reclaimable 1486848 [ 538.618901][ T8732] slab_unreclaimable 2854912 [ 538.618901][ T8732] pgfault 57255 [ 538.618901][ T8732] pgmajfault 0 [ 538.618901][ T8732] workingset_refault 0 [ 538.618901][ T8732] workingset_activate 0 [ 538.618901][ T8732] workingset_nodereclaim 0 [ 538.618901][ T8732] pgrefill 71 [ 538.618901][ T8732] pgscan 66 [ 538.618901][ T8732] pgsteal 33 [ 538.618901][ T8732] pgactivate 33 [ 538.714928][ T8732] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=10491,uid=0 [ 538.730860][ T8732] Memory cgroup out of memory: Killed process 10491 (syz-executor.5) total-vm:72576kB, anon-rss:2200kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 [ 538.749820][ T8724] syz-executor.3 invoked oom-killer: gfp_mask=0x40cc0(GFP_KERNEL|__GFP_COMP), order=1, oom_score_adj=0 [ 538.760205][ T1065] oom_reaper: reaped process 10491 (syz-executor.5), now anon-rss:0kB, file-rss:34688kB, shmem-rss:0kB [ 538.761405][ T8724] CPU: 0 PID: 8724 Comm: syz-executor.3 Not tainted 5.3.0-rc6-next-20190830 #75 [ 538.781614][ T8724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 538.791673][ T8724] Call Trace: [ 538.795222][ T8724] dump_stack+0x172/0x1f0 [ 538.799558][ T8724] dump_header+0x177/0x1152 [ 538.804109][ T8724] ? ___ratelimit+0xf8/0x595 [ 538.808699][ T8724] ? trace_hardirqs_on+0x67/0x240 [ 538.815972][ T8724] ? pagefault_out_of_memory+0x11c/0x11c [ 538.821759][ T8724] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 538.827559][ T8724] ? ___ratelimit+0x60/0x595 [ 538.832140][ T8724] ? do_raw_spin_unlock+0x57/0x270 [ 538.837248][ T8724] oom_kill_process.cold+0x10/0x15 [ 538.842347][ T8724] out_of_memory+0x334/0x1340 [ 538.847369][ T8724] ? lock_downgrade+0x920/0x920 [ 538.852240][ T8724] ? oom_killer_disable+0x280/0x280 [ 538.857472][ T8724] ? __kasan_check_read+0x11/0x20 [ 538.862489][ T8724] mem_cgroup_out_of_memory+0x1d8/0x240 [ 538.868023][ T8724] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 538.875313][ T8724] ? do_raw_spin_unlock+0x57/0x270 [ 538.880420][ T8724] ? _raw_spin_unlock+0x2d/0x50 [ 538.885465][ T8724] try_charge+0xf4b/0x1440 [ 538.889878][ T8724] ? __lock_acquire+0x800/0x4a00 [ 538.894816][ T8724] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 538.900378][ T8724] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 538.906955][ T8724] ? cache_grow_begin+0x122/0xd20 [ 538.912060][ T8724] ? find_held_lock+0x35/0x130 [ 538.916810][ T8724] ? cache_grow_begin+0x122/0xd20 [ 538.921944][ T8724] __memcg_kmem_charge_memcg+0x71/0xf0 [ 538.927466][ T8724] ? memcg_kmem_put_cache+0x50/0x50 [ 538.932662][ T8724] ? __kasan_check_read+0x11/0x20 [ 538.937731][ T8724] cache_grow_begin+0x629/0xd20 [ 538.942698][ T8724] ? __sanitizer_cov_trace_cmp2+0x11/0x20 [ 538.948415][ T8724] ? mempolicy_slab_node+0x139/0x390 [ 538.953755][ T8724] fallback_alloc+0x1fd/0x2d0 [ 538.958430][ T8724] ____cache_alloc_node+0x1bc/0x1d0 [ 538.963618][ T8724] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 538.969861][ T8724] kmem_cache_alloc_node+0xe3/0x740 [ 538.975176][ T8724] ? lockdep_hardirqs_on+0x418/0x5d0 [ 538.980461][ T8724] ? trace_hardirqs_on+0x67/0x240 [ 538.985640][ T8724] copy_process+0x44c4/0x6830 [ 538.990331][ T8724] ? __kasan_check_read+0x11/0x20 [ 538.995353][ T8724] ? __kasan_check_read+0x11/0x20 [ 539.000372][ T8724] ? __lock_acquire+0x16f2/0x4a00 [ 539.005392][ T8724] ? __cleanup_sighand+0x60/0x60 [ 539.010413][ T8724] ? __might_fault+0x12b/0x1e0 [ 539.015175][ T8724] ? __might_fault+0x12b/0x1e0 [ 539.020014][ T8724] _do_fork+0x146/0xfa0 [ 539.024204][ T8724] ? copy_init_mm+0x20/0x20 [ 539.028697][ T8724] ? __kasan_check_read+0x11/0x20 [ 539.033775][ T8724] ? _copy_to_user+0x118/0x160 [ 539.038543][ T8724] __x64_sys_clone+0x1ab/0x270 [ 539.043296][ T8724] ? __ia32_sys_vfork+0xd0/0xd0 [ 539.048138][ T8724] ? do_syscall_64+0x26/0x760 [ 539.052805][ T8724] ? lockdep_hardirqs_on+0x418/0x5d0 [ 539.058087][ T8724] ? trace_hardirqs_on+0x67/0x240 [ 539.063098][ T8724] do_syscall_64+0xfa/0x760 [ 539.067798][ T8724] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 539.074413][ T8724] RIP: 0033:0x457eba [ 539.078540][ T8724] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 539.098226][ T8724] RSP: 002b:00007ffddd578b40 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 539.106775][ T8724] RAX: ffffffffffffffda RBX: 00007ffddd578b40 RCX: 0000000000457eba [ 539.114734][ T8724] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 539.122700][ T8724] RBP: 00007ffddd578b80 R08: 0000000000000001 R09: 0000555556ec8940 [ 539.130669][ T8724] R10: 0000555556ec8c10 R11: 0000000000000246 R12: 0000000000000001 [ 539.138635][ T8724] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffddd578bd0 [ 539.147398][ T8724] memory: usage 37772kB, limit 0kB, failcnt 75 [ 539.153625][ T8724] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 539.160522][ T8724] Memory cgroup stats for /syz3: [ 539.160612][ T8724] anon 31092736 [ 539.160612][ T8724] file 131072 [ 539.160612][ T8724] kernel_stack 458752 [ 539.160612][ T8724] slab 5427200 [ 539.160612][ T8724] sock 0 [ 539.160612][ T8724] shmem 0 [ 539.160612][ T8724] file_mapped 0 [ 539.160612][ T8724] file_dirty 0 [ 539.160612][ T8724] file_writeback 0 [ 539.160612][ T8724] anon_thp 29360128 [ 539.160612][ T8724] inactive_anon 135168 [ 539.160612][ T8724] active_anon 31092736 [ 539.160612][ T8724] inactive_file 0 [ 539.160612][ T8724] active_file 0 [ 539.160612][ T8724] unevictable 0 [ 539.160612][ T8724] slab_reclaimable 1892352 [ 539.160612][ T8724] slab_unreclaimable 3534848 [ 539.160612][ T8724] pgfault 45804 [ 539.160612][ T8724] pgmajfault 0 [ 539.160612][ T8724] workingset_refault 0 [ 539.160612][ T8724] workingset_activate 0 [ 539.160612][ T8724] workingset_nodereclaim 0 [ 539.160612][ T8724] pgrefill 135 [ 539.160612][ T8724] pgscan 137 [ 539.160612][ T8724] pgsteal 34 [ 539.160612][ T8724] pgactivate 99 [ 539.162632][T13408] kobject: 'batman_adv' (00000000f3ec53a5): kobject_uevent_env [ 539.165659][ T8724] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=15991,uid=0 [ 539.269088][T13408] kobject: 'batman_adv' (00000000f3ec53a5): kobject_uevent_env: filter function caused the event to drop! [ 539.281989][ T8724] Memory cgroup out of memory: Killed process 15991 (syz-executor.3) total-vm:72576kB, anon-rss:2204kB, file-rss:35840kB, shmem-rss:0kB, UID:0 pgtables:143360kB oom_score_adj:1000 [ 539.302396][T13408] kobject: 'batman_adv' (00000000f3ec53a5): kobject_cleanup, parent 00000000ca0b622f