000000)=ANY=[@ANYBLOB="acab91baa9867298ebaf06000000060000005061f562027266732e2f"]) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r2, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x2}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0x988ac27b1c21ecc6, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000240)={r4}) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) r5 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x9, 0x0) ioctl$PPPIOCSFLAGS1(r5, 0x40047459, 0x0) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f00000000c0)={0x2, 0x1, 0x401, 0x4, 0x5}, 0xc) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r1, 0x0, 0x486, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r8, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r8, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(r8, 0x4018aee3, &(0x7f0000000140)={0x0, 0x4, 0x1, &(0x7f0000000100)=0x3}) write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x2, @link_local, 'bond0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f0000005b40), 0x4000000000001b2, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, 0x0, 0x0) r9 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vsock\x00', 0x42000, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r10, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r10, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) getsockopt$inet_pktinfo(r10, 0x0, 0x8, &(0x7f0000000480)={0x0, @remote, @broadcast}, &(0x7f00000004c0)=0xc) bind$bt_hci(r9, &(0x7f0000000500)={0x1f, r11, 0x1}, 0xc) r12 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm_plock\x00', 0xe19f20881b9de7c9, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x1, 0xb9, 0x3, 0x6, 0xa, r12, 0x80, [], 0x0, r7, 0x0, 0x3}, 0x3c) 21:59:21 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x214, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 672.054781][T23673] device nr0 entered promiscuous mode 21:59:21 executing program 3: openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='w\x00', 0x2, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) write$P9_RSYMLINK(r0, &(0x7f0000000000)={0x14, 0x11, 0x2, {0x0, 0x2}}, 0x14) [ 672.186304][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 672.192210][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 672.198108][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 672.204018][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:59:21 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x215, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 672.346354][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 672.352209][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:59:22 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x3300, 'c\x86\xdd'}]}, 0xfdef) 21:59:22 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x216, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 672.533409][T23697] device nr0 entered promiscuous mode [ 672.831878][T23697] device nr0 entered promiscuous mode 21:59:24 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4, 0x3c00000000000000) 21:59:24 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x217, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:24 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) preadv(r0, &(0x7f0000001480)=[{&(0x7f0000000100)=""/77, 0x4d}], 0x1, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$TIOCNOTTY(r1, 0x5422) 21:59:24 executing program 4: r0 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x101080, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r2, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000200)={&(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x9}) getsockname$netrom(r1, &(0x7f00000000c0)={{0x3, @rose}, [@bcast, @rose, @bcast, @bcast, @rose, @rose, @bcast, @netrom]}, &(0x7f0000000140)=0x48) fsetxattr$security_selinux(r0, &(0x7f0000000080)='\x00\x00\x02\x00\x00\x00\x00\x00\x00\x00\xe6\x00', 0x0, 0xfffffffffffffdb7, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r3, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$sock_SIOCDELDLCI(r3, 0x8981, &(0x7f0000000180)={'ifb0\x00', 0x4}) 21:59:24 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x3b00, 'c\x86\xdd'}]}, 0xfdef) 21:59:24 executing program 2: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0xfffffffffffffffc) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0x2}, 0x26f) write$binfmt_elf32(r1, &(0x7f0000000200)=ANY=[], 0xff42) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r3, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r3, 0xc0305615, &(0x7f0000000280)={0x0, {0x3, 0x3}}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r4, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r4, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r4, 0x8953, &(0x7f00000000c0)={{0x2, 0x4e22, @remote}, {0x6, @remote}, 0x4, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x13}}, 'ip6_vti0\x00'}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r5, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r5, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$BLKPG(r5, 0x1269, &(0x7f0000000240)={0x4ab7, 0x5, 0xec, &(0x7f0000000140)="cca43207c81ca2c46966f6c3d170d26a7672332b8bd7a177b4e53d332de014f962e77d06d3639018581630e8a33b37ee55d1ed9a48a1240f0cad1cd8578a1efe2ceb327803f94bc9058ecaf05d4a95e62ceec459349040db496bbe5c204dd1bcf6521e21461aba83aa3c62be25cdf910516a4da94ea135352e8f9409c42f1bd9231c730107f6401d97d32ee4b12803a3072b3a28663551d55d64f8306590e032fa5b5b0bc5843c7b8199cae90e2ddc95454ea16fadb8bed27d54004eeeca18bc3e497fff412bfea543c3e625c32283cf7dafc494f9da8f06c31b768e2bb9ca822733335055512eeed377d684"}) shutdown(r1, 0x1) [ 674.659159][T23711] device nr0 entered promiscuous mode 21:59:24 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x218, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:24 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x3c00, 'c\x86\xdd'}]}, 0xfdef) 21:59:24 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x219, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 675.056166][T23736] device nr0 entered promiscuous mode 21:59:24 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x21a, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:24 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x21b, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 675.358448][T23736] device nr0 entered promiscuous mode 21:59:25 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x21c, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:25 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4, 0x3f00000000000000) 21:59:25 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @mcast2, 0x2}, 0xfe78) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000f59ffc)=0x4, 0x4) bind$inet6(r1, &(0x7f0000000480)={0xa, 0x4e20, 0xfffffffffffffffc, @mcast1, 0x2}, 0x1c) pipe(&(0x7f0000000000)) 21:59:25 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x10001, 0x14bb40524bf3a5c0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f0000000040)=""/69) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) preadv(r1, &(0x7f0000000000), 0x10000000000001e6, 0x0) 21:59:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000000180)=[{0x15, 0x0, 0x0, 0xfffffffffffffffc}, {}, {0x6}]}, 0x10) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r2, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000000)={0x5, [0x6, 0x7fffffff, 0x8001, 0xfffffffeffffffff, 0x7]}, &(0x7f00000000c0)=0xe) 21:59:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") socket(0x18, 0x0, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r2, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x31, &(0x7f0000000000), 0x1) 21:59:25 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x21d, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:25 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) preadv(r0, &(0x7f0000001480)=[{&(0x7f0000000000)=""/77, 0x4d}], 0x1, 0x40000000000) 21:59:25 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x21e, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:25 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x3f00, 'c\x86\xdd'}]}, 0xfdef) 21:59:25 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) preadv(r0, &(0x7f0000001480)=[{&(0x7f0000000100)=""/77, 0x4d}], 0x1, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000000000)={0x3b, @broadcast, 0x4e22, 0x3, 'lc\x00', 0x2, 0x0, 0x1b}, 0x2c) [ 676.050242][T23783] device nr0 entered promiscuous mode 21:59:25 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x21f, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 676.125345][T23786] IPVS: set_ctl: invalid protocol: 59 255.255.255.255:20002 [ 676.188000][T23786] IPVS: set_ctl: invalid protocol: 59 255.255.255.255:20002 21:59:25 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) preadv(r0, &(0x7f0000001480)=[{&(0x7f0000000100)=""/77, 0x4d}], 0x1, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r2, 0x4040ae70, &(0x7f0000000000)={0x1, 0x7, 0x6, 0x106}) 21:59:26 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4, 0x4000000000000000) 21:59:26 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x220, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 676.473979][T23783] device nr0 entered promiscuous mode 21:59:26 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x400000, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x6) r1 = memfd_create(&(0x7f0000000040)='}eth1\x00', 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0], 0x12) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r2, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) bind$rds(r2, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) fchmod(r2, 0x168) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r1, 0x0) fremovexattr(r1, &(0x7f00000000c0)=@known='trusted.overlay.impure\x00') 21:59:26 executing program 2: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x80044dfb, &(0x7f0000000180)) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000040)=0x100000000) 21:59:26 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x221, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:26 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) preadv(r0, &(0x7f0000000080), 0x10000000000001a3, 0x0) 21:59:26 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x222, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:26 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x1) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) recvfrom(r0, &(0x7f0000000000)=""/58, 0x3a, 0x2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x0, 0x3, 0x0, 0x3, {0xa, 0x4e22, 0x8, @mcast1, 0x3}}}, 0x80) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) preadv(r2, &(0x7f0000001480)=[{&(0x7f0000000100)=""/77, 0x4d}], 0x1, 0x0) 21:59:26 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x4000, 'c\x86\xdd'}]}, 0xfdef) 21:59:26 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x223, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:26 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x224, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 677.135749][T23830] device nr0 entered promiscuous mode 21:59:26 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4, 0x6000000000000000) 21:59:26 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x225, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 677.462440][T23830] device nr0 entered promiscuous mode 21:59:27 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x226, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='integrjty,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c69776e5d4de874f83c331a425b47ce19abe03e67b3c554cb89771a69135ebef77f67350131f47b9c003f3a4451c00427c4165bd03c4537961025a910824e229dba25f77d632d11ac561746c37da98503dfa549c2c1920e1bafc9f0756f5bf041b135c45228ee977285a2f074bdf84dad35fe137548df789435834d957dec8857959e6518a15c0d1ddbcd857c45324a694d7d376be9604e0e7c56e8e43e8ef35393b555165b85158cf8ae34ee65f1dd592a0029c29c4aafe55f7818741cce67bdf1768f"]) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) openat$cgroup_ro(r1, &(0x7f0000000340)='cpuset.effective_cpus\x00', 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r2, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f00000002c0)={0x0, &(0x7f0000000280)}, 0x9) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000300)) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x12, 0x11, 0x16c491334e4efebf, "27109d6f611beb15e5cbe15f886b68873c81424371c04a98bca1bba2d56c1db63ab08a806f3f3632cc2aee89acf756b51c786827170b35ef7f21eeea84c15ddb", "bf07fe849c2e377554c15cd387c628917a5446527292ba4ba670de8d1b9c9c8e", [0x1, 0xf0]}) 21:59:27 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x1) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000100)=""/149, 0x207a0cb3) r1 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000001c0)="3bad0f80cae267af31c3787ba1e8fd5ec21d1702a970dc9883d07936f155e4edabcfca643fafa6fc8eccc37028204a849ab8afb202ffd304b3491353c4efe3f3836216d48825067b8cc6dfcade3ed8bb3060271405c92c49be7a4e11fb6deefa", 0x60, 0xfffffffffffffff9) pipe2$9p(&(0x7f00000000c0), 0x4800) keyctl$update(0x2, r1, 0x0, 0x0) 21:59:27 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000001180)='/dev/sg#\x00', 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x2) ioctl$SIOCX25SSUBSCRIP(r1, 0x89e1, &(0x7f0000000040)={'bond_slave_0\x00', 0x6, 0x4}) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0000009de9dedc6afad49d000000000037000000"]) 21:59:27 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x227, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 677.760035][T23852] jfs: Unrecognized mount option "integrjty" or missing value 21:59:27 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-net\x00', 0x2, 0x0) preadv(r0, &(0x7f0000000680)=[{&(0x7f0000000240)=""/176, 0xb0}, {&(0x7f0000000300)=""/217, 0x40c}, {&(0x7f0000000400)=""/241, 0xf1}, {&(0x7f0000000500)=""/175, 0x1d2}, {&(0x7f0000000700)=""/190, 0xbe}], 0x5, 0x0) r1 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x1, 0x2000) ioctl$KVM_X86_SET_MCE(r1, 0x4040ae9e, &(0x7f00000005c0)={0x2900000000000000, 0x2, 0x7, 0x4, 0x1e}) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000640)='/dev/zero\x00', 0x22c842, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f00000007c0)={0x0, 0x100000000}, &(0x7f0000000800)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000840)={0x1, 0xa3, 0x8001, 0x3, 0x200, 0x1ff, 0x3, 0x12e6, r3}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f0000000200)=0x1000, 0x8) r4 = syz_open_dev$audion(&(0x7f0000000000)='/\x00', 0x101, 0x4040) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000040)='/dev/vhost-net\x00') ioctl$KVM_RUN(r0, 0xae80, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r5, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r5, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$sock_inet_udp_SIOCINQ(r5, 0x541b, &(0x7f0000000600)) ioctl$VIDIOC_G_EXT_CTRLS(r5, 0xc0205647, &(0x7f0000000140)={0x0, 0x0, 0x3, [], &(0x7f0000000180)={0xa00902, 0x3, [], @p_u32=&(0x7f00000000c0)=0xff}}) 21:59:27 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x228, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_thread_area(&(0x7f0000000040)={0x80000001, 0xe7794f42a0906be1, 0x0, 0x7f, 0x7a7, 0xd7, 0x10001, 0x1, 0x1000, 0x8001}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8b04, &(0x7f0000000bc0)='wlan1\x00\x0e\xd3UM\xe1\x04\xbeK\x19\xecr=\xd4$\x00\x00\x00\x00\x00\x02\x01\xe5\xe8\",\x91\x91\x13\x9f\x19\x9e\x02\x00?\x00\xff\x8d\x00\x00\xf6\x00\xd4\xf2\xe7\xf9\x01\x06\x8c\xe2K\x04\xd9\xfd\xbd\x00\x1d})\xa0\xb1\xd2\xe4\x00\x00\x00\x00\x00\xa4]\xbb\x10F\xe4\xa8\xa8\x00\x00\x00\x00\xdfA\x83\xcdx\x90\x9a\x82\xc0)(4\xdf\bL\x7f\xff\xff\xffs\x18Z\xcc\x026\xf4\xb0\x9b@:HX\xbd(\xbfjOc\xcd\x15\xc1K\xab\xe9\xe3\xe8\x05\xda\xce\xed\xa5\xb8<\x9d\x12\x19Z\xb3@o\xc7\xce\xec\x02:a\xad\xef,\xbc (\x02z\x8eni)\xb5i\x0f\xc7\v\x9dz\xfa\x88\x87\xa2\xa8\xd9\x95:E\xfeO\xe7\xf8EX\xe3\xbcf\x02\x98P\x1a\x1f\x16\xb9\b\xa2\xb0\xb1\xc4vCh.\xa3\xd7G0\x92C5\x9d\x17\xd1\x96g\x8d\xd1\x06i\xde<\xf3\xd9\x93M/\x1eQ\xba\xe7\xf4\x9c\x9a\x1a\xde\b\xcaot\xeeKr\xb3\"\xa9\xef\xa2\xd8\x03_\xee=[o\xaa`\x93d\xff9\xfa\r\xbe\x16\xef\xf0\xfeThQ\xb8\xe8\xba7\xd0\xab.\x13L8V\x1d\xa0\x02y\xe4\xef\x00\x8b\xcd\x1b\xe8#\xb4\xea@\x1b\xd0y\x02iE\xb30\xe8\xdb\xb1\xdb/e\xb3X\xe4Tr\xb4w\xba\xa9\xfe\x0f\xdcFc\xd0\x9f\x82\x9d\xae\x9cyQOT\xdc\x86\x82Q\xe0\xab\xc1w\x03;-^(\x02=\xf39#\x9a\xcd\xe0\xd8q\x9a\xcd\xdeAF,\x04\"\x84\xa9O\x97\xf7\xfb\xa2N>\xcb\x9d\xc0\x810\x12\xcc@\x89\xf8F\x82\x88O\x03\xeb\xad\xc7\xee\x17\x1f\xaaX\xeeO\xb5\xcf\xff@\xc09[\xec>\xf1_\xfd\xeb\x1e\x83\xbb\xd7\xdb\xf8\x94\x9d\xdf\xcc\xd8F\x005\xba$\xb3\x9cy\xb4n\xd4\x97\x87}\x8e\x03\x8b\xbbU_\xa4\tG\xbdZWQ\xf2\x91\xcb\xbf\x06\x93N\xf61\x9ea\xc3\xfd\xca\x9e`[\xd4\xb2\xe1\xa2\xc6h\xf8\x0f\xbaDP\x91\x13H\n\xe5F*\xe8\an\xeb\x18\x80A\xfe\xc3\xb4pJ;\xaa\x84*_k\xea\x87x\xda\xe8\xf5+\x89\xdc\x19|:,\xb7b\xc9\x10\x8a\xbe\xc3\x15)\x80\xd0t`7\xed\xe4&\xe25\x98vW\xf1\xdcL=\xf7\xa9\x9b\xe6\x03W^t\'*b\x98:\x8aU\xe0\x99!E\x87@*C\x97|?\xff7\xca\xfc\xaa<\xc8L\xbf/9\x1df\x8c\xa6\x8f3\xcc@g\x80)\xf4\v\xcd\x98[Y\x04\xb6b\xff\x86\xdb\x7f\xb9\x10\xd9\x18j\x1d\x16p\xc3\x02\'\x8eY\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\xd8s\x1a\xc8\xf0z\xfc\xf6\xba*\xfar\xef\x98\xad\xaf\xb6r\xff\xfc\xcf\xebo\x8c\xd9:\x8d\xf2eBcU\xca\x83\x88L\xf6\xa7\xf4|,\xdb\x85y\xfc\xad\xc6\xa0\x8aK\xb40\xfb\xc5\x85') ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) accept4$inet6(r0, &(0x7f00000003c0)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000400)=0x1c, 0x800) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x8, 0x10000) ioctl$CAPI_GET_SERIAL(r1, 0xc0044308, &(0x7f0000000100)=0x100000000) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r3 = getpid() perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x3, 0x0, 0x9, 0x6, 0x0, 0x2, 0x10000, 0xd, 0xffffffff7fffffff, 0xe2, 0x8, 0x626, 0x2, 0x20, 0x1f, 0x7, 0x5a, 0x6, 0x3, 0x80000000, 0x7, 0x2, 0x4, 0x5, 0x3b1, 0xff, 0x6, 0x100000000, 0x20, 0x1, 0xfffffffffffffffe, 0x3000000, 0x6, 0x400, 0x1000, 0x4, 0x0, 0x6, 0x1, @perf_config_ext={0x100000000, 0x81}, 0x2000, 0x80000000, 0x5, 0x2, 0x7, 0x100000000, 0x1}, r3, 0x8, r1, 0x1e) shutdown(r2, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000000)) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0), 0x0) syz_open_dev$vbi(&(0x7f0000000180)='\x00\x00\a\x00', 0x1, 0x2) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r4, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r4, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$DRM_IOCTL_RES_CTX(r4, 0xc0106426, &(0x7f0000000240)={0x6, &(0x7f0000000140)=[{}, {}, {0x0}, {}, {}, {}]}) ioctl$DRM_IOCTL_DMA(r1, 0xc0406429, &(0x7f0000000380)={r5, 0x4, &(0x7f0000000280)=[0x100000001, 0xfffffffffffffffc, 0x9e85, 0x100000000], &(0x7f00000002c0)=[0x10001, 0x301c], 0x24, 0x6, 0x20, &(0x7f0000000300)=[0xc21, 0x8, 0x40, 0x0, 0x7ff, 0x7fff], &(0x7f0000000340)}) 21:59:27 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x69fd, 'c\x86\xdd'}]}, 0xfdef) [ 678.138918][T23877] device nr0 entered promiscuous mode 21:59:27 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x229, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:27 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4, 0x8dffffff00000000) 21:59:28 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x22a, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:28 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x19, &(0x7f0000001740), 0x8) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x20000) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f00000001c0)={{0x8000, 0x1}, 'port1\x00', 0x64, 0x120000, 0x3ff, 0x9, 0x8, 0x800, 0x7391, 0x0, 0x2, 0x7ff}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x4}, &(0x7f0000000100)=0x8) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r3, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000180)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x26}}, @in={0x2, 0x4e20, @multicast2}], 0x20) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000080)={r2, 0xa}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000000c0)={r2, 0xff}, 0x8) [ 678.490885][T23877] device nr0 entered promiscuous mode 21:59:28 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x22b, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:28 executing program 3: openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x8000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) 21:59:28 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x22c, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:28 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x800e, 'c\x86\xdd'}]}, 0xfdef) 21:59:28 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0xa4ca1f0be61cd13a, 0x110, r3, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000000140)=[@acquire], 0xfffffe4a, 0x0, 0x0}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000500)={0x8, 0x0, &(0x7f0000000680)=[@release], 0x0, 0x0, 0x0}) 21:59:28 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x22d, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 679.042452][T23908] device nr0 entered promiscuous mode [ 679.058500][T23911] debugfs: File '23910' in directory 'proc' already present! 21:59:28 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) preadv(r0, &(0x7f0000001480)=[{&(0x7f0000000100)=""/77, 0x4d}], 0x1, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x40, 0xd3dd50a0fa2d76f0) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f0000000000)={0x8, 0x100000001}) [ 679.144820][T23911] binder: 23910:23911 ioctl c0306201 20012000 returned -14 21:59:28 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4, 0xaa05000000000000) 21:59:28 executing program 2: socket$packet(0x11, 0x80000000000003, 0x300) bind$alg(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='\x01\x00\x00\x00\x00\x00\x00\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x60020}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@getneightbl={0x14, 0x42, 0x200, 0x70bd2c, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x200c4002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$FIGETBSZ(r2, 0x2, &(0x7f0000000200)) r3 = socket$inet6(0xa, 0x401000000001, 0x0) close(r3) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000fffffffe) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000140)=0x4, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000080), 0x14) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:59:28 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x22e, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 679.466321][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 679.472282][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:59:29 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x22f, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:29 executing program 4: write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x200a01, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000, 0x0) setxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.ima\x00', 0x0, 0x0, 0x2) close(0xffffffffffffffff) write$FUSE_LK(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r2, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x9) set_mempolicy(0x8003, &(0x7f0000000080)=0x5, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x40, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r4, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x4, 0x7, 0x4, 0x5971065a0e982ec1, {r5, r6/1000+10000}, {0x4, 0xc, 0x6, 0x4, 0x0, 0x2, "a4efe99e"}, 0x6, 0x3, @fd=r2, 0x4}) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0xd) r7 = socket$inet6_sctp(0xa, 0x1, 0x84) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r9, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r9, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) accept$ax25(r9, &(0x7f0000000280)={{}, [@bcast, @bcast, @netrom, @remote, @remote, @null, @netrom, @default]}, &(0x7f0000000300)=0x48) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r7, 0x84, 0x18, &(0x7f00000000c0)={r10}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f00000001c0)={r10, 0x7, 0x20}, &(0x7f0000000200)=0xc) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000240)={0xc, 0x4, 0x4, 0x100000000, r11}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0xf) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) r12 = openat(r0, &(0x7f0000000000)='./file0\x00', 0x10002, 0x180) ioctl$KVM_SET_MP_STATE(r12, 0x4004ae99, &(0x7f0000000040)=0x6) socket$alg(0x26, 0x5, 0x0) 21:59:29 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x230, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 679.732351][T23908] device nr0 entered promiscuous mode [ 679.786317][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 679.792189][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:59:29 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x231, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:29 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x232, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:30 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x80fe, 'c\x86\xdd'}]}, 0xfdef) 21:59:30 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000180)={{0x7f, 0x45, 0x4c, 0x46, 0x9280, 0x6, 0x1f, 0x0, 0x40, 0x3, 0x3e, 0xfffffffffffffffb, 0x305, 0x38, 0x2cd, 0x9, 0x4, 0x20, 0x2, 0xd490, 0xffffffff80000000, 0x80000001}, [{0x3, 0x10000, 0x2, 0x1, 0x1f, 0x9, 0x1000000, 0x5}], "d2084bb0cec1eb347fc06f61bcb48e3c131c86b3bbde1c24da5087f75a7a584ba27c3d3a6561202a4f1a", [[], [], [], [], [], [], [], [], []]}, 0x982) preadv(r0, &(0x7f0000001480)=[{&(0x7f0000000100)=""/77, 0x4d}], 0x1, 0x0) 21:59:30 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4, 0xf5ffffff00000000) 21:59:30 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/40) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0xfffffffffffffffd, @rand_addr="0000650074d591d400e6ff00", 0xfc3}, 0x1c) listen(r0, 0x200000000002) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000100)=[@in={0x2, 0x4e22, @broadcast}, @in6={0xa, 0x4e21, 0x3, @loopback, 0x3e}, @in6={0xa, 0x4e20, 0xffffffff00000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x438}, @in6={0xa, 0x4e20, 0x0, @loopback, 0xe000}, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in={0x2, 0x4e21, @empty}, @in={0x2, 0x4e22, @multicast1}], 0x94) 21:59:30 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x233, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:30 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x3, &(0x7f0000000000)=0x7fffffff, 0x4) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) preadv(r1, &(0x7f0000001480)=[{&(0x7f0000000100)=""/77, 0x4d}], 0x1, 0x0) [ 680.556055][T23969] device nr0 entered promiscuous mode 21:59:30 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0xa) mbind(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, &(0x7f0000000240)=0x10001, 0x80000000, 0xf) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7bf070") r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x4001, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r5, 0x112, 0xa, &(0x7f0000000180)=0x80000001, &(0x7f00000001c0)=0x4) close(r3) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000380)=0x20, 0x4) socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) write$vnet(r1, &(0x7f0000000040)={0x1, {&(0x7f00000002c0)=""/185, 0xb9, &(0x7f0000000400)=""/196, 0x1, 0xa61c319587ec1abe}}, 0x68) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000680)=0x311e975ff24b3880) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4f22, 0x0) 21:59:30 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x234, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:30 executing program 4: write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x200a01, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000, 0x0) setxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.ima\x00', 0x0, 0x0, 0x2) close(0xffffffffffffffff) write$FUSE_LK(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r2, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x9) set_mempolicy(0x8003, &(0x7f0000000080)=0x5, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x40, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r4, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x4, 0x7, 0x4, 0x5971065a0e982ec1, {r5, r6/1000+10000}, {0x4, 0xc, 0x6, 0x4, 0x0, 0x2, "a4efe99e"}, 0x6, 0x3, @fd=r2, 0x4}) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0xd) r7 = socket$inet6_sctp(0xa, 0x1, 0x84) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r9, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r9, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) accept$ax25(r9, &(0x7f0000000280)={{}, [@bcast, @bcast, @netrom, @remote, @remote, @null, @netrom, @default]}, &(0x7f0000000300)=0x48) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r7, 0x84, 0x18, &(0x7f00000000c0)={r10}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f00000001c0)={r10, 0x7, 0x20}, &(0x7f0000000200)=0xc) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000240)={0xc, 0x4, 0x4, 0x100000000, r11}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0xf) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) r12 = openat(r0, &(0x7f0000000000)='./file0\x00', 0x10002, 0x180) ioctl$KVM_SET_MP_STATE(r12, 0x4004ae99, &(0x7f0000000040)=0x6) socket$alg(0x26, 0x5, 0x0) 21:59:30 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x235, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 681.018997][T23969] device nr0 entered promiscuous mode 21:59:30 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x236, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:30 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x8400, 'c\x86\xdd'}]}, 0xfdef) 21:59:30 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x4e20, 0x0, @ipv4={[], [], @local}, 0x2}, {0xa, 0x4e23, 0x3, @empty, 0x2}, 0x80000001, [0xff, 0x2, 0xfff, 0x8, 0x5, 0x81, 0x2, 0x8]}, 0x5c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) 21:59:30 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x237, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 681.326706][T24003] device nr0 entered promiscuous mode 21:59:31 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x238, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:31 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) preadv(r0, &(0x7f0000001480), 0x0, 0x10000) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0xa772f2bb7da67a44, 0x0) [ 681.546333][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 681.552175][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:59:31 executing program 4: write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x200a01, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000, 0x0) setxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.ima\x00', 0x0, 0x0, 0x2) close(0xffffffffffffffff) write$FUSE_LK(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r2, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x9) set_mempolicy(0x8003, &(0x7f0000000080)=0x5, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x40, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r4, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x4, 0x7, 0x4, 0x5971065a0e982ec1, {r5, r6/1000+10000}, {0x4, 0xc, 0x6, 0x4, 0x0, 0x2, "a4efe99e"}, 0x6, 0x3, @fd=r2, 0x4}) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0xd) r7 = socket$inet6_sctp(0xa, 0x1, 0x84) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r9, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r9, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) accept$ax25(r9, &(0x7f0000000280)={{}, [@bcast, @bcast, @netrom, @remote, @remote, @null, @netrom, @default]}, &(0x7f0000000300)=0x48) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r7, 0x84, 0x18, &(0x7f00000000c0)={r10}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f00000001c0)={r10, 0x7, 0x20}, &(0x7f0000000200)=0xc) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000240)={0xc, 0x4, 0x4, 0x100000000, r11}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0xf) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) r12 = openat(r0, &(0x7f0000000000)='./file0\x00', 0x10002, 0x180) ioctl$KVM_SET_MP_STATE(r12, 0x4004ae99, &(0x7f0000000040)=0x6) socket$alg(0x26, 0x5, 0x0) 21:59:31 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001300)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f0000000540)=',e%\xd7\xe4\x9c\xe3\xc1\x99\x8e/}iR\xd5\v@Z\xe1\xd8\xe8\v\xe6\x87\x93\xd2a6Z\xd3AO%\xda\xdb\xfb$\x0f\xb9\x1fQw.HOo-\xca_\xca\xff\xfe\x85\x1c\xeb$\xbb\x0f\xa5Z@]\xadt;\xf3\x95\x89(|\x9e\xb8C\x896\xdb\x89\r\xe0})D\xee\x7f\x92\xf2\x82\xe3C?\">\x85FRG\x87\xa4f1\xc8l\xfa1\xf9\xcc\x13\xce\x88\xd7\x10\x87~\xa5\xff\x1bP\xefqH\x80\xf0m\x19\xec\x12\x10\xe6\x163\a4I\x94h!(\x19.\xbc\xadx\a\x83\xb4\x98\xe3\x9d\x9f\x1e}\'\xcc\xf5s\x82\v\xa8\xb2\xc4\xf5$\x18O,3\xecZ\x8eW5\xef\xfe>\xd9=#\x11\xc1rys\x81\x80\x9b\xfd\xbc\xad\x17A\xae\xfd\x11\x1d\x9b\xf7\xcf\x01\\\xbb\xd1r\xbbq\xb0\xdf\x1e\xc7\xdb\xc1\x89\xec\x12A\xce\xd4-Q[\xea!\\\n.\xc4H\xc4\xe1\xf6\x01>\x01\xaa]\xfb\x8c\x05\x99\x9ah\xf8\xdd (\xe5\x86-N\xb3Dp\x1f`/\xc9\xe2\rE>\xc9I\\\x10\x91\x1f\x80\xde\xd7\xd2\xce\xdf@\xdb)Ub\x9dHe\x8c\x1d\x01\x00\x00\x80a`\x9b\xa5\xf8\xf1B\xacT,)\xc2\xa4\xa9\xe8\x92H\x88\xff\a\x00\x00\x00\x00\x00\x00\xc6\xbf\xe7`6\xce$\xda6\xf0\x15\x7f\xfe\xb9\x90\xc3\x1d\xf9\x1d\xfbZ\xecV2\b\xf1\xd3\xed\xb7\xc1J-\x00\x00\x00\x00\x00') recvfrom$rxrpc(r0, &(0x7f0000000000)=""/24, 0x18, 0x40010020, 0x0, 0x0) [ 681.732286][T24003] device nr0 entered promiscuous mode 21:59:31 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x239, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:31 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000000)=0xe8) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r2 = semget(0x3, 0x0, 0x482) semctl$GETVAL(r2, 0x1, 0xc, &(0x7f0000000280)=""/38) keyctl$get_persistent(0x16, r0, r1) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r3, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r4, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r4, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$VHOST_NET_SET_BACKEND(r3, 0x4008af30, &(0x7f00000002c0)={0x3, r4}) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) preadv(r5, &(0x7f0000001480)=[{&(0x7f0000000100)=""/77, 0x4d}], 0x1, 0x0) [ 681.808438][T24025] tmpfs: Unknown parameter 'e%×äœãÁ™Ž/}iRÕ @ZáØè 懓Òa6ZÓAO%ÚÛû$¹Qw.HOo-Ê_Êÿþ…ë$»¥Z@]­t;ó•‰(|ž¸C‰6Û‰ à})Dî’ò‚ãC?">…FRG‡¤f1Èlú1ùÌΈ×‡~¥ÿPïqH€ðmìæ34I”h!(.¼­xƒ´˜ãŸ}'Ìõs‚ ¨²Äõ$O,3ìZŽW5ïþ>Ù' 21:59:31 executing program 2: munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) io_setup(0x2000000000000009, &(0x7f0000000100)=0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x1000000000022, &(0x7f0000000140)=0x1, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x14, &(0x7f00000000c0)=0x80000000, 0x4) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) io_submit(r0, 0x40000000000000fa, &(0x7f0000000480)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x221}]) 21:59:31 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x23a, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:31 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x1, 0x0, 0x0, 0x0) r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x111004, 0x0) r1 = eventfd2(0x100000001, 0x1) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r3, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) futex(&(0x7f000000cffc)=0x1, 0x810000000006, 0x0, 0x0, 0x0, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r2, 0x3b72, &(0x7f0000000200)={0x20, 0x6, 0x9, 0x200, 0x3ff}) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) r4 = gettid() pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r5, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r5, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$TIOCGSID(r5, 0x5429, &(0x7f00000001c0)=0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x7, @tid=r6}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) socketpair$unix(0x1, 0x2000000005, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) tkill(r4, 0x1000000000016) exit(0x0) 21:59:31 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0xc0fe, 'c\x86\xdd'}]}, 0xfdef) 21:59:31 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r5, &(0x7f0000000140)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB="dc3c4ef6676947a1426dce1ea859adc31c2f0e5afa9228d611b20a535b1be83d4855224fcc91609a12c5bbe9e469f10697c56fb9449863b8d9880756d9360319416ccf3ef3fd8bdb0135367d9ec958756fdc98220897850e736a161b29a7dbc1"]], 0x8) vmsplice(r5, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) sendto$inet(r5, &(0x7f0000000080)="1250b28f2320d11f531a7c71117f297f34cc7037d47335fde8ad85b888beeabf0680883769c2b900dfeb997d3ee26ba815ecd038bfe679568f2b6de637f82aa9d183b86a4f7e576151dd25c3b7c13a9118fe846d506106dcb41dfe61a361bd8d655ea6bdb69444358cda", 0x6a, 0x14080, &(0x7f0000000100)={0x2, 0x4e21, @rand_addr=0x4}, 0x10) connect$inet6(r3, &(0x7f0000000180)={0xa, 0xfffffffffffffffc, 0x0, @remote, 0x5}, 0x1c) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000040)) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r7, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r7, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$TIOCMSET(r7, 0x5418, &(0x7f0000000240)=0x5) r8 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) r9 = ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r9, 0x4048ae9b, &(0x7f00000002c0)={0xe0003}) ioctl$KVM_SET_MSRS(r9, 0x8090ae81, &(0x7f0000000000)) dup(r9) 21:59:31 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x23b, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:32 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x23c, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 682.444932][T24057] device nr0 entered promiscuous mode 21:59:32 executing program 4: write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x200a01, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000, 0x0) setxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.ima\x00', 0x0, 0x0, 0x2) close(0xffffffffffffffff) write$FUSE_LK(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r2, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x9) set_mempolicy(0x8003, &(0x7f0000000080)=0x5, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x40, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r4, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x4, 0x7, 0x4, 0x5971065a0e982ec1, {r5, r6/1000+10000}, {0x4, 0xc, 0x6, 0x4, 0x0, 0x2, "a4efe99e"}, 0x6, 0x3, @fd=r2, 0x4}) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0xd) r7 = socket$inet6_sctp(0xa, 0x1, 0x84) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r9, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r9, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) accept$ax25(r9, &(0x7f0000000280)={{}, [@bcast, @bcast, @netrom, @remote, @remote, @null, @netrom, @default]}, &(0x7f0000000300)=0x48) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r7, 0x84, 0x18, &(0x7f00000000c0)={r10}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f00000001c0)={r10, 0x7, 0x20}, &(0x7f0000000200)=0xc) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000240)={0xc, 0x4, 0x4, 0x100000000, r11}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0xf) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) r12 = openat(r0, &(0x7f0000000000)='./file0\x00', 0x10002, 0x180) ioctl$KVM_SET_MP_STATE(r12, 0x4004ae99, &(0x7f0000000040)=0x6) socket$alg(0x26, 0x5, 0x0) 21:59:32 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x23d, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:32 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x4000, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x0, 0x0, [0x98e, 0x1, 0x3, 0x8]}) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) preadv(r2, &(0x7f0000001480)=[{&(0x7f0000000100)=""/77, 0x4d}], 0x1, 0x0) ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x8004552d, &(0x7f0000000000)) [ 682.807234][T24057] device nr0 entered promiscuous mode 21:59:32 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x23e, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:32 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x23f, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:32 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0xfc00, 'c\x86\xdd'}]}, 0xfdef) 21:59:32 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) preadv(r0, &(0x7f0000002680)=[{&(0x7f0000000180)=""/4096}, {&(0x7f0000000040)=""/117}, {&(0x7f0000003740)=""/239}, {&(0x7f0000001280)=""/253}, {&(0x7f0000002740)=""/4096}, {&(0x7f0000001380)=""/231}, {&(0x7f00000024c0)=""/12}, {&(0x7f0000002500)=""/132}, {&(0x7f00000025c0)=""/74}, {&(0x7f0000002640)=""/15, 0x2e9}], 0x10000000000000c8, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x1f) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000100)) [ 683.321585][T24092] device nr0 entered promiscuous mode 21:59:34 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x14c}}, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) umount2(&(0x7f0000000500)='./file0\x00', 0x4) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r2, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000300)=0xe8) sendmsg$nl_route_sched(r1, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x5200000}, 0xc, &(0x7f0000000480)={&(0x7f0000000540)=ANY=[@ANYBLOB="140100002800200026bd7000fcdbdf2500000000", @ANYRES32=r3, @ANYBLOB="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"], 0x114}, 0x1, 0x0, 0x0, 0x5085}, 0xc000) 21:59:34 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x240, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:34 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) r4 = gettid() tkill(r4, 0x1004000000013) get_robust_list(r4, &(0x7f00000001c0)=&(0x7f0000000140)={&(0x7f0000000100)={&(0x7f00000000c0)}}, &(0x7f0000000200)=0x18) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r6 = creat(&(0x7f0000000040)='./file0\x00', 0x30a) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000080)={@dev={0xfe, 0x80, [], 0x17}, 0xfffffffffffffffa, 0x0, 0xff, 0x78aeb257e2e20691, 0xfffffffffffffff7, 0xffffffffffffe32d}, 0x20) prctl$PR_SVE_SET_VL(0x32, 0x554f) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) 21:59:34 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001ac0)='/dev/btrfs-control\x00', 0x6a8044, 0x0) ioctl$SIOCX25SSUBSCRIP(r0, 0x89e1, &(0x7f0000001b00)={'nr0\x00', 0x7fffffff, 0x100000000}) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000080), 0x2) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r2, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) listen(r2, 0x0) close(r2) preadv(r1, &(0x7f0000000040)=[{&(0x7f0000000100)=""/77, 0x4d}], 0x35, 0x0) 21:59:34 executing program 4: write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x200a01, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000, 0x0) setxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.ima\x00', 0x0, 0x0, 0x2) close(0xffffffffffffffff) write$FUSE_LK(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r2, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x9) set_mempolicy(0x8003, &(0x7f0000000080)=0x5, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x40, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r4, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x4, 0x7, 0x4, 0x5971065a0e982ec1, {r5, r6/1000+10000}, {0x4, 0xc, 0x6, 0x4, 0x0, 0x2, "a4efe99e"}, 0x6, 0x3, @fd=r2, 0x4}) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0xd) r7 = socket$inet6_sctp(0xa, 0x1, 0x84) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r9, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r9, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) accept$ax25(r9, &(0x7f0000000280)={{}, [@bcast, @bcast, @netrom, @remote, @remote, @null, @netrom, @default]}, &(0x7f0000000300)=0x48) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r7, 0x84, 0x18, &(0x7f00000000c0)={r10}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f00000001c0)={r10, 0x7, 0x20}, &(0x7f0000000200)=0xc) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000240)={0xc, 0x4, 0x4, 0x100000000, r11}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0xf) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) r12 = openat(r0, &(0x7f0000000000)='./file0\x00', 0x10002, 0x180) ioctl$KVM_SET_MP_STATE(r12, 0x4004ae99, &(0x7f0000000040)=0x6) 21:59:34 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0xfd69, 'c\x86\xdd'}]}, 0xfdef) [ 685.336633][T24108] device nr0 entered promiscuous mode 21:59:35 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x241, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:35 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) openat$cgroup_ro(r1, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001480)=[{&(0x7f0000000100)=""/77, 0x4d}], 0x1, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x7, 0x1) sendmsg$rds(r2, &(0x7f0000000a80)={&(0x7f00000001c0)={0x2, 0x4e21, @broadcast}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000200)=""/128, 0x80}, {&(0x7f0000000280)=""/26, 0x1a}, {&(0x7f00000002c0)=""/122, 0x7a}, {&(0x7f0000000340)=""/48, 0x30}, {&(0x7f0000000380)=""/64, 0x40}, {&(0x7f00000003c0)=""/171, 0xab}], 0x6, &(0x7f0000000900)=[@rdma_args={0x48, 0x114, 0x1, {{0xfffffffeffffffff, 0x1f4}, {&(0x7f0000000500)=""/92, 0x5c}, &(0x7f0000000740)=[{&(0x7f0000000580)=""/78, 0x4e}, {&(0x7f0000000600)=""/33, 0x21}, {&(0x7f0000000640)=""/120, 0x78}, {&(0x7f00000006c0)=""/122, 0x7a}], 0x4, 0x4, 0x1ff}}, @mask_fadd={0x58, 0x114, 0x8, {{0x5961, 0x3}, &(0x7f0000000780)=0x9, &(0x7f00000007c0)=0x6ce, 0x80000000, 0x4, 0xff, 0x3, 0x4, 0xe3b}}, @fadd={0x58, 0x114, 0x6, {{0x7f, 0x2}, &(0x7f0000000800)=0x7, &(0x7f0000000840)=0x1, 0x10001, 0x1, 0x3, 0x60, 0x8, 0x2}}, @zcopy_cookie={0x18, 0x114, 0xc, 0xffffffffffffffff}, @mask_cswp={0x58, 0x114, 0x9, {{0x9, 0x100}, &(0x7f0000000880)=0x1, &(0x7f00000008c0)=0x40a, 0x5, 0x2, 0x4, 0x4, 0x4, 0x1000}}, @rdma_dest={0x18, 0x114, 0x2, {0x1, 0xffff}}], 0x180, 0x4}, 0x4000000) 21:59:35 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x242, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:35 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x243, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:35 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0xfe80, 'c\x86\xdd'}]}, 0xfdef) 21:59:35 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x244, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 685.867380][T24136] device nr0 entered promiscuous mode [ 686.079723][T24136] device nr0 entered promiscuous mode 21:59:35 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001ac0)='/dev/btrfs-control\x00', 0x6a8044, 0x0) ioctl$SIOCX25SSUBSCRIP(r0, 0x89e1, &(0x7f0000001b00)={'nr0\x00', 0x7fffffff, 0x100000000}) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000080), 0x2) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r2, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) listen(r2, 0x0) close(r2) preadv(r1, &(0x7f0000000040)=[{&(0x7f0000000100)=""/77, 0x4d}], 0x35, 0x0) 21:59:35 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x245, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:37 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet6(0xa, 0x3, 0x3c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x0) splice(r0, 0x0, r1, 0x0, 0x4, 0x0) 21:59:37 executing program 4: write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x200a01, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000, 0x0) setxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.ima\x00', 0x0, 0x0, 0x2) close(0xffffffffffffffff) write$FUSE_LK(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r2, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x9) set_mempolicy(0x8003, &(0x7f0000000080)=0x5, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x40, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r4, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x4, 0x7, 0x4, 0x5971065a0e982ec1, {r5, r6/1000+10000}, {0x4, 0xc, 0x6, 0x4, 0x0, 0x2, "a4efe99e"}, 0x6, 0x3, @fd=r2, 0x4}) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0xd) r7 = socket$inet6_sctp(0xa, 0x1, 0x84) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r9, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r9, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) accept$ax25(r9, &(0x7f0000000280)={{}, [@bcast, @bcast, @netrom, @remote, @remote, @null, @netrom, @default]}, &(0x7f0000000300)=0x48) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r7, 0x84, 0x18, &(0x7f00000000c0)={r10}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f00000001c0)={r10, 0x7, 0x20}, &(0x7f0000000200)=0xc) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000240)={0xc, 0x4, 0x4, 0x100000000, r11}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0xf) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) openat(r0, &(0x7f0000000000)='./file0\x00', 0x10002, 0x180) 21:59:37 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x246, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:37 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001ac0)='/dev/btrfs-control\x00', 0x6a8044, 0x0) ioctl$SIOCX25SSUBSCRIP(r0, 0x89e1, &(0x7f0000001b00)={'nr0\x00', 0x7fffffff, 0x100000000}) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000080), 0x2) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r2, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) listen(r2, 0x0) close(r2) preadv(r1, &(0x7f0000000040)=[{&(0x7f0000000100)=""/77, 0x4d}], 0x35, 0x0) 21:59:37 executing program 3: openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) 21:59:37 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0xfec0, 'c\x86\xdd'}]}, 0xfdef) 21:59:38 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001ac0)='/dev/btrfs-control\x00', 0x6a8044, 0x0) ioctl$SIOCX25SSUBSCRIP(r0, 0x89e1, &(0x7f0000001b00)={'nr0\x00', 0x7fffffff, 0x100000000}) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000080), 0x2) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r2, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) listen(r2, 0x0) close(r2) preadv(r1, &(0x7f0000000040)=[{&(0x7f0000000100)=""/77, 0x4d}], 0x35, 0x0) [ 688.379500][T24161] device nr0 entered promiscuous mode 21:59:38 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x247, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:38 executing program 3: openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) preadv(r1, &(0x7f0000001480), 0x1, 0x100000000000006) 21:59:38 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001ac0)='/dev/btrfs-control\x00', 0x6a8044, 0x0) ioctl$SIOCX25SSUBSCRIP(r0, 0x89e1, &(0x7f0000001b00)={'nr0\x00', 0x7fffffff, 0x100000000}) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000080), 0x2) openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) listen(r1, 0x0) close(r1) 21:59:38 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x248, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:38 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001ac0)='/dev/btrfs-control\x00', 0x6a8044, 0x0) ioctl$SIOCX25SSUBSCRIP(r0, 0x89e1, &(0x7f0000001b00)={'nr0\x00', 0x7fffffff, 0x100000000}) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000080), 0x2) openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) close(r1) [ 689.004466][T24161] device nr0 entered promiscuous mode 21:59:38 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x2a0000, 0x0) r6 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0xac, 0x200) r7 = syz_genetlink_get_family_id$fou(&(0x7f0000000240)='fou\x00') sendmsg$FOU_CMD_GET(r6, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1a04008}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x64, r7, 0x800, 0x70bd2c, 0x25dfdbfe, {}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @remote}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e23}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x1ba}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @loopback}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @rand_addr="006baf3128afc883d7e2326f51ff15aa"}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}]}, 0x64}}, 0x40) ioctl$VIDIOC_SUBSCRIBE_EVENT(r5, 0x4020565a, &(0x7f0000000080)={0x5366d799faf51ba4, 0x6, 0x1}) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) 21:59:38 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) io_setup(0x6, &(0x7f0000000140)=0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) io_submit(r1, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000007, 0x0, r0, 0x0, 0x12f}]) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x400600, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000180)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f00000001c0)=0x10) r3 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) preadv(r3, &(0x7f0000001480)=[{&(0x7f0000000100)=""/77, 0x4d}], 0x1, 0x0) 21:59:38 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x249, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:38 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001ac0)='/dev/btrfs-control\x00', 0x6a8044, 0x0) ioctl$SIOCX25SSUBSCRIP(r0, 0x89e1, &(0x7f0000001b00)={'nr0\x00', 0x7fffffff, 0x100000000}) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000080), 0x2) openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) close(r1) 21:59:38 executing program 4: write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x200a01, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000, 0x0) setxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.ima\x00', 0x0, 0x0, 0x2) close(0xffffffffffffffff) write$FUSE_LK(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x9) set_mempolicy(0x8003, &(0x7f0000000080)=0x5, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x40, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x4, 0x7, 0x4, 0x5971065a0e982ec1, {r4, r5/1000+10000}, {0x4, 0xc, 0x6, 0x4, 0x0, 0x2, "a4efe99e"}, 0x6, 0x3, @fd=r1, 0x4}) vmsplice(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0xd) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r8, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r8, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) accept$ax25(r8, &(0x7f0000000280)={{}, [@bcast, @bcast, @netrom, @remote, @remote, @null, @netrom, @default]}, &(0x7f0000000300)=0x48) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r6, 0x84, 0x18, &(0x7f00000000c0)={r9}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f00000001c0)={r9, 0x7, 0x20}, &(0x7f0000000200)=0xc) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000240)={0xc, 0x4, 0x4, 0x100000000, r10}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0xf) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 21:59:38 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0xff00, 'c\x86\xdd'}]}, 0xfdef) 21:59:39 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001ac0)='/dev/btrfs-control\x00', 0x6a8044, 0x0) ioctl$SIOCX25SSUBSCRIP(r0, 0x89e1, &(0x7f0000001b00)={'nr0\x00', 0x7fffffff, 0x100000000}) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000080), 0x2) openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) close(r1) 21:59:39 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x24a, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 689.430758][T24210] device nr0 entered promiscuous mode 21:59:39 executing program 3: r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec\xd1w', 0x0, 0x2) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) preadv(r1, &(0x7f0000001480)=[{&(0x7f0000000100)=""/77, 0x4d}], 0x1, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) vmsplice(r3, &(0x7f0000000880)=[{&(0x7f0000000480)="d6d410e44acc46d95f895d84e40032f25c066529b9cf90b2321584c3ce1bbb3bab78cd4605b6abec1579b5fb9c1f46b55ac95d9fec73df363c73f41c946d47615f03fbd442c202d6f594f5d25d6b40bdcf4ead064ef69b88f4fa418f5ea0f794fa4c08e28aabdde63b09becf1f29e6fb7949e4aa0b82420b238ba52cca063c27bda5d505a8e7acefe46a044c5dbdbdcc3b50039228bed1e029a3dd8fdac4261da7bcb833a1d72a5d61ee", 0xaa}, {&(0x7f0000000540)="e326def8ce4e74f4d37f81671a0a90bae095d897aeab2c9e791c343c9e", 0x1d}, {&(0x7f0000000580)="73525a17", 0x4}, {&(0x7f00000005c0)="87d6ca8951ecd6134098a9457b875e37ce9960d172360be757f21b44e34ecd1779a846035486d7ed4fcb9b52e1fb084535abbc715fe828e9ca7169bc00a0f836f0f8ca17347f87c2ef73e3", 0x4b}, {&(0x7f0000000640)="64489f8bff34aba3a89a650861598c15828593177379ebaa9afc540a51d78b95bf1c639b53e596fc9d1940540a4e6c6aced2f0919065440f1a32985c5c52f016dd72e382846518cd3aa3c69a575404c4e3139a026aed1cc036ac3f031ee86b091638a20c17bd809fcf9907ac8ddac1c2", 0x70}, {&(0x7f00000006c0)="6f5b347e6883b6f588ff367272200eb4cd5f9e69ad1a1963c7355a2a06e23e7a0707694dc2da7e3a47bb896471666270fe41c996a009c152b90fc71c767ecba9864125389bf3d835de35da1a334601be3aebbe25ba3b475479d66bb7bc17078f519b5b80ae90da5d929de76679a98711ec5a492005", 0x75}, {&(0x7f0000000740)="cd3b4101b21e65d6284535a228df6674b504c14b90b31895693e1466459816036f67ed41a969526bcff0c7c55d9caee4ec1049494898fc3858c5388773e0eaf65d8b39e6351960787d603f16504b97998e", 0x51}, {&(0x7f00000007c0)="7c4f199e366af0eea194fe33cb4fb858564097427335b67a9d9008be81d503ccd10b", 0x22}, {&(0x7f0000000800)="ef7f66d1bcd3cc85b978b1c9a802ac8242533074bc63064e0decdebc962835784650c8733ae1213645cf851f786f054f555399ab3d79ba5a5b2fa733e96dea57ee43730c91f9", 0x46}], 0x9, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000003c0)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000000440)={0x5, 0x10, 0xfa00, {&(0x7f00000001c0), r4, 0x1}}, 0x18) r5 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x5, 0x4800) ioctl$FIGETBSZ(r5, 0x2, &(0x7f0000000180)) connect$caif(r2, &(0x7f0000000940)=@rfm={0x25, 0x3, "5675258f3de85095f3aa702b1ec56fbf"}, 0x18) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$sock_SIOCBRDELBR(r6, 0x89a1, &(0x7f0000000980)='tunl0\x00') 21:59:39 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001ac0)='/dev/btrfs-control\x00', 0x6a8044, 0x0) ioctl$SIOCX25SSUBSCRIP(r0, 0x89e1, &(0x7f0000001b00)={'nr0\x00', 0x7fffffff, 0x100000000}) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000080), 0x2) openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) close(r1) 21:59:39 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x24b, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:39 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001ac0)='/dev/btrfs-control\x00', 0x6a8044, 0x0) ioctl$SIOCX25SSUBSCRIP(r0, 0x89e1, &(0x7f0000001b00)={'nr0\x00', 0x7fffffff, 0x100000000}) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000080), 0x2) openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) close(0xffffffffffffffff) 21:59:39 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f0000000600)={"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"}) write$binfmt_misc(r1, &(0x7f0000000a00)={'syz0', "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"}, 0x1004) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @local, 0x5}, 0xffffffffffffffbe) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/attr/exec\x00', 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) r5 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000500)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000040)={r5, r5, r6}, &(0x7f0000000280)=""/243, 0x20e, &(0x7f0000000240)={&(0x7f0000000080)={'crct10dif-generic\x00'}, 0x0, 0x2}) keyctl$get_security(0x11, r6, &(0x7f0000000040)=""/10, 0xa) 21:59:39 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x24c, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:39 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) preadv(r0, &(0x7f0000001480), 0x0, 0x0) 21:59:39 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001ac0)='/dev/btrfs-control\x00', 0x6a8044, 0x0) ioctl$SIOCX25SSUBSCRIP(r0, 0x89e1, &(0x7f0000001b00)={'nr0\x00', 0x7fffffff, 0x100000000}) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000080), 0x2) openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) close(0xffffffffffffffff) 21:59:39 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x1000000, 'c\x86\xdd'}]}, 0xfdef) 21:59:39 executing program 4: write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x200a01, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000, 0x0) setxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.ima\x00', 0x0, 0x0, 0x2) close(0xffffffffffffffff) write$FUSE_LK(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x9) set_mempolicy(0x8003, &(0x7f0000000080)=0x5, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x40, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x4, 0x7, 0x4, 0x5971065a0e982ec1, {r4, r5/1000+10000}, {0x4, 0xc, 0x6, 0x4, 0x0, 0x2, "a4efe99e"}, 0x6, 0x3, @fd=r1, 0x4}) vmsplice(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0xd) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r8, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r8, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) accept$ax25(r8, &(0x7f0000000280)={{}, [@bcast, @bcast, @netrom, @remote, @remote, @null, @netrom, @default]}, &(0x7f0000000300)=0x48) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r6, 0x84, 0x18, &(0x7f00000000c0)={r9}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f00000001c0)={r9, 0x7, 0x20}, &(0x7f0000000200)=0xc) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000240)={0xc, 0x4, 0x4, 0x100000000, r10}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 21:59:39 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001ac0)='/dev/btrfs-control\x00', 0x6a8044, 0x0) ioctl$SIOCX25SSUBSCRIP(r0, 0x89e1, &(0x7f0000001b00)={'nr0\x00', 0x7fffffff, 0x100000000}) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000080), 0x2) openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) close(0xffffffffffffffff) [ 690.281540][T24247] device nr0 entered promiscuous mode 21:59:39 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) preadv(r0, &(0x7f0000001480)=[{&(0x7f0000000100)=""/77, 0x4d}], 0x1, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x4, 0x10}, 0xc) 21:59:40 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x24d, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:40 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001ac0)='/dev/btrfs-control\x00', 0x6a8044, 0x0) ioctl$SIOCX25SSUBSCRIP(r0, 0x89e1, &(0x7f0000001b00)={'nr0\x00', 0x7fffffff, 0x100000000}) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000080), 0x2) openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) close(r1) 21:59:40 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x24e, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:40 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001ac0)='/dev/btrfs-control\x00', 0x6a8044, 0x0) ioctl$SIOCX25SSUBSCRIP(r0, 0x89e1, &(0x7f0000001b00)={'nr0\x00', 0x7fffffff, 0x100000000}) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000080), 0x2) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) close(r1) [ 690.675601][T24247] device nr0 entered promiscuous mode 21:59:40 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r6, 0x4048ae9b, &(0x7f00000002c0)={0xe0003}) ioctl$KVM_SET_MSRS(r6, 0x8090ae81, &(0x7f0000000000)) ioctl$KVM_GET_MSRS(r6, 0xc008ae88, &(0x7f0000000040)) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/attr/exec\x00', 0x2, 0x0) 21:59:40 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x24f, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:40 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001ac0)='/dev/btrfs-control\x00', 0x6a8044, 0x0) ioctl$SIOCX25SSUBSCRIP(r0, 0x89e1, &(0x7f0000001b00)={'nr0\x00', 0x7fffffff, 0x100000000}) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) close(r1) 21:59:40 executing program 4: write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x200a01, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000, 0x0) setxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.ima\x00', 0x0, 0x0, 0x2) close(0xffffffffffffffff) write$FUSE_LK(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x9) set_mempolicy(0x8003, &(0x7f0000000080)=0x5, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x40, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x4, 0x7, 0x4, 0x5971065a0e982ec1, {r4, r5/1000+10000}, {0x4, 0xc, 0x6, 0x4, 0x0, 0x2, "a4efe99e"}, 0x6, 0x3, @fd=r1, 0x4}) vmsplice(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0xd) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r8, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r8, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) accept$ax25(r8, &(0x7f0000000280)={{}, [@bcast, @bcast, @netrom, @remote, @remote, @null, @netrom, @default]}, &(0x7f0000000300)=0x48) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r6, 0x84, 0x18, &(0x7f00000000c0)={r9}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f00000001c0)={r9, 0x7, 0x20}, &(0x7f0000000200)=0xc) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000240)={0xc, 0x4, 0x4, 0x100000000, r10}, 0x10) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 21:59:40 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x2000000, 'c\x86\xdd'}]}, 0xfdef) 21:59:40 executing program 2: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001ac0)='/dev/btrfs-control\x00', 0x6a8044, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) close(r0) 21:59:40 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x250, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 691.304112][T24294] device nr0 entered promiscuous mode 21:59:41 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) close(r0) 21:59:41 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, &(0x7f0000000280)=0x2, 0x4) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$tipc(0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r3, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) getsockopt$inet6_int(r3, 0x29, 0x46, &(0x7f0000000200), &(0x7f0000000240)=0x4) sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r2, 0x100, 0x70bd2b, 0x25dfdbfc, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x8}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x30, r2, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, 0x0, 0x4101, 0x0, {0x14, 0x17, {0x0, 0x400000000000, @l2={'ib', 0x3a, 'nr0\x00'}}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x20004000) r4 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) preadv(r4, &(0x7f0000001480)=[{&(0x7f0000000100)=""/77, 0x4d}], 0x1, 0x0) 21:59:41 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x251, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:41 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) close(r0) 21:59:41 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) close(r0) [ 691.745638][T24294] device nr0 entered promiscuous mode 21:59:41 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x252, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:41 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) close(r0) 21:59:41 executing program 4: write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x200a01, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000, 0x0) setxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.ima\x00', 0x0, 0x0, 0x2) close(0xffffffffffffffff) write$FUSE_LK(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x9) set_mempolicy(0x8003, &(0x7f0000000080)=0x5, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x40, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x4, 0x7, 0x4, 0x5971065a0e982ec1, {r4, r5/1000+10000}, {0x4, 0xc, 0x6, 0x4, 0x0, 0x2, "a4efe99e"}, 0x6, 0x3, @fd=r1, 0x4}) vmsplice(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0xd) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r8, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r8, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) accept$ax25(r8, &(0x7f0000000280)={{}, [@bcast, @bcast, @netrom, @remote, @remote, @null, @netrom, @default]}, &(0x7f0000000300)=0x48) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r6, 0x84, 0x18, &(0x7f00000000c0)={r9}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f00000001c0)={r9, 0x7, 0x20}, &(0x7f0000000200)=0xc) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000240)={0xc, 0x4, 0x4, 0x100000000, r10}, 0x10) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 21:59:41 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r5, 0x4048ae9b, &(0x7f00000002c0)={0xe0003}) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r8, 0x4048ae9b, &(0x7f00000002c0)={0xe0003}) ioctl$KVM_SET_MSRS(r8, 0x8090ae81, &(0x7f0000000000)) r9 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r9, 0xae01, 0x0) ioctl$KVM_SET_MSRS(r0, 0x8090ae81, &(0x7f0000000140)=ANY=[@ANYRESOCT=0x0, @ANYPTR=&(0x7f0000000380)=ANY=[@ANYRESHEX=r8, @ANYBLOB="b44c0456ec6613847e10dd9639fb921a567831ae15cdb869e3182a321297979710274cb8b80ca0e77d21bbcbc1376a5fcdfbb1d323cb815c6e378da6ba30972c251bfba52d4d4c88443f2ed4df8eda4cbb06363330371d31212979b37f87f9b87b1b7c6c99f7d42c360cea81e662a0dd80d2f1ee05bf500dce352626cc7ae9605fe4954e941ee43aa85f7aed836fc6439cf2155a08ea930b8f1cdae69989b4cde14a4ff2025e980bcf61e35d5dc58d6f6facfa15b5d98ca80d76632ca4f01ba89c5e9b3195e139d2", @ANYRES32=r9]]) r10 = gettid() tkill(r10, 0x1004000000013) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r10, r0, 0x0, 0x11, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0xffffffffffffffff}, 0x30) fcntl$setown(r5, 0x8, r11) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) close(r2) r12 = socket$inet6(0xa, 0x3, 0x3c) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000080)={0xf8}, 0x4) r13 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r13, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r12, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) 21:59:41 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x3000000, 'c\x86\xdd'}]}, 0xfdef) 21:59:41 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) close(r0) 21:59:41 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x253, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:41 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) close(r0) 21:59:41 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) preadv(r0, &(0x7f0000001480)=[{&(0x7f0000000100)=""/77, 0x4d}], 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x22000, 0x0) 21:59:42 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x254, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 692.494103][T24345] device nr0 entered promiscuous mode 21:59:42 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) close(r0) 21:59:42 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, 0x0, 0x0) close(r0) 21:59:42 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x255, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:42 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, 0x0, 0x0) close(r0) 21:59:42 executing program 4: write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x200a01, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000, 0x0) setxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.ima\x00', 0x0, 0x0, 0x2) close(0xffffffffffffffff) write$FUSE_LK(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x9) set_mempolicy(0x8003, &(0x7f0000000080)=0x5, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x40, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x4, 0x7, 0x4, 0x5971065a0e982ec1, {r4, r5/1000+10000}, {0x4, 0xc, 0x6, 0x4, 0x0, 0x2, "a4efe99e"}, 0x6, 0x3, @fd=r1, 0x4}) vmsplice(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0xd) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r8, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r8, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) accept$ax25(r8, &(0x7f0000000280)={{}, [@bcast, @bcast, @netrom, @remote, @remote, @null, @netrom, @default]}, &(0x7f0000000300)=0x48) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r6, 0x84, 0x18, &(0x7f00000000c0)={r9}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f00000001c0)={r9, 0x7, 0x20}, &(0x7f0000000200)=0xc) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000240)={0xc, 0x4, 0x4, 0x100000000, r10}, 0x10) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) [ 693.151726][T24345] device nr0 entered promiscuous mode 21:59:44 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) bind$pptp(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x1e) 21:59:44 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x256, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:44 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x4000000, 'c\x86\xdd'}]}, 0xfdef) 21:59:44 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, 0x0, 0x0) close(r0) 21:59:44 executing program 4: write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x200a01, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000, 0x0) setxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.ima\x00', 0x0, 0x0, 0x2) close(0xffffffffffffffff) write$FUSE_LK(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x9) set_mempolicy(0x8003, &(0x7f0000000080)=0x5, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x40, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x4, 0x7, 0x4, 0x5971065a0e982ec1, {r3, r4/1000+10000}, {0x4, 0xc, 0x6, 0x4, 0x0, 0x2, "a4efe99e"}, 0x6, 0x3, @fd=r1, 0x4}) vmsplice(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0xd) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r7, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r7, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) accept$ax25(r7, &(0x7f0000000280)={{}, [@bcast, @bcast, @netrom, @remote, @remote, @null, @netrom, @default]}, &(0x7f0000000300)=0x48) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r5, 0x84, 0x18, &(0x7f00000000c0)={r8}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f00000001c0)={r8, 0x7, 0x20}, &(0x7f0000000200)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 21:59:44 executing program 3: openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) write$FUSE_IOCTL(r0, &(0x7f0000000100)={0x20, 0xffffffffffffffda, 0x2, {0x7fff, 0x4, 0x1f, 0x6}}, 0x20) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r0, 0x111, 0x2, 0x1, 0x4) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r0, 0x111, 0x2, 0x1, 0x4) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r2, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000500)={{&(0x7f0000fff000/0x1000)=nil, 0x1000}, 0x1}) accept$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) r3 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, r3) pkey_mprotect(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x3000002, r3) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000440), 0x4) preadv(r1, &(0x7f00000003c0)=[{&(0x7f0000000180)=""/140, 0x8c}, {&(0x7f0000000040)=""/110, 0x6e}, {&(0x7f0000000240)=""/152, 0x98}, {&(0x7f0000000300)=""/176, 0xffffffffffffffda}], 0x4, 0x0) accept$ax25(0xffffffffffffffff, &(0x7f0000000480)={{0x3, @rose}, [@bcast, @default, @netrom, @null, @null, @default, @netrom, @null]}, &(0x7f0000000540)=0xfffffffffffffea5) 21:59:44 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300"}, 0x60) close(r0) [ 695.260169][T24384] device nr0 entered promiscuous mode 21:59:44 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x257, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:45 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300"}, 0x60) close(r0) 21:59:45 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x258, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:45 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300"}, 0x60) close(r0) 21:59:45 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) close(0xffffffffffffffff) 21:59:45 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) close(0xffffffffffffffff) 21:59:45 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x259, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:45 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x5000000, 'c\x86\xdd'}]}, 0xfdef) 21:59:45 executing program 4: write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x200a01, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000, 0x0) setxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.ima\x00', 0x0, 0x0, 0x2) close(0xffffffffffffffff) write$FUSE_LK(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x9) set_mempolicy(0x8003, &(0x7f0000000080)=0x5, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x40, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x4, 0x7, 0x4, 0x5971065a0e982ec1, {r3, r4/1000+10000}, {0x4, 0xc, 0x6, 0x4, 0x0, 0x2, "a4efe99e"}, 0x6, 0x3, @fd=r1, 0x4}) vmsplice(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0xd) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r7, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r7, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) accept$ax25(r7, &(0x7f0000000280)={{}, [@bcast, @bcast, @netrom, @remote, @remote, @null, @netrom, @default]}, &(0x7f0000000300)=0x48) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r5, 0x84, 0x18, &(0x7f00000000c0)={r8}, &(0x7f0000000100)=0x14) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 21:59:45 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$int_in(r5, 0x5452, &(0x7f0000000140)=0x1) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x8, 0x40) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r6, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) ioctl$PPPIOCSFLAGS1(r6, 0x40047459, &(0x7f00000001c0)=0x4010) vmsplice(r6, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r7, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r7, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$DRM_IOCTL_RES_CTX(r7, 0xc0106426, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{}, {}]}) 21:59:45 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) preadv(r0, &(0x7f0000001240)=[{&(0x7f0000000000)=""/181, 0xb5}, {&(0x7f0000000180)=""/173, 0xad}, {&(0x7f0000000240)=""/4096, 0x1000}], 0x3, 0x0) [ 696.193526][T24425] device nr0 entered promiscuous mode 21:59:45 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) close(0xffffffffffffffff) 21:59:45 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x25a, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:46 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/223, 0xdf}, {&(0x7f0000001340)=""/178, 0xb2}, {&(0x7f0000000140)=""/36, 0x24}], 0x4, 0xffffffffffffffff) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) write$vnet(r1, &(0x7f00000001c0)={0x1, {&(0x7f0000000000)=""/35, 0x23, &(0x7f0000000100), 0x1}}, 0x68) 21:59:46 executing program 2: write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x200a01, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000, 0x0) setxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.ima\x00', 0x0, 0x0, 0x2) close(0xffffffffffffffff) write$FUSE_LK(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x9) set_mempolicy(0x8003, &(0x7f0000000080)=0x5, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x40, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x4, 0x7, 0x4, 0x5971065a0e982ec1, {r4, r5/1000+10000}, {0x4, 0xc, 0x6, 0x4, 0x0, 0x2, "a4efe99e"}, 0x6, 0x3, @fd=r1, 0x4}) vmsplice(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0xd) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r8, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r8, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) accept$ax25(r8, &(0x7f0000000280)={{}, [@bcast, @bcast, @netrom, @remote, @remote, @null, @netrom, @default]}, &(0x7f0000000300)=0x48) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r6, 0x84, 0x18, &(0x7f00000000c0)={r9}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f00000001c0)={r9, 0x7, 0x20}, &(0x7f0000000200)=0xc) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000240)={0xc, 0x4, 0x4, 0x100000000, r10}, 0x10) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 21:59:46 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x25b, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:46 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x25c, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 696.773763][T24425] device nr0 entered promiscuous mode 21:59:46 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x25d, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:46 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r2, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000040), 0x4) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6(0xa, 0x3, 0x3c) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet_dccp(0x2, 0x6, 0x0) splice(r0, 0x0, r3, 0x0, 0x4, 0x0) 21:59:46 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x6000000, 'c\x86\xdd'}]}, 0xfdef) [ 697.234662][T24471] device nr0 entered promiscuous mode 21:59:46 executing program 4: write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x200a01, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000, 0x0) setxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.ima\x00', 0x0, 0x0, 0x2) close(0xffffffffffffffff) write$FUSE_LK(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x9) set_mempolicy(0x8003, &(0x7f0000000080)=0x5, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x40, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x4, 0x7, 0x4, 0x5971065a0e982ec1, {r3, r4/1000+10000}, {0x4, 0xc, 0x6, 0x4, 0x0, 0x2, "a4efe99e"}, 0x6, 0x3, @fd=r1, 0x4}) vmsplice(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0xd) socket$inet6_sctp(0xa, 0x1, 0x84) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r6, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r6, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) accept$ax25(r6, &(0x7f0000000280)={{}, [@bcast, @bcast, @netrom, @remote, @remote, @null, @netrom, @default]}, &(0x7f0000000300)=0x48) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 21:59:46 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x25e, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:46 executing program 2: write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x200a01, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000, 0x0) setxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.ima\x00', 0x0, 0x0, 0x2) close(0xffffffffffffffff) write$FUSE_LK(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x9) set_mempolicy(0x8003, &(0x7f0000000080)=0x5, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x40, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x4, 0x7, 0x4, 0x5971065a0e982ec1, {r4, r5/1000+10000}, {0x4, 0xc, 0x6, 0x4, 0x0, 0x2, "a4efe99e"}, 0x6, 0x3, @fd=r1, 0x4}) vmsplice(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0xd) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r8, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r8, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) accept$ax25(r8, &(0x7f0000000280)={{}, [@bcast, @bcast, @netrom, @remote, @remote, @null, @netrom, @default]}, &(0x7f0000000300)=0x48) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r6, 0x84, 0x18, &(0x7f00000000c0)={r9}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f00000001c0)={r9, 0x7, 0x20}, &(0x7f0000000200)=0xc) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000240)={0xc, 0x4, 0x4, 0x100000000, r10}, 0x10) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 21:59:47 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) preadv(r0, &(0x7f0000001480)=[{&(0x7f0000000100)=""/77, 0x4d}], 0x1, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x52e, 0x800) r2 = semget(0x3, 0x4, 0x400) semctl$GETPID(r2, 0x1, 0xb, &(0x7f0000000180)=""/233) ioctl$KVM_ASSIGN_SET_MSIX_NR(r1, 0x4008ae73, &(0x7f0000000040)={0x1f, 0x100000000}) 21:59:47 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x25f, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:47 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x17\xabx\xc8\x00', 0x2, 0x0) preadv(r0, &(0x7f0000001480), 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$VIDIOC_S_EDID(r1, 0xc0285629, &(0x7f0000000040)={0x0, 0xffffffffffff0001, 0x1, [], &(0x7f0000000000)=0x9}) 21:59:47 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x260, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 697.835164][T24471] device nr0 entered promiscuous mode 21:59:47 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x261, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:47 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet6(0xa, 0x3, 0x3c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r4, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r4, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x20000000000, 0x0, @mcast2}, 0x1c) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r7, 0x4048ae9b, &(0x7f00000002c0)={0xe0003}) ioctl$KVM_SET_MSRS(r7, 0x8090ae81, &(0x7f0000000000)) splice(r0, 0x0, r7, 0x0, 0x4, 0x0) 21:59:47 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x7000000, 'c\x86\xdd'}]}, 0xfdef) 21:59:47 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x262, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 698.236275][T24511] device nr0 entered promiscuous mode 21:59:47 executing program 2 (fault-call:2 fault-nth:0): r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) close(r0) 21:59:48 executing program 4: write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x200a01, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000, 0x0) setxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.ima\x00', 0x0, 0x0, 0x2) close(0xffffffffffffffff) write$FUSE_LK(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x9) set_mempolicy(0x8003, &(0x7f0000000080)=0x5, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x40, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x4, 0x7, 0x4, 0x5971065a0e982ec1, {r3, r4/1000+10000}, {0x4, 0xc, 0x6, 0x4, 0x0, 0x2, "a4efe99e"}, 0x6, 0x3, @fd=r1, 0x4}) vmsplice(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0xd) socket$inet6_sctp(0xa, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r5, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r5, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) accept$ax25(r5, &(0x7f0000000280)={{}, [@bcast, @bcast, @netrom, @remote, @remote, @null, @netrom, @default]}, &(0x7f0000000300)=0x48) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 21:59:48 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x263, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:48 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) close(r0) 21:59:48 executing program 3: openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f00000002c0)={0xe0003}) ioctl$KVM_SET_MSRS(r2, 0x8090ae81, &(0x7f0000000000)) preadv(r1, &(0x7f0000000140)=[{&(0x7f0000000180)=""/249, 0xf9}, {&(0x7f0000000280)=""/201, 0xc9}, {&(0x7f0000000000)=""/81, 0x51}, {&(0x7f0000000080)=""/30, 0x1e}], 0x4, 0xfffffffffffffffd) 21:59:48 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x264, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:48 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x1, 0x0, 0x0, 0x0, "8810e78754a503d39c2bd6a40f03c8aa024d00000000ffffffff7fff8e261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x27}, 0x60) close(r0) 21:59:48 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x265, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 698.901700][T24511] device nr0 entered promiscuous mode 21:59:48 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000100)=""/77, 0x7466b51db7c19b22}], 0x1, 0x0) 21:59:48 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x266, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:48 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x8000000, 'c\x86\xdd'}]}, 0xfdef) 21:59:48 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000bfffffffffff7f261e21ccf67e1d0000e565aa9a9d32c76205007a54cdad77b300", 0x2b}, 0x60) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) fstatfs(r1, &(0x7f0000000000)=""/143) close(r0) 21:59:48 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) epoll_create1(0x80000) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r5, &(0x7f00000009c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x28, r6, 0x1, 0x0, 0x0, {0x4}, [@TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}]}]}, 0x28}}, 0x0) sendmsg$TIPC_NL_LINK_SET(r0, &(0x7f00000008c0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x20000804}, 0xc, &(0x7f0000000880)={&(0x7f0000000840)={0x14, r6, 0x4, 0x70bd2b, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@initdev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@initdev}}, &(0x7f0000000740)=0xe8) sendmsg$kcm(r7, &(0x7f00000007c0)={&(0x7f0000000300)=@ll={0x11, 0xf7, r8, 0x1, 0x80000001, 0x6, @local}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000380)="feab9156de14fe6d90744ed173334f191758d24d421da661151672963a43cc896a2e18b37e7b5e8df6e55ed253950896c10c69f7fa3e10a48edc9ea1dfb8201bbf76add37b5bde6f27426d2124e8584e50fe5a3c6e52acfbceb1a62cba28082fcf38bb81a7d599f16ded3bab5fcb457ef5307a429e12d4ae923b9e00623b87965824283f7ad2053423badfd6d89aa9ef0e94a42dd4ebdff00f5077ad9fbd05ce188526a23b98036ec476ef8f1dbe51eb0df18e", 0xb3}, {&(0x7f0000000440)="ec20e501e9ba6e31ccd734e798ae2740f608bd320b705ddcdde018988d488bf8d2f1ea221f618d47a11d9008b5f0ed24b967ce4b79441696bd4ef65f664b1eecbff2f38cd98d08dd819a4963844f2c1a6985986a490fd2504f5933ac322526e10eb8bdde8653c4e51fd7", 0x6a}, {&(0x7f00000004c0)="6736a31e16096f09716593bb309642e52bc141835e5e4c1355d578a23b8e88b85107cb115f28ab03cea4978e28fd97b4ef336f53798c7d0a311f504940a4d67ef4d0a02884b1cf702f279033c3b29fc4453a50dd43c5a8ee07b0c1921b4917216d74ec57d8742c0f66d65930f5aa27f8d05c8113ee0ddc4a2371449407e70065f5275a4f659fef0427e73df5ed0ee78a2710789e388947aa4bb8347195fb141307fd3c1cf5e718ac049dc3c5c4", 0xad}, {&(0x7f0000000580)="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", 0xfe}], 0x4, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x53}, 0x20) write$binfmt_elf64(r7, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r7, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r7, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x204000000000000}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={r9, @in={{0x2, 0x4e21, @broadcast}}, 0xca, 0x2, 0x3, 0x3, 0x45}, 0x208) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r10 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r11 = ioctl$KVM_CREATE_VM(r10, 0xae01, 0x0) r12 = ioctl$KVM_CREATE_VCPU(r11, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r1, 0x4048ae9b, &(0x7f00000002c0)={0xe0003, 0x0, [0x2d8a, 0x0, 0x0, 0x0, 0x40000000000005]}) ioctl$KVM_SET_MSRS(r12, 0x8090ae81, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r12, 0x40286608, &(0x7f0000000900)={0x7, 0x5, 0x7, 0x0, 0x1000, 0x4}) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r13, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r13, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) setsockopt$CAIFSO_REQ_PARAM(r13, 0x116, 0x80, &(0x7f0000000700)="f9aeb92e4c65bbfb36390693c587d3445bc2505935e1df60438aae2659d7227ae9e94e2d11938d0ac96f87fb77b345f40a4c", 0x32) r14 = syz_open_dev$amidi(&(0x7f00000006c0)='/dev/amidi#\x00', 0x101, 0x20000) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r14, 0x3) 21:59:49 executing program 4: write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x200a01, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000, 0x0) setxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.ima\x00', 0x0, 0x0, 0x2) close(0xffffffffffffffff) write$FUSE_LK(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x9) set_mempolicy(0x8003, &(0x7f0000000080)=0x5, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x40, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x4, 0x7, 0x4, 0x5971065a0e982ec1, {r3, r4/1000+10000}, {0x4, 0xc, 0x6, 0x4, 0x0, 0x2, "a4efe99e"}, 0x6, 0x3, @fd=r1, 0x4}) vmsplice(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0xd) socket$inet6_sctp(0xa, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r5, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r5, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 21:59:49 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x267, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:49 executing program 3: openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) preadv(r2, &(0x7f0000000080), 0xcee9d940fedc793, 0x10000) [ 699.499616][T24563] device nr0 entered promiscuous mode 21:59:49 executing program 2: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000040)=[0x400, 0x49]) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000180)="fc78", 0x2}], 0x1, 0x0) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x2, 0x0, 0x7f, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffff020000007f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) close(r0) 21:59:49 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x268, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:49 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16=r2, @ANYBLOB="000812bd7000fedbdf2501000000"], 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x5) preadv(r0, &(0x7f0000001480)=[{&(0x7f0000000100)=""/77, 0x4d}], 0x1, 0x0) 21:59:49 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000080)='NET_DM\x00') r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r3, 0x4048ae9b, &(0x7f00000002c0)={0xe0003}) ioctl$KVM_SET_MSRS(r3, 0x8090ae81, &(0x7f0000000000)=ANY=[@ANYBLOB="810700ebff000000"]) close(r3) r4 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x100, 0x105400) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000180)={@in={{0x2, 0x4e20, @remote}}, 0x0, 0x800000000, 0x0, "da0ff5d83fd29558a0976102a500dba87322f87d6c5637424577185373331ffa5b0f6d45f1b74b4d021337ebef186ddd242fd0eff1c5d523fff7d1a217ee44c7f9643f86db198d988efe283d457a2d74"}, 0xd8) 21:59:49 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x269, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:49 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c700", 0x36}, 0xfffffffffffffee5) close(r0) [ 700.251630][T24563] device nr0 entered promiscuous mode 21:59:50 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x11000000, 'c\x86\xdd'}]}, 0xfdef) 21:59:50 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x26a, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:50 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000040)=ANY=[], 0xc2c0e8a) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) 21:59:50 executing program 4: write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x200a01, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000, 0x0) setxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.ima\x00', 0x0, 0x0, 0x2) close(0xffffffffffffffff) write$FUSE_LK(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x9) set_mempolicy(0x8003, &(0x7f0000000080)=0x5, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x40, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x4, 0x7, 0x4, 0x5971065a0e982ec1, {r3, r4/1000+10000}, {0x4, 0xc, 0x6, 0x4, 0x0, 0x2, "a4efe99e"}, 0x6, 0x3, @fd=r1, 0x4}) vmsplice(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0xd) socket$inet6_sctp(0xa, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r5, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 21:59:50 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7, 0x510c42) accept4$tipc(r0, &(0x7f0000000040), &(0x7f0000000080)=0x10, 0x800) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$VFIO_SET_IOMMU(r0, 0x3b66, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0x8000, 0x0) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000180)) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) fallocate(r1, 0x0, 0xe1, 0x3) close(r1) 21:59:50 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x26b, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:50 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0xffffffff, "8811e78354a503d39c00ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x19}, 0x60) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e24, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x9}, @in={0x2, 0x4e20, @local}, @in6={0xa, 0x4e22, 0xa1b, @remote, 0x6}, @in6={0xa, 0x4e24, 0x10000, @mcast1, 0x4}], 0x64) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r3, 0x4048ae9b, &(0x7f00000002c0)={0xe0003}) ioctl$KVM_SET_MSRS(r3, 0x8090ae81, &(0x7f0000000000)) ioctl$KVM_S390_INTERRUPT_CPU(r3, 0x4010ae94, &(0x7f0000000000)={0x0, 0x4, 0x8001}) [ 700.723042][T24617] device nr0 entered promiscuous mode 21:59:50 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000080)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) write$P9_RLERRORu(r2, &(0x7f0000000040)={0x2b, 0x7, 0x2, {{0x1e, 'selinux$posix_acl_accessnodev-'}, 0x10000}}, 0x2b) preadv(r1, &(0x7f0000000040), 0x0, 0x40000) 21:59:50 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x26c, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:50 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x26d, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:50 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r2, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) fcntl$getflags(r1, 0xb) bind$nfc_llcp(r2, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x4, 0x0, 0xffffffffffffffff, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r4, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r4, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) getsockopt$XDP_MMAP_OFFSETS(r4, 0x11b, 0x1, &(0x7f00000001c0), &(0x7f0000000240)=0x60) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r6, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r6, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$RTC_PIE_OFF(r6, 0x7006) write$binfmt_elf64(r5, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r5, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) r7 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x0, 0xda0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f00000001c0)={0x0}) ioctl$DRM_IOCTL_RM_CTX(r7, 0xc0086421, &(0x7f0000000280)={r8, 0x4}) ioctl$DRM_IOCTL_RM_CTX(r5, 0xc0086421, &(0x7f0000000280)={r8, 0x1}) vmsplice(r3, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) connect$llc(r3, &(0x7f0000000180)={0x1a, 0x30b, 0x80000001, 0x1, 0x8, 0x20, @broadcast}, 0x10) close(r0) 21:59:50 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x26e, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:51 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x21000000, 'c\x86\xdd'}]}, 0xfdef) 21:59:51 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mISDNtimer\x00', 0x8b9319dc702aa95f, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) 21:59:51 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x26f, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 701.581664][T24661] device nr0 entered promiscuous mode 21:59:51 executing program 4: write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x200a01, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000, 0x0) setxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.ima\x00', 0x0, 0x0, 0x2) close(0xffffffffffffffff) write$FUSE_LK(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x9) set_mempolicy(0x8003, &(0x7f0000000080)=0x5, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x40, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x4, 0x7, 0x4, 0x5971065a0e982ec1, {r3, r4/1000+10000}, {0x4, 0xc, 0x6, 0x4, 0x0, 0x2, "a4efe99e"}, 0x6, 0x3, @fd=r1, 0x4}) vmsplice(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0xd) socket$inet6_sctp(0xa, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) pipe(&(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 21:59:51 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x270, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:51 executing program 3: r0 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x6, 0xbc535c0adfcaa99e) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r3, 0x4048ae9b, &(0x7f00000002c0)={0xe0003}) ioctl$KVM_SET_MSRS(r3, 0x8090ae81, &(0x7f0000000000)) fcntl$getownex(r3, 0x10, &(0x7f00000002c0)={0x0, 0x0}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r6) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) sendmsg$unix(r0, &(0x7f00000003c0)={&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000000180)="db", 0x1}, {&(0x7f00000001c0)="c39bd1d1a5b20287c38f6850662b36bf1d7818bbe1bc52a5", 0x18}, {&(0x7f0000000200)="d86e01f21eba3366f67dc425a487721fce0b3be5104f27ef3cf89eb55dc6a59642d216cea2b7a5179e6a44be4b43d4e6ba48c46ae28610117d367edc5b6341fecc943723c49f0a64aef49bc299fb3d3e9a0043c2430dd5bf6e", 0x59}], 0x3, &(0x7f0000000380)=[@cred={{0x1c, 0x1, 0x2, {r4, r6, r7}}}], 0x20}, 0xe94c5c72f50a18e2) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) preadv(r8, &(0x7f0000001480)=[{&(0x7f0000000000)=""/77, 0x4d}], 0x1, 0x0) 21:59:51 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x271, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:51 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) preadv(r0, &(0x7f0000001480)=[{&(0x7f0000000100)=""/77, 0x4d}], 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x7, 0x100) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r2, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000040)=@assoc_value={0x0}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000180)={r3, 0x3, 0x100000000}, &(0x7f00000001c0)=0x8) [ 702.132329][T24661] device nr0 entered promiscuous mode 21:59:51 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x272, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:51 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x1, 0x0) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x1, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) close(r0) 21:59:51 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x273, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:52 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r5, &(0x7f00000009c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x28, r6, 0x1, 0x0, 0x0, {0x4}, [@TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}]}]}, 0x28}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x14}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x20, r6, 0x2, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x9}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x880}, 0x80000) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCGETLINKNAME(r1, 0x89e0, &(0x7f0000000100)={0x2}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) accept(r7, &(0x7f0000000040)=@isdn, &(0x7f00000000c0)=0x80) 21:59:52 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x29000000, 'c\x86\xdd'}]}, 0xfdef) 21:59:52 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) close(r0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x4000, 0x0) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r2, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r3, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r5, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r5, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$NBD_DO_IT(r5, 0xab03) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x18, &(0x7f00000000c0)={r7}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000180)={r7, 0xa8, "a6a29860fca269b854d47f056e7e8d571d2696cd33d5fa9b00f5dc43a5ab7778cd5a1e043474b61d1e5dc9437b3ea25225f3bf7895b9b66e976529f527954ada67c2baa8bef63a6302ff41341ca3de3adb25f5ef6eae035e3560a344bc56b7e9a8c4808af4675ba04e3693382a05396c7d121bc03be205c44177fb81f07574a2057b39abd0824093056b60cc3ca3b37ae76f028d2cd626202a878332fcfcddd30b504a3072706e34"}, &(0x7f0000000080)=0xb0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000000c0)={0x7bb, 0x4, 0x8000, 0x6, 0x9, 0x100000000, 0x8000, 0x1, r8}, &(0x7f0000000240)=0x20) 21:59:52 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x274, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:52 executing program 4: write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x200a01, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000, 0x0) setxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.ima\x00', 0x0, 0x0, 0x2) close(0xffffffffffffffff) write$FUSE_LK(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x9) set_mempolicy(0x8003, &(0x7f0000000080)=0x5, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x40, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x4, 0x7, 0x4, 0x5971065a0e982ec1, {r3, r4/1000+10000}, {0x4, 0xc, 0x6, 0x4, 0x0, 0x2, "a4efe99e"}, 0x6, 0x3, @fd=r1, 0x4}) vmsplice(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0xd) socket$inet6_sctp(0xa, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) [ 702.773092][T24714] device nr0 entered promiscuous mode 21:59:52 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x275, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:52 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001180)={r1, &(0x7f0000000180)="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", &(0x7f0000000000)="9200d788"}, 0x20) unlink(&(0x7f00000011c0)='./file0\x00') preadv(r0, &(0x7f0000001480)=[{&(0x7f0000000100)=""/77, 0x4d}], 0x1, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000001200)='/dev/vbi#\x00', 0x3, 0x2) r3 = gettid() tkill(r3, 0x1004000000013) r4 = getpgrp(r3) fcntl$setown(r2, 0x8, r4) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) 21:59:52 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x276, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 703.113033][T24714] device nr0 entered promiscuous mode 21:59:52 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r3, &(0x7f0000000180)={0xa, 0x4e21, 0x0, @rand_addr="81ecd7269c56069648aeb498f3428049", 0x5}, 0xfffffe13) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) 21:59:52 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x277, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:53 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x2b000000, 'c\x86\xdd'}]}, 0xfdef) 21:59:53 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x278, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:53 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r2) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) write$P9_RGETATTR(r0, &(0x7f0000000180)={0xa0, 0x19, 0x1, {0x42, {0xb9, 0x4, 0x7}, 0x10, r2, r3, 0x7, 0x9b1e, 0x40, 0x7fffffff, 0x4, 0x81, 0x9, 0x9, 0x3, 0x6, 0x1, 0x2, 0x4, 0x100, 0x3}}, 0xa0) r4 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r4, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) close(r4) [ 703.571856][T24741] device nr0 entered promiscuous mode 21:59:53 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x279, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:53 executing program 4: write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x200a01, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000, 0x0) setxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.ima\x00', 0x0, 0x0, 0x2) close(0xffffffffffffffff) write$FUSE_LK(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x9) set_mempolicy(0x8003, &(0x7f0000000080)=0x5, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x40, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x4, 0x7, 0x4, 0x5971065a0e982ec1, {r3, r4/1000+10000}, {0x4, 0xc, 0x6, 0x4, 0x0, 0x2, "a4efe99e"}, 0x6, 0x3, @fd=r1, 0x4}) vmsplice(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0xd) socket$inet6_sctp(0xa, 0x1, 0x84) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 21:59:53 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x27a, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 704.112892][T24741] device nr0 entered promiscuous mode 21:59:53 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x27b, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:53 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet6(0xa, 0x3, 0x3c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r6, 0x4048ae9b, &(0x7f00000002c0)={0xe0003}) ioctl$KVM_SET_MSRS(r6, 0x8090ae81, &(0x7f0000000000)) ioctl$KVM_S390_UCAS_UNMAP(r6, 0x4018ae51, &(0x7f0000000040)={0x100, 0x5bf1, 0x8}) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) splice(r7, 0x0, r1, 0x0, 0x4, 0x2) 21:59:55 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x2c000000, 'c\x86\xdd'}]}, 0xfdef) 21:59:55 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) close(r0) 21:59:55 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000001480)=[{&(0x7f0000000100)=""/77, 0x4d}], 0x1, 0x0) 21:59:55 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x27c, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:55 executing program 4: write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x200a01, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000, 0x0) setxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.ima\x00', 0x0, 0x0, 0x2) close(0xffffffffffffffff) write$FUSE_LK(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x9) set_mempolicy(0x8003, &(0x7f0000000080)=0x5, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x40, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x4, 0x7, 0x4, 0x5971065a0e982ec1, {r3, r4/1000+10000}, {0x4, 0xc, 0x6, 0x4, 0x0, 0x2, "a4efe99e"}, 0x6, 0x3, @fd=r1, 0x4}) vmsplice(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0xd) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 21:59:55 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r5, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r5, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) setsockopt$inet_tcp_TLS_TX(r5, 0x6, 0x1, &(0x7f0000000040)=@gcm_128={{0x304}, "b510362aec480748", "02f3bb61652914417b746a34d80563d5", "47a1121e", "e626b97a5a193f74"}, 0x28) prctl$PR_SET_THP_DISABLE(0x29, 0x1) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) [ 706.248987][T24778] device nr0 entered promiscuous mode 21:59:55 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) preadv(r0, &(0x7f0000001480)=[{&(0x7f0000000100)=""/77, 0x4d}], 0x1, 0x0) 21:59:56 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x27d, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:56 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0x24, 0x4) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) close(r0) 21:59:56 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) preadv(r0, &(0x7f0000001480)=[{&(0x7f0000000100)=""/77, 0x4d}], 0x1, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000000)=[r1], 0x1) 21:59:56 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x27e, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:56 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x27f, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 706.900525][T24778] device nr0 entered promiscuous mode 21:59:56 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x2f000000, 'c\x86\xdd'}]}, 0xfdef) 21:59:56 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) preadv(r0, &(0x7f0000001480)=[{&(0x7f0000000100)=""/77, 0x4d}], 0x1, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r4) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r6) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r8) r9 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r10) r11 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r12) r13 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r14) stat(&(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x6, &(0x7f0000000380)=[r15, r15, r16, r16, 0x0, r15]) stat(&(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x6, &(0x7f0000000380)=[r17, r17, r18, r18, 0x0, r17]) stat(&(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x6, &(0x7f0000000380)=[r19, r19, r20, r20, 0x0, r19]) stat(&(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x6, &(0x7f0000000380)=[r21, r21, r22, r22, 0x0, r21]) getgroups(0x7, &(0x7f0000000040)=[0x0, 0x0, r17, 0xffffffffffffffff, 0xee00, r19, r22]) stat(&(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x6, &(0x7f0000000380)=[r24, r24, r25, r25, 0x0, r24]) getresgid(&(0x7f0000000080), &(0x7f0000000180), &(0x7f00000001c0)=0x0) r27 = getegid() lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r2, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f00000002c0)={{}, {0x1, 0x4}, [{0x2, 0x1, r4}, {0x2, 0x2, r6}, {0x2, 0x5, r8}, {0x2, 0x0, r10}, {0x2, 0x4, r12}, {0x2, 0x1, r14}], {0x4, 0x2}, [{0x8, 0x6, r16}, {0x8, 0x6, r23}, {0x8, 0x0, r25}, {0x8, 0x2, r26}, {0x8, 0x4, r27}, {0x8, 0x4, r28}], {0x10, 0x4}, {0x20, 0x4}}, 0x84, 0x3) 21:59:56 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r5, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r5, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$KVM_GET_DEVICE_ATTR(r5, 0x4018aee2, &(0x7f0000000080)={0x0, 0x80000000, 0xf107, &(0x7f0000000040)=0x7}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) 21:59:56 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x280, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:56 executing program 4: write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x200a01, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000, 0x0) setxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.ima\x00', 0x0, 0x0, 0x2) close(0xffffffffffffffff) write$FUSE_LK(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x9) set_mempolicy(0x8003, &(0x7f0000000080)=0x5, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x40, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x4, 0x7, 0x4, 0x5971065a0e982ec1, {r2, r3/1000+10000}, {0x4, 0xc, 0x6, 0x4, 0x0, 0x2, "a4efe99e"}, 0x6, 0x3, @fd=r0, 0x4}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) [ 707.364945][T24828] device nr0 entered promiscuous mode 21:59:57 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) preadv(r0, &(0x7f0000001480)=[{&(0x7f0000000100)=""/77, 0x4d}], 0x1, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0x0, 0x28400) fcntl$getownex(r2, 0x10, &(0x7f0000000000)) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x2, 0x2, 0xea}}, 0x30) 21:59:57 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind(r0, &(0x7f0000000040)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x4, 0x0, 0x1, 0x0, {0xa, 0x4e24, 0x8, @mcast2, 0x7}}}, 0x57) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) close(r0) r2 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x8, 0x8ccebf1b3ca87c85) r3 = syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r3, 0x100, 0x70bd2b, 0x25dfdbfc, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x8}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) sendmsg$TIPC_CMD_SET_NETID(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x50}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r3, 0x800, 0x70bd28, 0x25dfdbff, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x4}}, ["", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x8cd235e52a1b38d3}, 0x40000) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x67, 0x2, {0x0, 0x3}}, 0x14) 21:59:57 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x281, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:57 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x282, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:57 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x283, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:57 executing program 3: openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/102) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000100)={@broadcast, @local}, &(0x7f0000000140)=0xc) preadv(r1, &(0x7f0000001480), 0x11e2, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r4, 0x4048ae9b, &(0x7f00000002c0)={0xe0003}) ioctl$KVM_SET_MSRS(r4, 0x8090ae81, &(0x7f0000000000)) sendfile(0xffffffffffffffff, r4, 0x0, 0xdfd1) 21:59:57 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_init_net_socket$ax25(0x3, 0x2, 0x1) r3 = socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r4, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r4, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) getsockopt$inet_tcp_int(r4, 0x6, 0x10, &(0x7f0000000040), &(0x7f0000000080)=0x4) close(r3) r5 = socket$inet6(0xa, 0x3, 0x3c) r6 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vfio/vfio\x00', 0x501041, 0x0) close(r6) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r5, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r2, 0x0, 0x484, &(0x7f00000001c0)=""/126, &(0x7f0000000240)=0x7e) [ 708.222461][T24828] device nr0 entered promiscuous mode 21:59:58 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x32000000, 'c\x86\xdd'}]}, 0xfdef) 21:59:58 executing program 4: write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x200a01, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000, 0x0) setxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.ima\x00', 0x0, 0x0, 0x2) close(0xffffffffffffffff) write$FUSE_LK(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x9) set_mempolicy(0x8003, &(0x7f0000000080)=0x5, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x40, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) clock_gettime(0x0, &(0x7f0000000340)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 21:59:58 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x284, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:58 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x8886, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f0000000040)={0xc}) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) close(r0) 21:59:58 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) preadv(r0, &(0x7f0000001480), 0x0, 0x8) 21:59:58 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) close(r0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x90000, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r1, 0x401870cc, &(0x7f0000000040)={0x3, 0x0, 0x4, 0x5}) 21:59:58 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x285, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 708.781180][T24880] device nr0 entered promiscuous mode 21:59:58 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[]], 0x8) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) listen(r1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r4, 0x4048ae9b, &(0x7f00000002c0)={0xe0003}) ioctl$KVM_SET_MSRS(r4, 0x8090ae81, &(0x7f0000000000)) fsetxattr$security_capability(r4, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000180)=@v2={0x2000000, [{0x3, 0x3}, {0x6e68ca45, 0x8}]}, 0x14, 0x1) close(r0) 21:59:58 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x286, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:58 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) write$9p(r0, &(0x7f0000000180)="354652d53f88", 0x6) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) preadv(r1, &(0x7f0000001480)=[{&(0x7f0000000100)=""/77, 0xfffffffffffffef3}], 0x20d, 0x7fffffe) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x80, 0x0) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x18, &(0x7f00000000c0)={r5}, &(0x7f0000000100)=0x14) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r7, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r7, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) r8 = socket$inet6_sctp(0xa, 0x1, 0x84) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r8, 0x84, 0x18, &(0x7f00000000c0)={r10}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp6_SCTP_RTOINFO(r6, 0x84, 0x0, &(0x7f00000001c0)={r10, 0x200, 0x7f, 0x9}, &(0x7f0000000200)=0x10) listen(r7, 0xcde2) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000040)={0x4, 0x8000, 0x1, 0x9, r5}, 0x10) 21:59:58 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000000)='veth1\x00', 0x40) connect$inet(r5, &(0x7f0000000140)={0x2, 0x0, @initdev}, 0x10) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") setsockopt$inet_group_source_req(r5, 0x0, 0x1, &(0x7f0000000180)={0x6, {{0x2, 0x0, @empty}}, {{0x2, 0x0, @local}}}, 0xe7) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r7, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r7, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) sendmsg$nl_route(r7, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=@ipmr_delroute={0x1b0, 0x19, 0x4, 0x70bd28, 0x25dfdbfe, {0x80, 0x0, 0xa8, 0x6, 0xfc, 0x0, 0xfe, 0x5, 0x1800}, [@RTA_PREFSRC={0x8, 0x7, @initdev={0xac, 0x1e, 0x1, 0x0}}, @RTA_ENCAP={0x74, 0x16, @generic="efad884094448e70965b1d23611d5a691c02b4dc05c944c426709f9fe33b23f688c6553e3096774862c355f440551369eef314c46bec2860a1e83209ba0e585fd0145cf412faf08813c0e3ed8db92ed986879b2585fd8b09638e48d4c73c8b71857416c34213a5425ab5e87a87b5fc"}, @RTA_ENCAP_TYPE={0x8, 0x15, 0x4}, @RTA_PREFSRC={0x8, 0x7, @initdev={0xac, 0x1e, 0x1, 0x0}}, @RTA_ENCAP_TYPE={0x8, 0x15, 0x3}, @RTA_FLOW={0x8, 0xb, 0xacb}, @RTA_METRICS={0xf8, 0x8, "1fa9a0f9d6870bfa664c67ff86727e7ff51db1dd3bf088081ea26ee09d8677556725a898983528e98ccc1d3f00f7211daef2155a3be76a3aa7479f032c32181195868cf55b3c77a5adc380c4ecafe75fabe9882607746ac980437c9d89628149bbcb0a39c44ebccc4ed66f02109437d3fd4867c63f71f91f6bf0bf0731a651ef8afa5cf272ac606d14dfb0470b3bde02b72f553ee3b1b3b2db78c0ce2fc08122647ae1fcf54948217c1560187cbcdd7fb4346aaa11effdf1315a6ccf2a23218053d1171d97c5a174c1e2c2024a48ed78f4276d14263ad0a50ef2fdd787efcce6f688f7ab6693c0ef1fb4e1791fb9024129e6"}]}, 0x1b0}, 0x1, 0x0, 0x0, 0x10}, 0x4084) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x400, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) 21:59:58 executing program 2: ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f0000000000)={0x5, 0x9, 0xaa, 0x1, 0x1a, 0x8c9, 0x9, 0x6, 0x4, 0x1, 0x0, 0xfffffffffffffff7}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f0000000180)={{0x3, 0x0, 0x3, 0x2, 0x2a}, 0x80, 0x8000}) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000200)={0xc1, 0x14b9, 0x9, 0x5}, 0x8) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, 0x0) mincore(&(0x7f0000000000/0x400000)=nil, 0x400000, &(0x7f0000000140)=""/177) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r2, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) bind$nfc_llcp(r2, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x9, "8811ef87a17a25585ae1721de6d16a42440000000000002000000000000000000000000000002c89000000bbd100", 0x1a}, 0x60) close(0xffffffffffffffff) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x819c539a08516148, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6f, 0x389, 0x9, [@enum={0x0, 0x0, 0x0, 0x6, 0x4, [{0xb, 0x4}, {0x7, 0xff}]}, @func={0xe, 0x0, 0x0, 0xc, 0x1}, @enum={0x4, 0x6, 0x0, 0x6, 0x4, [{0xb, 0x1}, {0x8, 0x800005}, {0xf, 0x7f}, {0x2, 0x9}, {0x1, 0x80000001}, {0x7, 0xabe}]}, @datasec={0x6, 0x1, 0x0, 0xf, 0x3, [{0x3, 0x5, 0x3}], "c6e6f9"}]}, {0x0, [0x5f, 0x2e, 0xf3f6e2aeae355e55, 0x5f, 0x61, 0x5f, 0x61]}}, &(0x7f00000002c0)=""/204, 0x91, 0xcc, 0x1}, 0x20) ioctl$DRM_IOCTL_FREE_BUFS(r3, 0x4010641a, &(0x7f00000000c0)={0x8, &(0x7f0000000080)=[0x3, 0x7, 0x400, 0x1, 0x4000000000000, 0x3, 0x0, 0x8000]}) [ 709.562206][T24880] device nr0 entered promiscuous mode 21:59:59 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x33000000, 'c\x86\xdd'}]}, 0xfdef) 21:59:59 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x287, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:59 executing program 4: write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x200a01, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000, 0x0) setxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.ima\x00', 0x0, 0x0, 0x2) close(0xffffffffffffffff) write$FUSE_LK(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x9) set_mempolicy(0x8003, &(0x7f0000000080)=0x5, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x40, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) [ 709.831715][T24926] device nr0 entered promiscuous mode 21:59:59 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x288, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:59 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x8000, 0x0) write$P9_RLERROR(r5, &(0x7f00000001c0)={0x9, 0x7, 0x1}, 0x9) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r6, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r6, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r7, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r7, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0xffffffffffffff70}], 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r6, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @ipv4={[], [], @broadcast}, 0x4}, r8}}, 0x30) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) 21:59:59 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f00000002c0)={0xe0003}) ioctl$KVM_SET_MSRS(r2, 0x8090ae81, &(0x7f0000000000)) ioctl$KVM_GET_ONE_REG(r2, 0x4010aeab, &(0x7f0000000000)={0x0, 0xfffffffffffffff7}) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r3, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, "8801e78754a503d39c2bd6a40f03c893024db1ffffffffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x19}, 0xfffffffffffffd08) close(r3) 21:59:59 executing program 3: openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/whost-net\x00', 0x2, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) preadv(r0, &(0x7f0000001480), 0x0, 0x3) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) r2 = accept4$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000180)=0x1c, 0x1800) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x18, &(0x7f00000000c0)={r5}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f00000001c0)={r5, 0x7}, &(0x7f0000000200)=0x8) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r6, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r6, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r6, 0x29, 0x1, &(0x7f0000000000), 0x4) 21:59:59 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x289, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 21:59:59 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x3b000000, 'c\x86\xdd'}]}, 0xfdef) 22:00:00 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x28a, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:00 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x1, 0x0, 0x0, 0x8, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x3a}, 0x60) close(r0) 22:00:00 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) r1 = epoll_create(0x9) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r3, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r3, 0x40a85323, &(0x7f0000000040)={{0x3, 0x400}, 'port0\x00', 0x24, 0x0, 0x100, 0x4, 0x8000, 0x1ff, 0x1, 0x0, 0x2, 0x4}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000000)={0x80000000}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r4, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r4, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r4, 0x40a85323, &(0x7f0000000180)={{0x3, 0x1}, 'port0\x00', 0x10, 0x2, 0x54, 0x2, 0x0, 0x2, 0x8001, 0x0, 0x4}) close(r0) [ 710.517502][T24956] device nr0 entered promiscuous mode 22:00:00 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x28b, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:00 executing program 4: write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x200a01, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000, 0x0) setxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.ima\x00', 0x0, 0x0, 0x2) close(0xffffffffffffffff) write$FUSE_LK(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x9) set_mempolicy(0x8003, &(0x7f0000000080)=0x5, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x40, 0x0) pipe(&(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:00:00 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x28c, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:00 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) preadv(r0, &(0x7f0000001480)=[{&(0x7f0000000100)=""/77, 0x4d}], 0x1, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4002, 0x0) ioctl$MON_IOCX_GETX(r1, 0x4018920a, &(0x7f0000000080)={&(0x7f0000000040), &(0x7f0000000180)=""/82, 0x52}) [ 711.062736][T24956] device nr0 entered promiscuous mode 22:00:00 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f0000000040)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) 22:00:00 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x28d, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:00 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x28e, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:00 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) preadv(r0, &(0x7f0000001480), 0x0, 0x0) 22:00:01 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x3c000000, 'c\x86\xdd'}]}, 0xfdef) 22:00:01 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x28f, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:01 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x7, 0x2, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) close(r0) 22:00:01 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r3, 0x4048ae9b, &(0x7f00000002c0)={0xe0003}) ioctl$KVM_SET_MSRS(r3, 0x8090ae81, &(0x7f0000000000)={0x3d5}) ioctl$KVM_SET_XCRS(r3, 0x4188aea7, &(0x7f0000000000)={0x3, 0x7, [{0xffff, 0x0, 0x1}, {0x5, 0x0, 0x8b88}, {0x1}]}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r4, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r4, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000040)) preadv(r0, &(0x7f0000001480)=[{&(0x7f0000000100)=""/77, 0x4d}], 0x1, 0x0) 22:00:01 executing program 4: write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x200a01, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000, 0x0) setxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.ima\x00', 0x0, 0x0, 0x2) close(0xffffffffffffffff) write$FUSE_LK(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x9) set_mempolicy(0x8003, &(0x7f0000000080)=0x5, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x40, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:00:01 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x290, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 711.725945][T25008] device nr0 entered promiscuous mode 22:00:01 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) close(r0) 22:00:01 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x291, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:01 executing program 5: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f00000000c0)="11dca5055e0bcfe47bf057") connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) 22:00:01 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r1 = getpid() r2 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000180)=0x14) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000001c0)={'bpq0\x00', r3}) getpgid(r1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x2, 0x0, 0x0, 0x7, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x53) close(r0) 22:00:01 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f0000000080)={'nat\x00', 0x0, 0x3, 0x1d, [], 0x4, &(0x7f0000000000)=[{}, {}, {}, {}], &(0x7f0000000040)=""/29}, &(0x7f0000000180)=0x78) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) close(r0) 22:00:01 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x292, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 712.422362][T25008] device nr0 entered promiscuous mode 22:00:02 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x3f000000, 'c\x86\xdd'}]}, 0xfdef) 22:00:02 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x293, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:02 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) preadv(r0, &(0x7f0000001480)=[{&(0x7f0000000100)=""/77, 0x4d}], 0x1, 0x0) write$binfmt_script(r0, &(0x7f0000000180)={'#! ', './file0', [{0x20, '/dev/vhost-net\x00'}, {0x20, '/dev/vhost-net\x00'}, {0x20, '/dev/vhost-net\x00'}, {0x20, 'security)self$^/]$cpuset&{-'}, {0x20, '%'}, {}, {0x20, '/dev/vhost-net\x00'}, {}], 0xa, "badf28ff39ac5d5ce5881c98a036bf3ccd641b2d7e688871dbda63befde3122f723a6550ac10453592b4dbc10086964b161ad274965835589445d077b94bf0fc706b83cc30150ddb710624810a1438a0c91322001b53c6bcf2bd37ac195809006f2842395e59dc31a7df6996ad4dc0433ef137234bb1"}, 0xe1) socket$inet(0x2, 0x80000, 0x200) 22:00:02 executing program 4: write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x200a01, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000, 0x0) setxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.ima\x00', 0x0, 0x0, 0x2) close(0xffffffffffffffff) write$FUSE_LK(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x9) set_mempolicy(0x8003, &(0x7f0000000080)=0x5, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:00:02 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x294, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 712.855894][T25056] device nr0 entered promiscuous mode 22:00:02 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000002c0)={0x6, {{0x2, 0x4e22, @broadcast}}}, 0x88) preadv(r0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/115, 0x73}], 0x1, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000200)=ANY=[@ANYRESDEC, @ANYPTR64], 0xfffffffffffffdc6) keyctl$session_to_parent(0x12) vmsplice(r2, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) write$uinput_user_dev(r2, &(0x7f0000000380)={'syz1\x00', {0x49a608e6, 0x1, 0x7970, 0x80000001}, 0x2e, [0x5, 0x5, 0x0, 0x780000000000, 0x7fff, 0xd30a, 0x101, 0x100000000, 0x1, 0xeba, 0x7, 0x941, 0x8, 0x80000000, 0xa000, 0x7fff, 0x80000000, 0x0, 0x1, 0x8, 0x3ff, 0x6, 0x1ff, 0x3, 0x200, 0x3, 0x1, 0x6, 0x3, 0x5, 0x0, 0xfff, 0x0, 0x9, 0x8, 0x200, 0x4, 0x79, 0x1000, 0x7f, 0x4, 0x1, 0x46, 0x1, 0x9, 0x5, 0x8, 0x0, 0x8, 0x6, 0x6, 0x2, 0x8, 0x6, 0x80, 0x8000, 0x3876b51c, 0x7ff, 0x9, 0x0, 0x1f, 0x7, 0xfffffffffffffffa, 0x4], [0x6, 0x7, 0x0, 0x9, 0x0, 0xb74, 0x2, 0x7, 0x7fff, 0x3, 0x5f74, 0x3, 0x1, 0xffffffff, 0x401, 0x5c000000000, 0x8, 0x78, 0x100000000, 0x2, 0x4, 0x5, 0xfffffffffffffffb, 0x6, 0x6, 0x3, 0x1, 0x3000000000, 0x8001, 0x4, 0x40, 0x7f, 0x2, 0x50, 0x5, 0x0, 0x7, 0xcc3c, 0x3, 0x1461, 0x74189d8d, 0x300, 0x30f, 0x0, 0x1, 0x2f, 0xf97, 0x401, 0x9, 0x6, 0x3, 0x1, 0xa800000000000000, 0x3, 0xfff, 0x4, 0x3f, 0x4a2, 0xda, 0x5, 0x401, 0x2, 0x0, 0xffff], [0x1, 0x6, 0x8, 0x2, 0x7fff, 0x3f, 0x3, 0x8, 0x5, 0x100000000, 0x5, 0x3, 0x8, 0x7, 0x5, 0x4, 0x3, 0x0, 0x6, 0xb8, 0x3f, 0x10001, 0x0, 0x3, 0x800, 0xfff, 0x8, 0x1, 0x8, 0xf6, 0xff, 0xc23, 0x1, 0x7fff, 0x101, 0x8001, 0x9, 0xe6, 0xffff, 0x1, 0x4, 0xffffffff, 0x100000001, 0x10001, 0x5, 0x7d13, 0x5, 0xfffffffffffffffb, 0x3, 0x4, 0x1, 0x3, 0x20, 0x3ecc0000, 0x5, 0x80000001, 0x7ff, 0x0, 0x401, 0x3, 0x9, 0xf0a, 0x401, 0x120000000000], [0x4, 0x78f, 0x5, 0xcac, 0x71, 0x7, 0x8, 0x3, 0x100000001, 0xfff, 0x10001, 0x0, 0x2, 0x7, 0x7ff, 0x184, 0x10000, 0x7, 0xff, 0x1f, 0x5, 0xfff, 0x8000, 0x3, 0x6, 0x9, 0x2, 0x7, 0x6, 0x8, 0x1000, 0x7, 0x4, 0x0, 0x7, 0x10000, 0x1, 0x0, 0x10, 0x81, 0x5, 0x5b0, 0x6, 0xc0, 0x5, 0x3, 0x20, 0x8001, 0x4, 0x2, 0x7ff, 0x100, 0x800, 0xfffffffffffffbff, 0xd7, 0x5, 0x4, 0x5, 0xff, 0x800, 0x7, 0x3, 0x5, 0x46d]}, 0x45c) 22:00:02 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000040)) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r4, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r4, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) write$P9_RMKDIR(r4, &(0x7f00000003c0)={0x14, 0x49, 0x2, {0x94, 0x1, 0x7}}, 0x14) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x100) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r7) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x101001, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@cache_loose='cache=loose'}, {@privport='privport'}], [{@pcr={'pcr', 0x3d, 0x3d}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x32, 0x63, 0x38, 0x37, 0x31, 0x11, 0x35], 0x2d, [0x35, 0x31, 0x35, 0x86], 0x2d, [0x30, 0x65, 0x61, 0x32], 0x2d, [0x36, 0x61, 0x33, 0x63], 0x2d, [0x66, 0x65, 0x0, 0x39, 0x31, 0x62, 0x35, 0x62]}}}, {@smackfsfloor={'smackfsfloor'}}, {@uid_eq={'uid', 0x3d, r7}}, {@uid_lt={'uid<', r8}}, {@fsmagic={'fsmagic', 0x3d, 0x31d}}, {@fsname={'fsname', 0x3d, 'trusted^\xae)mime_type+('}}]}}) r9 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r9, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) write$P9_RRENAME(r1, &(0x7f0000000380)={0x7, 0x15, 0x2}, 0x7) 22:00:02 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0, 0x10000}, 0x8) close(r0) 22:00:02 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x295, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:02 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000000)="120000001200e7ef007b0000f4afd7030a7c", 0xfcd1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f00000020c0), 0x320, 0x0, &(0x7f0000003700)={0x77359400}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) preadv(r1, &(0x7f0000001480)=[{&(0x7f0000000100)=""/77, 0x4d}], 0x1, 0x0) 22:00:03 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x296, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 713.513586][T25056] device nr0 entered promiscuous mode 22:00:03 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) preadv(r0, &(0x7f0000001480)=[{&(0x7f0000000100)=""/77, 0x4d}], 0x1, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x457032740ed123b1, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x9, 0x2) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r2, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$UFFDIO_ZEROPAGE(r2, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000fff000/0x1000)=nil, 0x1000}}) write$capi20(r1, &(0x7f0000000040)={0x10, 0x80, 0x42, 0x80, 0x1ff, 0x2}, 0x10) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r3, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$RTC_SET_TIME(r3, 0x4024700a, &(0x7f0000000180)={0x1a, 0x1e, 0xf, 0x7, 0x0, 0x2, 0x0, 0xb0}) 22:00:03 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x297, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:03 executing program 4: write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x200a01, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000, 0x0) setxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.ima\x00', 0x0, 0x0, 0x2) close(0xffffffffffffffff) write$FUSE_LK(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x9) set_mempolicy(0x8003, &(0x7f0000000080)=0x5, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:00:03 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x40000000, 'c\x86\xdd'}]}, 0xfdef) 22:00:03 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r7, 0x4048ae9b, &(0x7f00000002c0)={0xe0003}) ioctl$KVM_SET_MSRS(r7, 0x8090ae81, &(0x7f0000000000)) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000040)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffffffffffefd) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) [ 714.123333][T25104] device nr0 entered promiscuous mode 22:00:03 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x298, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:03 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c55ea6f1f75200a01000000ff7f0300000000000000df8dfcaa9a9d32c7627ffe7a54cdbd77b300000000f3ff00", 0x2b}, 0x60) close(r0) 22:00:04 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x299, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:04 executing program 3: openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f00000002c0)={0xe0003}) ioctl$KVM_SET_MSRS(r2, 0x8090ae81, &(0x7f0000000000)) preadv(r2, &(0x7f0000001480)=[{&(0x7f0000000100)=""/77, 0x4d}], 0x1, 0x0) 22:00:04 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x29a, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:04 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x29b, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:04 executing program 4: write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x200a01, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000, 0x0) setxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.ima\x00', 0x0, 0x0, 0x2) close(0xffffffffffffffff) write$FUSE_LK(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x9) set_mempolicy(0x8003, &(0x7f0000000080)=0x5, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) [ 714.988945][T25104] device nr0 entered promiscuous mode 22:00:04 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet6(0xa, 0x3, 0x3c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) 22:00:04 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x29c, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:04 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) r2 = syz_open_dev$vivid(&(0x7f0000000180)='/dev/video#\x00', 0x2, 0x2) ioctl$VIDIOC_G_MODULATOR(r2, 0xc0445636, &(0x7f00000001c0)={0x1, "ed2309e5b91a71892060021a421a78a230e869742bf827beb97c101092b76088", 0x400, 0x7fff, 0x5, 0x8, 0x1}) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r1, 0xc0585605, &(0x7f0000000000)={0x0, 0x0, {0xffffffffffffffe1, 0x6, 0x3006, 0x3, 0x2, 0x0, 0x2, 0x7}}) preadv(r0, &(0x7f0000001480)=[{&(0x7f0000000100)=""/77, 0x4d}], 0x1, 0x0) 22:00:05 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x69fd0000, 'c\x86\xdd'}]}, 0xfdef) 22:00:05 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000780)=ANY=[], 0xfffffd1a) vmsplice(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x0, &(0x7f00000000c0)=0x2000000000000074, 0x25d) r3 = shmget$private(0x0, 0x13000, 0x0, &(0x7f0000feb000/0x13000)=nil) shmat(r3, &(0x7f0000fea000/0x3000)=nil, 0x7000) shmat(r3, &(0x7f0000ffa000/0x4000)=nil, 0x4000) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, r5, 0xf7e8f6cb5dcde06f, 0x0, 0x0, {0x10}}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000440)={&(0x7f0000000340), 0xc, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="14000000", @ANYRES16=r5, @ANYBLOB="04002a0f0000000000000000eeffffff"], 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x40000000) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) accept(r2, &(0x7f00000004c0)=@pppoe={0x18, 0x0, {0x0, @remote}}, &(0x7f0000000000)=0x80) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000009c0)={{{@in6, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000040)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xa, r6}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'vcan0\x00', r6}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r8, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r8, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r8, 0x0, 0x10, &(0x7f0000000180)={{{@in6=@local, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@empty}}, &(0x7f0000000500)=0xe8) sendmsg$nl_route(r0, &(0x7f0000000700)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000540)=@dellink={0x158, 0x11, 0x200, 0x70bd26, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, 0x2604, 0x10000}, [@IFLA_LINKINFO={0x1c, 0x12, @erspan={{0xc, 0x1, 'erspan\x00'}, {0xc, 0x2, [@IFLA_GRE_REMOTE={0x8, 0x7, @remote}]}}}, @IFLA_LINKINFO={0x114, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x104, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0xffffffff}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x3}, @tunl_policy=[@IFLA_IPTUN_FWMARK={0x8, 0x14, 0x7}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x7}], @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x1000}, @IFLA_IPTUN_TTL={0x8, 0x4, 0xfb3}, @IFLA_IPTUN_LINK={0x8, 0x2, r7}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e23}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0x9}], @tunl_policy=[@IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0x4}, @IFLA_IPTUN_LINK={0x8, 0x2, r9}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e21}]], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_FWMARK={0x8, 0x14, 0x100}]], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0xffffffffffff4aff}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x27}}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0xf2f}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x3}], @IFLA_IPTUN_PROTO={0x8}]}}}, @IFLA_TXQLEN={0x8, 0xd, 0xfffffffffffffffa}]}, 0x158}, 0x1, 0x0, 0x0, 0x20000001}, 0x4000) r10 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r11, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r11, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) write$P9_RLCREATE(r11, &(0x7f00000002c0)={0x18, 0xf, 0x2, {{0x12, 0x4, 0x4}, 0x1}}, 0x18) bind$nfc_llcp(r10, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) close(r10) 22:00:05 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x29d, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 715.702770][T25158] device nr0 entered promiscuous mode 22:00:05 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x29e, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:05 executing program 4: write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x200a01, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000, 0x0) setxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.ima\x00', 0x0, 0x0, 0x2) close(0xffffffffffffffff) write$FUSE_LK(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x9) set_mempolicy(0x8003, &(0x7f0000000080)=0x5, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:00:05 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x29f, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:05 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) socket$inet_udplite(0x2, 0x2, 0x88) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x44cc0, 0x0) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) 22:00:05 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_G_FREQUENCY(r1, 0xc02c5638, &(0x7f0000000040)={0x9, 0x5, 0x20}) preadv(r0, &(0x7f0000001480), 0x0, 0x0) 22:00:05 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2a0, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:06 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) getitimer(0x0, &(0x7f0000000000)) preadv(r0, &(0x7f0000001480)=[{&(0x7f0000000100)=""/77, 0x4d}], 0x1, 0x0) 22:00:06 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x800e0000, 'c\x86\xdd'}]}, 0xfdef) 22:00:06 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x400400, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r3, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) r4 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0xffffffffdf93e562, 0x202000) r5 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x10803) r6 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x2, 0x2500) r7 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x7, 0x80000) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r8, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r8, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$UDMABUF_CREATE_LIST(r1, 0x40087543, &(0x7f00000001c0)={0x0, 0x7, [{r2, 0x0, 0x10000, 0x7ffffffff8000000}, {r3, 0x0, 0xd006fbe6441b2441, 0x8000}, {r4, 0x0, 0x2000, 0xfffffffff0000000}, {r5, 0x0, 0x2000}, {r6, 0x0, 0x1000000000000, 0xdf7f686a2743bfb1}, {r7, 0x0, 0x4000, 0x7ffffffff8010000}, {r8, 0x0, 0x1000000, 0xfffffffffffff000}]}) close(r0) 22:00:06 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2a1, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:06 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) preadv(r0, &(0x7f0000001480), 0x0, 0x1) [ 716.591560][T25198] device nr0 entered promiscuous mode 22:00:06 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2a2, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:06 executing program 4: write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x200a01, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000, 0x0) setxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.ima\x00', 0x0, 0x0, 0x2) close(0xffffffffffffffff) write$FUSE_LK(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x9) set_mempolicy(0x8003, &(0x7f0000000080)=0x5, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:00:06 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2a3, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:06 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet6(0xa, 0x3, 0x3c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x80000000000000, @remote, 0x5}, 0x1c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x513401, 0x0) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x0) splice(r0, 0x0, r1, 0x0, 0x4, 0x0) 22:00:06 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) preadv(r0, &(0x7f0000001480)=[{&(0x7f0000000100)=""/77, 0x4d}], 0x1, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x80000, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x18, &(0x7f00000000c0)={r4}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000180)={r4, 0xd8, "6df81c47d8c8baaca123b0ac7bdd602b40c00c693a06fbac7e0504574805f6a5d6f10f4e9faae6b637a443d89f96e24d79e5e04e1ed3be2619e2298e1424cc15037e3fa416f0038877723c78c6d2d818bde3bcd02c7087be5da4e39fd2a8adcce75e99630d91e7c9b81ead8e613db62228489140063759caf7be81376cfca4d999aa794d477976f629cec2e2ecc4faacf213761ecf9f9429ffde64793b01a3c624ea6be8227b6d64fb4bccab5616c052ab72e6748488d9926a1adb3b4ddfada04af4e8882e1a5ca440d4616affc4668f53351222a71b719b"}, &(0x7f0000000040)=0xe0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000280)={r5, 0x9c, "cb6ca871b628b9f224bc0f9069c8526558608d86fb08802905ae9f7df083756391c592be487d70c4d0b88817c9544f721c6bd54c44cd4a14cd31a18bfc3d3aba0dfe81782906a6919d93f157117103da384ce9472fa4400cd21901256b58c3a4d427bfa3f0b8948b9fb3c591768ef29e89e33488a6f526b844a3ab7325062e577418322de0e7373eb6d3ea92dc5342deaab0a1915d5618cf859a0142"}, &(0x7f0000000080)=0xa4) 22:00:06 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000000)=0x1, 0x4) preadv(r0, &(0x7f0000001480), 0x0, 0x200000000000000) 22:00:06 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2a4, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:06 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x200, 0x80) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) preadv(r0, &(0x7f0000001480)=[{&(0x7f0000000100)=""/77, 0x4d}], 0x1, 0x0) 22:00:06 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x84000000, 'c\x86\xdd'}]}, 0xfdef) 22:00:07 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x1000, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) close(r0) 22:00:07 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2a5, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 717.442490][T25245] device nr0 entered promiscuous mode 22:00:07 executing program 3: openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/\x00', 0x10000, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) preadv(r0, &(0x7f0000001480), 0x2db, 0x0) 22:00:07 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2a6, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:07 executing program 4: write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x200a01, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000, 0x0) setxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.ima\x00', 0x0, 0x0, 0x2) close(0xffffffffffffffff) write$FUSE_LK(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x9) set_mempolicy(0x8003, &(0x7f0000000080)=0x5, 0x6) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:00:07 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) ioctl$int_in(r0, 0xfc10, &(0x7f0000000000)=0x6) close(r0) 22:00:07 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) io_setup(0x1, &(0x7f0000000040)=0x0) io_pgetevents(r5, 0x7, 0x4, &(0x7f0000000080)=[{}, {}, {}, {}], 0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000100)={0x9}, 0x8}) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) 22:00:07 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000000)) preadv(r0, &(0x7f0000001480)=[{&(0x7f0000000100)=""/77, 0x4d}], 0x1, 0x0) 22:00:07 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x4, 0x400002) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) close(r0) 22:00:07 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2a7, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 718.082818][T25245] device nr0 entered promiscuous mode 22:00:07 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) close(r0) 22:00:08 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x84ffffff, 'c\x86\xdd'}]}, 0xfdef) 22:00:08 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2a8, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:08 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x3ff, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) connect$caif(r1, &(0x7f0000000000)=@dgm={0x25, 0x75, 0xbb}, 0x18) close(r0) 22:00:08 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2a9, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 718.554758][T25299] device nr0 entered promiscuous mode 22:00:08 executing program 4: write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x200a01, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000, 0x0) setxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.ima\x00', 0x0, 0x0, 0x2) close(0xffffffffffffffff) write$FUSE_LK(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x9) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:00:08 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2aa, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:08 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2ab, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:08 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) preadv(r0, &(0x7f0000001480)=[{&(0x7f0000000100)=""/77, 0x4d}], 0x1, 0x0) 22:00:08 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x400, 0x0) r6 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r5, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x328a02}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r6, 0x8, 0x70bd2b, 0x25dfdbfc, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x40}, 0x8004) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) [ 718.981835][T25299] device nr0 entered promiscuous mode 22:00:08 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2ac, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:08 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) preadv(r0, &(0x7f0000001480)=[{&(0x7f0000000100)=""/77, 0x4d}], 0x1, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000240)=[@in={0x2, 0x4e22, @empty}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e21, 0x5, @rand_addr="33046830f04dd5aa23afd3b97c6b36f1", 0x3}, @in6={0xa, 0x4e24, 0xffffffff, @empty, 0x200}, @in6={0xa, 0x4e22, 0x80000000, @empty, 0xd638}, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x84) lsetxattr$security_smack_entry(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.SMACK64EXEC\x00', &(0x7f0000000200)='!\x00', 0x2, 0x0) 22:00:08 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2ad, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:08 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x88ffffff, 'c\x86\xdd'}]}, 0xfdef) 22:00:09 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2ae, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:09 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2000, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000400)={0x18, 0x0, &(0x7f0000000380)=[@clear_death={0x400c630f, 0x2}, @increfs={0x40046304, 0x1}], 0x1b, 0x0, &(0x7f00000003c0)="0bbe5406a3547e17474ba0893cb00cfde125a644395353dac26bdd"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYRES64=r0], 0x2f5) vmsplice(r2, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000080)={0xd5}, 0x4) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x4010640d, &(0x7f0000000040)={0xdb, 0x2}) r3 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vfio/vfio\x00', 0x4000, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$FICLONE(r3, 0x40049409, r4) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) close(r0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r5, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r5, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r6, 0x84, 0x18, &(0x7f00000000c0)={r8}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r5, 0x84, 0x1a, &(0x7f00000001c0)={r8, 0xcb, "435a8ee153de50dd952504f3bec5ac3e0c3fa02f461fdfa92390220d6600de6634db8294f34d57fe37848e661d75248cfe75ad5387b59de79ca822c40793ce70b171b74e36445c919ff48b56324bd150766f060cd56c4632b669a14236132ec1659415ade2a48659c2650726d9e5c57fb003aab1dc30fa1c2170804b840e1528aab26871f51ae79e8eb52d2e3e83485101fba2a3bb5a8b19c70834c380dbb1f9423009ff2a17ad9268278163dd8bf0cefedc978198f1a0a58c39e1bbdd1f60caefc033d278bd3dd15e801b"}, &(0x7f00000002c0)=0xd3) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000300)={r9, 0x3, 0x10}, 0xc) [ 719.487919][T25337] device nr0 entered promiscuous mode 22:00:09 executing program 4: write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x200a01, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000, 0x0) setxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.ima\x00', 0x0, 0x0, 0x2) close(0xffffffffffffffff) write$FUSE_LK(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:00:09 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2af, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:09 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2b0, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:09 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x411, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x7}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r5, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r5, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000100)=0x2, 0x4) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r8, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r8, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r8, 0x84, 0x65, &(0x7f0000000140)=[@in6={0xa, 0x4e23, 0x98, @rand_addr="30e8b92cf7d638c29f3e00143fee392f", 0x4}], 0x1c) r9 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r9, 0x4048ae9b, &(0x7f00000002c0)={0xe0003}) ioctl$KVM_SET_MSRS(r9, 0x8090ae81, &(0x7f0000000000)) splice(r9, &(0x7f0000000080), 0xffffffffffffffff, &(0x7f00000000c0), 0x2000000000, 0xe) [ 719.953267][T25337] device nr0 entered promiscuous mode 22:00:09 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2b1, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:09 executing program 3: r0 = socket$pptp(0x18, 0x1, 0x2) syncfs(r0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) preadv(r1, &(0x7f0000001480)=[{&(0x7f0000000100)=""/77, 0x4d}], 0x1, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r2, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r3, &(0x7f00000009c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x28, r4, 0x1, 0x0, 0x0, {0x4}, [@TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}]}]}, 0x28}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r2, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000040)={&(0x7f0000000180)={0xd4, r4, 0x2, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xffffffffffff0001}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x80}]}, @TIPC_NLA_LINK={0x4}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffffffff00000001}]}, @TIPC_NLA_SOCK={0x4}, @TIPC_NLA_LINK={0x74, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4320}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x20000000}, 0x80) 22:00:09 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2b2, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:09 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x89ffffff, 'c\x86\xdd'}]}, 0xfdef) 22:00:10 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2b3, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 720.395659][T25375] device nr0 entered promiscuous mode 22:00:10 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x400) ioctl$KVM_ASSIGN_PCI_DEVICE(r1, 0x8040ae69, &(0x7f0000000040)={0xffc, 0x2, 0x100000001, 0x2, 0x7}) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r5, 0x4048ae9b, &(0x7f00000002c0)={0xe0003}) ioctl$KVM_SET_MSRS(r5, 0x8090ae81, &(0x7f0000000000)) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) socket$rxrpc(0x21, 0x2, 0x2) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) r8 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r8, 0xae01, 0x0) close(r8) 22:00:10 executing program 4: write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x200a01, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000, 0x0) setxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.ima\x00', 0x0, 0x0, 0x2) close(0xffffffffffffffff) write$FUSE_LK(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:00:10 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2b4, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:10 executing program 4: write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x200a01, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000, 0x0) setxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.ima\x00', 0x0, 0x0, 0x2) close(0xffffffffffffffff) write$FUSE_LK(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000000c0)) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:00:10 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2b5, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:10 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000040)={0x1f, {0x0, 0x0, 0x3}}, 0xa) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x4, 0x0, 0xdb9, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x28001, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000080), &(0x7f00000000c0)=0x4) close(r2) 22:00:10 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet6(0xa, 0x3, 0x3c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x4, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x5}, 0x1c) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r4, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r5, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r5, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$KDGKBMETA(r5, 0x4b62, &(0x7f0000000140)) vmsplice(r4, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000000040)={@local, 0x495e59dc, 0x1, 0x3, 0xc, 0x2, 0xffffffffffffffff}, &(0x7f0000000080)=0x20) splice(r0, 0x0, r1, 0x0, 0x4, 0x0) 22:00:10 executing program 4: write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x200a01, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000, 0x0) setxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.ima\x00', 0x0, 0x0, 0x2) close(0xffffffffffffffff) write$FUSE_LK(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:00:10 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) preadv(r0, &(0x7f0000001480)=[{&(0x7f0000000000)=""/77, 0x4d}], 0x1, 0x0) 22:00:10 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2b6, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 721.181686][T25375] device nr0 entered promiscuous mode 22:00:11 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x8dffffff, 'c\x86\xdd'}]}, 0xfdef) 22:00:11 executing program 2: bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) r0 = semget$private(0x0, 0x1, 0x0) semtimedop(r0, &(0x7f0000000040), 0x1b9, 0x0) semctl$IPC_INFO(r0, 0x2, 0x3, &(0x7f0000000280)=""/219) semctl$GETZCNT(r0, 0x4, 0xf, &(0x7f0000000180)=""/4096) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r4, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r4, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$VIDIOC_G_FMT(r4, 0xc0d05604, &(0x7f0000001240)={0x9, @sdr={0x47504a50, 0x5}}) vmsplice(r3, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r3, 0x54a3) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r2, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$KDSETKEYCODE(r2, 0x4b4d, &(0x7f0000001180)={0x7fffffff, 0x4}) getsockopt$inet_udp_int(r2, 0x11, 0x2, &(0x7f00000011c0), &(0x7f0000001200)=0x4) ioctl$VIDIOC_DBG_G_REGISTER(r1, 0xc0385650, &(0x7f0000000000)={{0x0, @addr=0x1}, 0x8, 0x6, 0x2}) close(0xffffffffffffffff) 22:00:11 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/\x10\'v/Vhost\xe0\x17e\xe4@', 0x2, 0x0) preadv(r0, &(0x7f0000001480)=[{&(0x7f0000000100)=""/77, 0x4d}], 0x1, 0x0) 22:00:11 executing program 4: write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x200a01, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000, 0x0) setxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.ima\x00', 0x0, 0x0, 0x2) close(0xffffffffffffffff) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:00:11 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2b7, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:11 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(r0, &(0x7f0000000040)="b9", 0xffffffab, 0x480c0, 0x0, 0x572e574d65a9e821) [ 721.823710][T25434] device nr0 entered promiscuous mode 22:00:11 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2b8, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:11 executing program 4: write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x200a01, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000, 0x0) setxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.ima\x00', 0x0, 0x0, 0x2) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:00:11 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0xa04100, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r5, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r5, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) sendmsg$SEG6_CMD_SETHMAC(r5, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20201008}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, 0x0, 0x8, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x8}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr="de8bd58ab1ed358bded1b3a2ee9ccac8"}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}}]}, 0x54}, 0x1, 0x0, 0x0, 0x20040040}, 0x80) prctl$PR_GET_CHILD_SUBREAPER(0x25) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) 22:00:11 executing program 3: 22:00:11 executing program 3: 22:00:11 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2b9, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 722.442121][T25434] device nr0 entered promiscuous mode 22:00:12 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0xfc000000, 'c\x86\xdd'}]}, 0xfdef) 22:00:12 executing program 4: write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x200a01, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:00:12 executing program 3: 22:00:12 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2ba, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:12 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$RXRPC_SECURITY_KEYRING(r1, 0x110, 0x2, &(0x7f0000000040)='\x00', 0x1) bind$nfc_llcp(r0, &(0x7f0000000080)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x40002b}, 0x60) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x6000) ioctl$VHOST_NET_SET_BACKEND(r2, 0x4008af30, &(0x7f0000000140)={0x2}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r3, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r3, 0xc0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x3, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x1, 0x1}, 0x0, 0x0, &(0x7f0000000200)={0x3, 0xa, 0x9, 0xf7a2}, &(0x7f0000000240)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x6}}, 0x10) close(r0) 22:00:12 executing program 3: 22:00:12 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2bb, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 722.828557][T25477] device nr0 entered promiscuous mode 22:00:12 executing program 4: write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x200a01, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:00:12 executing program 3: 22:00:12 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x400002, 0x0) 22:00:12 executing program 3: 22:00:12 executing program 4: write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x200a01, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:00:13 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0xfe800000, 'c\x86\xdd'}]}, 0xfdef) 22:00:13 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2bc, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:13 executing program 3: 22:00:13 executing program 4: write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x200a01, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:00:13 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x20000, 0x0) ioctl$SG_GET_PACK_ID(r1, 0x227c, &(0x7f0000000040)) close(r0) 22:00:13 executing program 3: 22:00:13 executing program 4: write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:00:13 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2bd, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 723.712794][T25517] device nr0 entered promiscuous mode 22:00:13 executing program 3: 22:00:13 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) lsetxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="00fb5b01057e9e02b7ecb2295c64c02e16d42ed73ab5cd48ea6b535eb895f1149dd3efb824a1f9e0db165ee6f6be83a08dc23faab4c54d31466aaaa94e3eb9b5f00ac86426034546a00c597e1c6aea3ed333cd331f4de794cf0b3b32c6aea834bceb6916f70000"], 0x5b, 0x1) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) 22:00:13 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x6, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0xffffffffffffff39) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) readahead(r1, 0x8001, 0x7) close(r0) rt_sigpending(&(0x7f0000000000), 0x8) 22:00:13 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2be, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 724.432024][T25517] device nr0 entered promiscuous mode 22:00:14 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0xfec00000, 'c\x86\xdd'}]}, 0xfdef) 22:00:14 executing program 3: 22:00:14 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:00:14 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x5d01841a45852b41, 0x80) openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.sched_load_balance\x00', 0x2, 0x0) close(r0) 22:00:14 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2bf, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:14 executing program 3: 22:00:14 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x4, 0x0, 0x6, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x396) close(r0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$inet6_sctp(0xa, 0x0, 0x84) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x0, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) accept(r3, &(0x7f00000004c0)=@pppoe={0x18, 0x0, {0x0, @remote}}, &(0x7f0000000000)=0x80) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000009c0)={{{@in6, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000040)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xa, r4}) sendmmsg$inet(r1, &(0x7f0000004480)=[{{&(0x7f0000000000)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000500)=[{&(0x7f0000000040)="b994134839c21bf8c917166e0031ea8c241b5040be13c3a165f28fe89378fd0a2e0ee2437b63621800b1f54131bfc495619789fb76decf799107be6407bf09acf64888b996ea7184103bf982d7d95e84373f7782c9410c15d04110b47ab3a8df1f302ac0147845e2a34c747702e17d", 0x6f}, {&(0x7f00000000c0)="c8ff01a584845a807cf6fe8b768d5fa54d5da05a9031d616d1eb75721cdf1e4f399ccc", 0x23}, {&(0x7f0000000180)="f0c621e0664949629dce8bf031ed17700eeaa5bc7680f6de362822eff489ca1cf29cb1b978526e3e30eeff2608684ca2ae5e2268aa8b1b06e3c4beb8fc5fb3ef8e7855af49f198969f87d91c612e060983412739e8fe9ba1172b05b9dad845244861a69cd9fb98affece0ba55333a64ebab7c761c3101c84f1ec93b4a12a06117d72cf45c7f1bab7d751350dc5039d79cd16b737f616da09677b065e13d6cacf3755a40a4410b1c0bc8302c7830272b455a2a986bd9667ccbe16232bd873d2ddac1d4c6323afc44ccef690c1d1323e6898586d342ab47f6b", 0xd8}, {&(0x7f0000000280)="ec18d208f69365e675e6801043128faba16e7e2fc89f4b8672c94467bbb2a5909db13b918fdb7fe29b1ece012fb0d34ac3d26715e446f36a5b73c4fa4ff455f2382e4324a7ca97bd69e4", 0x4a}, {&(0x7f0000000300)="ddf32825ef6bf1d86124b44fc7cac166a1707d2fc0736f647d6774b00d075979b419f34006bcebe5fb50414199c17e62b3c8a9e6de884e32f1384aa6c9245f22494d6fa762615d3f2ac22826d79b5c66d87d40ecd5a132896ff141", 0x5b}, {&(0x7f0000000380)="266ce50bf48447798208de1545f003c3f7b622ce0dc464fb31f6e6a0642dd2c2b4c9c0e72152779ba23479dfc19d0d60ae71d730b337bad2abe7604dff042050062061d25e5deef46b9cf4c38c4c950e3ce9671e374ed595d4a35a", 0x5b}, {&(0x7f0000000400)}, {&(0x7f0000000440)="ad7afdf8c54f7aeb09a889a71734ab1571da9b8a22803ef7c1cf5daf8d32d3f15d033a5f268823c0a1cbd402ba757c53386e27561404de7de62656a7e50e1ca3197f1f1506b07425c8f43e0fc04a61651c7ea6f229cb74f04c58dd1ab2da3d58210cefcd1e8951a5467b4e53ea2229e778c8eeb6bfff8d94dcac1c31a88ae2231c303eb8dad3f5f85d1c97f4c027c002954a6b3c63302d7d4fdbdc7ca07845da8c55d8a449552244e1e79259ec31e8610931a4c4f1e3fb68108034c48fe19b", 0xbf}], 0x8, &(0x7f0000000580)=[@ip_ttl={{0x14, 0x0, 0x2, 0x200}}, @ip_ttl={{0x14, 0x0, 0x2, 0x3}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @rand_addr=0x40, @remote}}}], 0x50}}, {{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000600)="b2dd45d60d89b603273dbae1a5398d4c06e1f084db505c5f7bb3a59069d13cf5271ee14502bbd052dd5107e805147b0ab09694cf3f41d92e00d0f9b07d698936ec8cf9040fc6de84c6706b6316b1dfbdfd5b1f1407a0e5fc10e4015689442b01ea77201821268ea7ebd9", 0x6a}, {&(0x7f0000000680)="7e913c3ee95387d93d587d01df9f2bd19670eeb57fead7ebb7a9afba52840332d0f9a15fb5cd76ff15a3c7ecab6559aabf2d72209a9e57ef5f0d4b10af57a58b75f04817212516e95cea865c3a6821b8f6383e6f4d7f45304ce66c91614dc79a71bbb48e3ed0a49b548a3a6fa1b320bba63d11421ea82e90407b8de5012f875a33e598031b3a6175b9a2a6cd503309fb250ef3913ae82ebb1ac00617a6460a341052dee2af112161bafea49e9fa9250a59d50c55589ff323b4b750861975b50990f7", 0xc2}, {&(0x7f0000000780)="994595aa26b32301a7e0f32e260faf4ff89c", 0x12}], 0x3, &(0x7f0000000800)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x6}}], 0x18}}, {{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000840)="2005b7260f2358a8dd903ffc230cbebe22766277bf732d95d96bf74246a9bf5bf12e280b8d090aca697a109eb46640bd148976c3285c69f0358ed4d4f91a999ebe76eb83ddee8ad7d5a109b772421c9010cf38ac58143a6fa7f63ad1e1f3a1e2b93e44a7ef57647e5a09790c0eca8430260732790901493c37720e4a05cf337898e17c5158d35231df353583831674915c90505ac49ff44b6d5137336df8768b7512a2f4cae478be2f6b0fddf7e577ab03a9882c0cb23df625e595dc3dcc10ea8e27495f13efa37b3478dc36a7a71ed81d064b7cf2b4ce859ad4df664cf31f2eabf6a78cf01b2ad844d264dcb12dae1898f99f0253", 0xf5}, {&(0x7f0000000940)="cb736dc0e98005785bce179dc3ca57b459bcb5b6d03757b4cc2d8f6e293760138a83cacc482aeeae42fec6bfd73a27d225423c34386ec8a1a0f4eaf8", 0x3c}, {&(0x7f0000000980)="11b26e8e8ba864fdd48c54cb50f1292d63a1b2f85d0ae5a692a2cd3dc908a45ff63aeb53e875709e3ca417701ea968f93bc5313a66d3cb6bc1fbdb65d24fdb310d331d870a484cb3d8b800448af60be0e86709087f39ba4e1d50", 0x5a}, {&(0x7f0000000a00)="011326d73512062f24e2cb42085ca5f422b14b5aa5181164a58e9315e26471b03fda93cf63", 0x25}, {&(0x7f0000000a40)}, {&(0x7f0000000a80)="9dc1ed0673b368", 0x7}, {&(0x7f0000000ac0)="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", 0x1000}], 0x7}}, {{&(0x7f0000001b40)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000002c40)=[{&(0x7f0000001b80)="14e674135499d21aa4deab1ad55317ba6739d38b775b6febb1c15a78cdb91a767b9fddcf645e59c926b206d3d158a6aed69ebff69c941967821a36650f634d65c92125b1533a2673bf270c3636dc4ce5a012a4af83529ec24f441fb98a71d19148be69b2b6e9dbdd213653d0c3457adff24df727e14d1f04d5a76e56703e6a408391f9c4153bf1b2fab47dda37c2f48e5fa536782f25255a6825955cae93c804e44a29f61389f1a681fa33c4447c7ab4e2d81d48156734b6f46e6790aa4c1f52d3761e2c4db645733f7b1715e0acc697b65e4b0ccba3deaa5f18d425965022d8e92741535596b43fac802e9bfc5437c1658e28ad101af932ce6991301529c10cb916601706dda6e786a6e3f503e73bdb708f28b5939a30170566d15e0b6fbb2f3788e6ee4518d660e138a1586c6d91e5f755be02a8c374b6e64b80c3d75bb276d6c08b46e3694a2e3b1ca10ae37c799a28d8cabe2828b3694bbbc242a2ce255b9bcd77cdd75badcb3aa2e62e244cc688436c35e990f5c820b8872c6aa633084f74411f57d9c3f932b8717c08ea6b446451c2dea4fb5d216e185803bb525e2ad8c58c77a3617b79a718047dfc38e78078e19ebe6d22370e8bfc44eec213ae4cd850b83e0473a54fd31e6585ea39924f36c73921f9e0ff19ad3a354773721e447974f3b61e888853c32c84ff2da748b79aa3116308f714a7c6b39e970b90b2f8fa51d10480dd1fd8aa5c1829add8c77af8dbd751b344136d46ea18700cda7f4517b3e69ba32cbdaa8aca74a1137daecb8d00bab69c0c25119d3e8dd3f2d71e017d206f6254ca88ae708ff9da3a808e7bc476af8f0532405c68e780e5974b35718e819ceb1e58fa425748f6d69795ba888c956f58ee2946465e8c941bb4e83ec34127203b9948e9beeed3be5afec34ce1deee3437bcecf22b7b4ceed78c6c38d10e86767431de21d0e095258f3a979e43cbea6a3bfbf6003ec9eb38be076e0978c9364b507457fd142fc15014b1088d8d3e2547e0205192aa257a8dbbf529a3d3d3c7c0fd3735d2b21362b7107f3667aca31eaa6be643aee2bce8c2e1aec0704c9be4cd087692e8ba28c0e663db870a67dad36e1a1ae812d6cc18c4a8d4faf71a4d6ef9049e698a86adc2022e50b8a017fb76fff366460a6809a29e9a37639f87b5b4420e0c33c065bd1d6c29d0460fe0660c491d726fc3ba7dd9212aef64419b34dbd6c696e2d928e30fca75e97f8711e21ea9527fb8891247be1955e10751e9c0147c5d9e0600a728972eec88217a23bb97e522e45cbca0a53a5482325a75c3b89f797a1b2537216698edf9bb09e5d2fae650359d59918b1c9c58673208bdfadf9861381356a3cb786cd167e2543492bb366b35e16a1f1eccb6eebabbe410dd0280459eb9e44bc46396f796a6606e082496a664f8945740cb6c667362dd613f7230964ecc61bd55fbc166be199541e82e39a23a2aada174b66dafa97689d4e2b79211728dbf37e5f4329daee267492ee18790f3e59e8338c1e20a76a16ffd198bef2c1d7bee9ace948ea2cb41801a3a2bc6174b0520da86185cb577b9833e0a313811c9fa92486e169502ce02b6de39760c2c8a0ba94f2013fb7fd74f68c49ec4c9b94d7e3c6213ddbc5f2cd390d2deea7bcb1869c3179de5b66a20c4a622f8442bf93aed6c0b2c309f148e02c0d53a39672e7fad5c819f09e67d8544f17b745497d26e8e989ce9d31372f0fcec914a8f4ef14f615a9c02570d87854f201775badb72057dcb280ef28b11ed7e08c6eecc36b8018bac0fc710516e8402de327c8e9b0ad7431a6538d6f0fca00b00212c2add6c9144cca08641337f6e2c230d0b1f7a8a179228c2d036068160b104171308ff7232c31f6a5c6081ee93d8863a1cf6a284c728b750969a79f289ad081ca138365a126129d157b75670508cb1ccb61ef9cf8edeeedb0347febf91ffc4ea19dd9f522bb10c681487da3ed6c9fad12ca87011cbf39530fce2162ad090f07fc014c4bc209489a56cb57b56978f721788932d89d84c2928d5bb52df3b66d48689048d486baab127880551c903f2445b0a15102ec461868464aed45b6604cb025e92fee9512717aae4a7ed6854f74dd6515f0cac8f566201c49985fa0fa7ca44d20da0fe5661396bce48460e4347f4cb7e8e46b1d327c2ce755ffe4a2a8de8b12c63dfd1a731d4a582d42e582ea8c8fb00c48b157fe8e89819f2129a61c261b6c9418aaf6c81b1468f8625c13c45c1e219934d9e2c160ee3cdf3571794f4468e5fb29c067d5b80f81b0300ed54670e488fd1cf8427741e7fcc181d158ae5ce9afbf0c134fa3c7f639270f6a7361bd3a7a2abef12e0eae9f15d472589203d1229b2b33863f66977cdf1deec8ccb3f8d0a0baf41e2380f2f573afa58479817aaad424eaa798ff926b0413171ca99bea4deb8c2165643fef21f3d1e0820ccbad17ed217429a396eb0a698602eacabcfc869c7274c4c688e892a87a007193be4ca2cc1cc2a2515536effe77a04a5bfb6cac288fd06dbecc26c669b6d5dd410041c2e05e6bcc55e30a861d85bdd838f1c095c05c3354d5f3fcebe7995471e541b3a128b4eb6db77da84eaef267a98ea82d9d770a5b48f2c37aac0381a971240440bb0ae504b4e29d925d5f41e62dc197226c21dfabd744a98c1b8ce0cffa1f855883b726c3e61c9f414a5c000978b42adf3dab9767ad9c622fe4f9999f157593b32e6afa11e21d6ff554551de35b861a6782f205438ff8caeba0e686bd1753ad45c2e424209534362e0870e916ba8d44ae360cb3c1e39577dd42af73ff102c95da9bdbb571541084f6707a6185cdfe9c68bfd2742280d8ecf9eac89ae8afe3c9b4f897e8ce46ce0f133f6e003f79ea9aefc52bfee5602713f7c43bb3a5a400b933c53c7154572859de9f46cec3760c75560274416148126e5b50d10adb644885a1f67ef03ac867476eab26666fe9b16a2f18b7197fa4632d9dc498474218a40b5c6abe410a40af166a279087f28db5934108a3ff4011f75eba89a35f3698c6902245226fccb65a51e3e438cfd642e4ac1508800fe82bd49b18c2d97d39af94da463bd1c4425e65a78698dd6be5b2e9c1a1d4c79fc3f4b37e5e32239a9f6c9aca735d7e2bc5bb65b0ca7d611695825dd491ceb0011c731c762e1ac9f2ca6f58ea3e4df518d701875d7e0669aeee7271d9c054b69ab6af52cf141c44ecba17c1dfcef3db15fa61f77059c8f8b753a563ec9a55b38bf6e1c7c10486df0394b90b5545b3fa16a67e5fc98f0bd742d04f3ffb071f416dd6c887178bc2713740c031b99d3323f87b14defd78c4d6e3e59621350c4e68e3b501415fea171536d7f3a7fe1cfb2589cbc109aa0d9c4c4891ae0410a784ea9eaeb90cc5dcc3de6655339df76631670fbb95f501e4d80f51277f8a8735e29165b4a2ba574ddb7d9d31cb94984d4dbd6b6d9f997ce9c7b54126c857b277bd462d0d4521e0538a2a86ed19b73a8cbcb9cc54b69255cbbd8419b85103cd26a53d2a031a54e1dc476e3110a507b65848f583e729025dc07a2ac37b8e9a2827d9e55cb66363a73267a008c4540635083b4ed88cc41f5813793a383840223962b0f92ea5f33ce321405fa5ceb752a9af8e89d4213b27f5c9757ff5ce120da99b4277bbfa3bf63d0c2e7fd662fce51a86e2d4c2b1f75d8d87f633f6f54f6c9a697fa756794401d8d8315fbf93d95fd63d9437372a8310648f481754b0b29e87c338ea1af9f2d5016e395fe1ec925737e5e3f64ee5d712db65238291dc61b8e3f9ea82c857ddf45052c5d2dac57ff53c7da4e2dc2e2bfa18f26431dd76f335c3a0f4672d1fc0bd3741720f0759dac3b42d25fe506dac5b9c07e4121d1492bcf83320abf9de5c154cdf7f0cbaa27ef12602590509e05d7c48d61517447405412cced848ddafbbc41b1099f764731058d063f99e27bb2c0aea301fd385bbbe25b809cfcb12dd30426d9a3703d994d30aa596d0dcceea0bb407509256e5382c8be4786f8f96473db1460083784a55170c3bf7905b4ebd8199643375dd6e58e4d6b56f4d7d8b7204b661a9ccd2ee1ec72f2b9e4485a1c870c46ba1d0f8b36507b5ea3be1203e28f24414fb6e5bac0dbc17d44bbd4f809949bc540d458c20311c8d6e572741dd177cee9e9de66ad3620e1b46272dd2fddd36db6d1529b9c860e6a5017ae69897dd7f7bd420179b09d11ef142bed68e32fe196acac38dbaa0a55deb7b3917b4ad096a72385fd65a7750a29a13399a30678fd35e0a24dec0343a3d063718a3beb9bc9ab4ba1443a25900089d8e6a7c43a67d4938ade2c5db1e2cdac2c08daa269b7ced0c6e646a96b0af62e8a264b38c2fd96f861e1b1e40bc3aa890314ad40adfe93efd905ecec3778a4fe2d43d6de366cf599b71b03b56f3c8ff4f3405dcfd11a21128cbdbe37e91c25f19dee0ae160a5f816cc9eae3f51b2e410081dc97732ba50563f5abf186c76ab7a16568b5b5516940e81d9a6b5419ce0b65b326c36949cc9f76c8828d2bef2d163714412bf9f3c4650a6684c1ed5012cea884c5de845c41ef0fb3ae74e94da1b0ccd2a5a22dc32aede40b2c477c5bcc6fa6b47b98e17825c32ad904236fa7330c95c15f2f56aa742c35e76be27836d90996940dbc6298458423a0d007b995a42f6983dbfb8fecd5a6a3a71e4621294c35dc4e82d1a953772a708a1fe1cd24f8f08eeff68bfa8437c87914527677ab435c6b1bd310bd6a8beebc658d27d8f33b3bcea28a4fedeb3d5587c3a56603377cdb6ca1bc763b93228364ac0ba79fda0421dfa32da404a84dbd0b68ebaf792a4fe817139ebbc0e34a91fef700eebd89ee38e6a752b9565d37690cc487f2d6bef3f6ac19c4f85c0c9f2a86f89112a5b920da476d43820216cb55f3ba3e5feb74c3f3cb9651ceb77c087ad6b42367bffc1741ea36c94b705ccd164aa194a7284e4557ab08c3c5d046b57f02df6977f37a07e443f261cb298ac1e227282e8043a0c3c06afcf8910c6e2762cad3cdc6c5da34f45fbdb1d0aa4fcf10f148da89c01a8c5920e46a64936d6c518ad3ceb95ff2384d788b250104977ce1f54407da926282d46bb7f7bb2903feba00d8eaacedc85ded7f94b613784d4dd9f8d1345d6c03304162e75649099a75e21f9c1747cf03401a59d72df02ca8dc6b315761e6c5bca4d6e26d5d443f71955a2b6fc37260188d389a7bd72aeb9a52d0a00a1551aae8328e6a318b5d993f9c24f95b834b7a60fed6cad987b85f2b562a9c4723f8067eb8600e4d4a30a3b437f411df9dacf1add3edc2bc4477c9070d6544b1982872ee3d27c3c6ce4c772552310be6a31b6e8305f6cd13ce89274987ad8cad3acd91c1857d976ab5cb14e61a48aaa9a54a7f60b6fae4ac28f294c0d331d95fa5ab26e8a8ed79158c462cec2edec4afbdb3c761db593bc6968837ce5b405ca72b3b151c61eef1f42416793a6a97caf9676771c57f28a5bae75e65ad3034917ccb52d3c6d1e4717d4128bbbdc1718ac8d8fde3003299c53ed2d625ef3129993de238710b491c58ecb8d743a3d34ce541393f0bbebd33b6e8e957d8774a1e7e7de64b2db364e8447d9c848567890f363d31ee44e623f120f4716948d69513f8aec18682e73c6b78775fb34b71becac6a7eeb3c20a9088133be14ed8f171336cfd8f16d74195eaf15168156b03a8fc6c55a045b2511723cf26802499ae9e5ef583d979da5279a210920c1a85b6640e962dbfe086b2abccdadafcc7e1d03c1df2e8f980cf43548291467ad06e9d4", 0x1000}, {&(0x7f0000002b80)="cb755a74e2a932442610c92f9f269705946d6021cc98651ff9c76cefd3d5e1fc61f2eb52cf0a5d163bf4d914b1c81bfe979bb084595da159e5be3cc8d1ffb086f43813d18cb3192234dfb787adec2ba654299187f69538e2fa366339230bc0d6", 0x60}, {&(0x7f0000002c00)="aa948c1a78dedbd7eb085c890ed2bcba19e9318fbbea4026bc7215af7591ad4037b9", 0x22}], 0x3}}, {{0x0, 0x0, &(0x7f0000003140)=[{&(0x7f0000002c80)="34171d07a8a9df1752786d8773d8af3beb8a4a00ff68099c2f19632a66", 0x1d}, {&(0x7f0000002cc0)="7dce012388eb47076d182e5708020c07e5b9ca3307fef2f647a2066c87c43afbdd4590671a75b3de4df71554a84296425d387ba78df43eac939448b984a5b45ebd10055ca25b65f3f22aa1a150b908c19d45dfd9095eb3e9321174ed5be33e77c02905b7e253a43e465ee59e28ed821e52b0e501374b5690813869a1088b3b0569aca0b5a83a0e04a9a8810972ec423bb83c72b6523f92bcf407a864e80e0b49fbee94abe1a6a79e5f634472e797ae79759a36278291a0af3c8a52a14b7eb248ed28", 0xc2}, {&(0x7f0000002dc0)="30c5e9c984ab5cb9466e7d94840b1f844ad9110b738c3d31d09bf9bfbc2c7b2bbeeaae5500241ce334cc29344dc3aa9687dae241eecc5bb5d636a34d851d28238679be2ef5a72eb7dbb203f74b2315b679a732daa986bded858981a8cca0a997b9d92844cceadf34d01ab38cd1a86385ffc3151e60065d6b3ccfff939dc268c0f523b1734a1cbeb5b9", 0x89}, {&(0x7f0000002e80)="6a7a8348de7c0efc745e60b63e491fd5d414b7ca76d2cc47e1278a6fb294780686ee60bc3d78b5b083504ea172886c0442092399d4f17e2ba2418a63b1e6a246530e7bb4b1a639c1775630", 0x4b}, {&(0x7f0000002f00)="45fc976a024f5e33c705", 0xa}, {&(0x7f0000002f40)="11eff8df04994e5f213b1a894791a8", 0xf}, {&(0x7f0000002f80)="c74ea00da0cb94e2b26d47a2a94b68b86d861ecf243724758294f3269ae650925a2046b082a3bb35ce326fadcc72fc6d986cf9704220b43f9076616f2359fc9abc7a155ff317d4270ed07779d1c691180f59af0d5b9c9b46310e4a486d860a8ec7ba608059f5d271929063696570fe1342fc9657413257d8f193368c9c93f081ed4fcaa9d8500d6416158d8ce87a351a77bb8ade9dc1d0c99252cbd77583367b7bda9e4d8d036f8fe5ea262bcb6662c3", 0xb0}, {&(0x7f0000003040)="a0071cb6bd6c1a6f4e4eaf4fa9ae72be96ed08d56f1cc6adc6d7f89037b4e6a580e99618d7818412745bc630170fa4b34bb0b0d719a499646218a6eaddb3a88adb717361024765d9790b77f35066b9080a5131b2c57a60e72d30d15905cf19fe850fd716eb7233a5b143b1d6a4bdd632be85cd72337a2b3d752f0dd392ce125db866d5e34df2c23a1711b58107b7945a8d1b23c65bddefdaa5e10af0aa1431144b8675a975d64a5aca1b1c444461fd828540e5cc602ffa92f5a526cc790b5c3f6ca0de40ac829e04f0a79740990d01b9c2d36df141864793", 0xd8}], 0x8, &(0x7f00000031c0)=[@ip_ttl={{0x14}}, @ip_ttl={{0x14, 0x0, 0x2, 0xff}}], 0x30}}, {{&(0x7f0000003200)={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f00000032c0)=[{&(0x7f0000003240)="87c14772062c5ee87e7326c162447c16c2c094ade8b9ecec44eefa79499fd690e6b1e6592d83806a5d3a4366fa730798853a27b42342345f37488368e8a98c3b89f4cf2e32107f8de75b", 0x4a}], 0x1, &(0x7f0000003300)=[@ip_retopts={{0x70, 0x0, 0x7, {[@cipso={0x86, 0x51, 0x3ff, [{0x2, 0x2}, {0x5, 0x7, "2987c96d3f"}, {0x5, 0x7, "e3387bd243"}, {0x5, 0x8, "ac08699dd6e7"}, {0x5, 0x6, 'A:9~'}, {0x2, 0x12, "feded8caaac8bbb5341615f7e0552723"}, {0x1, 0xa, "3eb4161b575be21e"}, {0x2, 0x9, "7fcca7bc655b4f"}, {0x2, 0x2}, {0x6, 0x6, "140edff1"}]}, @ssrr={0x89, 0xf, 0x9, [@dev={0xac, 0x14, 0x14, 0x28}, @empty, @remote]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x54, 0x0, 0x7, {[@cipso={0x86, 0x31, 0x7f, [{0x7, 0xf, "9c44a2087958d20ab4f810ba25"}, {0x7, 0x8, "0fa72529f91e"}, {0x7, 0x4, "aba0"}, {0x2, 0x10, "1bb707d81eae13c7102e595dac1a"}]}, @generic={0x94, 0x5, "54cb44"}, @rr={0x7, 0xb, 0xfffffffffffffff8, [@broadcast, @rand_addr=0x401]}]}}}], 0xe0}}, {{&(0x7f0000003400)={0x2, 0x4e23, @empty}, 0x10, &(0x7f0000004440)=[{&(0x7f0000003440)="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", 0x1000}], 0x1}}], 0x7, 0x8800) [ 724.769130][T25562] device nr0 entered promiscuous mode 22:00:14 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2c0, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:14 executing program 3: 22:00:14 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) socket$inet_udplite(0x2, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r4, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r4, &(0x7f0000000140), 0x0, 0x2) getsockopt$inet_udp_int(r4, 0x11, 0x65, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:00:14 executing program 4: openat$ptmx(0xffffffffffffff9c, 0x0, 0x4000, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:00:14 executing program 3: [ 725.442838][T25562] device nr0 entered promiscuous mode 22:00:15 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0xff000000, 'c\x86\xdd'}]}, 0xfdef) 22:00:15 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2c1, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:15 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r3, 0x4048ae9b, &(0x7f00000002c0)={0xe0003}) ioctl$KVM_SET_MSRS(r3, 0x8090ae81, &(0x7f0000000000)) dup2(r0, r3) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r4, 0x660c) close(r0) 22:00:15 executing program 3: 22:00:15 executing program 4: openat$ptmx(0xffffffffffffff9c, 0x0, 0x4000, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:00:15 executing program 3: 22:00:15 executing program 4: openat$ptmx(0xffffffffffffff9c, 0x0, 0x4000, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) [ 725.804145][T25605] device nr0 entered promiscuous mode 22:00:15 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2c2, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:15 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x0, [], [{0xf6c, 0x4, 0xfffffffffffffffa, 0x6, 0x3, 0xb4}, {0x20, 0x5f9d, 0x3, 0x4b, 0x4, 0x8}], [[], [], []]}) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) close(r0) 22:00:15 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet6(0xa, 0x3, 0x3c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r4, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r4, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) 22:00:15 executing program 3: 22:00:15 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:00:16 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0xffffff7f, 'c\x86\xdd'}]}, 0xfdef) 22:00:16 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2c3, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:16 executing program 3: 22:00:16 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) close(r0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) 22:00:16 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:00:16 executing program 3: [ 726.680441][T25649] device nr0 entered promiscuous mode 22:00:16 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2c4, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:16 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) pipe2(&(0x7f0000000000), 0x400) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) close(r0) 22:00:16 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:00:16 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r5, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r5, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) setsockopt$bt_BT_DEFER_SETUP(r5, 0x112, 0x7, &(0x7f0000000040)=0x1, 0x4) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) 22:00:16 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r2, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$VIDIOC_G_OUTPUT(r2, 0x8004562e, &(0x7f0000000180)) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000000)={0x400000000, 0x4, [0x7, 0x6, 0x7fff, 0x8, 0x908b], 0x10001}) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) close(r0) 22:00:16 executing program 3: 22:00:16 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0xffffff84, 'c\x86\xdd'}]}, 0xfdef) 22:00:16 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:00:16 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2c5, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:16 executing program 3: 22:00:17 executing program 3: 22:00:17 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) [ 727.514521][T25691] device nr0 entered promiscuous mode 22:00:17 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2c6, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:17 executing program 3: 22:00:17 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) 22:00:17 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x8000, 0x20000) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000100)=@sha1={0x1, "abee21dfa3893bf96e0bc27c798b7af8263b98ad"}, 0x15, 0x3) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) 22:00:17 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2c7, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:17 executing program 3: [ 728.081799][T25691] device nr0 entered promiscuous mode 22:00:17 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) close(r0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000080)) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x800, 0x30402) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r3, 0xc004ae02, &(0x7f0000000180)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$IP_VS_SO_SET_TIMEOUT(r2, 0x0, 0x48a, &(0x7f0000000040)={0x3f, 0x9, 0x9}, 0xc) 22:00:17 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) 22:00:17 executing program 3: 22:00:17 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0xffffff88, 'c\x86\xdd'}]}, 0xfdef) 22:00:17 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2c8, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:18 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x156, &(0x7f0000000680)={&(0x7f00000004c0)=ANY=[@ANYBLOB="240000002e0009abe71fd02b09ad6678e82a5da402000000020001000000000000000000ef24d08faf3809e81fe49e8ee5268a000000000009e0f7a741f18fd48f00000000000000000000000000000000000000000000cf00"/102], 0x24}}, 0x1) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 728.452725][T25732] device nr0 entered promiscuous mode 22:00:18 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2c9, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='veth1_to_team\x00', 0x10) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(r0, &(0x7f0000000040)="b9", 0xffffffab, 0x480c0, 0x0, 0x572e574d65a9e821) 22:00:18 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2ca, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 728.852950][T25732] device nr0 entered promiscuous mode 22:00:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x2a4, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c0000002200fd03000800000800010000"], 0x14}}, 0x0) r1 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000380)=[@op, @op]}], 0x4924aa4, 0x0) 22:00:18 executing program 3: r0 = socket$inet6(0xa, 0x4000000080002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c) sendmmsg$inet(r0, &(0x7f00000016c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 22:00:18 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2cb, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:18 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) prctl$PR_SVE_GET_VL(0x33, 0x1703c) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f0000000000)) fsconfig$FSCONFIG_SET_BINARY(r0, 0x2, &(0x7f00000001c0)='/dev/kvm\x00', &(0x7f0000000200)="f9dd44a40a37b9296cfbfe7fa6d39b1ecbe05770cd962c6936db79c621432e930de7f014b17fb15eb126af43b942f48e7d881978c02d97065f276443564e531937faae03bf47a42940023ec9246d3f2f5d723111c22669f26b266da3a2b478c231843d9e4f2d8a346c457ae340b479756ddd8fe0d353efd03b9c97594c1f671254048842bf576e7b0b67d756009b32dfbeeff29b541018b7592282a1e3ce5fd60e7705a10fd0d4c7aa3d545e83100ffe0108b627650606927d839104f2b5d41921d5c619baf1e429c257164a16a7cc979aeade6890f7ca8fb4c365218dcfcf105b", 0xe1) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000380)) close(r0) 22:00:18 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r0, 0x8, &(0x7f0000000740)) r1 = socket(0x11, 0x2, 0x0) r2 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r2, 0x107, 0xf, &(0x7f00000001c0)="a2e6999b", 0x4) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r2, &(0x7f00000002c0)={{0x108, 0x0, 0x0, 0x24a, 0x0, 0x0, 0x0, 0x0, 0x5}, "e606b1c2062a6d0000000000"}, 0xfdef) r3 = socket(0x10, 0x3, 0x0) r4 = socket$inet(0x2, 0x714a238ca84d0453, 0x17a8) ioctl$sock_inet_SIOCDELRT(r4, 0x890c, &(0x7f0000000480)={0x0, {0x2, 0x4e22, @empty}, {0x2, 0x4e24, @remote}, {0x2, 0x4e23, @loopback}, 0x28, 0x0, 0x0, 0x0, 0x81, &(0x7f0000000440)='veth0_to_team\x00', 0xffffffffffffff7f, 0x3, 0x2}) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000240)={0x49e}, 0x10) write(r3, &(0x7f0000000000)="1c0000001e009b8a14e5f407000904000a0000000000000001000000", 0x1c) r5 = socket$unix(0x1, 0x1, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r5, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x98, r6, 0x208, 0x70bd28, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0xfffffffffffffffb}]}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x8}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x200}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@remote}]}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x400}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x18}}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x80}, 0x4) sendmsg$IPVS_CMD_NEW_DEST(r3, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="fc001fe6", @ANYRES16=r6, @ANYBLOB="00082cbd7000fddbdf250500000014000300080004009ade0000080001000000000060000100080009006500000014000300fe88000000000000000000000000010108000b00736970000c0007000a000000400000000800020021000000080004004e200000080004004e2200000c0007003b00000010000000080001000200000008000600ffffffff3400010008000600666f0000080001000a0000000c00070020000000200000000c000700090000002200000008000200770000003000010008000b0073697000080009007c00000008000b007369700014000300ac1414aa00"/238], 0xf4}, 0x1, 0x0, 0x0, 0x20008810}, 0x9a980) sendmsg$IPVS_CMD_ZERO(r2, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x82000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="340000006cbc14b9d3784e77df4a5121702733b3581060efedb317d0725b59762dd7d71268eda7187783427622eb5530b29c88425f2d3f7435f7d6c40dfa312b17bb2a3295d6fb6fbbf63e73d7e0f480d1abcc2b104287062292ff8b28523d46955a59ed2640de52e84d4ef5b0d19ee4f4c27f3ab2a5d34e01a1cab8ebb0134acac339", @ANYRES16=r6, @ANYBLOB="20002bbd7000ffdbdf251000000008000600090000001800030014000600fe8000000000000000000000000000aa"], 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000180)="c667bf2331c3e60fcff0d67159517ca8", 0x10) accept(r1, 0x0, &(0x7f0000000040)) r7 = socket(0x400000000000010, 0x802, 0x0) write(r7, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r7, 0x29, 0xd2, &(0x7f00000008c0)={{0xa, 0x4e23, 0xffff, @remote, 0x27c}, {0xa, 0x4e24, 0x7, @remote, 0x8}, 0x1000, [0x2, 0x5, 0x401, 0x1, 0xf5, 0x6, 0x9, 0x401]}, 0x5c) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bond0\x00\x00\x00\x00\x00\x00\x00\x06\x01\x00'}) write(r7, &(0x7f0000000940)="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", 0x1000) r8 = socket(0x400000000010, 0x2, 0x0) recvmsg(r8, &(0x7f00000027c0)={0x0, 0x326, 0x0, 0x0, &(0x7f0000000100)=""/146, 0x1c}, 0x0) setsockopt$sock_int(r8, 0x1, 0x10, &(0x7f00000000c0)=0x522, 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000700)={'bond0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03', 0xffb}) 22:00:18 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2cc, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:18 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0xffffff89, 'c\x86\xdd'}]}, 0xfdef) 22:00:19 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r3, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f0000000340)={0x6, {{0x2, 0x4e20, @loopback}}}, 0x88) ioctl$VIDIOC_DECODER_CMD(r1, 0xc0485660, &(0x7f0000000040)={0x2, 0x2, @raw_data=[0x6, 0x1, 0x76, 0x2, 0x8, 0x2, 0x7, 0x6, 0x7, 0xffff, 0x4, 0x80, 0x9, 0x8004, 0x80000001, 0x1ff]}) r4 = socket$inet6(0xa, 0x3, 0x3c) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r6, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r6, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x200000, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r9, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r9, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$VIDIOC_DV_TIMINGS_CAP(r9, 0xc0905664, &(0x7f00000001c0)={0x0, 0x0, [], @raw_data=[0x8, 0x2, 0x1a, 0x6, 0x80000000, 0xd1, 0x1, 0x81, 0x68, 0xffffffff7fffffff, 0x8, 0x9, 0xe88b, 0x7ff, 0x5, 0x80, 0x5, 0x0, 0x8001, 0xffffffff, 0x7, 0x80000001, 0x4, 0xe9, 0x803, 0x7fffffff, 0xdeea, 0xd2b2, 0x1000, 0x9, 0x4, 0x8001]}) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f0000000100)={r7, r8}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r10, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r10, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r10, 0x40042409, 0x1) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) r11 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) r12 = shmat(r11, &(0x7f0000ffb000/0x1000)=nil, 0x0) shmdt(r12) shmdt(r12) 22:00:19 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2cd, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:19 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2ce, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 729.824091][T25782] device bond0 entered promiscuous mode [ 729.846509][T25782] device bond_slave_0 entered promiscuous mode 22:00:19 executing program 4 (fault-call:3 fault-nth:0): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:00:19 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2cf, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 729.873456][T25782] device bond_slave_1 entered promiscuous mode [ 729.905166][T25782] 8021q: adding VLAN 0 to HW filter on device bond0 [ 729.940408][T25788] device nr0 entered promiscuous mode 22:00:19 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x20, 0x1, 0x5, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2e}, 0x60) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000000c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000008940)={{{@in6=@remote, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@empty}}, &(0x7f0000008a40)=0xe8) r5 = socket$inet6_sctp(0xa, 0x0, 0x84) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x0, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r6, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r6, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) accept(r6, &(0x7f00000004c0)=@pppoe={0x18, 0x0, {0x0, @remote}}, &(0x7f0000000000)=0x80) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000009c0)={{{@in6, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8916, &(0x7f0000000040)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xa, r7}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008a80)={'team0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000008ac0)={{{@in=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000008bc0)=0xe8) r10 = socket$inet6_sctp(0xa, 0x0, 0x84) r11 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r11, 0x6, 0x0, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r11, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r11, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r11, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) accept(r11, &(0x7f00000004c0)=@pppoe={0x18, 0x0, {0x0, @remote}}, &(0x7f0000000000)=0x80) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f00000009c0)={{{@in6, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r10, 0x8916, &(0x7f0000000040)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xa, r12}) r13 = socket$inet6_sctp(0xa, 0x0, 0x84) r14 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r14, 0x6, 0x0, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r14, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r14, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r14, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) accept(r14, &(0x7f00000004c0)=@pppoe={0x18, 0x0, {0x0, @remote}}, &(0x7f0000000000)=0x80) getsockopt$inet_IP_XFRM_POLICY(r14, 0x0, 0x11, &(0x7f00000009c0)={{{@in6, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r13, 0x8916, &(0x7f0000000040)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xa, r15}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000008c00)={{{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000008d00)=0xe8) r17 = socket$inet6_sctp(0xa, 0x0, 0x84) r18 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r18, 0x6, 0x0, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r18, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r18, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r18, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) accept(r18, &(0x7f00000004c0)=@pppoe={0x18, 0x0, {0x0, @remote}}, &(0x7f0000000000)=0x80) getsockopt$inet_IP_XFRM_POLICY(r18, 0x0, 0x11, &(0x7f00000009c0)={{{@in6, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r17, 0x8916, &(0x7f0000000040)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xa, r19}) r20 = socket$inet6_sctp(0xa, 0x0, 0x84) r21 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r21, 0x6, 0x0, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r21, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r21, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r21, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) accept(r21, &(0x7f00000004c0)=@pppoe={0x18, 0x0, {0x0, @remote}}, &(0x7f0000000000)=0x80) getsockopt$inet_IP_XFRM_POLICY(r21, 0x0, 0x11, &(0x7f00000009c0)={{{@in6, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r20, 0x8916, &(0x7f0000000040)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xa, r22}) r23 = socket$inet6_sctp(0xa, 0x0, 0x84) r24 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r24, 0x6, 0x0, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r24, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r24, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r24, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) accept(r24, &(0x7f00000004c0)=@pppoe={0x18, 0x0, {0x0, @remote}}, &(0x7f0000000000)=0x80) getsockopt$inet_IP_XFRM_POLICY(r24, 0x0, 0x11, &(0x7f00000009c0)={{{@in6, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r23, 0x8916, &(0x7f0000000040)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xa, r25}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000008d40)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@empty}}, &(0x7f0000008e40)=0xe8) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r27, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r27, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r27, 0x29, 0x22, &(0x7f0000008f00)={{{@in=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000009000)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000009400)={@broadcast, @dev, 0x0}, &(0x7f0000009440)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000009b40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x410}, 0xc, &(0x7f0000009b00)={&(0x7f0000009480)={0x678, r2, 0xe00, 0x70bd2d, 0x25dfdbff, {}, [{{0x8, 0x1, r3}, {0x74, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8}}}]}}, {{0x8, 0x1, r4}, {0x1f0, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1f}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffc}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}]}}, {{0x8, 0x1, r9}, {0x40, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}]}}, {{0x8, 0x1, r15}, {0xb0, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x1f}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r16}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xff}}}]}}, {{0x8}, {0x1b0, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x81}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r19}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x2e}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x10000}}}]}}, {{0x8, 0x1, r22}, {0x130, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xac}}, {0x8, 0x6, r25}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r26}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r28}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r29}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}]}}]}, 0x678}, 0x1, 0x0, 0x0, 0x1000}, 0x40000) close(r0) [ 730.085967][T25802] FAULT_INJECTION: forcing a failure. [ 730.085967][T25802] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 730.156082][T25802] CPU: 0 PID: 25802 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 730.165352][T25802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 730.175436][T25802] Call Trace: [ 730.178760][T25802] dump_stack+0x172/0x1f0 [ 730.183149][T25802] should_fail.cold+0xa/0x15 [ 730.187759][T25802] ? fault_create_debugfs_attr+0x180/0x180 [ 730.193595][T25802] ? ___might_sleep+0x163/0x280 [ 730.198486][T25802] should_fail_alloc_page+0x50/0x60 [ 730.203692][T25802] __alloc_pages_nodemask+0x1a1/0x900 [ 730.210283][T25802] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 730.215834][T25802] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 730.221128][T25802] ? __alloc_pages_slowpath+0x2540/0x2540 [ 730.226874][T25802] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 730.233124][T25802] ? fput_many+0x12c/0x1a0 [ 730.237548][T25802] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 730.243916][T25802] alloc_pages_current+0x107/0x210 [ 730.249044][T25802] __get_free_pages+0xc/0x40 22:00:19 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) ioctl$int_in(r2, 0xd32d56f53dbaaaf4, &(0x7f0000000040)=0x4) r4 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x4862, 0x8000) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$fou(&(0x7f00000056c0)='fou\x00') sendmsg$FOU_CMD_ADD(r5, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x24, r6, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_LOCAL_V4={0x8, 0x6, @initdev}, @FOU_ATTR_PEER_V4={0x8, 0xb, @rand_addr=0xf0}]}, 0x24}}, 0x0) r7 = socket$inet6_sctp(0xa, 0x0, 0x84) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r8, 0x6, 0x0, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r8, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r8, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) accept(r8, &(0x7f00000004c0)=@pppoe={0x18, 0x0, {0x0, @remote}}, &(0x7f0000000000)=0x80) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f00000009c0)={{{@in6, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000040)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xa, r9}) sendmsg$FOU_CMD_ADD(r4, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x64, r6, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r9}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @loopback}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_PEER_V4={0x8, 0x8, @empty}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_PEER_V6={0x14, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}}]}, 0x64}, 0x1, 0x0, 0x0, 0x100}, 0x8000) r10 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r10, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) [ 730.253641][T25802] __x64_sys_mincore+0x25b/0x860 [ 730.258581][T25802] ? lockdep_hardirqs_on+0x418/0x5d0 [ 730.264051][T25802] do_syscall_64+0xfa/0x760 [ 730.268559][T25802] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 730.274453][T25802] RIP: 0033:0x4598e9 [ 730.278360][T25802] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 730.298057][T25802] RSP: 002b:00007f786c5e8c78 EFLAGS: 00000246 ORIG_RAX: 000000000000001b 22:00:19 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2d0, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 730.306525][T25802] RAX: ffffffffffffffda RBX: 00007f786c5e8c90 RCX: 00000000004598e9 [ 730.314535][T25802] RDX: 0000000020000580 RSI: 0000000000002000 RDI: 0000000020ffe000 [ 730.322522][T25802] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 730.330530][T25802] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f786c5e96d4 [ 730.338603][T25802] R13: 00000000004c5d52 R14: 00000000004da788 R15: 0000000000000004 22:00:20 executing program 4 (fault-call:3 fault-nth:1): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) [ 730.630128][T25766] device bond0 left promiscuous mode [ 730.664976][T25766] device bond_slave_0 left promiscuous mode [ 730.692151][T25766] device bond_slave_1 left promiscuous mode [ 730.772105][T25837] FAULT_INJECTION: forcing a failure. [ 730.772105][T25837] name failslab, interval 1, probability 0, space 0, times 0 [ 730.793888][T25837] CPU: 1 PID: 25837 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 730.803059][T25837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 730.813121][T25837] Call Trace: [ 730.816446][T25837] dump_stack+0x172/0x1f0 [ 730.820802][T25837] should_fail.cold+0xa/0x15 [ 730.825501][T25837] ? fault_create_debugfs_attr+0x180/0x180 [ 730.831323][T25837] ? ___might_sleep+0x163/0x280 [ 730.836182][T25837] __should_failslab+0x121/0x190 [ 730.841127][T25837] should_failslab+0x9/0x14 [ 730.845647][T25837] kmem_cache_alloc_trace+0x2d3/0x790 [ 730.851371][T25837] ? __kasan_check_read+0x11/0x20 [ 730.856409][T25837] do_huge_pmd_wp_page_fallback+0x131/0x1740 [ 730.862404][T25837] ? perf_trace_lock_acquire+0xf5/0x530 [ 730.867964][T25837] ? find_held_lock+0x35/0x130 [ 730.872910][T25837] ? defrag_store+0x360/0x360 [ 730.877592][T25837] ? lock_downgrade+0x920/0x920 [ 730.882529][T25837] ? swp_swapcount+0x540/0x540 [ 730.887294][T25837] ? shrink_huge_zero_page_scan+0x1a0/0x1a0 [ 730.893185][T25837] ? __kasan_check_read+0x11/0x20 [ 730.898207][T25837] ? do_raw_spin_unlock+0x57/0x270 [ 730.903324][T25837] do_huge_pmd_wp_page+0x7ff/0x2300 [ 730.908520][T25837] ? __kasan_check_read+0x11/0x20 [ 730.913556][T25837] ? __split_huge_pmd+0x2810/0x2810 [ 730.918771][T25837] ? __kasan_check_read+0x11/0x20 [ 730.923800][T25837] ? pmd_val+0x85/0x100 [ 730.923822][T25837] ? add_mm_counter_fast.part.0+0x40/0x40 [ 730.933666][T25837] ? debug_smp_processor_id+0x3c/0x214 [ 730.933690][T25837] __handle_mm_fault+0x14cf/0x3f20 [ 730.944330][T25837] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 730.944361][T25837] ? __kasan_check_read+0x11/0x20 [ 730.954910][T25837] handle_mm_fault+0x1b5/0x6c0 [ 730.954933][T25837] __do_page_fault+0x536/0xdd0 [ 730.964446][T25837] do_page_fault+0x38/0x590 [ 730.968949][T25837] page_fault+0x39/0x40 [ 730.968966][T25837] RIP: 0010:copy_user_generic_unrolled+0xa0/0xc0 [ 730.968980][T25837] Code: 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 4c 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a 06 <88> 07 48 ff c6 48 ff c7 ff c9 75 f2 31 c0 0f 1f 00 c3 0f 1f 40 00 [ 730.968987][T25837] RSP: 0018:ffff888058b77e68 EFLAGS: 00010202 [ 730.968998][T25837] RAX: 0000000000000000 RBX: 0000000000000002 RCX: 0000000000000002 [ 730.969006][T25837] RDX: 0000000000000002 RSI: ffff8880a8576000 RDI: 0000000020000580 [ 730.969021][T25837] RBP: ffff888058b77ea0 R08: 1ffff110150aec00 R09: ffffed10150aec01 [ 730.980250][T25837] R10: ffffed10150aec00 R11: ffff8880a8576001 R12: 0000000020000580 [ 730.980259][T25837] R13: ffff8880a8576000 R14: 0000000020000582 R15: 00007ffffffff000 [ 730.980295][T25837] ? _copy_to_user+0x146/0x160 [ 730.980321][T25837] __x64_sys_mincore+0x3cd/0x860 [ 731.006064][T25837] do_syscall_64+0xfa/0x760 [ 731.021980][T25837] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 731.021992][T25837] RIP: 0033:0x4598e9 [ 731.022007][T25837] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 731.022019][T25837] RSP: 002b:00007f786c5e8c78 EFLAGS: 00000246 ORIG_RAX: 000000000000001b [ 731.038975][T25837] RAX: ffffffffffffffda RBX: 00007f786c5e8c90 RCX: 00000000004598e9 [ 731.038984][T25837] RDX: 0000000020000580 RSI: 0000000000002000 RDI: 0000000020ffe000 [ 731.038992][T25837] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 731.039000][T25837] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f786c5e96d4 [ 731.039008][T25837] R13: 00000000004c5d52 R14: 00000000004da788 R15: 0000000000000004 22:00:20 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000002500)=[{{&(0x7f0000000000)=@generic, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000080)=""/151, 0x97}, {&(0x7f0000000140)=""/178, 0xb2}, {&(0x7f0000000200)=""/155, 0x9b}, {&(0x7f00000002c0)=""/38, 0x26}, {&(0x7f0000000300)=""/183, 0xb7}], 0x5, &(0x7f0000000440)=""/105, 0x69}, 0x1}, {{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f00000004c0)}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/206, 0xce}], 0x3, &(0x7f0000001640)=""/102, 0x66}, 0x6}, {{0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000016c0)=""/32, 0x20}], 0x1, &(0x7f0000001740)=""/226, 0xe2}, 0x402}, {{&(0x7f0000001840)=@x25, 0x80, &(0x7f0000001940)=[{&(0x7f00000018c0)=""/85, 0x55}], 0x1}, 0x80}, {{0x0, 0x0, &(0x7f0000001dc0)=[{&(0x7f0000001980)=""/177, 0xb1}, {&(0x7f0000001a40)=""/140, 0x8c}, {&(0x7f0000001b00)=""/215, 0xd7}, {&(0x7f0000001c00)=""/52, 0x34}, {&(0x7f0000001c40)=""/145, 0x91}, {&(0x7f0000001d00)=""/191, 0xbf}], 0x6}, 0xffff}, {{&(0x7f0000001e40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000002000)=[{&(0x7f0000001ec0)=""/9, 0x9}, {&(0x7f0000001f00)=""/206, 0xce}], 0x2, &(0x7f0000002040)=""/127, 0x7f}, 0x2}, {{&(0x7f00000020c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f00000023c0)=[{&(0x7f0000002140)=""/113, 0x71}, {&(0x7f00000021c0)=""/91, 0x5b}, {&(0x7f0000002240)=""/184, 0xb8}, {&(0x7f0000002300)=""/180, 0xb4}], 0x4, &(0x7f0000002400)=""/213, 0xd5}, 0x1}], 0x7, 0x10120, &(0x7f00000026c0)) ioctl$SIOCX25GCALLUSERDATA(r0, 0x89e4, &(0x7f0000002700)={0x55, "6dba06226d58082c822c6c0f4e25aaf75d82aa9ea2ff977437376bd2c92c3e6febf457f419c34a52253d51bc504d57af217b7bfc745334384ca01a410612f867cd4d9428bf50230efc3d2024ae88e182531b40107147564896287ded5f88ba4f0404e4410c6367e0605527a6b763eeac8b3369521f9ea6b107ef775f70d32370"}) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000002bc0)={&(0x7f00000027c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000002840)=""/132, 0x84}, {&(0x7f0000002900)=""/2, 0x2}, {&(0x7f0000002940)}, {&(0x7f0000002980)=""/64, 0x40}, {&(0x7f00000029c0)=""/90, 0x5a}, {&(0x7f0000002a40)=""/234, 0xea}], 0x6}, 0x22001) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000002c00)='/dev/dlm_plock\x00', 0x280001, 0x0) io_setup(0x5, &(0x7f0000002c40)=0x0) io_destroy(r3) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000002cc0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000002d80)={&(0x7f0000002c80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000002d40)={&(0x7f0000002d00)={0x1c, r4, 0x20, 0x70bd2b, 0x25dfdbfd, {}, [""]}, 0x1c}}, 0x8000) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r2, 0x5386, &(0x7f0000002dc0)) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000002e00)='/dev/null\x00', 0x40, 0x0) ioctl$KDDELIO(r5, 0x4b35, 0x2) setxattr$security_selinux(&(0x7f0000002e40)='./file0\x00', &(0x7f0000002e80)='security.selinux\x00', &(0x7f0000002ec0)='system_u:object_r:clock_device_t:s0\x00', 0x24, 0x1) creat(&(0x7f0000002f00)='./file0\x00', 0x80) r6 = syz_open_dev$dmmidi(&(0x7f0000002f40)='/dev/dmmidi#\x00', 0x1, 0x0) ioctl$PPPIOCSPASS(r6, 0x40107447, &(0x7f0000002fc0)={0x2, &(0x7f0000002f80)=[{0x1, 0x2772, 0x1, 0x8}, {0x8000, 0xfffffffffffffff0, 0x6, 0x9}]}) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000003000)='/dev/cachefiles\x00', 0x400000, 0x0) io_uring_register$IORING_REGISTER_EVENTFD(r7, 0x4, &(0x7f0000003040)=r2, 0x1) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000003080)={0x0, 0x80000}) ioctl$DRM_IOCTL_GEM_FLINK(r2, 0xc008640a, &(0x7f00000030c0)={r8}) syz_open_dev$dspn(&(0x7f0000003100)='/dev/dsp#\x00', 0x9, 0xe3a37f9122c38312) r9 = openat$nullb(0xffffffffffffff9c, &(0x7f0000003140)='/dev/nullb0\x00', 0x400000, 0x0) ioctl$EXT4_IOC_MIGRATE(r9, 0x6609) r10 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000003180)='/dev/btrfs-control\x00', 0x1, 0x0) ioctl$SIOCRSSL2CALL(r10, 0x89e2, &(0x7f00000031c0)=@default) lseek(r7, 0x0, 0x0) ioctl$VIDIOC_S_AUDOUT(r6, 0x40345632, &(0x7f0000003200)={0x100000001, "0ab0ad9137a40ee84c32f0896a1c210d7c97f3df47308ef4f55fc8b3000405c3", 0x1, 0x3}) r11 = syz_open_dev$media(&(0x7f0000003240)='/dev/media#\x00', 0x8000, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r6, 0x84, 0x6d, &(0x7f0000003280)={0x0, 0xcc, "bdd2b2d40cb451da650693dce3840ee142540cbb80428e5994b4c3e60e88b7c2f8d31cad99144a3bab093504609e662abc5c68f1d33b753d87b1b4c3f3c5ae3effc42027a5ef854845073be17bb4b32c5df62ebce8c665279c52da3aa7e6df9a78af229c37723c08cc55a7de4ea67745fa430ab974300e2de83c55d4a3b1b917cbe82cc234bf0877547878d35951dead8d397cc8327c14f13ef84329065b577aacd45cd18cc36f8d960023ea6e4b1fd34aab0e5ef340fe19b5365032d201721b6d7e9475971e4f13e5de46b7"}, &(0x7f0000003380)=0xd4) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r11, 0x84, 0x18, &(0x7f00000033c0)={r12, 0x4}, &(0x7f0000003400)=0x8) 22:00:20 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2d1, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 731.207918][T25783] device nr0 entered promiscuous mode 22:00:21 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0xffffff8d, 'c\x86\xdd'}]}, 0xfdef) 22:00:21 executing program 4 (fault-call:3 fault-nth:2): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:00:21 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) close(r0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = gettid() tkill(r2, 0x1004000000013) syz_open_procfs$namespace(r2, &(0x7f0000000180)='ns/ipc\x00') write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="cc6b80e7e863c8d7f1a5aa7050ec1d38f02cbea2fc21ad0e6692d008c7ac426ea40b4efee5b2e97ed9194e3c42dcdc4f1061cc02ef8bae227fede0f18e5e26f4104f1302785e41daf5c9c6e0fffa0f21bb7f47acfa76672eb3077fefe6610daa3f1cea5a6e99dff2e44ce7274f390cb3cef40e8e737d6f5111210cd85302c16ef68fa745a1b1c12279aec971bdd7f69878b8ea708e6f8affa0495dedd50447e1c6275697a3e505e991ff9597c803d12d0d263f10921989bc", 0xb8) 22:00:21 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) openat$userio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/userio\x00', 0x40, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r5, 0x4048ae9b, &(0x7f00000002c0)={0xe0003}) ioctl$KVM_SET_MSRS(r5, 0x8090ae81, &(0x7f0000000000)) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) close(r1) r7 = socket$inet6(0xa, 0x3, 0x3c) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r7, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) 22:00:21 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2d2, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:21 executing program 3: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x4}, 0x10) accept4(r0, &(0x7f0000000040)=@l2, &(0x7f00000000c0)=0x80, 0x80800) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f00000000c0)='./file0\x00') mkdirat(r2, &(0x7f0000000200)='./file1\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)={'#! ', './file0', [{}, {0x20, 'lo'}, {0x20, '}bdevtrusted,'}, {0x20, 'eth1'}, {0x20, ':vmnet1vboxnet0.'}, {0x20, 'md5sum\'em0/usercpusetnodev\x8bposix_acl_access'}, {0x20, 'securityppp1+'}, {0x20, '*cpuset[.GPL'}], 0xa, "6cdaa5fdd86a219764bdd091c792ac7953b181b9e09ca5ba8a8f3dc999d823a071f803a488a7127854192f56e53035787307b7c0424d1ac96f0a36aa5cff1093a77022a399c2bb3ecdf79d7dbd49ca07e27595263e96696e448b4d8efbe03029664d4bb56361e67cf474c2c5b877a93e892060f7707654ee0a7f5945e1b299050867747e007ec6aae89ac537fd5daa48260b722da84688c10d35609dad4b3b75f847c7270d75796fd33c5d2fd6887ed16005aaa6c9c39961"}, 0x132) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)=0x20000008) symlinkat(&(0x7f00000002c0)='./file0/file0\x00', r1, &(0x7f0000000180)='./file0/file0\x00') renameat2(r1, &(0x7f0000000100)='./file0/file0\x00', r1, &(0x7f0000000000)='./file0\x00', 0x2) write(r0, &(0x7f0000000100)="240000001a005f0014f9f407000904000a00000000000000000000000800020000000000", 0x538) [ 731.612843][T25859] FAULT_INJECTION: forcing a failure. [ 731.612843][T25859] name fail_page_alloc, interval 1, probability 0, space 0, times 0 22:00:21 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2d3, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:21 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000880)) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) r2 = gettid() tkill(r2, 0x1004000000013) ptrace$peek(0xffffffffffffffff, r2, &(0x7f0000000140)) ioctl$VIDIOC_S_AUDIO(r1, 0x40345622, &(0x7f0000000040)={0x9, "34ede5aac4dfcf463c5721b35ea03b327798538e76c5214f29b4fa24cf5105e6", 0x0, 0x2}) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000100)=0xffffffffffff0000) [ 731.720561][T25868] device nr0 entered promiscuous mode [ 731.767186][T25859] CPU: 0 PID: 25859 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 731.776343][T25859] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 731.786666][T25859] Call Trace: [ 731.789973][T25859] dump_stack+0x172/0x1f0 [ 731.794324][T25859] should_fail.cold+0xa/0x15 [ 731.798941][T25859] ? fault_create_debugfs_attr+0x180/0x180 [ 731.804773][T25859] ? ___might_sleep+0x163/0x280 [ 731.809654][T25859] should_fail_alloc_page+0x50/0x60 [ 731.814866][T25859] __alloc_pages_nodemask+0x1a1/0x900 [ 731.820246][T25859] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 731.826588][T25859] ? __alloc_pages_slowpath+0x2540/0x2540 [ 731.826603][T25859] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 731.826627][T25859] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 731.826641][T25859] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 731.826661][T25859] alloc_pages_vma+0x1bc/0x3f0 [ 731.826684][T25859] do_huge_pmd_wp_page_fallback+0x1f0/0x1740 [ 731.826699][T25859] ? perf_trace_lock_acquire+0xf5/0x530 [ 731.826718][T25859] ? find_held_lock+0x35/0x130 [ 731.826735][T25859] ? defrag_store+0x360/0x360 [ 731.826754][T25859] ? lock_downgrade+0x920/0x920 [ 731.826772][T25859] ? swp_swapcount+0x540/0x540 [ 731.866941][T25859] ? shrink_huge_zero_page_scan+0x1a0/0x1a0 [ 731.866960][T25859] ? __kasan_check_read+0x11/0x20 [ 731.866975][T25859] ? do_raw_spin_unlock+0x57/0x270 [ 731.866993][T25859] do_huge_pmd_wp_page+0x7ff/0x2300 [ 731.867004][T25859] ? __kasan_check_read+0x11/0x20 [ 731.867025][T25859] ? __split_huge_pmd+0x2810/0x2810 [ 731.867040][T25859] ? __kasan_check_read+0x11/0x20 [ 731.867059][T25859] ? pmd_val+0x85/0x100 [ 731.867073][T25859] ? add_mm_counter_fast.part.0+0x40/0x40 [ 731.867090][T25859] ? debug_smp_processor_id+0x3c/0x214 [ 731.867110][T25859] __handle_mm_fault+0x14cf/0x3f20 [ 731.902155][T25859] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 731.902190][T25859] ? __kasan_check_read+0x11/0x20 [ 731.902219][T25859] handle_mm_fault+0x1b5/0x6c0 [ 731.958483][T25859] __do_page_fault+0x536/0xdd0 [ 731.963259][T25859] do_page_fault+0x38/0x590 [ 731.967765][T25859] page_fault+0x39/0x40 [ 731.971932][T25859] RIP: 0010:copy_user_generic_unrolled+0xa0/0xc0 [ 731.978265][T25859] Code: 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 4c 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a 06 <88> 07 48 ff c6 48 ff c7 ff c9 75 f2 31 c0 0f 1f 00 c3 0f 1f 40 00 [ 731.998137][T25859] RSP: 0018:ffff88804715fe68 EFLAGS: 00010202 [ 732.004215][T25859] RAX: 0000000000000000 RBX: 0000000000000002 RCX: 0000000000000002 [ 732.012189][T25859] RDX: 0000000000000002 RSI: ffff88805a80a000 RDI: 0000000020000580 [ 732.020163][T25859] RBP: ffff88804715fea0 R08: 1ffff1100b501400 R09: ffffed100b501401 [ 732.028136][T25859] R10: ffffed100b501400 R11: ffff88805a80a001 R12: 0000000020000580 [ 732.036807][T25859] R13: ffff88805a80a000 R14: 0000000020000582 R15: 00007ffffffff000 [ 732.045077][T25859] ? _copy_to_user+0x146/0x160 [ 732.049855][T25859] __x64_sys_mincore+0x3cd/0x860 [ 732.054809][T25859] do_syscall_64+0xfa/0x760 [ 732.059327][T25859] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 732.065220][T25859] RIP: 0033:0x4598e9 [ 732.069129][T25859] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 732.088830][T25859] RSP: 002b:00007f786c5e8c78 EFLAGS: 00000246 ORIG_RAX: 000000000000001b [ 732.097249][T25859] RAX: ffffffffffffffda RBX: 00007f786c5e8c90 RCX: 00000000004598e9 [ 732.105228][T25859] RDX: 0000000020000580 RSI: 0000000000002000 RDI: 0000000020ffe000 22:00:21 executing program 4 (fault-call:3 fault-nth:3): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) [ 732.113350][T25859] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 732.121328][T25859] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f786c5e96d4 [ 732.129300][T25859] R13: 00000000004c5d52 R14: 00000000004da788 R15: 0000000000000004 22:00:21 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2d4, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 732.285953][T25881] FAULT_INJECTION: forcing a failure. [ 732.285953][T25881] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 732.316677][T25881] CPU: 0 PID: 25881 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 732.325837][T25881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 732.335909][T25881] Call Trace: [ 732.339215][T25881] dump_stack+0x172/0x1f0 [ 732.343566][T25881] should_fail.cold+0xa/0x15 [ 732.348177][T25881] ? fault_create_debugfs_attr+0x180/0x180 [ 732.353990][T25881] ? ___might_sleep+0x163/0x280 [ 732.358850][T25881] should_fail_alloc_page+0x50/0x60 [ 732.364046][T25881] __alloc_pages_nodemask+0x1a1/0x900 [ 732.369405][T25881] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 732.375550][T25881] ? __alloc_pages_slowpath+0x2540/0x2540 [ 732.381273][T25881] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 732.386818][T25881] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 732.393214][T25881] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 732.399453][T25881] alloc_pages_vma+0x1bc/0x3f0 [ 732.404214][T25881] do_huge_pmd_wp_page_fallback+0x1f0/0x1740 [ 732.410198][T25881] ? perf_trace_lock_acquire+0xf5/0x530 [ 732.416072][T25881] ? find_held_lock+0x35/0x130 [ 732.420828][T25881] ? defrag_store+0x360/0x360 [ 732.425501][T25881] ? lock_downgrade+0x920/0x920 [ 732.430355][T25881] ? swp_swapcount+0x540/0x540 [ 732.435288][T25881] ? shrink_huge_zero_page_scan+0x1a0/0x1a0 [ 732.441174][T25881] ? __kasan_check_read+0x11/0x20 [ 732.446193][T25881] ? do_raw_spin_unlock+0x57/0x270 [ 732.451294][T25881] do_huge_pmd_wp_page+0x7ff/0x2300 [ 732.456481][T25881] ? __kasan_check_read+0x11/0x20 [ 732.461514][T25881] ? __split_huge_pmd+0x2810/0x2810 [ 732.466715][T25881] ? __kasan_check_read+0x11/0x20 [ 732.471741][T25881] ? pmd_val+0x85/0x100 [ 732.475883][T25881] ? add_mm_counter_fast.part.0+0x40/0x40 [ 732.481599][T25881] ? debug_smp_processor_id+0x3c/0x214 [ 732.487068][T25881] __handle_mm_fault+0x14cf/0x3f20 [ 732.492171][T25881] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 732.497823][T25881] ? __kasan_check_read+0x11/0x20 [ 732.502893][T25881] handle_mm_fault+0x1b5/0x6c0 [ 732.507640][T25881] __do_page_fault+0x536/0xdd0 [ 732.512388][T25881] do_page_fault+0x38/0x590 [ 732.516883][T25881] page_fault+0x39/0x40 [ 732.521037][T25881] RIP: 0010:copy_user_generic_unrolled+0xa0/0xc0 [ 732.527351][T25881] Code: 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 4c 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a 06 <88> 07 48 ff c6 48 ff c7 ff c9 75 f2 31 c0 0f 1f 00 c3 0f 1f 40 00 [ 732.547203][T25881] RSP: 0018:ffff888058367e68 EFLAGS: 00010202 [ 732.553258][T25881] RAX: 0000000000000000 RBX: 0000000000000002 RCX: 0000000000000002 [ 732.561226][T25881] RDX: 0000000000000002 RSI: ffff8880676d7000 RDI: 0000000020000580 [ 732.569299][T25881] RBP: ffff888058367ea0 R08: 1ffff1100cedae00 R09: ffffed100cedae01 [ 732.577270][T25881] R10: ffffed100cedae00 R11: ffff8880676d7001 R12: 0000000020000580 [ 732.585257][T25881] R13: ffff8880676d7000 R14: 0000000020000582 R15: 00007ffffffff000 [ 732.593345][T25881] ? _copy_to_user+0x146/0x160 [ 732.598112][T25881] __x64_sys_mincore+0x3cd/0x860 [ 732.603047][T25881] do_syscall_64+0xfa/0x760 [ 732.607712][T25881] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 732.613592][T25881] RIP: 0033:0x4598e9 [ 732.617483][T25881] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 732.637092][T25881] RSP: 002b:00007f786c5e8c78 EFLAGS: 00000246 ORIG_RAX: 000000000000001b [ 732.645503][T25881] RAX: ffffffffffffffda RBX: 00007f786c5e8c90 RCX: 00000000004598e9 [ 732.653458][T25881] RDX: 0000000020000580 RSI: 0000000000002000 RDI: 0000000020ffe000 [ 732.661425][T25881] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 732.669392][T25881] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f786c5e96d4 [ 732.677356][T25881] R13: 00000000004c5d52 R14: 00000000004da788 R15: 0000000000000004 22:00:22 executing program 4 (fault-call:3 fault-nth:4): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) [ 732.743783][T25868] device nr0 entered promiscuous mode 22:00:22 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r7, 0x4048ae9b, &(0x7f00000002c0)={0xe0003}) ioctl$KVM_SET_MSRS(r7, 0x8090ae81, &(0x7f0000000000)) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FS_IOC_SETVERSION(r7, 0x40087602, &(0x7f0000000200)=0x2) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r8, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r8, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = accept(r9, 0x0, &(0x7f0000000240)) readv(r10, &(0x7f00000007c0)=[{&(0x7f0000000280)=""/4, 0x4}, {&(0x7f0000000380)=""/139, 0x8b}, {&(0x7f0000000440)=""/161, 0xa1}, {&(0x7f0000000500)=""/10, 0xa}, {&(0x7f0000000540)=""/85, 0x55}, {&(0x7f0000001200)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/254, 0xfe}, {&(0x7f00000006c0)=""/130, 0x82}, {&(0x7f0000000780)=""/64, 0x40}], 0x9) ioctl$SG_SET_COMMAND_Q(0xffffffffffffffff, 0x2271, &(0x7f00000001c0)=0x1) ioctl$DRM_IOCTL_AGP_ENABLE(r8, 0x40086432, &(0x7f0000000040)=0x1ff) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r11, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r11, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) setsockopt$inet_udp_int(r11, 0x11, 0xb, &(0x7f0000000140)=0x8, 0x4) [ 732.862057][T25891] FAULT_INJECTION: forcing a failure. [ 732.862057][T25891] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 732.902044][T25891] CPU: 1 PID: 25891 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 732.911202][T25891] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 732.921272][T25891] Call Trace: [ 732.924608][T25891] dump_stack+0x172/0x1f0 [ 732.928968][T25891] should_fail.cold+0xa/0x15 [ 732.933583][T25891] ? fault_create_debugfs_attr+0x180/0x180 [ 732.939400][T25891] ? ___might_sleep+0x163/0x280 [ 732.944269][T25891] should_fail_alloc_page+0x50/0x60 [ 732.949479][T25891] __alloc_pages_nodemask+0x1a1/0x900 [ 732.954855][T25891] ? __alloc_pages_slowpath+0x2540/0x2540 [ 732.960588][T25891] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 732.966848][T25891] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 732.973090][T25891] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 732.979346][T25891] alloc_pages_vma+0x1bc/0x3f0 [ 732.984124][T25891] do_huge_pmd_wp_page_fallback+0x1f0/0x1740 [ 732.990201][T25891] ? perf_trace_lock_acquire+0xf5/0x530 [ 732.995858][T25891] ? defrag_store+0x360/0x360 [ 733.000545][T25891] ? lock_downgrade+0x920/0x920 [ 733.005593][T25891] ? swp_swapcount+0x540/0x540 [ 733.010399][T25891] ? shrink_huge_zero_page_scan+0x1a0/0x1a0 [ 733.016307][T25891] ? __kasan_check_read+0x11/0x20 [ 733.021346][T25891] ? do_raw_spin_unlock+0x57/0x270 [ 733.026466][T25891] do_huge_pmd_wp_page+0x7ff/0x2300 [ 733.031665][T25891] ? __kasan_check_read+0x11/0x20 [ 733.036704][T25891] ? __split_huge_pmd+0x2810/0x2810 [ 733.041906][T25891] ? __kasan_check_read+0x11/0x20 [ 733.046938][T25891] ? pmd_val+0x85/0x100 [ 733.051112][T25891] ? add_mm_counter_fast.part.0+0x40/0x40 [ 733.056849][T25891] ? debug_smp_processor_id+0x3c/0x214 [ 733.062323][T25891] __handle_mm_fault+0x14cf/0x3f20 [ 733.067444][T25891] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 733.073006][T25891] ? __kasan_check_read+0x11/0x20 [ 733.078041][T25891] handle_mm_fault+0x1b5/0x6c0 [ 733.082812][T25891] __do_page_fault+0x536/0xdd0 [ 733.087588][T25891] do_page_fault+0x38/0x590 [ 733.092095][T25891] page_fault+0x39/0x40 [ 733.096260][T25891] RIP: 0010:copy_user_generic_unrolled+0xa0/0xc0 [ 733.102586][T25891] Code: 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 4c 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a 06 <88> 07 48 ff c6 48 ff c7 ff c9 75 f2 31 c0 0f 1f 00 c3 0f 1f 40 00 [ 733.122376][T25891] RSP: 0018:ffff888059a0fe68 EFLAGS: 00010202 [ 733.128443][T25891] RAX: 0000000000000000 RBX: 0000000000000002 RCX: 0000000000000002 [ 733.136511][T25891] RDX: 0000000000000002 RSI: ffff888067951000 RDI: 0000000020000580 [ 733.144478][T25891] RBP: ffff888059a0fea0 R08: 1ffff1100cf2a200 R09: ffffed100cf2a201 [ 733.152443][T25891] R10: ffffed100cf2a200 R11: ffff888067951001 R12: 0000000020000580 [ 733.160645][T25891] R13: ffff888067951000 R14: 0000000020000582 R15: 00007ffffffff000 [ 733.168696][T25891] ? _copy_to_user+0x146/0x160 [ 733.173451][T25891] __x64_sys_mincore+0x3cd/0x860 [ 733.178397][T25891] do_syscall_64+0xfa/0x760 [ 733.182890][T25891] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 733.188772][T25891] RIP: 0033:0x4598e9 [ 733.192676][T25891] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 733.212280][T25891] RSP: 002b:00007f786c5e8c78 EFLAGS: 00000246 ORIG_RAX: 000000000000001b [ 733.220722][T25891] RAX: ffffffffffffffda RBX: 00007f786c5e8c90 RCX: 00000000004598e9 [ 733.228680][T25891] RDX: 0000000020000580 RSI: 0000000000002000 RDI: 0000000020ffe000 [ 733.236649][T25891] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 733.244662][T25891] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f786c5e96d4 [ 733.252631][T25891] R13: 00000000004c5d52 R14: 00000000004da788 R15: 0000000000000004 22:00:22 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x100000000000000, 'c\x86\xdd'}]}, 0xfdef) 22:00:22 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2d5, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 733.399866][T25908] device nr0 entered promiscuous mode 22:00:24 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2d6, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:24 executing program 4 (fault-call:3 fault-nth:5): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:00:24 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r7, 0x4048ae9b, &(0x7f00000002c0)={0xe0003}) ioctl$KVM_SET_MSRS(r7, 0x8090ae81, &(0x7f0000000000)) r8 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r9 = ioctl$KVM_CREATE_VM(r8, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r9, 0xae41, 0x0) r10 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r11 = ioctl$KVM_CREATE_VM(r10, 0xae01, 0x0) r12 = ioctl$KVM_CREATE_VCPU(r11, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r11, 0x4048ae9b, &(0x7f00000002c0)={0xe0003, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4da7d6f5]}) ioctl$KVM_SET_MSRS(r12, 0x8090ae81, &(0x7f0000000000)) r13 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r14 = ioctl$KVM_CREATE_VM(r13, 0xae01, 0x0) r15 = ioctl$KVM_CREATE_VCPU(r14, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f00000002c0)={0x2}) ioctl$KVM_SET_MSRS(r15, 0x8090ae81, &(0x7f0000000000)) r16 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r17 = ioctl$KVM_CREATE_VM(r16, 0xae01, 0x0) r18 = ioctl$KVM_CREATE_VCPU(r17, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r18, 0x4048ae9b, &(0x7f00000002c0)={0xe0003}) ioctl$KVM_SET_MSRS(r18, 0x8090ae81, &(0x7f0000000000)) r19 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x100, 0x0) write$binfmt_misc(r19, &(0x7f0000000400)=ANY=[], 0x0) splice(r0, 0x0, r1, 0x0, 0x4, 0x0) 22:00:24 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x200000000000000, 'c\x86\xdd'}]}, 0xfdef) 22:00:24 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/prev\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r2, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000011c0)={0x0, @in={{0x2, 0x4e22, @loopback}}, 0x7, 0x1}, &(0x7f0000001280)=0x90) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x18, &(0x7f00000000c0)={r5}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000012c0)={0x0, 0x9}, &(0x7f0000001300)=0x8) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r6, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r6, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000002500)={0x0, @in6={{0xa, 0x4e22, 0x1, @mcast2, 0x9}}, 0x3, 0xffffffffffffffff}, &(0x7f00000025c0)=0x90) sendmsg$inet_sctp(r0, &(0x7f0000001440)={&(0x7f0000000040)=@in={0x2, 0x4e21, @loopback}, 0x10, &(0x7f0000001180)=[{&(0x7f00000024c0)="a48e6816d1e92d4d016675746f225aa0a0a1c12f870267545b78583c6d55b1b1cd4e841c99bd042d829f39837d4648dfba450021a269", 0x36}, {&(0x7f00000000c0)="da5159be02374e9d3eacca191284b9fa7b7c4d4426c32c75f6117915df", 0x1d}, {&(0x7f0000001480)="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"/4126, 0x101e}], 0x3, &(0x7f0000002600)=[@sndinfo={0x20, 0x84, 0x2, {0x815a, 0x118, 0x960, 0x45, r5}}, @sndrcv={0x30, 0x84, 0x1, {0x1ff, 0x200, 0x4, 0x100000001, 0xa4, 0x6, 0x7, 0x2, r7}}, @authinfo={0x18, 0x84, 0x6, {0x1000}}, @authinfo={0x18, 0x84, 0x6, {0xca}}, @dstaddrv6={0x20, 0x84, 0x8, @dev={0xfe, 0x80, [], 0x17}}], 0xa0, 0x4000000}, 0x8000) r8 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r8, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) close(r8) [ 734.624997][T25919] device nr0 entered promiscuous mode [ 734.653786][T25917] FAULT_INJECTION: forcing a failure. [ 734.653786][T25917] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 734.678929][T25917] CPU: 0 PID: 25917 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 734.688086][T25917] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 734.688094][T25917] Call Trace: [ 734.688131][T25917] dump_stack+0x172/0x1f0 [ 734.688154][T25917] should_fail.cold+0xa/0x15 [ 734.688175][T25917] ? fault_create_debugfs_attr+0x180/0x180 [ 734.688192][T25917] ? ___might_sleep+0x163/0x280 [ 734.688214][T25917] should_fail_alloc_page+0x50/0x60 [ 734.688228][T25917] __alloc_pages_nodemask+0x1a1/0x900 [ 734.688248][T25917] ? __alloc_pages_slowpath+0x2540/0x2540 [ 734.688267][T25917] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 734.688290][T25917] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 734.688305][T25917] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 734.688324][T25917] alloc_pages_vma+0x1bc/0x3f0 [ 734.688344][T25917] do_huge_pmd_wp_page_fallback+0x1f0/0x1740 [ 734.688364][T25917] ? perf_trace_lock_acquire+0xf5/0x530 [ 734.726621][T25917] ? defrag_store+0x360/0x360 [ 734.726646][T25917] ? lock_downgrade+0x920/0x920 [ 734.726666][T25917] ? swp_swapcount+0x540/0x540 [ 734.726682][T25917] ? shrink_huge_zero_page_scan+0x1a0/0x1a0 [ 734.726696][T25917] ? __kasan_check_read+0x11/0x20 [ 734.726709][T25917] ? do_raw_spin_unlock+0x57/0x270 [ 734.726726][T25917] do_huge_pmd_wp_page+0x7ff/0x2300 [ 734.726738][T25917] ? __kasan_check_read+0x11/0x20 [ 734.726759][T25917] ? __split_huge_pmd+0x2810/0x2810 [ 734.726774][T25917] ? __kasan_check_read+0x11/0x20 [ 734.726793][T25917] ? pmd_val+0x85/0x100 [ 734.737865][T25917] ? add_mm_counter_fast.part.0+0x40/0x40 [ 734.737887][T25917] ? debug_smp_processor_id+0x3c/0x214 [ 734.737911][T25917] __handle_mm_fault+0x14cf/0x3f20 [ 734.737934][T25917] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 734.737962][T25917] ? __kasan_check_read+0x11/0x20 [ 734.737986][T25917] handle_mm_fault+0x1b5/0x6c0 [ 734.738007][T25917] __do_page_fault+0x536/0xdd0 [ 734.738033][T25917] do_page_fault+0x38/0x590 [ 734.738050][T25917] page_fault+0x39/0x40 [ 734.738067][T25917] RIP: 0010:copy_user_generic_unrolled+0xa0/0xc0 [ 734.738081][T25917] Code: 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 4c 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a 06 <88> 07 48 ff c6 48 ff c7 ff c9 75 f2 31 c0 0f 1f 00 c3 0f 1f 40 00 [ 734.738095][T25917] RSP: 0018:ffff888059a0fe68 EFLAGS: 00010202 [ 734.761646][T25917] RAX: 0000000000000000 RBX: 0000000000000002 RCX: 0000000000000002 [ 734.761656][T25917] RDX: 0000000000000002 RSI: ffff88808e319000 RDI: 0000000020000580 [ 734.761666][T25917] RBP: ffff888059a0fea0 R08: 1ffff11011c63200 R09: ffffed1011c63201 [ 734.761676][T25917] R10: ffffed1011c63200 R11: ffff88808e319001 R12: 0000000020000580 [ 734.761687][T25917] R13: ffff88808e319000 R14: 0000000020000582 R15: 00007ffffffff000 [ 734.761728][T25917] ? _copy_to_user+0x146/0x160 [ 734.761750][T25917] __x64_sys_mincore+0x3cd/0x860 [ 734.777998][T25917] do_syscall_64+0xfa/0x760 [ 734.778023][T25917] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 734.778034][T25917] RIP: 0033:0x4598e9 [ 734.778047][T25917] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 734.778055][T25917] RSP: 002b:00007f786c5e8c78 EFLAGS: 00000246 ORIG_RAX: 000000000000001b [ 734.778068][T25917] RAX: ffffffffffffffda RBX: 00007f786c5e8c90 RCX: 00000000004598e9 [ 734.778076][T25917] RDX: 0000000020000580 RSI: 0000000000002000 RDI: 0000000020ffe000 [ 734.778083][T25917] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 734.778091][T25917] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f786c5e96d4 [ 734.778098][T25917] R13: 00000000004c5d52 R14: 00000000004da788 R15: 0000000000000004 [ 735.302492][T25926] device nr0 entered promiscuous mode 22:00:25 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2d4, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:25 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2d7, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:25 executing program 4 (fault-call:3 fault-nth:6): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:00:25 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x9, 0x121081) accept$netrom(r1, &(0x7f00000001c0)={{0x3, @bcast}, [@default, @remote, @netrom, @remote, @netrom, @netrom, @rose, @netrom]}, &(0x7f0000000240)=0x48) recvfrom$llc(r0, &(0x7f0000000000)=""/26, 0x1f9, 0x40018007, &(0x7f0000000080)={0x1a, 0x302, 0x1, 0x5, 0x4, 0xfffffffffffffffd, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x10) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)={&(0x7f0000000380)='./file0\x00', 0x0, 0x4}, 0x10) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r2, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) getrandom(&(0x7f0000000280)=""/208, 0xd0, 0x2) write$P9_RXATTRCREATE(r2, &(0x7f0000000040)={0x7, 0x21, 0x1}, 0x7) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r3, &(0x7f0000000100)={0x27, 0x0, 0x1, 0x6, 0xfffffffffffffffc, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x23}, 0xfffffffffffffe28) close(r3) socket$alg(0x26, 0x5, 0x0) 22:00:25 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x300000000000000, 'c\x86\xdd'}]}, 0xfdef) 22:00:25 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x802, 0x440) pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r5, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r5, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$VT_RELDISP(r5, 0x5605) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r6, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r6, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$VIDIOC_S_FMT(r6, 0xc0d05605, &(0x7f0000000340)={0x9, @vbi={0xe9, 0x2, 0x100000000, 0x41564e57, [0x5, 0x6], [0x5f, 0x401], 0x13a}}) ioctl$LOOP_SET_DIRECT_IO(r4, 0x4c08, 0x80000000) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x8000, 0x0, 0x8d4}) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f00000001c0)=@md5={0x1, "9d7e7d463d7f6b4560febed5eddc7ee4"}, 0x11, 0x1) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="09a9b8a7be5f9aaa73b64c3fe66aa0fd439172e4f0edce82d2332cf8d2f4659799f57d8627c333ab8640ec7c1c220bd0bb155c9cd8338cf00b9e08e6392d4fe87a0567e9ecaa76191bcc1bd4cb562ff6733836770d892a4023f488000cd8c4ae5784eada19feb93909efa4ecf8538375704511151fecc1c82b24aaeaf2350d5ec8d06f9b467909fd57d895b6f9672dc309b5420dde38609be37f58edcd22bd1b", @ANYRESDEC, @ANYRESHEX, @ANYRES32=r3, @ANYRES16, @ANYPTR=&(0x7f0000000300)=ANY=[@ANYRES32=r1, @ANYRES64=0x0, @ANYRES32]], 0xd4) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) [ 735.708426][T25943] FAULT_INJECTION: forcing a failure. [ 735.708426][T25943] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 735.776340][T25943] CPU: 1 PID: 25943 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 735.785517][T25943] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 735.797671][T25943] Call Trace: [ 735.800961][T25943] dump_stack+0x172/0x1f0 [ 735.805284][T25943] should_fail.cold+0xa/0x15 [ 735.809866][T25943] ? fault_create_debugfs_attr+0x180/0x180 [ 735.815657][T25943] ? ___might_sleep+0x163/0x280 [ 735.820631][T25943] should_fail_alloc_page+0x50/0x60 [ 735.825814][T25943] __alloc_pages_nodemask+0x1a1/0x900 [ 735.831174][T25943] ? __alloc_pages_slowpath+0x2540/0x2540 [ 735.836880][T25943] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 735.843112][T25943] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 735.849335][T25943] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 735.855567][T25943] alloc_pages_vma+0x1bc/0x3f0 [ 735.860332][T25943] do_huge_pmd_wp_page_fallback+0x1f0/0x1740 [ 735.866297][T25943] ? perf_trace_lock_acquire+0xf5/0x530 [ 735.871837][T25943] ? defrag_store+0x360/0x360 [ 735.876515][T25943] ? lock_downgrade+0x920/0x920 [ 735.881354][T25943] ? swp_swapcount+0x540/0x540 [ 735.889577][T25943] ? shrink_huge_zero_page_scan+0x1a0/0x1a0 [ 735.895504][T25943] ? __kasan_check_read+0x11/0x20 [ 735.900513][T25943] ? do_raw_spin_unlock+0x57/0x270 [ 735.905624][T25943] do_huge_pmd_wp_page+0x7ff/0x2300 [ 735.910807][T25943] ? __kasan_check_read+0x11/0x20 [ 735.916194][T25943] ? __split_huge_pmd+0x2810/0x2810 [ 735.921397][T25943] ? __kasan_check_read+0x11/0x20 [ 735.926416][T25943] ? pmd_val+0x85/0x100 [ 735.930572][T25943] ? add_mm_counter_fast.part.0+0x40/0x40 [ 735.937237][T25943] ? debug_smp_processor_id+0x3c/0x214 [ 735.942683][T25943] __handle_mm_fault+0x14cf/0x3f20 [ 735.948219][T25943] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 735.953758][T25943] ? __kasan_check_read+0x11/0x20 [ 735.958785][T25943] handle_mm_fault+0x1b5/0x6c0 [ 735.963539][T25943] __do_page_fault+0x536/0xdd0 [ 735.968296][T25943] do_page_fault+0x38/0x590 [ 735.972810][T25943] page_fault+0x39/0x40 [ 735.977215][T25943] RIP: 0010:copy_user_generic_unrolled+0xa0/0xc0 [ 735.983528][T25943] Code: 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 4c 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a 06 <88> 07 48 ff c6 48 ff c7 ff c9 75 f2 31 c0 0f 1f 00 c3 0f 1f 40 00 [ 736.004074][T25943] RSP: 0018:ffff888059a0fe68 EFLAGS: 00010202 [ 736.011089][T25943] RAX: 0000000000000000 RBX: 0000000000000002 RCX: 0000000000000002 [ 736.019220][T25943] RDX: 0000000000000002 RSI: ffff8880a3ba5000 RDI: 0000000020000580 [ 736.027435][T25943] RBP: ffff888059a0fea0 R08: 1ffff11014774a00 R09: ffffed1014774a01 [ 736.035391][T25943] R10: ffffed1014774a00 R11: ffff8880a3ba5001 R12: 0000000020000580 [ 736.043355][T25943] R13: ffff8880a3ba5000 R14: 0000000020000582 R15: 00007ffffffff000 [ 736.051341][T25943] ? _copy_to_user+0x146/0x160 [ 736.056098][T25943] __x64_sys_mincore+0x3cd/0x860 [ 736.061030][T25943] do_syscall_64+0xfa/0x760 [ 736.065539][T25943] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 736.072372][T25943] RIP: 0033:0x4598e9 [ 736.076604][T25943] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 736.096210][T25943] RSP: 002b:00007f786c5e8c78 EFLAGS: 00000246 ORIG_RAX: 000000000000001b [ 736.104742][T25943] RAX: ffffffffffffffda RBX: 00007f786c5e8c90 RCX: 00000000004598e9 [ 736.112710][T25943] RDX: 0000000020000580 RSI: 0000000000002000 RDI: 0000000020ffe000 22:00:25 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2d8, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 736.121717][T25943] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 736.129691][T25943] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f786c5e96d4 [ 736.137648][T25943] R13: 00000000004c5d52 R14: 00000000004da788 R15: 0000000000000004 [ 736.193383][T25954] device nr0 entered promiscuous mode 22:00:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r1) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) write$binfmt_elf64(r3, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0x8) vmsplice(r2, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r2, 0x80045530, &(0x7f0000000580)=""/9) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$kcm(0x29, 0x5, 0x0) write$binfmt_elf64(r4, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r4, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r5, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r5, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r5, 0xc0305616, &(0x7f0000000880)={0x0, {0x9, 0x8000000000000}}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000440)={0x0, 0x0}, &(0x7f0000000480)=0xc) sendmsg$sock(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f00000005c0)="c27fd0a1ba9eadc64bf3ad6a1340cfb041bbe562e03bad215e183d8dd28a6f98fb3d94b14eade389ddb5b59590b36b83ca193f827c6f095dd3cacec50fd31ad6117ef7bdaa3f9cc829b3a924847656220634257a1b18754b7f49390a38881170a2ee16a899f739658999515ebcd1a6fde0009c13e4a96f2276ae5c511a488daf7b816a6b817bfd9ae49cdbc4237476d6f800690db28db75bb0af3f3cd4b900ce07bb1c024834424c061646e97af09a8c5f8c849cf7bb32068760a0f23574", 0xbe}, {&(0x7f0000000680)="ae182d1b1967d2bbd7d0ed940488c108de3efb36f44b97ff08be60be3dcae3bf3e518e367c2ad69c52ed7fee14c66d8213a4da8379825566300c12596de606b89fff49a9b22898240e2db838b8943016439a74dc05af585280cc14a27d635959045699bdd9bc156da645d491f7a4b9f392e858e486a73da73435175b72634b0fa18921cb78910667ec9ad866a6648ba116bda01ee11fed67223b593118e42c1f0e3627fd2997f13541a1c9363ea9da48ec2675ac74aea6fea9f29c7286", 0xbd}], 0x2, &(0x7f0000000780)=[@txtime={{0x18, 0x1, 0x3d, 0x100}}, @mark={{0x14, 0x1, 0x24, 0x200}}, @txtime={{0x18, 0x1, 0x3d, 0x1}}, @txtime={{0x18, 0x1, 0x3d, 0x2}}, @timestamping={{0x14, 0x1, 0x25, 0xe4}}, @txtime={{0x18, 0x1, 0x3d, 0x3f}}], 0x90}, 0x880) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0xa, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000140)="4e835147d98949526fee44d9c2ccfad8d6ef39232f7bd3d78218f6858704f6a4f08d5cdfd47418fc164bf2759b011cb45915b4864230e17e0745d2051153c5d3d2330def2c1719706c426d4df4", 0x4d, 0x8}, {&(0x7f00000001c0)="0833ad71e00d576e5a9e3e45991ed2bbbf60033d3e235628f53eef80152a74d1", 0x20, 0x9}, {&(0x7f0000000200)="56961eb8967fb1c85bb222c51b40c013228e33eec626a11e571ccfde67824fe0f1a7d130000bdf8e6e97463e470f230e15e684085de60dd77cdd5f1fa79584bad9bc93060aa2fcc8953ff25f10c72bf65d9f5eaf105fcc48948a4b3a8d40839c40ddcbee8c966a1489eb68b3c5ddd6dbec7b839d9bf33875bc6b88ee396eacea0100f1e7e163eb5f76652da05708841a9d90b03e132f6b", 0x97, 0x7}, {&(0x7f00000002c0)="b7a3feed6cc4bf873e211813f8067cf53ac9a3d5e458367adef8174a549fb9a17faf3547f4bdcdb3b5c3a6b7c93623093cdc6c8a2936dc27a01e95e11c14013d4e93c3a5cc68cd8dc9fae12d2be5398fbdc86d65149beeba99d8406128d694a542875fbd3711a2459de3109fb7980dc20f22bc294fc1dfc4239782a954c1b52ff8cef9a73cd99904bc41dc99124aa33aaf3e03fcda4760811435b26d37938a1ab55e8b6dde65eb8745465974d35798cc23a3838701aa85db552e77cbac14118a185b8163bd3b9eac", 0xc8, 0x100000001}], 0x2400, &(0x7f00000004c0)=ANY=[@ANYBLOB='flush,dots,nodots,sys_immutable,uid>', @ANYRESDEC=r1, @ANYBLOB=',fowner=', @ANYRESDEC=r6, @ANYBLOB="2c736d61626b66736465663d2c736d61636b6673666c6f6f723d21747275737465646d643573756d626465762be76d643573756d29766d6e6574317b6c6f242c7375626a5f747970653d14776c616e30656d31212c7365636c6162656c2c00"]) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x400) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r8, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r8, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) r9 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r10 = ioctl$KVM_CREATE_VM(r9, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r10, 0xae41, 0x0) ioctl$FS_IOC_GETFLAGS(r10, 0x80086601, &(0x7f0000000900)) ioctl$TUNSETTXFILTER(r8, 0x400454d1, &(0x7f00000008c0)={0x1, 0x1, [@dev={[], 0x26}]}) getsockopt$sock_linger(r7, 0x1, 0x6, &(0x7f00000000c0), &(0x7f0000000100)=0x8) 22:00:25 executing program 4 (fault-call:3 fault-nth:7): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:00:26 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2d9, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 736.479966][T25967] FAULT_INJECTION: forcing a failure. [ 736.479966][T25967] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 736.497948][T25967] CPU: 1 PID: 25967 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 736.507116][T25967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 736.517187][T25967] Call Trace: [ 736.520502][T25967] dump_stack+0x172/0x1f0 [ 736.524857][T25967] should_fail.cold+0xa/0x15 [ 736.529459][T25967] ? fault_create_debugfs_attr+0x180/0x180 [ 736.535263][T25967] ? ___might_sleep+0x163/0x280 [ 736.540112][T25967] should_fail_alloc_page+0x50/0x60 [ 736.545296][T25967] __alloc_pages_nodemask+0x1a1/0x900 [ 736.550676][T25967] ? __alloc_pages_slowpath+0x2540/0x2540 [ 736.556558][T25967] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 736.562797][T25967] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 736.569022][T25967] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 736.575256][T25967] alloc_pages_vma+0x1bc/0x3f0 [ 736.580015][T25967] do_huge_pmd_wp_page_fallback+0x1f0/0x1740 [ 736.586272][T25967] ? perf_trace_lock_acquire+0xf5/0x530 [ 736.591825][T25967] ? defrag_store+0x360/0x360 [ 736.596506][T25967] ? lock_downgrade+0x920/0x920 [ 736.601353][T25967] ? swp_swapcount+0x540/0x540 [ 736.606105][T25967] ? shrink_huge_zero_page_scan+0x1a0/0x1a0 [ 736.611986][T25967] ? __kasan_check_read+0x11/0x20 [ 736.616995][T25967] ? do_raw_spin_unlock+0x57/0x270 [ 736.622094][T25967] do_huge_pmd_wp_page+0x7ff/0x2300 [ 736.627278][T25967] ? __kasan_check_read+0x11/0x20 [ 736.632292][T25967] ? __split_huge_pmd+0x2810/0x2810 [ 736.637561][T25967] ? __kasan_check_read+0x11/0x20 [ 736.642574][T25967] ? pmd_val+0x85/0x100 [ 736.646717][T25967] ? add_mm_counter_fast.part.0+0x40/0x40 [ 736.652532][T25967] ? debug_smp_processor_id+0x3c/0x214 [ 736.657983][T25967] __handle_mm_fault+0x14cf/0x3f20 [ 736.663088][T25967] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 736.668636][T25967] ? __kasan_check_read+0x11/0x20 [ 736.673654][T25967] handle_mm_fault+0x1b5/0x6c0 [ 736.678411][T25967] __do_page_fault+0x536/0xdd0 [ 736.683167][T25967] do_page_fault+0x38/0x590 [ 736.687657][T25967] page_fault+0x39/0x40 [ 736.691800][T25967] RIP: 0010:copy_user_generic_unrolled+0xa0/0xc0 [ 736.698113][T25967] Code: 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 4c 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a 06 <88> 07 48 ff c6 48 ff c7 ff c9 75 f2 31 c0 0f 1f 00 c3 0f 1f 40 00 [ 736.717854][T25967] RSP: 0018:ffff88805a497e68 EFLAGS: 00010202 [ 736.723913][T25967] RAX: 0000000000000000 RBX: 0000000000000002 RCX: 0000000000000002 [ 736.731875][T25967] RDX: 0000000000000002 RSI: ffff888056990000 RDI: 0000000020000580 [ 736.739833][T25967] RBP: ffff88805a497ea0 R08: 1ffff1100ad32000 R09: ffffed100ad32001 [ 736.747793][T25967] R10: ffffed100ad32000 R11: ffff888056990001 R12: 0000000020000580 [ 736.755760][T25967] R13: ffff888056990000 R14: 0000000020000582 R15: 00007ffffffff000 [ 736.763829][T25967] ? _copy_to_user+0x146/0x160 [ 736.768583][T25967] __x64_sys_mincore+0x3cd/0x860 [ 736.773538][T25967] do_syscall_64+0xfa/0x760 [ 736.778034][T25967] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 736.783909][T25967] RIP: 0033:0x4598e9 [ 736.787793][T25967] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 736.807391][T25967] RSP: 002b:00007f786c5e8c78 EFLAGS: 00000246 ORIG_RAX: 000000000000001b [ 736.815786][T25967] RAX: ffffffffffffffda RBX: 00007f786c5e8c90 RCX: 00000000004598e9 22:00:26 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) fallocate(r1, 0x8, 0x401, 0x3) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x400000, 0x0) ioctl$TIOCGSOFTCAR(r3, 0x5419, &(0x7f0000000080)) bind$nfc_llcp(r2, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="01fff8741b36e93f0ae6e09b61f90e735c8d57d18d8cd936687583572a2606271f00000095fe4ff414f66b0d566ceec5ff8fdc65e52d9fbc25a843da8f1d81e911150b28ecf98cd8b1606dc84fd332e319e43b13c627bde7637234c9bf8444b62ea4aa8040d1107303d2d1982daa50e2000000000000"], 0x76) close(r2) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r4, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r4, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r4, 0x800443d3, &(0x7f0000000240)={{0xffffffffedf76f16, 0x2, 0x80000000, 0x5, 0xffff, 0x4}, 0x68, 0x800, 0x3f}) r5 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x3, 0x0) ioctl$KDGKBMODE(r5, 0x4b44, &(0x7f0000000200)) [ 736.823743][T25967] RDX: 0000000020000580 RSI: 0000000000002000 RDI: 0000000020ffe000 [ 736.831883][T25967] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 736.839947][T25967] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f786c5e96d4 [ 736.847902][T25967] R13: 00000000004c5d52 R14: 00000000004da788 R15: 0000000000000004 22:00:26 executing program 5: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$SIOCX25SENDCALLACCPT(r1, 0x89e9) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000080)=0x101, 0x4) pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$inet6(0xa, 0x3, 0x3c) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r5, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x4, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r7, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r7, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) write$P9_RRENAME(r7, &(0x7f0000000140)={0x7, 0x15, 0x2}, 0x7) 22:00:26 executing program 4 (fault-call:3 fault-nth:8): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:00:26 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2da, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 737.239669][T25996] FAULT_INJECTION: forcing a failure. [ 737.239669][T25996] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 737.254690][T25996] CPU: 1 PID: 25996 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 737.263815][T25996] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 737.273864][T25996] Call Trace: [ 737.277205][T25996] dump_stack+0x172/0x1f0 [ 737.281565][T25996] should_fail.cold+0xa/0x15 [ 737.286192][T25996] ? fault_create_debugfs_attr+0x180/0x180 [ 737.292006][T25996] ? ___might_sleep+0x163/0x280 [ 737.296890][T25996] should_fail_alloc_page+0x50/0x60 [ 737.302084][T25996] __alloc_pages_nodemask+0x1a1/0x900 [ 737.308167][T25996] ? __alloc_pages_slowpath+0x2540/0x2540 [ 737.313913][T25996] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 737.320240][T25996] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 737.326467][T25996] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 737.332709][T25996] alloc_pages_vma+0x1bc/0x3f0 [ 737.337744][T25996] do_huge_pmd_wp_page_fallback+0x1f0/0x1740 [ 737.343722][T25996] ? perf_trace_lock_acquire+0xf5/0x530 [ 737.349289][T25996] ? defrag_store+0x360/0x360 [ 737.353988][T25996] ? lock_downgrade+0x920/0x920 [ 737.358846][T25996] ? swp_swapcount+0x540/0x540 [ 737.363608][T25996] ? shrink_huge_zero_page_scan+0x1a0/0x1a0 [ 737.369684][T25996] ? __kasan_check_read+0x11/0x20 [ 737.374730][T25996] ? do_raw_spin_unlock+0x57/0x270 [ 737.380217][T25996] do_huge_pmd_wp_page+0x7ff/0x2300 [ 737.385460][T25996] ? __kasan_check_read+0x11/0x20 [ 737.390490][T25996] ? __split_huge_pmd+0x2810/0x2810 [ 737.395686][T25996] ? __kasan_check_read+0x11/0x20 [ 737.400699][T25996] ? pmd_val+0x85/0x100 [ 737.405192][T25996] ? add_mm_counter_fast.part.0+0x40/0x40 [ 737.410906][T25996] ? debug_smp_processor_id+0x3c/0x214 [ 737.416367][T25996] __handle_mm_fault+0x14cf/0x3f20 [ 737.421482][T25996] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 737.427050][T25996] ? __kasan_check_read+0x11/0x20 [ 737.432097][T25996] handle_mm_fault+0x1b5/0x6c0 [ 737.436872][T25996] __do_page_fault+0x536/0xdd0 [ 737.441650][T25996] do_page_fault+0x38/0x590 [ 737.446152][T25996] page_fault+0x39/0x40 [ 737.450300][T25996] RIP: 0010:copy_user_generic_unrolled+0xa0/0xc0 [ 737.456724][T25996] Code: 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 4c 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a 06 <88> 07 48 ff c6 48 ff c7 ff c9 75 f2 31 c0 0f 1f 00 c3 0f 1f 40 00 [ 737.476431][T25996] RSP: 0018:ffff88805c677e68 EFLAGS: 00010202 [ 737.482616][T25996] RAX: 0000000000000000 RBX: 0000000000000002 RCX: 0000000000000002 [ 737.491807][T25996] RDX: 0000000000000002 RSI: ffff888095a14000 RDI: 0000000020000580 [ 737.499855][T25996] RBP: ffff88805c677ea0 R08: 1ffff11012b42800 R09: ffffed1012b42801 [ 737.507833][T25996] R10: ffffed1012b42800 R11: ffff888095a14001 R12: 0000000020000580 [ 737.515984][T25996] R13: ffff888095a14000 R14: 0000000020000582 R15: 00007ffffffff000 [ 737.523996][T25996] ? _copy_to_user+0x146/0x160 [ 737.528777][T25996] __x64_sys_mincore+0x3cd/0x860 [ 737.533717][T25996] do_syscall_64+0xfa/0x760 [ 737.538210][T25996] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 737.544100][T25996] RIP: 0033:0x4598e9 [ 737.548026][T25996] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 737.567963][T25996] RSP: 002b:00007f786c5e8c78 EFLAGS: 00000246 ORIG_RAX: 000000000000001b [ 737.576392][T25996] RAX: ffffffffffffffda RBX: 00007f786c5e8c90 RCX: 00000000004598e9 [ 737.584650][T25996] RDX: 0000000020000580 RSI: 0000000000002000 RDI: 0000000020ffe000 [ 737.592625][T25996] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 737.600587][T25996] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f786c5e96d4 [ 737.608547][T25996] R13: 00000000004c5d52 R14: 00000000004da788 R15: 0000000000000004 22:00:27 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2db, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:27 executing program 4 (fault-call:3 fault-nth:9): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) [ 737.679893][T25954] device nr0 entered promiscuous mode [ 737.844799][T26006] FAULT_INJECTION: forcing a failure. [ 737.844799][T26006] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 737.879556][T26006] CPU: 0 PID: 26006 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 737.888714][T26006] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 737.898868][T26006] Call Trace: [ 737.902174][T26006] dump_stack+0x172/0x1f0 [ 737.906534][T26006] should_fail.cold+0xa/0x15 [ 737.911145][T26006] ? fault_create_debugfs_attr+0x180/0x180 [ 737.916968][T26006] ? ___might_sleep+0x163/0x280 [ 737.921838][T26006] should_fail_alloc_page+0x50/0x60 [ 737.927041][T26006] __alloc_pages_nodemask+0x1a1/0x900 [ 737.932428][T26006] ? __alloc_pages_slowpath+0x2540/0x2540 [ 737.938161][T26006] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 737.944412][T26006] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 737.950662][T26006] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 737.956916][T26006] alloc_pages_vma+0x1bc/0x3f0 [ 737.961720][T26006] do_huge_pmd_wp_page_fallback+0x1f0/0x1740 [ 737.967705][T26006] ? perf_trace_lock_acquire+0xf5/0x530 [ 737.974222][T26006] ? defrag_store+0x360/0x360 [ 737.978909][T26006] ? lock_downgrade+0x920/0x920 [ 737.983762][T26006] ? swp_swapcount+0x540/0x540 [ 737.988540][T26006] ? shrink_huge_zero_page_scan+0x1a0/0x1a0 [ 737.994435][T26006] ? __kasan_check_read+0x11/0x20 [ 737.999544][T26006] ? do_raw_spin_unlock+0x57/0x270 [ 738.004658][T26006] do_huge_pmd_wp_page+0x7ff/0x2300 [ 738.009858][T26006] ? __kasan_check_read+0x11/0x20 [ 738.014892][T26006] ? __split_huge_pmd+0x2810/0x2810 [ 738.020104][T26006] ? __kasan_check_read+0x11/0x20 [ 738.025140][T26006] ? pmd_val+0x85/0x100 [ 738.029300][T26006] ? add_mm_counter_fast.part.0+0x40/0x40 [ 738.035150][T26006] ? debug_smp_processor_id+0x3c/0x214 [ 738.040625][T26006] __handle_mm_fault+0x14cf/0x3f20 [ 738.045759][T26006] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 738.051334][T26006] ? __kasan_check_read+0x11/0x20 [ 738.056378][T26006] handle_mm_fault+0x1b5/0x6c0 [ 738.061160][T26006] __do_page_fault+0x536/0xdd0 [ 738.065961][T26006] do_page_fault+0x38/0x590 [ 738.070482][T26006] page_fault+0x39/0x40 [ 738.074651][T26006] RIP: 0010:copy_user_generic_unrolled+0xa0/0xc0 [ 738.080984][T26006] Code: 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 4c 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a 06 <88> 07 48 ff c6 48 ff c7 ff c9 75 f2 31 c0 0f 1f 00 c3 0f 1f 40 00 [ 738.100692][T26006] RSP: 0018:ffff888047817e68 EFLAGS: 00010202 [ 738.106782][T26006] RAX: 0000000000000000 RBX: 0000000000000002 RCX: 0000000000000002 [ 738.114932][T26006] RDX: 0000000000000002 RSI: ffff888099ff5000 RDI: 0000000020000580 [ 738.122898][T26006] RBP: ffff888047817ea0 R08: 1ffff110133fea00 R09: ffffed10133fea01 [ 738.122906][T26006] R10: ffffed10133fea00 R11: ffff888099ff5001 R12: 0000000020000580 [ 738.122913][T26006] R13: ffff888099ff5000 R14: 0000000020000582 R15: 00007ffffffff000 [ 738.122953][T26006] ? _copy_to_user+0x146/0x160 [ 738.122973][T26006] __x64_sys_mincore+0x3cd/0x860 [ 738.122998][T26006] do_syscall_64+0xfa/0x760 [ 738.123019][T26006] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 738.123034][T26006] RIP: 0033:0x4598e9 [ 738.171578][T26006] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 738.191185][T26006] RSP: 002b:00007f786c5e8c78 EFLAGS: 00000246 ORIG_RAX: 000000000000001b [ 738.199594][T26006] RAX: ffffffffffffffda RBX: 00007f786c5e8c90 RCX: 00000000004598e9 [ 738.207569][T26006] RDX: 0000000020000580 RSI: 0000000000002000 RDI: 0000000020ffe000 [ 738.215535][T26006] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 738.223496][T26006] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f786c5e96d4 [ 738.231539][T26006] R13: 00000000004c5d52 R14: 00000000004da788 R15: 0000000000000004 22:00:27 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x400000000000000, 'c\x86\xdd'}]}, 0xfdef) 22:00:27 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000001c00e6ff1b00000002000000000000000100000df9ff00000100"/54], &(0x7f0000000700)=""/241, 0x36, 0xf1, 0x1}, 0x20) 22:00:27 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) close(r0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) accept$nfc_llcp(r1, &(0x7f0000000000), &(0x7f0000000080)=0x60) 22:00:27 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r3 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0xfffffffffffeffff, 0x22800) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) close(0xffffffffffffffff) socket$inet6(0xa, 0x3, 0x3c) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x4e24, 0x9, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x5}, 0x11) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) 22:00:27 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2dc, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:27 executing program 4 (fault-call:3 fault-nth:10): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:00:28 executing program 3: pselect6(0xffffffffffffffe9, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)={0x8}, 0xfffffffffffffd9e}) syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x4020000000000, 0xaaaaaaaaaaaae53, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000010000000100000001000000000b00000040000080000000000000006d5ebe5a0000ffff53ef", 0x5cf, 0x400}], 0x1, 0x0) [ 738.445830][T26022] FAULT_INJECTION: forcing a failure. [ 738.445830][T26022] name fail_page_alloc, interval 1, probability 0, space 0, times 0 22:00:28 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2dd, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 738.501803][T26022] CPU: 0 PID: 26022 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 738.508037][T26026] device nr0 entered promiscuous mode [ 738.510946][T26022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 738.510954][T26022] Call Trace: [ 738.510979][T26022] dump_stack+0x172/0x1f0 [ 738.511003][T26022] should_fail.cold+0xa/0x15 [ 738.511025][T26022] ? fault_create_debugfs_attr+0x180/0x180 [ 738.544569][T26022] ? ___might_sleep+0x163/0x280 [ 738.549447][T26022] should_fail_alloc_page+0x50/0x60 [ 738.554657][T26022] __alloc_pages_nodemask+0x1a1/0x900 [ 738.560061][T26022] ? __alloc_pages_slowpath+0x2540/0x2540 [ 738.565805][T26022] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 738.572070][T26022] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 738.578317][T26022] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 738.584572][T26022] alloc_pages_vma+0x1bc/0x3f0 [ 738.589375][T26022] do_huge_pmd_wp_page_fallback+0x1f0/0x1740 [ 738.589393][T26022] ? perf_trace_lock_acquire+0xf5/0x530 [ 738.589422][T26022] ? defrag_store+0x360/0x360 [ 738.589440][T26022] ? lock_downgrade+0x920/0x920 [ 738.589458][T26022] ? swp_swapcount+0x540/0x540 [ 738.589472][T26022] ? shrink_huge_zero_page_scan+0x1a0/0x1a0 [ 738.589486][T26022] ? __kasan_check_read+0x11/0x20 [ 738.589498][T26022] ? do_raw_spin_unlock+0x57/0x270 [ 738.589518][T26022] do_huge_pmd_wp_page+0x7ff/0x2300 [ 738.589528][T26022] ? __kasan_check_read+0x11/0x20 [ 738.589547][T26022] ? __split_huge_pmd+0x2810/0x2810 [ 738.601235][T26022] ? __kasan_check_read+0x11/0x20 [ 738.601254][T26022] ? pmd_val+0x85/0x100 [ 738.601269][T26022] ? add_mm_counter_fast.part.0+0x40/0x40 [ 738.601287][T26022] ? debug_smp_processor_id+0x3c/0x214 [ 738.601310][T26022] __handle_mm_fault+0x14cf/0x3f20 [ 738.601334][T26022] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 738.601364][T26022] ? __kasan_check_read+0x11/0x20 [ 738.601386][T26022] handle_mm_fault+0x1b5/0x6c0 [ 738.601414][T26022] __do_page_fault+0x536/0xdd0 [ 738.601439][T26022] do_page_fault+0x38/0x590 [ 738.601456][T26022] page_fault+0x39/0x40 [ 738.601472][T26022] RIP: 0010:copy_user_generic_unrolled+0xa0/0xc0 [ 738.601484][T26022] Code: 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 4c 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a 06 <88> 07 48 ff c6 48 ff c7 ff c9 75 f2 31 c0 0f 1f 00 c3 0f 1f 40 00 [ 738.601496][T26022] RSP: 0018:ffff88805a497e68 EFLAGS: 00010202 [ 738.619237][T26031] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 738.621608][T26022] RAX: 0000000000000000 RBX: 0000000000000002 RCX: 0000000000000002 [ 738.621618][T26022] RDX: 0000000000000002 RSI: ffff888099fde000 RDI: 0000000020000580 [ 738.621628][T26022] RBP: ffff88805a497ea0 R08: 1ffff110133fbc00 R09: ffffed10133fbc01 [ 738.621638][T26022] R10: ffffed10133fbc00 R11: ffff888099fde001 R12: 0000000020000580 [ 738.621648][T26022] R13: ffff888099fde000 R14: 0000000020000582 R15: 00007ffffffff000 [ 738.621686][T26022] ? _copy_to_user+0x146/0x160 [ 738.621706][T26022] __x64_sys_mincore+0x3cd/0x860 [ 738.621732][T26022] do_syscall_64+0xfa/0x760 [ 738.795693][T26022] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 738.801880][T26022] RIP: 0033:0x4598e9 [ 738.805768][T26022] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 738.825370][T26022] RSP: 002b:00007f786c5e8c78 EFLAGS: 00000246 ORIG_RAX: 000000000000001b [ 738.833790][T26022] RAX: ffffffffffffffda RBX: 00007f786c5e8c90 RCX: 00000000004598e9 [ 738.841760][T26022] RDX: 0000000020000580 RSI: 0000000000002000 RDI: 0000000020ffe000 [ 738.849717][T26022] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 738.857674][T26022] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f786c5e96d4 [ 738.865631][T26022] R13: 00000000004c5d52 R14: 00000000004da788 R15: 0000000000000004 22:00:28 executing program 4 (fault-call:3 fault-nth:11): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:00:28 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2de, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 739.160189][T26040] FAULT_INJECTION: forcing a failure. [ 739.160189][T26040] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 739.224737][T26040] CPU: 1 PID: 26040 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 739.234873][T26040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 739.245157][T26040] Call Trace: [ 739.248458][T26040] dump_stack+0x172/0x1f0 [ 739.253165][T26040] should_fail.cold+0xa/0x15 [ 739.257768][T26040] ? fault_create_debugfs_attr+0x180/0x180 [ 739.257788][T26040] ? ___might_sleep+0x163/0x280 [ 739.257823][T26040] should_fail_alloc_page+0x50/0x60 [ 739.268469][T26040] __alloc_pages_nodemask+0x1a1/0x900 [ 739.268487][T26040] ? __alloc_pages_slowpath+0x2540/0x2540 [ 739.268504][T26040] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 739.268528][T26040] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 739.268547][T26040] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 739.275719][T26031] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 739.279105][T26040] alloc_pages_vma+0x1bc/0x3f0 22:00:28 executing program 2: r0 = gettid() tkill(r0, 0x1004000000013) r1 = getpgid(r0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0xa0001, 0x0) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x4, 0x2, 0x8, 0x0, 0x0, 0x4, 0x44441, 0x2, 0x0, 0xffff, 0xdc, 0x5, 0x80000001, 0x7ff, 0x40, 0x7, 0xffff, 0x68, 0xfffffffffffffffc, 0x3, 0x1, 0x6, 0x80000001, 0xfff, 0x8, 0x0, 0x1000, 0x0, 0x3, 0x7, 0x4, 0x4, 0xebc5615800000000, 0x1, 0xfffffffffffffff8, 0x7, 0x0, 0x0, 0x2, @perf_config_ext={0x7ff, 0xc0bd}, 0x8000, 0xfff, 0x0, 0x8, 0x3, 0x2, 0x1f}, r1, 0x2, r2, 0x1) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r3, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) close(r3) [ 739.279130][T26040] do_huge_pmd_wp_page_fallback+0x1f0/0x1740 [ 739.279146][T26040] ? perf_trace_lock_acquire+0xf5/0x530 [ 739.279173][T26040] ? defrag_store+0x360/0x360 [ 739.279191][T26040] ? lock_downgrade+0x920/0x920 [ 739.279211][T26040] ? swp_swapcount+0x540/0x540 [ 739.285044][T26031] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 0)! [ 739.291144][T26040] ? shrink_huge_zero_page_scan+0x1a0/0x1a0 [ 739.291161][T26040] ? __kasan_check_read+0x11/0x20 [ 739.291175][T26040] ? do_raw_spin_unlock+0x57/0x270 [ 739.291194][T26040] do_huge_pmd_wp_page+0x7ff/0x2300 [ 739.291207][T26040] ? __kasan_check_read+0x11/0x20 [ 739.291232][T26040] ? __split_huge_pmd+0x2810/0x2810 [ 739.299845][T26031] EXT4-fs (loop3): group descriptors corrupted! [ 739.306115][T26040] ? __kasan_check_read+0x11/0x20 [ 739.306137][T26040] ? pmd_val+0x85/0x100 [ 739.306154][T26040] ? add_mm_counter_fast.part.0+0x40/0x40 [ 739.306170][T26040] ? debug_smp_processor_id+0x3c/0x214 [ 739.306193][T26040] __handle_mm_fault+0x14cf/0x3f20 [ 739.420118][T26040] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 739.425672][T26040] ? __kasan_check_read+0x11/0x20 [ 739.430732][T26040] handle_mm_fault+0x1b5/0x6c0 [ 739.435491][T26040] __do_page_fault+0x536/0xdd0 [ 739.440261][T26040] do_page_fault+0x38/0x590 [ 739.444777][T26040] page_fault+0x39/0x40 [ 739.448921][T26040] RIP: 0010:copy_user_generic_unrolled+0xa0/0xc0 [ 739.456208][T26040] Code: 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 4c 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a 06 <88> 07 48 ff c6 48 ff c7 ff c9 75 f2 31 c0 0f 1f 00 c3 0f 1f 40 00 [ 739.475983][T26040] RSP: 0018:ffff88805ca3fe68 EFLAGS: 00010202 [ 739.483001][T26040] RAX: 0000000000000000 RBX: 0000000000000002 RCX: 0000000000000002 [ 739.490989][T26040] RDX: 0000000000000002 RSI: ffff8880a7e0b000 RDI: 0000000020000580 [ 739.498947][T26040] RBP: ffff88805ca3fea0 R08: 1ffff11014fc1600 R09: ffffed1014fc1601 [ 739.506920][T26040] R10: ffffed1014fc1600 R11: ffff8880a7e0b001 R12: 0000000020000580 [ 739.514902][T26040] R13: ffff8880a7e0b000 R14: 0000000020000582 R15: 00007ffffffff000 [ 739.522897][T26040] ? _copy_to_user+0x146/0x160 [ 739.527768][T26040] __x64_sys_mincore+0x3cd/0x860 [ 739.532769][T26040] do_syscall_64+0xfa/0x760 [ 739.537262][T26040] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 739.543146][T26040] RIP: 0033:0x4598e9 [ 739.547297][T26040] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 739.566905][T26040] RSP: 002b:00007f786c5e8c78 EFLAGS: 00000246 ORIG_RAX: 000000000000001b 22:00:29 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = dup3(r1, 0xffffffffffffffff, 0x100000) ioctl$TIOCLINUX5(r3, 0x541c, &(0x7f0000000040)={0x5, 0x1f, 0xc0e, 0x1f, 0x6}) r4 = socket$inet6(0xa, 0x3, 0x3c) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) [ 739.575951][T26040] RAX: ffffffffffffffda RBX: 00007f786c5e8c90 RCX: 00000000004598e9 [ 739.584355][T26040] RDX: 0000000020000580 RSI: 0000000000002000 RDI: 0000000020ffe000 [ 739.592327][T26040] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 739.600305][T26040] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f786c5e96d4 [ 739.608289][T26040] R13: 00000000004c5d52 R14: 00000000004da788 R15: 0000000000000004 [ 739.743198][T26026] device nr0 entered promiscuous mode 22:00:29 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x500000000000000, 'c\x86\xdd'}]}, 0xfdef) 22:00:29 executing program 4 (fault-call:3 fault-nth:12): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:00:29 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2df, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:29 executing program 3: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r2, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) clock_gettime(0x0, &(0x7f00000007c0)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000800)={0x0, 0x0}) write$evdev(r2, &(0x7f0000000840)=[{{r3, r4/1000+10000}, 0x5, 0x10001, 0xfff}, {{r5, r6/1000+10000}, 0x11, 0x3, 0x19f}, {{}, 0x1f, 0x2, 0x96}, {{r7, r8/1000+30000}, 0x1, 0x2, 0x6}, {{0x77359400}, 0x5, 0x2, 0x1}], 0x78) ioctl$PIO_FONTX(r0, 0x4b6c, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f00000001c0)='./file0\x00', 0x10000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000003c0)="feeea29a191dab4a5086b3e18ba343d4372251090cfce0923067d0f856c31424381768ee37efe17328da5f42b29a1339d7ac2a342b8362d300b4a1416430e722ab1e3f3ba82573f7ad5262bc3b764d8e320e2a997c40afc4e6a6d74ed2567a5bf66800b8116434a1ddd270566af95f64be7e200995539bf060e789eebb1b1718eb7ed6df8c5eaf1309e317afae3fecb89c8e2b8714870b9cbcf33dd6f9bf7da8329acc1517a223e2157ebd233a7f5d7b2d6435f2d24fc908f4a6f8310d11eab6e11b34456f9ec9f9cd09242b00401f9971c1654d8db3", 0xd6, 0x5}, {&(0x7f0000000200)="85f63b6eea70094d6ee67ba833cd7b5bcc55bf76b93ce6744d6adb0d9435116e7454f1803eb8010fd78ebc74326a92cbe640c06c47e2368e2e474cbd6efdb3a2a2791198204114f72e3391249c45b777f46b9ef158a2dbc8c1a6da25ec183f435422df90", 0x64, 0x99}, {&(0x7f00000004c0)="b294ec3252c2f66f1e68215bf6a51527eb3cb2158ceadeeba188a47265dad5f4a85528ff9a854e719c987234857462dabc56a84cb32a2e63639fcaa023af9a70fb851b1f89bd8cf90511dc01eb6d2c8e5f362c", 0x53, 0x3ff}, {&(0x7f0000000540)="ef5d29dbd72e47364b0f70779b571fabceec8c1d96c04a396dcddf1195912fa6be8b4c2c40c1376d43d28b18840fecf802edf0798b652138a0b27c79da039711f0bfe239792b56e8cb03f6123d962a8086bdce0de5bdc0d4a7b7f735dbf5e8580a8a5d1a4fd5bad0b91a4c3f73", 0x6d, 0x2}, {&(0x7f00000005c0)="009accbb6688661127432584a9759099fa7ec092962f926c54673502310a0bb485087405efdbc056524684ec3301f49dc8ffbe7a2adf53e6f32e715e700667b2961beb400951b1990a3885cda6462cc90977e0f6eac40d30f5ad8584049541a6edfe183d24d29cb760d38854a8ae4fc11d6ff0bb858bd759988f232d7324643cb15fb6024134dccb34ae3650f898bf8f4b9bac7982dfd8565a02471632d504002aa984c19142777030adbc544dabbffd7401b9a99d2b4cff1a2be4cb971e73d61bfcdd4e862e5062f8106d9c0b0bd0072939a50ef03d40a801ee8ba3aeac", 0xde, 0x20}, {&(0x7f0000000d80)="c22855384d639b3b8b301f3c1e4fd51b2c28ae45b160fe31554c5de6a4879a358084e3fd0aba058dd80900dbeb55d84acb5fb4f7008f90c870475f03b6ce051a0276a2d51c7ed93ed830e1d4cac46694fc3cc694efc7419629af3673136caa1d0be70206001be538d24462022c01769893d09866cd1963b52a7cab195a0883e44e44eddcb8162931875e64f284dc152b3e9228952e2ecd9a680060c3139a15d0da52f0567e24977716d09e9208c438a4fa3456092cf50ec0abcbfdb1396460cb79dfff75acf108caac5553a91f47dfb31408a3e142c8af867b531c4d6dd4cb8faf9fe5cc077b328e6e5b371b660c12285673d411590a389a303e552d52d81cfec7ae685c7a01d788894e57a936e30075391a4801063aefb9d24b7b58a9ec2ee7b1be5755033dac2b711783cb297712b3b99071db00f7aa7e183e2b387c9ed15124cff7c6e8bf72c9429b9e48cfbac4175798a0225bd94ce62395f0b57b81bb9b6ff2251f9f79245ce6ff69062c2db9ea906b28c33d84cfc3396c111d68b46788bfd7f51c0f43aafdafa83c3eb0899af039b579f00dc321deb78fd269e15f9c6c7e851714c92f226b6268bfdbeef2edfbc309c44fc7858c490e32bcdf9b5a75d2af32ba23af7321d7c922abf49bfd7190c0276484794233afb7aa6e90cef2e39614e890f78af01871a3eb44d7d2f9ab24273fc312402bdf6e40cd11395d9be8de5d04aa240af2cac7e5cbeacfb031b07359caf67f8e5005d7b233d2183a785a71a5e6d79c4eb2f9ec2ed40524f6d5382e01dda222ec22b082466ef4d25158c874abc9fe0ee70cc7b2a851e33a29b9df7a52135a9a75957291d9b58671d8ce588740add1ee85f715d71743d20f04509ce8c31e37d67f9dab7aa844e50e8ec7623a6e7369327d4211a7cd3a48fc7240fe33e774cff5ac9f0b1a440facf30cb5a39d66db8b966ee601f90e98639c2d48f499a8451907db0ac64c1a98dcd2489810f9e3c60fc46aacbe5e8e7034e8e011f209a24899873d13294b53753b06fc1fe2c0d5ae031d9aa374ba0d1b9df36ce41d21293c7dbf26588a817203ae5772e8c9867718954236d7a3f63fde5f1afe9540e312b30ed61a18b27593e27c233311fc2952583fa270961ab22d06ddf15f1a2c6f7a48c81a64fe38753f4a2173f8c265e8cee6a9aa9d1fb11ede7e895bde64801ee87fdb571820a6f8f0fd7f351245b7a729bb6fd59b4c1dfcdf305fbd54d94492a188aed82875b1e823929c7cfb33374ea61a733a142cc91d912b0f0f85a07a1bcae04f6a2a28c12ae5f973c49b44922302df3bb7b51e684db6e2577baed0cdfb3607fee670bacd258fff4ddf1ee9e3638bce64b9810066ac4b849f09000183a0650b894d493a70f7ca9f8e9c9d4899b1e19864a8cbe710d8f490b3ec8f960f1b754e9e10e1bb812b49df847f5209509ca7405146ef48c3ede931df9c4a5fe38c8f3b675cc7c221b228fbbdfb747467ef16cdd7be4a3cf07b983fd71821a5a2bd50b7dcb9e5a445d25d9c96ace443b141570b40530a7d70db608322f46ca4e78c2792f8ead67d8ef1ecf0b8e6f6c742dd2392a4e649e2e78bc3dacd3067c3b910711f3bfe25a124d030b2489a36af4be9797924fd8a2161dfbc29b792513362392b493d605dc4af108b85fe61674e1525e5c8ee3776f2da697bc9339c7d7abee4365d79b04c28b042033d542f4906580ea807f583de8692e468620f5230bbd1a782c2a4e3562c7a0ff031922dd0623bf114ce3e07905ae13d32139c00dd9b7b8125b08d1148d60155e8a084bfa1323376f600e50df7e3b590c3ad7cb2c746a2f9e1c0472d51b595de85c50427355a59c7529fffd2098520af225ce49e0d677e0938af5414d1738843f1d445d3380465776b54d5765c595e52eefa8f03900164da7dd5ca66ab95fee2df0edb94dc362a5ea4bcd42fc17a73cdcf4c0bb77c37ab55913169bffffb587b6e40fe004164ec0b69b0c2ac94405352d60ea4a8b4621fc532419389fbc296a129de9cb055b71b3020d5f3db7f0ee38d8e15e0dcc5e86dfea5c11f06571ceaca67fbff46e23421e7a0a63215fc6a25907262faa9098d98f99656df1df88f6eb57704de0a85680978c1f5fdb90f1f490c3a004018ce4b7e05d26438682f5284c737a5d737446fbf7e616167432fb124b8383f1c32906f2e6a7ef5e755c7c408458f118c9a9babaa2dc74579c82db862e16225cf0428b8fbbed3dcec490c797deb4fb0f981e6a7185fa29c581ffbe24c7cd4a4c0d46a481fdbc60a65b632de85a832737ae20ce09e0c1bcf1bbaaf6f82e813beaa25f4c0c2ba990c199bf1e32c9bc98d47802be427c22268f0b4fbef77f0ba455820a6e4213dc3456aa750da12b0ee6dba88eb65a377d173959e076c9ef6254cd309543c4342c219bfca580effcf7e46fcd7a408c690904aa869e93fa8ada5342b67099b459307dba458b6213a5542bbfc305955771173bb546a3f5a6e2bde2e97303ee8a134c1ff555a7dbe30d4913961a866e47064cec09baf5b09bb00916b4254b20354f5dbdb11b46bdff328f58d6f6539e87dd6717378c5dc5aa970a79e63bc566d522cf06c29d0f5a8c75313f5539f6764aa108d11e47ca3eeb7affeebb1d61d61293e102faea0f6fd38341d586461079ebe16dbab175c99e76e4855af254129afda7fcc63fc6d70454e08ae18e5e0804e87155999de222012934ff8ad2b54e7aaee5f72777cc128843368c4ff1990240c5b8d9199bcc700ae2d01aa7e704b8a5040214c9bd94133054e7d0500e1af3f7f9be8ff96498144cbdbcf1b89fd780f505d57c2fa09a86541ba16eea4356dcbf6a7ae44c98739980a731163e764b193791baa5306444f2cd5fb980a7bdeece75a18c209b4dad569614cbee972152790d3e31626eec7f3cb45d423fb91b12489d4ebf49c0ef00e1f9170658af03778f3d2e2142d509171544a0f217585a9e8245fe51422ee2538f03eb40253530e22eae66a7c74c67a13ce28b5ee54d523f646dce08a9f7873dd521bb57073398bf4d135083c0bc201df21a22cfe59e14ac1edd3dca1c4462c2a25d226b12e7d1d0e987b0c5bf245e2ea9c9dfde200f12e12fc000a90fcca9778a47401080d84d483d944e72198f650eea58556607424607d2c285c5bf0685689b0b6ed623caf26d670013934f418323a647067a45d6309295c361280bfb2ae0597dc32755c46c4db51ed336af4ae70d814abba627f1e6f501737f0ec1ee9a54bbccbcc20e4dd8433282b9ddbdcc97f32e36930ca05e54aba2f56647460ce57b13373f3795727f8bbbfcf68f2d04066a73059e6b221872191ce6be455cf81bad0ccc276ee4f0cb6e7d0c694a6137749a2f72012463bb5fc74075b4a383d1075d61d8a28475a972ad6f99ad2bb65b12cdfbd4543abfee29fc5dd4e0c79b08487de39cb12d49dbc9da02f3f00cd0ded1721d2ed2539a6811d8572428b9a6dd6c286d8534dfcceb1c84b74253e1ac0aa6b8d75dca91e6171e6db21975bc2cdaf53ead614ceab0f9a66892c06a729beedd5c6cefebe9c7a2290a624f81793ced33b534cf7bf5f5188b8f1d34a9584f83c74d689cb45f67475d7e9e7ad7ac504b076718742ac65e0ef69faa057583d88f72ad8510a48d120c68cc3b3c3139c72254ac3febf384c54025e590a8dae276e6976bdf3ee8ae11d8c95c3b1667dacbb587afeb1a36b4a9a8539b40ae916375c14d1e7a6c75b80692ef99d41e9889e5bee4db20344dffcb951dc8d48ea7270260404411bf1ad24d90bbbb3aae48f6eca55bf4b702dabce9c355b9297bf623aca41f6dc2949ec885946a5c2ff155423bb3226085f87ef798db4a3086bddbf0060e7e991ae8e42a2d1f2a80e2754afde923388bea92b4d1d57ec66b71129d46685cf8f748c0313288d595c535d09a76c70eb17fb98f4afec1998302822315309d9b1bdd7f14adac051809bb4f1deda914f8fb5184b8ad3527b49f8b02dcecf12bc549f1bf7dea2218a416d9522fdb349a5de80da8f3f6c8581479cfdc5edf808b5a460ae34656395b05e2cbb901d0d6dd91d6f0e9a2563e728e268e6b0e5d1715b2c308ea96b06ea6909d550ecfbd5342001608db273e73f5dee6221c8dec56567da20311b340ee4e2040b0be4ac5ed23f7eb537b50f6b054cd1c77b8213d75faf30fdefa557e0cc56bdc62afe7b1532bb8512c29e9f383b940f2e768893bb689a05d51e2871cd2b2e8a29aa63b515fc10d6be071cd7d69c39fbc8a1a9fa10148fbf134603ecd74b00f6b143061ea384eb0cadc93f9fd7b0e52bf98b935ed6b45a880ceae8be2e566e361da36baecbc0df9b37962b3e46a9711acb0fd92ff89a3cbb1d2af4f4a934c46125194888919cc2103e7630c68ab2bbf0ca999bca2772367aa44fd94edbe7a711eec1f5dc80c7dcf1f7aca6f4c5b51e684fff0525a105aa4df3f8d9df1cd85c00cb50932baad522d19db7d056d1e7dad20376a844385d2c4bdab198fb450806eab115e5dc7b378ab19e1ef0548163e6405e169992d4cd3cb53ba82540f08891e19579e100bf92b8292faf9311a17a528f72d11314b372468d6db989f920a26a8ead706011311756e8b7d962086e877c0b177295d6263c001418d9f8cafcafa8f4af73863868da6a4e0b8374afba74815c89490368586dc6e2e8d6122c2731f78bedf9a0e78192e781906b71d837bc0b123e88812aae2ca8c92de6256ee0189b1929f363880d8acec479c656411200212a1936431def166c5284ca7a43ee170c184428a34337985d4e763c44893bf47fd83a11f248e6597899c8e8f780b41735b91c40dde0b7f1955f663f83ad32972154b1f81f633e672ac2ed959573775b28476826745b8edd3bad2569f10481c64fa3e77602dee530dcea5fd28453ea31c112fbee33a700adeaabc3d5ce8927196afac8465eb3721bbee8b7d91a99fc0a8427df5ecce849d474a61b202c71397e90ccb0764f257698f27719d30e71ec508b8817fb1ff4a865bbb64ccde863cf4880706f32865e98170b673eb1da547c1031488688c4199a14f3d9a487764a68bc412601758d5c4f1c98bc9fb9dd3f03664735bda23e9726bf0266d04abefb0b191464bbd2ed749d9c4ae10b7db22e8d12f7d36e1f55e6a1da231a1bc46951f4d44205a3d7867af7922069385efb73dfa92b9c7ba5bfbe09c6f5b030f4273e2a263100c8f570d67bf4adb28a5b342de2f7f9466efa80b0ff017768381d5b1f25334cf3e104f19bcec558e0fcfeb7ccec28d83e64dc5383a6c122d39706c64a08089a10120114d5adaafbdea49db5ea628319354a5c71098994ec5ca08830ec81d6dd889e88a30546751f4e58b31c7179406841e29553ca5c004a9195092890d4d290e99fb08df3c1e51af75f720dd9ec602a16e9513246f050413b16d1c27ccfcea0a419999d778be1a260922e8196ecd24aee966286be74a504509602c14bc680715ea7527864d327d31a40c914baaab40dc4d7420a564f07eb55657f2c6da20e6e811c7188ae5468bd0cf12df19183eb5f2fff44bf080ddf13b1d5aa36332febbb6925fdd06deab18f239755630757c5405af32c7e7e614ab92679e19c462e0321127db2176fc76c53fc33b2614a37314b901b854728342b14ce1d4088f2c16b00134f562539dc1f5beabc8e877a613dc2b651f0e2ccc6420a611d284ae88283d8cb2e6abfaf70b357daf135fba747a91e45af12e332e2822344b849b89d38c9e350b8e57439fb38ebaa631a5d12c295e58cd8d2578da1ac", 0x1000, 0x1}], 0xf72fd35b1313c585, &(0x7f0000000780)={[{@prjquota='prjquota'}, {@jqfmt_vfsold='jqfmt=vfsold'}], [{@dont_hash='dont_hash'}, {@smackfstransmute={'smackfstransmute', 0x3d, '/dev/fuse\x00'}}]}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') writev(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000280)="8abd4146a8df028b2a3f21914ded1a423906ccdfc216664130f7374bdaed85e982bcef5ca9d5df60467cbd021688cc8fcc682794f44a48803ab0f013179d595ca5215f651ac0e724bc776c7d494c0e39c58bf9c495b59083150fc0cce74610ceca2ecf7cbd09266352585c334d2e223df2e384d3b999cb8cc96916a3d02949ade56aee7e9cb1c86b5090b0d738eef6fceabbb0b6156cacef6680abd36bdf65db88b95f6611460d438d644724085e6e3e28fdc5e36d7339fa2b6c5d3ef3c678f80914b785b8da47874a7f5ec12803d73f1b19a22f7255cd3ceace2a91763d", 0xde}], 0x1) [ 740.130909][T26064] FAULT_INJECTION: forcing a failure. [ 740.130909][T26064] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 740.164477][T26064] CPU: 0 PID: 26064 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 740.173643][T26064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 740.173651][T26064] Call Trace: [ 740.173677][T26064] dump_stack+0x172/0x1f0 [ 740.173706][T26064] should_fail.cold+0xa/0x15 [ 740.187059][T26064] ? fault_create_debugfs_attr+0x180/0x180 [ 740.187077][T26064] ? ___might_sleep+0x163/0x280 [ 740.187102][T26064] should_fail_alloc_page+0x50/0x60 [ 740.187116][T26064] __alloc_pages_nodemask+0x1a1/0x900 [ 740.187137][T26064] ? __alloc_pages_slowpath+0x2540/0x2540 [ 740.187156][T26064] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 22:00:29 executing program 4 (fault-call:3 fault-nth:13): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) [ 740.187180][T26064] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 740.187201][T26064] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 740.196100][T26064] alloc_pages_vma+0x1bc/0x3f0 [ 740.196125][T26064] do_huge_pmd_wp_page_fallback+0x1f0/0x1740 [ 740.196142][T26064] ? perf_trace_lock_acquire+0xf5/0x530 [ 740.196169][T26064] ? defrag_store+0x360/0x360 [ 740.196189][T26064] ? lock_downgrade+0x920/0x920 [ 740.196207][T26064] ? swp_swapcount+0x540/0x540 [ 740.196222][T26064] ? shrink_huge_zero_page_scan+0x1a0/0x1a0 [ 740.196237][T26064] ? __kasan_check_read+0x11/0x20 [ 740.196249][T26064] ? do_raw_spin_unlock+0x57/0x270 [ 740.196265][T26064] do_huge_pmd_wp_page+0x7ff/0x2300 [ 740.196276][T26064] ? __kasan_check_read+0x11/0x20 [ 740.196299][T26064] ? __split_huge_pmd+0x2810/0x2810 [ 740.206926][T26064] ? __kasan_check_read+0x11/0x20 [ 740.206949][T26064] ? pmd_val+0x85/0x100 [ 740.206964][T26064] ? add_mm_counter_fast.part.0+0x40/0x40 [ 740.206983][T26064] ? debug_smp_processor_id+0x3c/0x214 [ 740.207006][T26064] __handle_mm_fault+0x14cf/0x3f20 22:00:29 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2e0, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 740.207029][T26064] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 740.207057][T26064] ? __kasan_check_read+0x11/0x20 [ 740.207080][T26064] handle_mm_fault+0x1b5/0x6c0 [ 740.207101][T26064] __do_page_fault+0x536/0xdd0 [ 740.217651][T26064] do_page_fault+0x38/0x590 [ 740.217671][T26064] page_fault+0x39/0x40 [ 740.217689][T26064] RIP: 0010:copy_user_generic_unrolled+0xa0/0xc0 [ 740.217705][T26064] Code: 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 4c 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a 06 <88> 07 48 ff c6 48 ff c7 ff c9 75 f2 31 c0 0f 1f 00 c3 0f 1f 40 00 [ 740.217713][T26064] RSP: 0018:ffff888066e7fe68 EFLAGS: 00010202 [ 740.217723][T26064] RAX: 0000000000000000 RBX: 0000000000000002 RCX: 0000000000000002 [ 740.217736][T26064] RDX: 0000000000000002 RSI: ffff888095dbb000 RDI: 0000000020000580 [ 740.217746][T26064] RBP: ffff888066e7fea0 R08: 1ffff11012bb7600 R09: ffffed1012bb7601 [ 740.217755][T26064] R10: ffffed1012bb7600 R11: ffff888095dbb001 R12: 0000000020000580 [ 740.217763][T26064] R13: ffff888095dbb000 R14: 0000000020000582 R15: 00007ffffffff000 [ 740.217792][T26064] ? _copy_to_user+0x146/0x160 [ 740.217813][T26064] __x64_sys_mincore+0x3cd/0x860 [ 740.229763][T26064] do_syscall_64+0xfa/0x760 [ 740.229788][T26064] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 740.229800][T26064] RIP: 0033:0x4598e9 [ 740.229815][T26064] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 740.229824][T26064] RSP: 002b:00007f786c5e8c78 EFLAGS: 00000246 ORIG_RAX: 000000000000001b [ 740.229836][T26064] RAX: ffffffffffffffda RBX: 00007f786c5e8c90 RCX: 00000000004598e9 [ 740.229844][T26064] RDX: 0000000020000580 RSI: 0000000000002000 RDI: 0000000020ffe000 [ 740.229852][T26064] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 740.229861][T26064] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f786c5e96d4 [ 740.229869][T26064] R13: 00000000004c5d52 R14: 00000000004da788 R15: 0000000000000004 [ 740.428876][T26077] FAULT_INJECTION: forcing a failure. [ 740.428876][T26077] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 740.447354][T26077] CPU: 0 PID: 26077 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 740.477159][T26077] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 740.477167][T26077] Call Trace: [ 740.477193][T26077] dump_stack+0x172/0x1f0 [ 740.477215][T26077] should_fail.cold+0xa/0x15 [ 740.477235][T26077] ? fault_create_debugfs_attr+0x180/0x180 [ 740.477253][T26077] ? ___might_sleep+0x163/0x280 [ 740.477278][T26077] should_fail_alloc_page+0x50/0x60 [ 740.477292][T26077] __alloc_pages_nodemask+0x1a1/0x900 [ 740.477313][T26077] ? __alloc_pages_slowpath+0x2540/0x2540 [ 740.501656][T26077] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 740.517576][T26077] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 740.517591][T26077] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 740.517611][T26077] alloc_pages_vma+0x1bc/0x3f0 [ 740.517634][T26077] do_huge_pmd_wp_page_fallback+0x1f0/0x1740 [ 740.517654][T26077] ? perf_trace_lock_acquire+0xf5/0x530 [ 740.539569][T26077] ? defrag_store+0x360/0x360 [ 740.539590][T26077] ? lock_downgrade+0x920/0x920 [ 740.539608][T26077] ? swp_swapcount+0x540/0x540 [ 740.539621][T26077] ? shrink_huge_zero_page_scan+0x1a0/0x1a0 [ 740.539638][T26077] ? __kasan_check_read+0x11/0x20 [ 740.558776][T26077] ? do_raw_spin_unlock+0x57/0x270 [ 740.558796][T26077] do_huge_pmd_wp_page+0x7ff/0x2300 [ 740.558809][T26077] ? __kasan_check_read+0x11/0x20 [ 740.558830][T26077] ? __split_huge_pmd+0x2810/0x2810 [ 740.558844][T26077] ? __kasan_check_read+0x11/0x20 [ 740.558863][T26077] ? pmd_val+0x85/0x100 [ 740.558880][T26077] ? add_mm_counter_fast.part.0+0x40/0x40 [ 740.587420][T26068] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 740.592496][T26077] ? debug_smp_processor_id+0x3c/0x214 [ 740.628246][T26070] device nr0 entered promiscuous mode [ 740.633115][T26077] __handle_mm_fault+0x14cf/0x3f20 [ 740.716679][T26077] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 740.722249][T26077] ? __kasan_check_read+0x11/0x20 [ 740.727289][T26077] handle_mm_fault+0x1b5/0x6c0 [ 740.732261][T26077] __do_page_fault+0x536/0xdd0 [ 740.737039][T26077] do_page_fault+0x38/0x590 [ 740.741551][T26077] page_fault+0x39/0x40 [ 740.745851][T26077] RIP: 0010:copy_user_generic_unrolled+0xa0/0xc0 [ 740.752187][T26077] Code: 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 4c 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a 06 <88> 07 48 ff c6 48 ff c7 ff c9 75 f2 31 c0 0f 1f 00 c3 0f 1f 40 00 [ 740.771797][T26077] RSP: 0018:ffff888068ab7e68 EFLAGS: 00010202 [ 740.777870][T26077] RAX: 0000000000000000 RBX: 0000000000000002 RCX: 0000000000000002 [ 740.785836][T26077] RDX: 0000000000000002 RSI: ffff88805c582000 RDI: 0000000020000580 [ 740.794070][T26077] RBP: ffff888068ab7ea0 R08: 1ffff1100b8b0400 R09: ffffed100b8b0401 [ 740.802040][T26077] R10: ffffed100b8b0400 R11: ffff88805c582001 R12: 0000000020000580 [ 740.810009][T26077] R13: ffff88805c582000 R14: 0000000020000582 R15: 00007ffffffff000 [ 740.818019][T26077] ? _copy_to_user+0x146/0x160 [ 740.822786][T26077] __x64_sys_mincore+0x3cd/0x860 [ 740.827737][T26077] do_syscall_64+0xfa/0x760 [ 740.832507][T26077] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 740.838393][T26077] RIP: 0033:0x4598e9 [ 740.842283][T26077] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 740.861894][T26077] RSP: 002b:00007f786c5e8c78 EFLAGS: 00000246 ORIG_RAX: 000000000000001b [ 740.870745][T26077] RAX: ffffffffffffffda RBX: 00007f786c5e8c90 RCX: 00000000004598e9 22:00:30 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet6(0xa, 0x3, 0x3c) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x4, 0x0) [ 740.878801][T26077] RDX: 0000000020000580 RSI: 0000000000002000 RDI: 0000000020ffe000 [ 740.886877][T26077] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 740.894956][T26077] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f786c5e96d4 [ 740.902981][T26077] R13: 00000000004c5d52 R14: 00000000004da788 R15: 0000000000000004 22:00:30 executing program 4 (fault-call:3 fault-nth:14): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:00:30 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x168}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stat\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 22:00:30 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2e1, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 741.237105][T26091] FAULT_INJECTION: forcing a failure. [ 741.237105][T26091] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 741.296104][T26091] CPU: 1 PID: 26091 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 741.305270][T26091] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 741.315329][T26091] Call Trace: [ 741.318620][T26091] dump_stack+0x172/0x1f0 [ 741.318645][T26091] should_fail.cold+0xa/0x15 [ 741.318666][T26091] ? fault_create_debugfs_attr+0x180/0x180 [ 741.318685][T26091] ? ___might_sleep+0x163/0x280 [ 741.338234][T26091] should_fail_alloc_page+0x50/0x60 [ 741.343449][T26091] __alloc_pages_nodemask+0x1a1/0x900 [ 741.348834][T26091] ? __alloc_pages_slowpath+0x2540/0x2540 [ 741.354647][T26091] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 741.360900][T26091] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 741.367147][T26091] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 741.373398][T26091] alloc_pages_vma+0x1bc/0x3f0 [ 741.378172][T26091] do_huge_pmd_wp_page_fallback+0x1f0/0x1740 [ 741.384169][T26091] ? perf_trace_lock_acquire+0xf5/0x530 [ 741.389731][T26091] ? defrag_store+0x360/0x360 [ 741.394419][T26091] ? lock_downgrade+0x920/0x920 [ 741.399275][T26091] ? swp_swapcount+0x540/0x540 [ 741.404041][T26091] ? shrink_huge_zero_page_scan+0x1a0/0x1a0 [ 741.409944][T26091] ? __kasan_check_read+0x11/0x20 [ 741.414990][T26091] ? do_raw_spin_unlock+0x57/0x270 [ 741.420143][T26091] do_huge_pmd_wp_page+0x7ff/0x2300 [ 741.425442][T26091] ? __kasan_check_read+0x11/0x20 [ 741.430500][T26091] ? __split_huge_pmd+0x2810/0x2810 [ 741.435703][T26091] ? __kasan_check_read+0x11/0x20 [ 741.440714][T26091] ? pmd_val+0x85/0x100 [ 741.444855][T26091] ? add_mm_counter_fast.part.0+0x40/0x40 [ 741.450564][T26091] ? debug_smp_processor_id+0x3c/0x214 [ 741.456009][T26091] __handle_mm_fault+0x14cf/0x3f20 [ 741.461125][T26091] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 741.466694][T26091] ? __kasan_check_read+0x11/0x20 [ 741.471720][T26091] handle_mm_fault+0x1b5/0x6c0 [ 741.476533][T26091] __do_page_fault+0x536/0xdd0 [ 741.481310][T26091] do_page_fault+0x38/0x590 [ 741.485812][T26091] page_fault+0x39/0x40 [ 741.489966][T26091] RIP: 0010:copy_user_generic_unrolled+0xa0/0xc0 [ 741.496286][T26091] Code: 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 4c 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a 06 <88> 07 48 ff c6 48 ff c7 ff c9 75 f2 31 c0 0f 1f 00 c3 0f 1f 40 00 [ 741.515876][T26091] RSP: 0018:ffff888047817e68 EFLAGS: 00010202 [ 741.521938][T26091] RAX: 0000000000000000 RBX: 0000000000000002 RCX: 0000000000000002 [ 741.529908][T26091] RDX: 0000000000000002 RSI: ffff888057fd9000 RDI: 0000000020000580 [ 741.537872][T26091] RBP: ffff888047817ea0 R08: 1ffff1100affb200 R09: ffffed100affb201 [ 741.546426][T26091] R10: ffffed100affb200 R11: ffff888057fd9001 R12: 0000000020000580 [ 741.554497][T26091] R13: ffff888057fd9000 R14: 0000000020000582 R15: 00007ffffffff000 [ 741.562479][T26091] ? _copy_to_user+0x146/0x160 [ 741.567238][T26091] __x64_sys_mincore+0x3cd/0x860 [ 741.572239][T26091] do_syscall_64+0xfa/0x760 [ 741.576795][T26091] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 741.582806][T26091] RIP: 0033:0x4598e9 [ 741.586701][T26091] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 741.606297][T26091] RSP: 002b:00007f786c5e8c78 EFLAGS: 00000246 ORIG_RAX: 000000000000001b [ 741.615131][T26091] RAX: ffffffffffffffda RBX: 00007f786c5e8c90 RCX: 00000000004598e9 [ 741.623088][T26091] RDX: 0000000020000580 RSI: 0000000000002000 RDI: 0000000020ffe000 [ 741.631057][T26091] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 741.639017][T26091] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f786c5e96d4 [ 741.646976][T26091] R13: 00000000004c5d52 R14: 00000000004da788 R15: 0000000000000004 22:00:31 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2e2, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:31 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) getcwd(&(0x7f0000000000)=""/127, 0x7f) close(r0) 22:00:31 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000000, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) fanotify_init(0x20, 0x0) sendto$inet(r3, 0x0, 0xfffffffffffffcf3, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xfea0, 0x0, 0x0, 0x0) 22:00:31 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000340)={0x6, 0x0, [{0x4, 0x34, &(0x7f0000000040)=""/52}, {0x5000, 0x7e, &(0x7f0000000080)=""/126}, {0x2000, 0x77, &(0x7f0000000100)=""/119}, {0x4000, 0x4b, &(0x7f00000001c0)=""/75}, {0x100000, 0x92, &(0x7f0000000240)=""/146}, {0x0, 0x25, &(0x7f0000000300)=""/37}]}) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f0000000440)={0x28, 0x2, 0x0, {0x0, 0x100000001, 0x5}}, 0x28) 22:00:31 executing program 4 (fault-call:3 fault-nth:15): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:00:31 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x600000000000000, 'c\x86\xdd'}]}, 0xfdef) [ 742.457285][T26114] FAULT_INJECTION: forcing a failure. [ 742.457285][T26114] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 742.461674][T26112] device nr0 entered promiscuous mode [ 742.470819][T26114] CPU: 0 PID: 26114 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 742.485518][T26114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 742.495588][T26114] Call Trace: [ 742.499072][T26114] dump_stack+0x172/0x1f0 [ 742.503418][T26114] should_fail.cold+0xa/0x15 [ 742.508025][T26114] ? fault_create_debugfs_attr+0x180/0x180 [ 742.513843][T26114] ? ___might_sleep+0x163/0x280 [ 742.518729][T26114] should_fail_alloc_page+0x50/0x60 [ 742.523944][T26114] __alloc_pages_nodemask+0x1a1/0x900 [ 742.529429][T26114] ? __alloc_pages_slowpath+0x2540/0x2540 [ 742.535148][T26114] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 742.541417][T26114] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 742.547809][T26114] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 742.554042][T26114] alloc_pages_vma+0x1bc/0x3f0 [ 742.558821][T26114] do_huge_pmd_wp_page_fallback+0x1f0/0x1740 [ 742.564825][T26114] ? perf_trace_lock_acquire+0xf5/0x530 [ 742.570366][T26114] ? defrag_store+0x360/0x360 [ 742.575033][T26114] ? lock_downgrade+0x920/0x920 [ 742.579885][T26114] ? swp_swapcount+0x540/0x540 [ 742.584648][T26114] ? shrink_huge_zero_page_scan+0x1a0/0x1a0 [ 742.590556][T26114] ? __kasan_check_read+0x11/0x20 [ 742.595663][T26114] ? do_raw_spin_unlock+0x57/0x270 [ 742.600792][T26114] do_huge_pmd_wp_page+0x7ff/0x2300 [ 742.605985][T26114] ? __kasan_check_read+0x11/0x20 [ 742.610998][T26114] ? __split_huge_pmd+0x2810/0x2810 [ 742.616183][T26114] ? __kasan_check_read+0x11/0x20 [ 742.621222][T26114] ? pmd_val+0x85/0x100 [ 742.625374][T26114] ? add_mm_counter_fast.part.0+0x40/0x40 [ 742.631125][T26114] ? debug_smp_processor_id+0x3c/0x214 [ 742.636587][T26114] __handle_mm_fault+0x14cf/0x3f20 [ 742.643874][T26114] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 742.649419][T26114] ? __kasan_check_read+0x11/0x20 [ 742.654454][T26114] handle_mm_fault+0x1b5/0x6c0 [ 742.659240][T26114] __do_page_fault+0x536/0xdd0 [ 742.664037][T26114] do_page_fault+0x38/0x590 [ 742.668530][T26114] page_fault+0x39/0x40 [ 742.672683][T26114] RIP: 0010:copy_user_generic_unrolled+0xa0/0xc0 [ 742.679013][T26114] Code: 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 4c 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a 06 <88> 07 48 ff c6 48 ff c7 ff c9 75 f2 31 c0 0f 1f 00 c3 0f 1f 40 00 [ 742.698915][T26114] RSP: 0018:ffff888066e7fe68 EFLAGS: 00010202 [ 742.705000][T26114] RAX: 0000000000000000 RBX: 0000000000000002 RCX: 0000000000000002 [ 742.712961][T26114] RDX: 0000000000000002 RSI: ffff88809898f000 RDI: 0000000020000580 [ 742.721068][T26114] RBP: ffff888066e7fea0 R08: 1ffff11013131e00 R09: ffffed1013131e01 [ 742.729142][T26114] R10: ffffed1013131e00 R11: ffff88809898f001 R12: 0000000020000580 [ 742.737356][T26114] R13: ffff88809898f000 R14: 0000000020000582 R15: 00007ffffffff000 [ 742.745831][T26114] ? _copy_to_user+0x146/0x160 [ 742.750740][T26114] __x64_sys_mincore+0x3cd/0x860 [ 742.755818][T26114] do_syscall_64+0xfa/0x760 [ 742.760337][T26114] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 742.766234][T26114] RIP: 0033:0x4598e9 [ 742.770321][T26114] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 742.790379][T26114] RSP: 002b:00007f786c5e8c78 EFLAGS: 00000246 ORIG_RAX: 000000000000001b [ 742.799802][T26114] RAX: ffffffffffffffda RBX: 00007f786c5e8c90 RCX: 00000000004598e9 22:00:32 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x6, 0x0, 0x0, 0x40, 0xfffffffffffffffe, "0900004054a503d39c2bd6a40f03c8aa000000000000a500ffffffff7f261e21ccf67e1d0000e573aa9ab732c7627ffe7a54cdbd77b300", 0x2b}, 0x60) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000000)={0xffffffffffffff22, {{0x2, 0x4e21, @multicast1}}}, 0x88) close(r0) [ 742.807878][T26114] RDX: 0000000020000580 RSI: 0000000000002000 RDI: 0000000020ffe000 [ 742.815999][T26114] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 742.824065][T26114] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f786c5e96d4 [ 742.832145][T26114] R13: 00000000004c5d52 R14: 00000000004da788 R15: 0000000000000004 22:00:32 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2e3, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:32 executing program 4 (fault-call:3 fault-nth:16): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:00:32 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2e4, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 743.129810][T26133] FAULT_INJECTION: forcing a failure. [ 743.129810][T26133] name fail_page_alloc, interval 1, probability 0, space 0, times 0 22:00:32 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet6(0xa, 0x3, 0x3c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r6, 0x4048ae9b, &(0x7f00000002c0)={0xe0003}) ioctl$KVM_SET_MSRS(r6, 0x8090ae81, &(0x7f0000000000)) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r8 = ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) r9 = ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r9, 0x4048ae9b, &(0x7f00000002c0)={0xe0003}) ioctl$KVM_SET_MSRS(r9, 0x8090ae81, &(0x7f0000000000)) splice(r6, 0x0, r9, 0x0, 0x100000000, 0xd) [ 743.182725][T26133] CPU: 1 PID: 26133 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 743.191892][T26133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 743.201963][T26133] Call Trace: [ 743.205301][T26133] dump_stack+0x172/0x1f0 [ 743.209661][T26133] should_fail.cold+0xa/0x15 [ 743.214281][T26133] ? fault_create_debugfs_attr+0x180/0x180 [ 743.220114][T26133] ? ___might_sleep+0x163/0x280 [ 743.224993][T26133] should_fail_alloc_page+0x50/0x60 [ 743.230292][T26133] __alloc_pages_nodemask+0x1a1/0x900 [ 743.235688][T26133] ? __alloc_pages_slowpath+0x2540/0x2540 [ 743.241433][T26133] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 743.247698][T26133] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 743.247715][T26133] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 743.247738][T26133] alloc_pages_vma+0x1bc/0x3f0 [ 743.247763][T26133] do_huge_pmd_wp_page_fallback+0x1f0/0x1740 [ 743.247779][T26133] ? perf_trace_lock_acquire+0xf5/0x530 [ 743.247805][T26133] ? defrag_store+0x360/0x360 [ 743.247824][T26133] ? lock_downgrade+0x920/0x920 [ 743.271033][T26133] ? swp_swapcount+0x540/0x540 [ 743.271051][T26133] ? shrink_huge_zero_page_scan+0x1a0/0x1a0 [ 743.271068][T26133] ? __kasan_check_read+0x11/0x20 [ 743.271081][T26133] ? do_raw_spin_unlock+0x57/0x270 [ 743.271098][T26133] do_huge_pmd_wp_page+0x7ff/0x2300 [ 743.271110][T26133] ? __kasan_check_read+0x11/0x20 [ 743.271134][T26133] ? __split_huge_pmd+0x2810/0x2810 [ 743.271152][T26133] ? __kasan_check_read+0x11/0x20 [ 743.271173][T26133] ? pmd_val+0x85/0x100 [ 743.271188][T26133] ? add_mm_counter_fast.part.0+0x40/0x40 [ 743.271208][T26133] ? debug_smp_processor_id+0x3c/0x214 [ 743.343851][T26133] __handle_mm_fault+0x14cf/0x3f20 [ 743.348965][T26133] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 743.354641][T26133] ? __kasan_check_read+0x11/0x20 [ 743.359738][T26133] handle_mm_fault+0x1b5/0x6c0 [ 743.364535][T26133] __do_page_fault+0x536/0xdd0 [ 743.369325][T26133] do_page_fault+0x38/0x590 [ 743.373848][T26133] page_fault+0x39/0x40 [ 743.378023][T26133] RIP: 0010:copy_user_generic_unrolled+0xa0/0xc0 [ 743.384359][T26133] Code: 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 4c 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a 06 <88> 07 48 ff c6 48 ff c7 ff c9 75 f2 31 c0 0f 1f 00 c3 0f 1f 40 00 [ 743.405885][T26133] RSP: 0018:ffff8880653b7e68 EFLAGS: 00010202 [ 743.405898][T26133] RAX: 0000000000000000 RBX: 0000000000000002 RCX: 0000000000000002 [ 743.405906][T26133] RDX: 0000000000000002 RSI: ffff88809799d000 RDI: 0000000020000580 [ 743.405913][T26133] RBP: ffff8880653b7ea0 R08: 1ffff11012f33a00 R09: ffffed1012f33a01 [ 743.405920][T26133] R10: ffffed1012f33a00 R11: ffff88809799d001 R12: 0000000020000580 [ 743.405928][T26133] R13: ffff88809799d000 R14: 0000000020000582 R15: 00007ffffffff000 [ 743.405968][T26133] ? _copy_to_user+0x146/0x160 [ 743.405990][T26133] __x64_sys_mincore+0x3cd/0x860 [ 743.406017][T26133] do_syscall_64+0xfa/0x760 [ 743.406040][T26133] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 743.406050][T26133] RIP: 0033:0x4598e9 22:00:33 executing program 4 (fault-call:3 fault-nth:17): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) [ 743.406071][T26133] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 743.406078][T26133] RSP: 002b:00007f786c5e8c78 EFLAGS: 00000246 ORIG_RAX: 000000000000001b [ 743.406096][T26133] RAX: ffffffffffffffda RBX: 00007f786c5e8c90 RCX: 00000000004598e9 [ 743.420119][T26133] RDX: 0000000020000580 RSI: 0000000000002000 RDI: 0000000020ffe000 [ 743.420129][T26133] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 22:00:33 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffffa, 0x20000802, &(0x7f00000000c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) r1 = dup2(r0, r0) sendto$inet(r0, &(0x7f0000000100)="be", 0x1, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$video(&(0x7f0000000580)='/dev/video#\x00', 0x2, 0xc0000) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r2, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) r4 = gettid() tkill(r4, 0x1004000000013) r5 = gettid() tkill(r5, 0x1004000000013) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r5, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000240)='syz_tun\x00', 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={r4, r2, 0x0, 0x8, &(0x7f0000000200)='syz_tun\x00', r6}, 0x30) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f00000001c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000340), r3, 0x2}}, 0x18) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000140)=ANY=[@ANYRESDEC], 0x1}}, 0x1) close(r1) [ 743.420138][T26133] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f786c5e96d4 [ 743.420148][T26133] R13: 00000000004c5d52 R14: 00000000004da788 R15: 0000000000000004 [ 743.620601][T26149] FAULT_INJECTION: forcing a failure. [ 743.620601][T26149] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 743.647154][T26112] device nr0 entered promiscuous mode 22:00:33 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2e5, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 743.671327][T26149] CPU: 0 PID: 26149 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 743.680492][T26149] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 743.690648][T26149] Call Trace: [ 743.693956][T26149] dump_stack+0x172/0x1f0 [ 743.698311][T26149] should_fail.cold+0xa/0x15 [ 743.702928][T26149] ? fault_create_debugfs_attr+0x180/0x180 [ 743.708755][T26149] ? ___might_sleep+0x163/0x280 [ 743.713760][T26149] should_fail_alloc_page+0x50/0x60 [ 743.718971][T26149] __alloc_pages_nodemask+0x1a1/0x900 [ 743.724356][T26149] ? __alloc_pages_slowpath+0x2540/0x2540 [ 743.730076][T26149] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 743.730099][T26149] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 743.730111][T26149] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 743.730129][T26149] alloc_pages_vma+0x1bc/0x3f0 [ 743.730155][T26149] do_huge_pmd_wp_page_fallback+0x1f0/0x1740 [ 743.730171][T26149] ? perf_trace_lock_acquire+0xf5/0x530 [ 743.730199][T26149] ? defrag_store+0x360/0x360 [ 743.730219][T26149] ? lock_downgrade+0x920/0x920 [ 743.730236][T26149] ? swp_swapcount+0x540/0x540 [ 743.730250][T26149] ? shrink_huge_zero_page_scan+0x1a0/0x1a0 [ 743.730264][T26149] ? __kasan_check_read+0x11/0x20 [ 743.730280][T26149] ? do_raw_spin_unlock+0x57/0x270 [ 743.795738][T26149] do_huge_pmd_wp_page+0x7ff/0x2300 [ 743.800954][T26149] ? __kasan_check_read+0x11/0x20 [ 743.805999][T26149] ? __split_huge_pmd+0x2810/0x2810 [ 743.811309][T26149] ? __kasan_check_read+0x11/0x20 [ 743.816358][T26149] ? pmd_val+0x85/0x100 [ 743.820528][T26149] ? add_mm_counter_fast.part.0+0x40/0x40 [ 743.826277][T26149] ? debug_smp_processor_id+0x3c/0x214 [ 743.832055][T26149] __handle_mm_fault+0x14cf/0x3f20 [ 743.837192][T26149] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 743.842768][T26149] ? __kasan_check_read+0x11/0x20 [ 743.847819][T26149] handle_mm_fault+0x1b5/0x6c0 [ 743.852590][T26149] __do_page_fault+0x536/0xdd0 [ 743.857567][T26149] do_page_fault+0x38/0x590 [ 743.862092][T26149] page_fault+0x39/0x40 [ 743.866377][T26149] RIP: 0010:copy_user_generic_unrolled+0xa0/0xc0 [ 743.872727][T26149] Code: 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 4c 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a 06 <88> 07 48 ff c6 48 ff c7 ff c9 75 f2 31 c0 0f 1f 00 c3 0f 1f 40 00 [ 743.892609][T26149] RSP: 0018:ffff88806756fe68 EFLAGS: 00010202 [ 743.898677][T26149] RAX: 0000000000000000 RBX: 0000000000000002 RCX: 0000000000000002 [ 743.906777][T26149] RDX: 0000000000000002 RSI: ffff8880a452f000 RDI: 0000000020000580 [ 743.915027][T26149] RBP: ffff88806756fea0 R08: 1ffff110148a5e00 R09: ffffed10148a5e01 [ 743.923020][T26149] R10: ffffed10148a5e00 R11: ffff8880a452f001 R12: 0000000020000580 [ 743.931135][T26149] R13: ffff8880a452f000 R14: 0000000020000582 R15: 00007ffffffff000 [ 743.939170][T26149] ? _copy_to_user+0x146/0x160 [ 743.944007][T26149] __x64_sys_mincore+0x3cd/0x860 [ 743.949380][T26149] do_syscall_64+0xfa/0x760 [ 743.953877][T26149] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 743.959761][T26149] RIP: 0033:0x4598e9 [ 743.963661][T26149] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 743.983278][T26149] RSP: 002b:00007f786c5e8c78 EFLAGS: 00000246 ORIG_RAX: 000000000000001b [ 743.991695][T26149] RAX: ffffffffffffffda RBX: 00007f786c5e8c90 RCX: 00000000004598e9 [ 743.999666][T26149] RDX: 0000000020000580 RSI: 0000000000002000 RDI: 0000000020ffe000 [ 744.007640][T26149] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 22:00:33 executing program 4 (fault-call:3 fault-nth:18): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) [ 744.015599][T26149] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f786c5e96d4 [ 744.023578][T26149] R13: 00000000004c5d52 R14: 00000000004da788 R15: 0000000000000004 22:00:33 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x204200, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000080)='9p\x00', 0x100010, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_client='access=client'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@dont_appraise='dont_appraise'}]}}) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) close(r0) signalfd4(r0, &(0x7f0000000000)={0x8}, 0x8, 0x80000) 22:00:33 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2e6, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 744.251469][T26165] FAULT_INJECTION: forcing a failure. [ 744.251469][T26165] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 744.296701][T26165] CPU: 0 PID: 26165 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 744.305867][T26165] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 744.315936][T26165] Call Trace: [ 744.319251][T26165] dump_stack+0x172/0x1f0 [ 744.323622][T26165] should_fail.cold+0xa/0x15 [ 744.328245][T26165] ? fault_create_debugfs_attr+0x180/0x180 [ 744.334076][T26165] ? ___might_sleep+0x163/0x280 [ 744.338962][T26165] should_fail_alloc_page+0x50/0x60 [ 744.344163][T26165] __alloc_pages_nodemask+0x1a1/0x900 [ 744.349543][T26165] ? __alloc_pages_slowpath+0x2540/0x2540 [ 744.355278][T26165] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 744.361543][T26165] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 744.367815][T26165] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 744.374081][T26165] alloc_pages_vma+0x1bc/0x3f0 [ 744.378876][T26165] do_huge_pmd_wp_page_fallback+0x1f0/0x1740 [ 744.384865][T26165] ? perf_trace_lock_acquire+0xf5/0x530 [ 744.390867][T26165] ? defrag_store+0x360/0x360 [ 744.395556][T26165] ? lock_downgrade+0x920/0x920 [ 744.400443][T26165] ? swp_swapcount+0x540/0x540 [ 744.405215][T26165] ? shrink_huge_zero_page_scan+0x1a0/0x1a0 [ 744.411114][T26165] ? __kasan_check_read+0x11/0x20 [ 744.416139][T26165] ? do_raw_spin_unlock+0x57/0x270 [ 744.421257][T26165] do_huge_pmd_wp_page+0x7ff/0x2300 [ 744.426453][T26165] ? __kasan_check_read+0x11/0x20 [ 744.431486][T26165] ? __split_huge_pmd+0x2810/0x2810 [ 744.436729][T26165] ? __kasan_check_read+0x11/0x20 [ 744.441804][T26165] ? pmd_val+0x85/0x100 [ 744.445971][T26165] ? add_mm_counter_fast.part.0+0x40/0x40 [ 744.451701][T26165] ? debug_smp_processor_id+0x3c/0x214 [ 744.457176][T26165] __handle_mm_fault+0x14cf/0x3f20 [ 744.462310][T26165] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 744.467882][T26165] ? __kasan_check_read+0x11/0x20 [ 744.472930][T26165] handle_mm_fault+0x1b5/0x6c0 [ 744.477710][T26165] __do_page_fault+0x536/0xdd0 [ 744.482494][T26165] do_page_fault+0x38/0x590 [ 744.487095][T26165] page_fault+0x39/0x40 [ 744.491270][T26165] RIP: 0010:copy_user_generic_unrolled+0xa0/0xc0 [ 744.497610][T26165] Code: 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 4c 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a 06 <88> 07 48 ff c6 48 ff c7 ff c9 75 f2 31 c0 0f 1f 00 c3 0f 1f 40 00 [ 744.517434][T26165] RSP: 0018:ffff888066c87e68 EFLAGS: 00010202 [ 744.523529][T26165] RAX: 0000000000000000 RBX: 0000000000000002 RCX: 0000000000000002 [ 744.531497][T26165] RDX: 0000000000000002 RSI: ffff8880a92a4000 RDI: 0000000020000580 [ 744.539521][T26165] RBP: ffff888066c87ea0 R08: 1ffff11015254800 R09: ffffed1015254801 [ 744.547492][T26165] R10: ffffed1015254800 R11: ffff8880a92a4001 R12: 0000000020000580 [ 744.555478][T26165] R13: ffff8880a92a4000 R14: 0000000020000582 R15: 00007ffffffff000 [ 744.563480][T26165] ? _copy_to_user+0x146/0x160 [ 744.568257][T26165] __x64_sys_mincore+0x3cd/0x860 [ 744.573227][T26165] do_syscall_64+0xfa/0x760 [ 744.577747][T26165] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 744.583632][T26165] RIP: 0033:0x4598e9 [ 744.587525][T26165] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 744.607139][T26165] RSP: 002b:00007f786c5e8c78 EFLAGS: 00000246 ORIG_RAX: 000000000000001b [ 744.615547][T26165] RAX: ffffffffffffffda RBX: 00007f786c5e8c90 RCX: 00000000004598e9 [ 744.623503][T26165] RDX: 0000000020000580 RSI: 0000000000002000 RDI: 0000000020ffe000 [ 744.631465][T26165] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 744.639780][T26165] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f786c5e96d4 [ 744.647759][T26165] R13: 00000000004c5d52 R14: 00000000004da788 R15: 0000000000000004 22:00:34 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x700000000000000, 'c\x86\xdd'}]}, 0xfdef) 22:00:34 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$TUNSETCARRIER(r1, 0x400454e2, &(0x7f0000000040)) syz_open_dev$cec(&(0x7f0000000300)='/dev/cec#\x00', 0x3, 0x2) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80480910}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)={0x120, r5, 0x4, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x34, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4064}]}, @TIPC_NLA_BEARER={0xd8, 0x1, [@TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x317d6986}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff00000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7f}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xffff}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x26}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x62862107}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfffffffffffffe00}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2f67}]}]}, 0x120}, 0x1, 0x0, 0x0, 0x26}, 0x4000800) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) 22:00:34 executing program 4 (fault-call:3 fault-nth:19): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:00:34 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) close(r0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x802004, 0x0) accept$inet6(r1, &(0x7f0000000040), &(0x7f0000000080)=0x1c) 22:00:34 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2e7, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:34 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r2, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x0, 0x2) bind$nfc_llcp(r2, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300000000000100", 0x26}, 0x60) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) fcntl$F_GET_RW_HINT(r4, 0x40b, &(0x7f00000001c0)) r5 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) close(r1) [ 744.840183][T26182] FAULT_INJECTION: forcing a failure. [ 744.840183][T26182] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 744.868997][T26188] device nr0 entered promiscuous mode [ 744.905189][T26182] CPU: 1 PID: 26182 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 744.914348][T26182] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 744.924428][T26182] Call Trace: [ 744.927727][T26182] dump_stack+0x172/0x1f0 [ 744.932073][T26182] should_fail.cold+0xa/0x15 [ 744.936679][T26182] ? fault_create_debugfs_attr+0x180/0x180 [ 744.942492][T26182] ? ___might_sleep+0x163/0x280 [ 744.947364][T26182] should_fail_alloc_page+0x50/0x60 [ 744.952654][T26182] __alloc_pages_nodemask+0x1a1/0x900 [ 744.958037][T26182] ? __alloc_pages_slowpath+0x2540/0x2540 [ 744.963763][T26182] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 744.970022][T26182] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 744.976262][T26182] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 744.982508][T26182] alloc_pages_vma+0x1bc/0x3f0 [ 744.987287][T26182] do_huge_pmd_wp_page_fallback+0x1f0/0x1740 [ 744.993277][T26182] ? perf_trace_lock_acquire+0xf5/0x530 [ 744.998844][T26182] ? defrag_store+0x360/0x360 [ 745.003538][T26182] ? lock_downgrade+0x920/0x920 [ 745.008395][T26182] ? swp_swapcount+0x540/0x540 [ 745.013243][T26182] ? shrink_huge_zero_page_scan+0x1a0/0x1a0 [ 745.019139][T26182] ? __kasan_check_read+0x11/0x20 [ 745.024161][T26182] ? do_raw_spin_unlock+0x57/0x270 [ 745.029276][T26182] do_huge_pmd_wp_page+0x7ff/0x2300 [ 745.034470][T26182] ? __kasan_check_read+0x11/0x20 [ 745.039504][T26182] ? __split_huge_pmd+0x2810/0x2810 [ 745.044703][T26182] ? __kasan_check_read+0x11/0x20 [ 745.049738][T26182] ? pmd_val+0x85/0x100 22:00:34 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2e8, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 745.054415][T26182] ? add_mm_counter_fast.part.0+0x40/0x40 [ 745.060138][T26182] ? debug_smp_processor_id+0x3c/0x214 [ 745.065633][T26182] __handle_mm_fault+0x14cf/0x3f20 [ 745.070759][T26182] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 745.076327][T26182] ? __kasan_check_read+0x11/0x20 [ 745.081364][T26182] handle_mm_fault+0x1b5/0x6c0 [ 745.086137][T26182] __do_page_fault+0x536/0xdd0 [ 745.090916][T26182] do_page_fault+0x38/0x590 [ 745.095434][T26182] page_fault+0x39/0x40 [ 745.100566][T26182] RIP: 0010:copy_user_generic_unrolled+0xa0/0xc0 [ 745.106914][T26182] Code: 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 4c 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a 06 <88> 07 48 ff c6 48 ff c7 ff c9 75 f2 31 c0 0f 1f 00 c3 0f 1f 40 00 [ 745.126522][T26182] RSP: 0018:ffff888064c77e68 EFLAGS: 00010202 [ 745.126534][T26182] RAX: 0000000000000000 RBX: 0000000000000002 RCX: 0000000000000002 [ 745.126541][T26182] RDX: 0000000000000002 RSI: ffff88805ca05000 RDI: 0000000020000580 [ 745.126549][T26182] RBP: ffff888064c77ea0 R08: 1ffff1100b940a00 R09: ffffed100b940a01 [ 745.126557][T26182] R10: ffffed100b940a00 R11: ffff88805ca05001 R12: 0000000020000580 [ 745.126564][T26182] R13: ffff88805ca05000 R14: 0000000020000582 R15: 00007ffffffff000 [ 745.126601][T26182] ? _copy_to_user+0x146/0x160 [ 745.126623][T26182] __x64_sys_mincore+0x3cd/0x860 [ 745.126648][T26182] do_syscall_64+0xfa/0x760 [ 745.140658][T26182] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 745.140671][T26182] RIP: 0033:0x4598e9 [ 745.140687][T26182] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 745.140696][T26182] RSP: 002b:00007f786c5e8c78 EFLAGS: 00000246 ORIG_RAX: 000000000000001b [ 745.140710][T26182] RAX: ffffffffffffffda RBX: 00007f786c5e8c90 RCX: 00000000004598e9 [ 745.140720][T26182] RDX: 0000000020000580 RSI: 0000000000002000 RDI: 0000000020ffe000 [ 745.140729][T26182] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 745.140738][T26182] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f786c5e96d4 [ 745.140747][T26182] R13: 00000000004c5d52 R14: 00000000004da788 R15: 0000000000000004 [ 745.335511][T26188] device nr0 entered promiscuous mode 22:00:36 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r1 = dup3(0xffffffffffffffff, r0, 0x80000) bind$bt_l2cap(r1, &(0x7f0000000540)={0x1f, 0x3, {0x2, 0x4, 0x4, 0x0, 0x400, 0x800}, 0x1, 0x1ff}, 0xe) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x1, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) r3 = mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1, 0x11, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000480)={0x74, 0x0, &(0x7f0000000300)=[@reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x60, 0x18, &(0x7f0000000240)={@flat=@binder={0x73622a85, 0x83f607a174f9ad4d, 0x2}, @fda={0x66646185, 0x7, 0x0, 0x2a}, @ptr={0x70742a85, 0x1, &(0x7f0000000180)=""/184, 0xb8, 0x2, 0xd}}, &(0x7f00000000c0)={0x0, 0x18, 0x38}}}, @enter_looper, @free_buffer, @free_buffer={0x40086303, r3}, @acquire_done={0x40106309, 0x3}], 0xf2, 0x0, &(0x7f0000000380)="3375e8c663f0e18447a584ca988c42ffbfa887b35de53d10080d1a3434ac3555bc987ecf7d1617a90b1691a007236d9f0cdde347d7c7faf207fa106dd31e15862caed2349f274b6e631ff9aedb86df4577d1d27d04e1bdad47b9a90ebe19c8ec9361c1698d354037d1c184713a6beef14cc87589997717e979d67b4f025afc3ac374b85a87d55b9c891555f13bf5709d7d1c197ab45a9cf656cb8a959459f197423684c166f4b9b0be3f30060782042fa68395c77c42b60912f883543e0e18143db2d8b0dc7d791f6c9ab2c49b2a9ea591fc648dadf61551b58c418b7908df1f77b3d3692ed2493a2c0bbc3162e3b1ebd10e"}) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) r5 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r5) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r6, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r6, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$IMGETDEVINFO(r6, 0x80044944, &(0x7f00000004c0)={0xd93c}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) r7 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0x0, 0x0, @reserved}, 0x10, 0x800) close(r7) 22:00:36 executing program 4 (fault-call:3 fault-nth:20): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:00:36 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2e9, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:36 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x800000000000000, 'c\x86\xdd'}]}, 0xfdef) 22:00:36 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x80000, 0x80) r4 = socket$inet_udplite(0x2, 0x2, 0x88) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) setitimer(0x3, &(0x7f0000000080)={{r5, r6/1000+10000}, {0x0, 0x2710}}, &(0x7f00000000c0)) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) 22:00:36 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x81, 0x1a77d8a85e4f94cc) r2 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x0, 0xda0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f00000001c0)={0x0}) ioctl$DRM_IOCTL_RM_CTX(r2, 0xc0086421, &(0x7f0000000280)={r3, 0x4}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f0000000140)={r3, &(0x7f0000000080)=""/190}) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000000)=@fragment, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r5, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r5, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) bind$alg(r5, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) setsockopt$inet6_opts(r0, 0x29, 0x36, 0x0, 0x0) [ 746.758280][T26209] device nr0 entered promiscuous mode [ 746.802000][T26215] FAULT_INJECTION: forcing a failure. [ 746.802000][T26215] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 746.837487][T26215] CPU: 1 PID: 26215 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 746.846660][T26215] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 746.856705][T26215] Call Trace: [ 746.859996][T26215] dump_stack+0x172/0x1f0 [ 746.864322][T26215] should_fail.cold+0xa/0x15 [ 746.868901][T26215] ? fault_create_debugfs_attr+0x180/0x180 [ 746.874694][T26215] ? ___might_sleep+0x163/0x280 [ 746.879538][T26215] should_fail_alloc_page+0x50/0x60 [ 746.884720][T26215] __alloc_pages_nodemask+0x1a1/0x900 [ 746.890084][T26215] ? __alloc_pages_slowpath+0x2540/0x2540 [ 746.895798][T26215] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 746.902030][T26215] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 746.908261][T26215] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 746.914492][T26215] alloc_pages_vma+0x1bc/0x3f0 [ 746.919244][T26215] do_huge_pmd_wp_page_fallback+0x1f0/0x1740 [ 746.925211][T26215] ? perf_trace_lock_acquire+0xf5/0x530 [ 746.930752][T26215] ? defrag_store+0x360/0x360 [ 746.935428][T26215] ? lock_downgrade+0x920/0x920 [ 746.940264][T26215] ? swp_swapcount+0x540/0x540 [ 746.945013][T26215] ? shrink_huge_zero_page_scan+0x1a0/0x1a0 [ 746.951671][T26215] ? __kasan_check_read+0x11/0x20 [ 746.956722][T26215] ? do_raw_spin_unlock+0x57/0x270 [ 746.961819][T26215] do_huge_pmd_wp_page+0x7ff/0x2300 [ 746.966997][T26215] ? __kasan_check_read+0x11/0x20 [ 746.972008][T26215] ? __split_huge_pmd+0x2810/0x2810 [ 746.977190][T26215] ? __kasan_check_read+0x11/0x20 [ 746.982205][T26215] ? pmd_val+0x85/0x100 [ 746.986352][T26215] ? add_mm_counter_fast.part.0+0x40/0x40 [ 746.992062][T26215] ? debug_smp_processor_id+0x3c/0x214 [ 746.997508][T26215] __handle_mm_fault+0x14cf/0x3f20 [ 747.002607][T26215] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 747.008155][T26215] ? __kasan_check_read+0x11/0x20 [ 747.013179][T26215] handle_mm_fault+0x1b5/0x6c0 [ 747.017934][T26215] __do_page_fault+0x536/0xdd0 [ 747.022685][T26215] do_page_fault+0x38/0x590 [ 747.027193][T26215] page_fault+0x39/0x40 [ 747.031340][T26215] RIP: 0010:copy_user_generic_unrolled+0xa0/0xc0 [ 747.037663][T26215] Code: 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 4c 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a 06 <88> 07 48 ff c6 48 ff c7 ff c9 75 f2 31 c0 0f 1f 00 c3 0f 1f 40 00 [ 747.057257][T26215] RSP: 0018:ffff888068307e68 EFLAGS: 00010202 [ 747.063306][T26215] RAX: 0000000000000000 RBX: 0000000000000002 RCX: 0000000000000002 [ 747.071265][T26215] RDX: 0000000000000002 RSI: ffff888056b1b000 RDI: 0000000020000580 [ 747.079220][T26215] RBP: ffff888068307ea0 R08: 1ffff1100ad63600 R09: ffffed100ad63601 [ 747.087174][T26215] R10: ffffed100ad63600 R11: ffff888056b1b001 R12: 0000000020000580 [ 747.095137][T26215] R13: ffff888056b1b000 R14: 0000000020000582 R15: 00007ffffffff000 [ 747.103120][T26215] ? _copy_to_user+0x146/0x160 [ 747.107890][T26215] __x64_sys_mincore+0x3cd/0x860 [ 747.112816][T26215] do_syscall_64+0xfa/0x760 [ 747.117328][T26215] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 747.123210][T26215] RIP: 0033:0x4598e9 [ 747.127101][T26215] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 22:00:36 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2ea, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 747.147814][T26215] RSP: 002b:00007f786c5e8c78 EFLAGS: 00000246 ORIG_RAX: 000000000000001b [ 747.156217][T26215] RAX: ffffffffffffffda RBX: 00007f786c5e8c90 RCX: 00000000004598e9 [ 747.164343][T26215] RDX: 0000000020000580 RSI: 0000000000002000 RDI: 0000000020ffe000 [ 747.172314][T26215] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 747.180267][T26215] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f786c5e96d4 [ 747.188340][T26215] R13: 00000000004c5d52 R14: 00000000004da788 R15: 0000000000000004 22:00:36 executing program 4 (fault-call:3 fault-nth:21): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:00:37 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2eb, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 747.453992][T26230] FAULT_INJECTION: forcing a failure. [ 747.453992][T26230] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 747.468231][T26230] CPU: 1 PID: 26230 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 747.477372][T26230] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 747.487436][T26230] Call Trace: [ 747.490748][T26230] dump_stack+0x172/0x1f0 [ 747.495194][T26230] should_fail.cold+0xa/0x15 22:00:37 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r5, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r5, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) getsockopt$netrom_NETROM_T1(r5, 0x103, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x4) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) [ 747.499897][T26230] ? fault_create_debugfs_attr+0x180/0x180 [ 747.505726][T26230] ? ___might_sleep+0x163/0x280 [ 747.510610][T26230] should_fail_alloc_page+0x50/0x60 [ 747.515923][T26230] __alloc_pages_nodemask+0x1a1/0x900 [ 747.521289][T26230] ? __alloc_pages_slowpath+0x2540/0x2540 [ 747.527087][T26230] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 747.533355][T26230] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 747.539699][T26230] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 747.545964][T26230] alloc_pages_vma+0x1bc/0x3f0 [ 747.550762][T26230] do_huge_pmd_wp_page_fallback+0x1f0/0x1740 [ 747.556779][T26230] ? defrag_store+0x360/0x360 [ 747.561482][T26230] ? __kasan_check_read+0x11/0x20 [ 747.566524][T26230] ? preempt_schedule_common+0x63/0xe0 [ 747.566543][T26230] ? preempt_schedule+0x4b/0x60 [ 747.566563][T26230] ? ___preempt_schedule+0x16/0x20 [ 747.576887][T26230] do_huge_pmd_wp_page+0x7ff/0x2300 [ 747.576900][T26230] ? __kasan_check_read+0x11/0x20 [ 747.576921][T26230] ? __split_huge_pmd+0x2810/0x2810 [ 747.576943][T26230] ? __kasan_check_read+0x11/0x20 [ 747.602461][T26230] ? pmd_val+0x85/0x100 [ 747.606639][T26230] ? add_mm_counter_fast.part.0+0x40/0x40 [ 747.612395][T26230] ? debug_smp_processor_id+0x3c/0x214 [ 747.617966][T26230] __handle_mm_fault+0x14cf/0x3f20 [ 747.623194][T26230] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 747.628770][T26230] ? __kasan_check_read+0x11/0x20 [ 747.633823][T26230] handle_mm_fault+0x1b5/0x6c0 [ 747.638606][T26230] __do_page_fault+0x536/0xdd0 [ 747.643397][T26230] do_page_fault+0x38/0x590 [ 747.648005][T26230] page_fault+0x39/0x40 22:00:37 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) bind$nfc_llcp(r1, &(0x7f0000000040)={0x27, 0x1, 0x1, 0x4, 0x0, 0x3, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x20000000000002b}, 0xfffffffffffffdfd) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r3, 0x8000, 0x4, 0x7f, 0x1}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) close(r0) r4 = socket$bt_cmtp(0x1f, 0x3, 0x5) r5 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x6, 0x100) write$input_event(r5, &(0x7f0000000240)={{}, 0x3, 0x7f, 0x82d6}, 0xfffffffffffffc58) recvfrom(r4, &(0x7f0000000100)=""/201, 0xc9, 0x2, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r5, 0xc0f85403, &(0x7f0000000380)={{0x2, 0x74135b5e5c87113f, 0x2, 0x2, 0x8}, 0x0, 0x1, 'id0\x00', 'timer1\x00', 0x0, 0x9, 0xfffffffffffffffc, 0x4, 0x9}) [ 747.652179][T26230] RIP: 0010:copy_user_generic_unrolled+0xa0/0xc0 [ 747.658509][T26230] Code: 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 4c 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a 06 <88> 07 48 ff c6 48 ff c7 ff c9 75 f2 31 c0 0f 1f 00 c3 0f 1f 40 00 [ 747.678120][T26230] RSP: 0018:ffff8880675ffe68 EFLAGS: 00010202 [ 747.678131][T26230] RAX: 0000000000000000 RBX: 0000000000000002 RCX: 0000000000000002 [ 747.678139][T26230] RDX: 0000000000000002 RSI: ffff888095730000 RDI: 0000000020000580 [ 747.678148][T26230] RBP: ffff8880675ffea0 R08: 1ffff11012ae6000 R09: ffffed1012ae6001 [ 747.678156][T26230] R10: ffffed1012ae6000 R11: ffff888095730001 R12: 0000000020000580 [ 747.678170][T26230] R13: ffff888095730000 R14: 0000000020000582 R15: 00007ffffffff000 [ 747.692251][T26230] ? _copy_to_user+0x146/0x160 [ 747.692275][T26230] __x64_sys_mincore+0x3cd/0x860 [ 747.692300][T26230] do_syscall_64+0xfa/0x760 [ 747.738405][T26230] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 747.744327][T26230] RIP: 0033:0x4598e9 [ 747.748236][T26230] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 747.767847][T26230] RSP: 002b:00007f786c5e8c78 EFLAGS: 00000246 ORIG_RAX: 000000000000001b [ 747.776250][T26230] RAX: ffffffffffffffda RBX: 00007f786c5e8c90 RCX: 00000000004598e9 [ 747.784416][T26230] RDX: 0000000020000580 RSI: 0000000000002000 RDI: 0000000020ffe000 [ 747.792380][T26230] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 747.800364][T26230] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f786c5e96d4 [ 747.808351][T26230] R13: 00000000004c5d52 R14: 00000000004da788 R15: 0000000000000004 22:00:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001200)='/dev/full\x00', 0xa8eb96ee90bcbc72, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r1, 0x80386433, &(0x7f0000001240)=""/206) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000001140)="f52a55661f4e39d2d80a35c3a2b34f3332921635cbd1b1225df83a31f81217bef78ddbe0ff7ed058cf97ea6d061511bce1164fbae8ac32ee0d9a4e6087801b23449a866174d0ec0a1157a3d4ec14cd31338ccac9ba84eb9756d7511d0186fc06a5734a5462fd45d9e16263840defca4b5bc0998732fb462942f1203ee150f17572645656", 0x84, 0xfffffffffffffffb) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) rt_sigreturn() getsockopt$inet_tcp_buf(r2, 0x6, 0x1a, &(0x7f0000000100)=""/4096, &(0x7f0000001100)=0x1000) 22:00:37 executing program 4 (fault-call:3 fault-nth:22): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) [ 747.852126][T26209] device nr0 entered promiscuous mode 22:00:37 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2ec, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 747.999747][T26251] FAULT_INJECTION: forcing a failure. [ 747.999747][T26251] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 748.041207][T26251] CPU: 1 PID: 26251 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 748.050361][T26251] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 748.060426][T26251] Call Trace: [ 748.063732][T26251] dump_stack+0x172/0x1f0 [ 748.068081][T26251] should_fail.cold+0xa/0x15 [ 748.072679][T26251] ? fault_create_debugfs_attr+0x180/0x180 [ 748.078496][T26251] ? ___might_sleep+0x163/0x280 [ 748.083365][T26251] should_fail_alloc_page+0x50/0x60 [ 748.088568][T26251] __alloc_pages_nodemask+0x1a1/0x900 [ 748.093949][T26251] ? __alloc_pages_slowpath+0x2540/0x2540 [ 748.099677][T26251] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 748.105935][T26251] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 748.112179][T26251] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 748.118427][T26251] alloc_pages_vma+0x1bc/0x3f0 [ 748.123199][T26251] do_huge_pmd_wp_page_fallback+0x1f0/0x1740 [ 748.129184][T26251] ? perf_trace_lock_acquire+0xf5/0x530 [ 748.134769][T26251] ? defrag_store+0x360/0x360 [ 748.139470][T26251] ? lock_downgrade+0x920/0x920 [ 748.144327][T26251] ? swp_swapcount+0x540/0x540 [ 748.149095][T26251] ? shrink_huge_zero_page_scan+0x1a0/0x1a0 [ 748.154990][T26251] ? __kasan_check_read+0x11/0x20 [ 748.160015][T26251] ? do_raw_spin_unlock+0x57/0x270 [ 748.165128][T26251] do_huge_pmd_wp_page+0x7ff/0x2300 [ 748.170326][T26251] ? __kasan_check_read+0x11/0x20 [ 748.175359][T26251] ? __split_huge_pmd+0x2810/0x2810 [ 748.180575][T26251] ? __kasan_check_read+0x11/0x20 [ 748.185608][T26251] ? pmd_val+0x85/0x100 [ 748.189765][T26251] ? add_mm_counter_fast.part.0+0x40/0x40 [ 748.195489][T26251] ? debug_smp_processor_id+0x3c/0x214 [ 748.200956][T26251] __handle_mm_fault+0x14cf/0x3f20 [ 748.206070][T26251] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 748.211618][T26251] ? __kasan_check_read+0x11/0x20 [ 748.216645][T26251] handle_mm_fault+0x1b5/0x6c0 [ 748.221611][T26251] __do_page_fault+0x536/0xdd0 [ 748.226372][T26251] do_page_fault+0x38/0x590 [ 748.230869][T26251] page_fault+0x39/0x40 [ 748.235025][T26251] RIP: 0010:copy_user_generic_unrolled+0xa0/0xc0 [ 748.241351][T26251] Code: 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 4c 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a 06 <88> 07 48 ff c6 48 ff c7 ff c9 75 f2 31 c0 0f 1f 00 c3 0f 1f 40 00 [ 748.260950][T26251] RSP: 0018:ffff888064c17e68 EFLAGS: 00010202 [ 748.267015][T26251] RAX: 0000000000000000 RBX: 0000000000000002 RCX: 0000000000000002 [ 748.275344][T26251] RDX: 0000000000000002 RSI: ffff8880a8eba000 RDI: 0000000020000580 [ 748.283312][T26251] RBP: ffff888064c17ea0 R08: 1ffff110151d7400 R09: ffffed10151d7401 [ 748.291281][T26251] R10: ffffed10151d7400 R11: ffff8880a8eba001 R12: 0000000020000580 [ 748.299346][T26251] R13: ffff8880a8eba000 R14: 0000000020000582 R15: 00007ffffffff000 [ 748.307372][T26251] ? _copy_to_user+0x146/0x160 [ 748.312174][T26251] __x64_sys_mincore+0x3cd/0x860 [ 748.317123][T26251] do_syscall_64+0xfa/0x760 [ 748.321630][T26251] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 748.327510][T26251] RIP: 0033:0x4598e9 [ 748.331408][T26251] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 748.351007][T26251] RSP: 002b:00007f786c5e8c78 EFLAGS: 00000246 ORIG_RAX: 000000000000001b [ 748.359433][T26251] RAX: ffffffffffffffda RBX: 00007f786c5e8c90 RCX: 00000000004598e9 [ 748.367441][T26251] RDX: 0000000020000580 RSI: 0000000000002000 RDI: 0000000020ffe000 [ 748.375402][T26251] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 748.383358][T26251] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f786c5e96d4 22:00:38 executing program 4 (fault-call:3 fault-nth:23): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) [ 748.391322][T26251] R13: 00000000004c5d52 R14: 00000000004da788 R15: 0000000000000004 22:00:38 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x1100000000000000, 'c\x86\xdd'}]}, 0xfdef) 22:00:38 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet(0x10, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f0000000140)={0xf0f041}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f00000001c0)) r2 = socket(0x100000000000011, 0x2, 0x0) bind(r2, &(0x7f0000000000)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r3 = socket(0x10, 0x0, 0x0) close(0xffffffffffffffff) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) socket$isdn(0x22, 0x3, 0x11) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000080), 0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, 0x0, &(0x7f00000000c0)) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000000)=0x1) ioctl$KDADDIO(r5, 0x400455c8, 0x0) fremovexattr(r5, &(0x7f0000000280)=@known='system.posix_acl_default\x00') getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000240)={0x0, 0xdff}, &(0x7f0000000500)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000540)={r6, 0x8, 0x20}, &(0x7f0000000580)=0xc) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x00\x00\x00\x00\x00)\x04', @ifru_flags}) 22:00:38 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x71e0ed32, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) fsetxattr$trusted_overlay_opaque(r6, &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x1) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f00000000c0)=0x3) 22:00:38 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2ed, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 748.584263][T26260] FAULT_INJECTION: forcing a failure. [ 748.584263][T26260] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 748.613265][T26265] vivid-006: disconnect [ 748.676483][T26260] CPU: 0 PID: 26260 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 748.685734][T26260] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 748.695798][T26260] Call Trace: [ 748.699101][T26260] dump_stack+0x172/0x1f0 [ 748.699127][T26260] should_fail.cold+0xa/0x15 [ 748.699146][T26260] ? fault_create_debugfs_attr+0x180/0x180 [ 748.713868][T26260] ? ___might_sleep+0x163/0x280 [ 748.718747][T26260] should_fail_alloc_page+0x50/0x60 [ 748.718762][T26260] __alloc_pages_nodemask+0x1a1/0x900 [ 748.718779][T26260] ? __alloc_pages_slowpath+0x2540/0x2540 [ 748.718795][T26260] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 748.718818][T26260] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 748.718833][T26260] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 748.718853][T26260] alloc_pages_vma+0x1bc/0x3f0 [ 748.718877][T26260] do_huge_pmd_wp_page_fallback+0x1f0/0x1740 [ 748.718892][T26260] ? perf_trace_lock_acquire+0xf5/0x530 [ 748.718917][T26260] ? defrag_store+0x360/0x360 [ 748.718936][T26260] ? lock_downgrade+0x920/0x920 [ 748.718953][T26260] ? swp_swapcount+0x540/0x540 [ 748.718975][T26260] ? shrink_huge_zero_page_scan+0x1a0/0x1a0 [ 748.775173][T26268] device nr0 entered promiscuous mode [ 748.775881][T26260] ? __kasan_check_read+0x11/0x20 [ 748.802075][T26260] ? do_raw_spin_unlock+0x57/0x270 [ 748.807205][T26260] do_huge_pmd_wp_page+0x7ff/0x2300 [ 748.812413][T26260] ? __kasan_check_read+0x11/0x20 [ 748.817453][T26260] ? __split_huge_pmd+0x2810/0x2810 22:00:38 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x29}, 0x60) close(r0) [ 748.822660][T26260] ? __kasan_check_read+0x11/0x20 [ 748.827709][T26260] ? pmd_val+0x85/0x100 [ 748.831879][T26260] ? add_mm_counter_fast.part.0+0x40/0x40 [ 748.837613][T26260] ? debug_smp_processor_id+0x3c/0x214 [ 748.843091][T26260] __handle_mm_fault+0x14cf/0x3f20 [ 748.848238][T26260] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 748.853905][T26260] ? __kasan_check_read+0x11/0x20 [ 748.858943][T26260] handle_mm_fault+0x1b5/0x6c0 [ 748.858965][T26260] __do_page_fault+0x536/0xdd0 [ 748.858992][T26260] do_page_fault+0x38/0x590 [ 748.859011][T26260] page_fault+0x39/0x40 [ 748.859030][T26260] RIP: 0010:copy_user_generic_unrolled+0xa0/0xc0 [ 748.859046][T26260] Code: 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 4c 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a 06 <88> 07 48 ff c6 48 ff c7 ff c9 75 f2 31 c0 0f 1f 00 c3 0f 1f 40 00 [ 748.859055][T26260] RSP: 0018:ffff8880604dfe68 EFLAGS: 00010202 [ 748.859067][T26260] RAX: 0000000000000000 RBX: 0000000000000002 RCX: 0000000000000002 [ 748.859076][T26260] RDX: 0000000000000002 RSI: ffff888093a78000 RDI: 0000000020000580 [ 748.859085][T26260] RBP: ffff8880604dfea0 R08: 1ffff1101274f000 R09: ffffed101274f001 [ 748.859093][T26260] R10: ffffed101274f000 R11: ffff888093a78001 R12: 0000000020000580 [ 748.859101][T26260] R13: ffff888093a78000 R14: 0000000020000582 R15: 00007ffffffff000 [ 748.859133][T26260] ? _copy_to_user+0x146/0x160 [ 748.859153][T26260] __x64_sys_mincore+0x3cd/0x860 [ 748.859187][T26260] do_syscall_64+0xfa/0x760 [ 748.859209][T26260] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 748.859220][T26260] RIP: 0033:0x4598e9 22:00:38 executing program 2: syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x1, 0x0, 0x3ac8436cf2f40d88, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x131) r1 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x1, 0x2) ioctl$VIDIOC_S_HW_FREQ_SEEK(r1, 0x40305652, &(0x7f0000000040)={0x3, 0x2, 0x9, 0x8, 0x1, 0x8000}) close(r0) 22:00:38 executing program 4 (fault-call:3 fault-nth:24): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) [ 748.859234][T26260] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 748.859242][T26260] RSP: 002b:00007f786c5e8c78 EFLAGS: 00000246 ORIG_RAX: 000000000000001b [ 748.859256][T26260] RAX: ffffffffffffffda RBX: 00007f786c5e8c90 RCX: 00000000004598e9 [ 748.859264][T26260] RDX: 0000000020000580 RSI: 0000000000002000 RDI: 0000000020ffe000 [ 748.859273][T26260] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 748.859282][T26260] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f786c5e96d4 [ 748.859289][T26260] R13: 00000000004c5d52 R14: 00000000004da788 R15: 0000000000000004 22:00:38 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x20080, 0x0) r1 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000500)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000040)={r1, r1, r2}, &(0x7f0000000280)=""/243, 0x20e, &(0x7f0000000240)={&(0x7f0000000080)={'crct10dif-generic\x00'}, 0x0, 0x2}) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) r4 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, r1, r3, r4, 0x2) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x1, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000c465aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0xffffffe1) close(r0) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) 22:00:38 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2ee, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 749.179052][T26291] FAULT_INJECTION: forcing a failure. [ 749.179052][T26291] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 749.192728][T26263] vivid-006: reconnect [ 749.252558][T26291] CPU: 0 PID: 26291 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 749.261728][T26291] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 749.271792][T26291] Call Trace: [ 749.275104][T26291] dump_stack+0x172/0x1f0 [ 749.279489][T26291] should_fail.cold+0xa/0x15 [ 749.284115][T26291] ? fault_create_debugfs_attr+0x180/0x180 [ 749.289941][T26291] ? ___might_sleep+0x163/0x280 [ 749.294921][T26291] should_fail_alloc_page+0x50/0x60 [ 749.300482][T26291] __alloc_pages_nodemask+0x1a1/0x900 [ 749.305958][T26291] ? __alloc_pages_slowpath+0x2540/0x2540 [ 749.311687][T26291] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 749.318033][T26291] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 749.324280][T26291] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 749.330533][T26291] alloc_pages_vma+0x1bc/0x3f0 [ 749.335409][T26291] do_huge_pmd_wp_page_fallback+0x1f0/0x1740 [ 749.341404][T26291] ? perf_trace_lock_acquire+0xf5/0x530 [ 749.346984][T26291] ? defrag_store+0x360/0x360 [ 749.351678][T26291] ? lock_downgrade+0x920/0x920 [ 749.356550][T26291] ? swp_swapcount+0x540/0x540 [ 749.361334][T26291] ? shrink_huge_zero_page_scan+0x1a0/0x1a0 [ 749.367243][T26291] ? __kasan_check_read+0x11/0x20 [ 749.372267][T26291] ? do_raw_spin_unlock+0x57/0x270 [ 749.377386][T26291] do_huge_pmd_wp_page+0x7ff/0x2300 [ 749.382587][T26291] ? __kasan_check_read+0x11/0x20 [ 749.387623][T26291] ? __split_huge_pmd+0x2810/0x2810 [ 749.392831][T26291] ? __kasan_check_read+0x11/0x20 [ 749.397867][T26291] ? pmd_val+0x85/0x100 [ 749.402026][T26291] ? add_mm_counter_fast.part.0+0x40/0x40 [ 749.407755][T26291] ? debug_smp_processor_id+0x3c/0x214 [ 749.413226][T26291] __handle_mm_fault+0x14cf/0x3f20 [ 749.418351][T26291] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 749.424608][T26291] ? __kasan_check_read+0x11/0x20 [ 749.429649][T26291] handle_mm_fault+0x1b5/0x6c0 [ 749.434436][T26291] __do_page_fault+0x536/0xdd0 [ 749.439309][T26291] do_page_fault+0x38/0x590 [ 749.443822][T26291] page_fault+0x39/0x40 [ 749.447989][T26291] RIP: 0010:copy_user_generic_unrolled+0xa0/0xc0 [ 749.454353][T26291] Code: 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 4c 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a 06 <88> 07 48 ff c6 48 ff c7 ff c9 75 f2 31 c0 0f 1f 00 c3 0f 1f 40 00 [ 749.473966][T26291] RSP: 0018:ffff88805aa5fe68 EFLAGS: 00010202 [ 749.480045][T26291] RAX: 0000000000000000 RBX: 0000000000000002 RCX: 0000000000000002 [ 749.488117][T26291] RDX: 0000000000000002 RSI: ffff888056b1a000 RDI: 0000000020000580 [ 749.496108][T26291] RBP: ffff88805aa5fea0 R08: 1ffff1100ad63400 R09: ffffed100ad63401 [ 749.504086][T26291] R10: ffffed100ad63400 R11: ffff888056b1a001 R12: 0000000020000580 [ 749.512098][T26291] R13: ffff888056b1a000 R14: 0000000020000582 R15: 00007ffffffff000 [ 749.520124][T26291] ? _copy_to_user+0x146/0x160 [ 749.524913][T26291] __x64_sys_mincore+0x3cd/0x860 [ 749.529883][T26291] do_syscall_64+0xfa/0x760 [ 749.534413][T26291] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 749.540339][T26291] RIP: 0033:0x4598e9 [ 749.544246][T26291] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 749.563861][T26291] RSP: 002b:00007f786c5e8c78 EFLAGS: 00000246 ORIG_RAX: 000000000000001b [ 749.572375][T26291] RAX: ffffffffffffffda RBX: 00007f786c5e8c90 RCX: 00000000004598e9 [ 749.580363][T26291] RDX: 0000000020000580 RSI: 0000000000002000 RDI: 0000000020ffe000 [ 749.588347][T26291] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 749.596370][T26291] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f786c5e96d4 22:00:39 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) timerfd_create(0xc, 0x800) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) [ 749.604361][T26291] R13: 00000000004c5d52 R14: 00000000004da788 R15: 0000000000000004 22:00:39 executing program 4 (fault-call:3 fault-nth:25): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:00:39 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2ef, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 749.887890][T26268] device nr0 entered promiscuous mode [ 749.939599][T26317] FAULT_INJECTION: forcing a failure. [ 749.939599][T26317] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 749.945175][T26265] vivid-006: disconnect [ 750.025849][T26265] vivid-006: reconnect [ 750.026570][T26317] CPU: 0 PID: 26317 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 750.039824][T26317] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 750.039832][T26317] Call Trace: [ 750.039857][T26317] dump_stack+0x172/0x1f0 [ 750.039880][T26317] should_fail.cold+0xa/0x15 [ 750.039901][T26317] ? fault_create_debugfs_attr+0x180/0x180 [ 750.039918][T26317] ? ___might_sleep+0x163/0x280 [ 750.039944][T26317] should_fail_alloc_page+0x50/0x60 [ 750.039957][T26317] __alloc_pages_nodemask+0x1a1/0x900 [ 750.039977][T26317] ? __alloc_pages_slowpath+0x2540/0x2540 [ 750.039994][T26317] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 750.040021][T26317] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 750.040037][T26317] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 750.040056][T26317] alloc_pages_vma+0x1bc/0x3f0 [ 750.040078][T26317] do_huge_pmd_wp_page_fallback+0x1f0/0x1740 [ 750.119243][T26317] ? perf_trace_lock_acquire+0xf5/0x530 [ 750.124850][T26317] ? defrag_store+0x360/0x360 [ 750.129553][T26317] ? lock_downgrade+0x920/0x920 [ 750.134419][T26317] ? swp_swapcount+0x540/0x540 [ 750.139222][T26317] ? shrink_huge_zero_page_scan+0x1a0/0x1a0 [ 750.145132][T26317] ? __kasan_check_read+0x11/0x20 [ 750.150168][T26317] ? do_raw_spin_unlock+0x57/0x270 [ 750.155296][T26317] do_huge_pmd_wp_page+0x7ff/0x2300 [ 750.160502][T26317] ? __kasan_check_read+0x11/0x20 [ 750.165546][T26317] ? __split_huge_pmd+0x2810/0x2810 [ 750.170768][T26317] ? __kasan_check_read+0x11/0x20 [ 750.175809][T26317] ? pmd_val+0x85/0x100 [ 750.179984][T26317] ? add_mm_counter_fast.part.0+0x40/0x40 [ 750.185716][T26317] ? debug_smp_processor_id+0x3c/0x214 [ 750.191195][T26317] __handle_mm_fault+0x14cf/0x3f20 [ 750.196323][T26317] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 750.201892][T26317] ? __kasan_check_read+0x11/0x20 [ 750.206938][T26317] handle_mm_fault+0x1b5/0x6c0 [ 750.211829][T26317] __do_page_fault+0x536/0xdd0 [ 750.216616][T26317] do_page_fault+0x38/0x590 [ 750.221155][T26317] page_fault+0x39/0x40 [ 750.225327][T26317] RIP: 0010:copy_user_generic_unrolled+0xa0/0xc0 [ 750.231666][T26317] Code: 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 4c 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a 06 <88> 07 48 ff c6 48 ff c7 ff c9 75 f2 31 c0 0f 1f 00 c3 0f 1f 40 00 [ 750.251370][T26317] RSP: 0018:ffff88806575fe68 EFLAGS: 00010202 [ 750.257452][T26317] RAX: 0000000000000000 RBX: 0000000000000002 RCX: 0000000000000002 [ 750.265437][T26317] RDX: 0000000000000002 RSI: ffff8880685b8000 RDI: 0000000020000580 [ 750.273425][T26317] RBP: ffff88806575fea0 R08: 1ffff1100d0b7000 R09: ffffed100d0b7001 [ 750.281416][T26317] R10: ffffed100d0b7000 R11: ffff8880685b8001 R12: 0000000020000580 [ 750.289403][T26317] R13: ffff8880685b8000 R14: 0000000020000582 R15: 00007ffffffff000 [ 750.297419][T26317] ? _copy_to_user+0x146/0x160 [ 750.302193][T26317] __x64_sys_mincore+0x3cd/0x860 [ 750.307257][T26317] do_syscall_64+0xfa/0x760 [ 750.311777][T26317] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 750.317680][T26317] RIP: 0033:0x4598e9 [ 750.321586][T26317] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 750.341208][T26317] RSP: 002b:00007f786c5c7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000001b [ 750.349613][T26317] RAX: ffffffffffffffda RBX: 00007f786c5c7c90 RCX: 00000000004598e9 [ 750.349622][T26317] RDX: 0000000020000580 RSI: 0000000000002000 RDI: 0000000020ffe000 [ 750.349629][T26317] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 750.349637][T26317] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f786c5c86d4 [ 750.349644][T26317] R13: 00000000004c5d52 R14: 00000000004da788 R15: 0000000000000004 22:00:40 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x2100000000000000, 'c\x86\xdd'}]}, 0xfdef) 22:00:40 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x6, 0x0, 0x1, 0xffffffffffffffff, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000000180)={0x9, 0x108, 0xfa00, {r1, 0x14, "2589c6", "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"}}, 0x110) close(r0) 22:00:40 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2f0, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0xfffffffffffffffc, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0x0, 0x2) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000080)) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000100)={0x9e0000, 0x9, 0x0, [0x0, 0xfdfdffffffffffff], &(0x7f0000000000)={0xa20933, 0xd40a, [], @string=&(0x7f0000000040)=0x5}}) connect$can_bcm(0xffffffffffffffff, 0x0, 0x0) 22:00:40 executing program 4 (fault-call:3 fault-nth:26): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:00:40 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000040)={0x6, 0x2}) r3 = socket$inet6(0xa, 0x3, 0x3c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) [ 750.776982][T26326] FAULT_INJECTION: forcing a failure. [ 750.776982][T26326] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 750.837265][T26326] CPU: 1 PID: 26326 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 750.846426][T26326] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 750.856488][T26326] Call Trace: [ 750.859794][T26326] dump_stack+0x172/0x1f0 [ 750.864151][T26326] should_fail.cold+0xa/0x15 [ 750.868759][T26326] ? fault_create_debugfs_attr+0x180/0x180 [ 750.874580][T26326] ? ___might_sleep+0x163/0x280 [ 750.879477][T26326] should_fail_alloc_page+0x50/0x60 22:00:40 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x20000000, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0xf4) ioctl$VIDIOC_G_OUTPUT(r0, 0x8004562e, &(0x7f0000000040)) close(r0) [ 750.884690][T26326] __alloc_pages_nodemask+0x1a1/0x900 [ 750.890072][T26326] ? __alloc_pages_slowpath+0x2540/0x2540 [ 750.895802][T26326] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 750.902071][T26326] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 750.908330][T26326] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 750.914601][T26326] alloc_pages_vma+0x1bc/0x3f0 [ 750.919392][T26326] do_huge_pmd_wp_page_fallback+0x1f0/0x1740 [ 750.925381][T26326] ? perf_trace_lock_acquire+0xf5/0x530 [ 750.930933][T26326] ? defrag_store+0x360/0x360 [ 750.930953][T26326] ? lock_downgrade+0x920/0x920 [ 750.930970][T26326] ? swp_swapcount+0x540/0x540 [ 750.930989][T26326] ? shrink_huge_zero_page_scan+0x1a0/0x1a0 [ 750.951145][T26326] ? __kasan_check_read+0x11/0x20 [ 750.956181][T26326] ? do_raw_spin_unlock+0x57/0x270 [ 750.961311][T26326] do_huge_pmd_wp_page+0x7ff/0x2300 [ 750.966524][T26326] ? __kasan_check_read+0x11/0x20 [ 750.971571][T26326] ? __split_huge_pmd+0x2810/0x2810 [ 750.976787][T26326] ? __kasan_check_read+0x11/0x20 [ 750.981834][T26326] ? pmd_val+0x85/0x100 [ 750.986004][T26326] ? add_mm_counter_fast.part.0+0x40/0x40 [ 750.991782][T26326] ? debug_smp_processor_id+0x3c/0x214 [ 750.997260][T26326] __handle_mm_fault+0x14cf/0x3f20 [ 751.002394][T26326] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 751.007969][T26326] ? __kasan_check_read+0x11/0x20 [ 751.013014][T26326] handle_mm_fault+0x1b5/0x6c0 [ 751.017797][T26326] __do_page_fault+0x536/0xdd0 [ 751.022585][T26326] do_page_fault+0x38/0x590 [ 751.027101][T26326] page_fault+0x39/0x40 [ 751.031276][T26326] RIP: 0010:copy_user_generic_unrolled+0xa0/0xc0 [ 751.037614][T26326] Code: 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 4c 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a 06 <88> 07 48 ff c6 48 ff c7 ff c9 75 f2 31 c0 0f 1f 00 c3 0f 1f 40 00 [ 751.057353][T26326] RSP: 0018:ffff8880474b7e68 EFLAGS: 00010202 [ 751.063487][T26326] RAX: 0000000000000000 RBX: 0000000000000002 RCX: 0000000000000002 [ 751.071556][T26326] RDX: 0000000000000002 RSI: ffff88805ca04000 RDI: 0000000020000580 [ 751.079540][T26326] RBP: ffff8880474b7ea0 R08: 1ffff1100b940800 R09: ffffed100b940801 [ 751.087525][T26326] R10: ffffed100b940800 R11: ffff88805ca04001 R12: 0000000020000580 [ 751.095509][T26326] R13: ffff88805ca04000 R14: 0000000020000582 R15: 00007ffffffff000 [ 751.103520][T26326] ? _copy_to_user+0x146/0x160 [ 751.108306][T26326] __x64_sys_mincore+0x3cd/0x860 [ 751.113269][T26326] do_syscall_64+0xfa/0x760 [ 751.117795][T26326] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 751.123696][T26326] RIP: 0033:0x4598e9 [ 751.127611][T26326] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 751.147225][T26326] RSP: 002b:00007f786c5e8c78 EFLAGS: 00000246 ORIG_RAX: 000000000000001b [ 751.155653][T26326] RAX: ffffffffffffffda RBX: 00007f786c5e8c90 RCX: 00000000004598e9 [ 751.163730][T26326] RDX: 0000000020000580 RSI: 0000000000002000 RDI: 0000000020ffe000 [ 751.171714][T26326] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 751.179698][T26326] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f786c5e96d4 22:00:40 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) name_to_handle_at(r0, &(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000c80)={0x1008, 0x3, "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"}, &(0x7f0000000040), 0x0) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0x0) mount$9p_unix(&(0x7f0000000580)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000a00)='9p\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='trans=unix,smackf']) ioctl$VIDIOC_G_AUDOUT(r0, 0x80345631, &(0x7f0000000080)) 22:00:40 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2f1, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 751.187680][T26326] R13: 00000000004c5d52 R14: 00000000004da788 R15: 0000000000000004 [ 751.216404][T26340] device nr0 entered promiscuous mode 22:00:40 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) close(r0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x60) accept4$inet(r4, &(0x7f00000002c0)={0x2, 0x0, @multicast2}, &(0x7f0000000300)=0x10, 0x40000) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = gettid() tkill(r5, 0x1004000000013) fcntl$setown(r3, 0x8, r5) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100008a4}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x38, 0x0, 0x5c89056948c70baf, 0x70bd26, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x10001}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xffffffffffffb195}]}, 0x38}, 0x1, 0x0, 0x0, 0x10008015}, 0x40800) ppoll(&(0x7f0000000000)=[{r2, 0x80}, {r1, 0x1020}], 0x2, &(0x7f0000000040), &(0x7f0000000080)={0x5}, 0x9d) [ 751.493154][T26351] 9pnet: p9_fd_create_unix (26351): problem connecting socket: ./file0: -111 22:00:41 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2f2, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:41 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) [ 751.580419][T26355] 9pnet: p9_fd_create_unix (26355): problem connecting socket: ./file0: -111 22:00:41 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x2900000000000000, 'c\x86\xdd'}]}, 0xfdef) 22:00:41 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet6(0xa, 0x3, 0x3c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r6, 0x4048ae9b, &(0x7f00000002c0)={0xe0003}) ioctl$KVM_SET_MSRS(r6, 0x8090ae81, &(0x7f0000000000)) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) r8 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r9 = ioctl$KVM_CREATE_VM(r8, 0xae01, 0x0) r10 = ioctl$KVM_CREATE_VCPU(r9, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r10, 0x4048ae9b, &(0x7f00000002c0)={0xe0003}) ioctl$KVM_SET_MSRS(r10, 0x8090ae81, &(0x7f0000000000)) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r12 = ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r12, 0xae41, 0x0) r13 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r14 = ioctl$KVM_CREATE_VM(r13, 0xae01, 0x0) r15 = ioctl$KVM_CREATE_VCPU(r14, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r15, 0x4048ae9b, &(0x7f00000002c0)={0xe0003}) ioctl$KVM_SET_MSRS(r15, 0x8090ae81, &(0x7f0000000000)) r16 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r16, 0xae01, 0x0) write$binfmt_misc(r6, &(0x7f0000000240)=ANY=[], 0x0) splice(r0, 0x0, r1, 0x0, 0x4, 0x0) 22:00:41 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) name_to_handle_at(r0, &(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000c80)={0x1008, 0x3, "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"}, &(0x7f0000000040), 0x0) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0x0) mount$9p_unix(&(0x7f0000000580)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000a00)='9p\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='trans=unix,smackf']) ioctl$VIDIOC_G_AUDOUT(r0, 0x80345631, &(0x7f0000000080)) 22:00:41 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2f3, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:41 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2, &(0x7f0000000580)=""/229) [ 752.294164][T26373] 9pnet: p9_fd_create_unix (26373): problem connecting socket: ./file0: -111 [ 752.322341][T26380] device nr0 entered promiscuous mode 22:00:41 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r2, 0x8200) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141142, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800007, 0x11, r3, 0x0) fcntl$setstatus(r0, 0x4, 0x44800) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x4000}]) 22:00:42 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2f4, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:42 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2002, &(0x7f0000000580)=""/229) 22:00:42 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2f5, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 752.951959][T26380] device nr0 entered promiscuous mode 22:00:44 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x2) fcntl$addseals(r0, 0x409, 0x2) close(r0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) openat(r1, &(0x7f00000000c0)='./file0\x00', 0x42e000, 0x2) 22:00:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f00000000c0)=0x2, 0x4) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r2, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000140), &(0x7f0000000180)=0x4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r3, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) r4 = accept$alg(r3, 0x0, 0x0) write$binfmt_script(r4, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0xa059) recvmmsg(r4, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/84, 0x18}, {&(0x7f0000000200)=""/98, 0x344}, {&(0x7f0000000280)=""/112, 0x7fffef4a}, {&(0x7f0000000340)=""/249, 0xf9}], 0x4}}], 0x1, 0x0, 0x0) 22:00:44 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2f6, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:44 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x21000000, &(0x7f0000000580)=""/229) 22:00:44 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) 22:00:44 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x2b00000000000000, 'c\x86\xdd'}]}, 0xfdef) [ 754.582520][T26423] device nr0 entered promiscuous mode 22:00:44 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ff9000/0x4000)=nil, 0x4000, &(0x7f00000001c0)=""/229) 22:00:44 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2f7, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:44 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pwritev(r0, &(0x7f0000000040)=[{&(0x7f00000000c0)="ea37874940a9276674ddff89995482d8a7c65d37762b68550ce479c9c8d90613877c3ed47d6212f4fca66d88da8bbdc62924f49d30bf6018408f71485fabd27f40dc6f6ea3e54faf8820c68bba543a2f491e7ba2d49ef2bfa6af30b1a16e16ba225d38ef8a7abff22cb8c69fa52151c27cc1a9bacf17ca405bac7c2f151d654b98603489843c07bae5f658bad5b3464ee51ecef2efc30cade96f34afaa10388bd744eb7412119fc3f10a192f2a00b49425ffe6426b15fd5cbb06efa0aaba98a145117618fd5327ac578f0ee6f1ab8011805596c49ba6f9359a63d8e356", 0xdd}], 0x1, 0x0) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:00:44 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2f8, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:44 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000080)='./file1\x00', 0x4800, 0xb1) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:00:44 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x2c00000000000000, 'c\x86\xdd'}]}, 0xfdef) [ 755.253516][T26466] device nr0 entered promiscuous mode 22:00:45 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x101, 0xd, 0x8, 0x101}, {0x78c8, 0xd8c, 0x8, 0x4}, {0x0, 0x144, 0x7, 0x18fb}, {0xf00000000000, 0x9, 0x7, 0x2}, {0x5, 0x129e, 0x9}]}, 0x10) membarrier(0x69, 0x0) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0xffffffff, 0xb6, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0xc1b7}, 0xffffff8a) close(r0) 22:00:45 executing program 3: pipe(&(0x7f0000000680)={0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="38f37fdba040c4d5415a871b0f11"], 0x0, 0xe}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000400)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) socket$key(0xf, 0x3, 0x2) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) write(r5, &(0x7f0000000340), 0xdfb13935) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 22:00:45 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2f9, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:45 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000000)=0x7ff, 0x4) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:00:45 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2fa, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 755.712254][T26466] device nr0 entered promiscuous mode 22:00:45 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2fb, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:45 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2fc, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:46 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x40, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:00:46 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2fd, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:46 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x2f00000000000000, 'c\x86\xdd'}]}, 0xfdef) 22:00:46 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r3, 0x4048ae9b, &(0x7f00000002c0)={0xe0003}) ioctl$KVM_SET_MSRS(r3, 0x8090ae81, &(0x7f0000000000)) write$binfmt_elf64(r3, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[]], 0xffffffffffffff84) r4 = openat(r0, &(0x7f0000000080)='./file0\x00', 0x100, 0x100) r5 = socket$kcm(0x2b, 0x8000000000001, 0x0) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) name_to_handle_at(r6, &(0x7f0000000040)='\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0000000801002400"], 0x0, 0x1400) sendmsg$alg(r6, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000180)="cbb79d74268ebbbd53c5452c89d1339a91d9653563d79af1391deeb953c8530a6a6b6a3150eb8222f60772887d63b072592974fab53f49e26dda3c5cecfd5ea5fdc99b4c6fee1da3ff9308df2710c8d81ce268274ae94be33c71e0cd8d326e58f58754bf5db4f5b63a17477910f091b21a398948027c5090473add3a3254d278a9a8b4e9c2e201ef5013300277d2c873a373a264b7cb35569d556668ee3a5422982b7aff0b", 0xa5}, {&(0x7f0000000240)="820d7400aa76385380cf989715e7966e26de980f9b8c4a6b90079c4e300459e87d824f816d5e2b1f6e48aa91f5f3b67b9bf5c79ebb22ee36abab45ef828728c82a0fc593ff39792c7d3348d8670ccc67cd3f82f7a6d1a7a63d9bf8452025239a0ce3bc59daa44c33390cb2c8761424b0", 0x70}, {&(0x7f00000002c0)="dc20a040bc316b440f4ebfb6ae677670e563ceac049897f8b13440bb5d893ba7d10dd26faa0b1c1e986dae32b77708389c2237879e7bf3f817b5b2916199415e5772024b3362d49c1c5d", 0x4a}, {&(0x7f0000000340)="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", 0xfb}, {&(0x7f0000000440)="6fe427df6de729a59cdd0cc70afff4f8533419595b22b09dbda017dbd0259498067cf6ecae9a4fc3da7e3799d0f324503d3dcdb6c4fd9ea574551484224fb357c09ddbb574f6bbb8485fb8fee94f37cafcbeb2c174a29fa949c0d657440fea3f4c574131eef2802151aa6e23ea8130f6", 0x70}, {&(0x7f00000004c0)="85fa3a93dfb678e2b58fd6b35e19ec62e8733f1a2f974fe6c5d711ff9d3ab3b457df6e77f8407e1a45254b663b95edf573c395c68867d7d9fdb740a40687dd9f5b05cf8e449ef61f3d16dc5c5cf6153432277ffe6c4c525952eeb7f4e72c566462", 0x61}, {&(0x7f0000000540)="2742c62d8eeddd1023aecf0103ecdb600563e724566fbccc5b4acd3d198b8c7c826adf6c25e72ee1e2d166a6daae5a6c53b4165f08e1de34c92147c272bb8e886962ce4950d758bfaba6bbaa8a3fbff05ca15538108c05654ff58fb89dbebc6cbe6de59a55313ea15608b5450553e7342643f0490d9bd80145b959df3a0de7f807ebab33541a46b132c6666181aabe54d454bb5fab005af2712dc67d5e1d015aa52e7581ab08f2dcffe9cab67126400aea2aa04ec279caf252a7c582319363b05d052d11eb13562a82", 0xc9}, {&(0x7f0000000640)="c9c41a5f41484304cd7c6ee183657f62d704523457bd017959b15d00ab2c2f9da799120d5e7d9f9c330f7306f9abae86fc7a8ea2aade6fc5b386579b09461dcde39ef15aaf160dec6e2057027b0bae92ec543defb70fc7075013", 0x5a}, {&(0x7f00000006c0)="1c0cc3701b84bfe19a0ba8187dea3c7994b40bb879ef8750635c73210a128eee39bbf54219f499a4ecaacca4d9d33f639de41486b1cbf55b4dafed8cd01be7654d8d239e47987f0f8f9a88a811f075fb19260ac5cd596811799909b02d4049712ae1384c21368c95e4f7733e540f3e0467dfc0bca45b5c12756b962fd094f3f8ed24b2", 0x83}], 0x9, &(0x7f0000000100)=[@assoc={0x18, 0x117, 0x4, 0x1ff}], 0x18, 0x40860}, 0x20000804) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r7 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r7, 0x29, 0x24, &(0x7f00000000c0), 0x4) r8 = getpgrp(0xffffffffffffffff) fstat(r4, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r0, 0xc0286405, &(0x7f0000000900)={0x8000, 0x6, r8, 0x0, r9, 0x0, 0x0, 0x5}) sendmsg$kcm(r7, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f00000018c0)="f4001100002b3325fe8000000000000005baa68754a3000000000200000000000000000001ffffff8800", 0x5ac}], 0x1}, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x0, 0x7fffffff}, &(0x7f0000000100)=0xc) r10 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r10, &(0x7f0000000000)={0x27, 0x0, 0x4000001, 0x0, 0x0, 0xffefffffffffffff, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) close(r10) r11 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000940)='/dev/dlm-monitor\x00', 0x101000, 0x0) ioctl$PIO_UNIMAP(r11, 0x4b67, &(0x7f00000009c0)={0x9, &(0x7f0000000980)=[{0x80000000, 0x1000}, {0x2, 0x7e}, {0x80, 0x8}, {0x38000000000000, 0x4}, {0x4b5, 0x6000000000000}, {0x4, 0x5}, {0x0, 0x354}, {0x4c, 0x8001}, {0xdb, 0xd524}]}) prctl$PR_CAPBSET_DROP(0x18, 0xd) r12 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r13 = ioctl$KVM_CREATE_VM(r12, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r13, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r13, 0xae41, 0x1) 22:00:46 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2fe, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 756.813559][T26512] device nr0 entered promiscuous mode 22:00:46 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x109042, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f00000002c0)={0xe0003}) ioctl$KVM_SET_MSRS(r2, 0x8090ae81, &(0x7f0000000000)) write$binfmt_elf64(r2, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffc, 0x0, 0x10001, 0x8, 0xbdcc, 0xdfeffab3e730cd5b, 0x6, 0xdf, 0x168, 0x40, 0x203, 0x5, 0xffffffff, 0x38, 0x2, 0x10000, 0x2, 0x6}, [{0x3, 0x9, 0x1, 0x5, 0xbc, 0x4, 0x8000, 0x1}], "5fae08b1bde7b9f7928ba42925c646b0bf0c505a181bbd98c5bb224dff9e9378fe3e92179178b117408af1b3b3839309971aa72b3f3109fe7971540433c0afc4497281bd3ab72fea42ce7dbd035ea3fff9295aeff74f098607736ca93ef58848f53857e6d9c968ef1d530536be16dce51e6f417981b2d244d810a9d0409dc3e8dccbc6626e", [[], [], []]}, 0x3fd) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r3, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x6b5f279a) 22:00:46 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x2ff, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:46 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$BLKALIGNOFF(r0, 0x127a, &(0x7f0000000140)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xffffffff, &(0x7f0000000340)=0x0) io_cancel(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2, 0xffffffff, 0xffffffffffffffff, &(0x7f0000000380)="cb110f57168e1435e7b7cd9c2c51508db8e268942d60649e6c5b345222b06971845205f4139ff5d68c87efbf872d696aa882f891ff784453df111ebd4c1dd04b9eeb98a9bd22109fc96e46aab758af8c99b49570716c3a33126afde7878aaca74a0fa13ee2f2a6c7b302d9ba9cf598cada8a0073d2edcfd0d081e45c26475aa2", 0x80, 0x81c, 0x0, 0x1}, &(0x7f0000000440)) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0xfffffffffffffe7d) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r5, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[]], 0x8) vmsplice(r6, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$TIOCSERGETLSR(r6, 0x5459, &(0x7f0000000000)) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f00000002c0)=""/110) r7 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x0, 0x2) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r7, 0xc058534f, &(0x7f0000000240)={{0x4}, 0x0, 0x0, 0x3, {0x7, 0xd5a}, 0x800, 0x2}) socket$inet6_udp(0xa, 0x2, 0x0) 22:00:46 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x300, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:47 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x301, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:47 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/devX\xd5\xf9e\x00', 0xfbc8ccd618c96cb, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r4, 0x4048ae9b, &(0x7f00000002c0)={0xe0003}) ioctl$KVM_SET_MSRS(r4, 0x8090ae81, &(0x7f0000000000)) ioctl$KVM_SET_SIGNAL_MASK(r4, 0x4004ae8b, &(0x7f0000000180)={0xe8, "7aa958a4802d5e3debcce7c366c51e145b99063544bd278ccd448022af490d14f21281c4b3b213ab1f2e57ab660e601f1b7344bd893a15c7bffe91cca8f94fd8a71dfa388378dae2474ec629148a2728d6c36eef999e1a6724757ac912064ec9c0314d6001dba74df87686db6112af51a8b43c07f78866bf8a86a927a6589d2ec2e4ec660383e534ed0952798faae89e90138efbf6aac4d7180ba65e07f939adfce9c7bf6d472fae7a3a6adf745d451840491f6b77f1c6378656bcaab31528b3eadacc5ee1e058c04b573bacb08258447e9bb0211349259b49d583625d8d98da25fd6a9bf1b55bc2"}) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r6 = accept4(r0, &(0x7f0000000400)=@x25, &(0x7f0000000380)=0x80, 0x80000) sendmsg$nl_xfrm(r6, &(0x7f0000000640)={&(0x7f0000000480), 0xc, &(0x7f0000000600)={&(0x7f00000004c0)=@getspdinfo={0x138, 0x25, 0x200, 0x70bd2b, 0x25dfdbff, 0x1, [@srcaddr={0x14}, @output_mark={0x8, 0x1d, 0xfff}, @algo_comp={0x108, 0x3, {{'lzjh\x00'}, 0x5f0, "2ce2fd91f0dea541ae5de32cda2ea7ad84072b18ecdb83c07609d1ec57cca3c8631127a016264472340bd73c0b6660a150ab1ed0ccdf29b258713fdb0eb340af054ebde493710351764d24ba49eea1339c7e692ac4cbd606248f1cc24aef7fc9203b0eda8069916ce12cfe7dd1841749f0fe6ead0e4bfcde6d4cc8594ac5277368b1b14d62d105e06c8a55ead663404ccfb4367c0727b948ecbb2e6cd151187581db5faf14bf1d7bd1d1574cd0ca32fa0e6408b8ce9afb3395c4513b771a"}}]}, 0x138}, 0x1, 0x0, 0x0, 0x8000}, 0x80) r7 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) r8 = fcntl$dupfd(r1, 0x80c, r7) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x10000, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r9, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r9, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r8, 0x5387, &(0x7f00000003c0)) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) close(r0) 22:00:47 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x302, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 757.645460][T26512] device nr0 entered promiscuous mode 22:00:47 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x202400, 0x0) ioctl$RTC_WIE_ON(r0, 0x700f) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:00:47 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x303, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:47 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x3200000000000000, 'c\x86\xdd'}]}, 0xfdef) 22:00:47 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) write$input_event(r0, &(0x7f0000000080)={{r1, r2/1000+30000}, 0x0, 0xffffffffffffffff, 0xe00000000000}, 0x18) futex(&(0x7f000000cffc), 0x1, 0x0, 0x0, 0x0, 0x0) 22:00:47 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x304, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:47 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='\x00\x00\x00\x00\x00\f\x00', 0x70002, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f00000000c0)={0x0, 0x8001, 0x6, 0x0, 0x0, [{r0, 0x0, 0x800}, {r0, 0x0, 0x8c3f}, {r0, 0x0, 0x10001}, {r0, 0x0, 0x5}, {r0}, {r0, 0x0, 0x9f}]}) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f00000001c0)=""/229) 22:00:48 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x305, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 758.504961][T26571] device nr0 entered promiscuous mode 22:00:48 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x10000) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x4, 0x4) mq_open(&(0x7f00000000c0)='/dev/ptmx\x00', 0x2, 0x40, &(0x7f0000000100)={0x2fc3, 0x81, 0x8, 0x3, 0x1000, 0x3, 0x3, 0xffffffff}) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:00:48 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x4, 0x0, 0xfffffffffffffffd, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x1f}, 0x60) close(r0) 22:00:48 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) close(r0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r1, 0xc0845658, &(0x7f0000000040)={0x4dde2f05661c9a5, @bt={0xdad, 0x3, 0x3, 0x0, 0x4, 0x7fff, 0x200, 0x7, 0x80, 0x1ff, 0x200000000000, 0x0, 0x6, 0x1, 0x7}}) 22:00:48 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x306, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:48 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x2, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:00:48 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x307, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:48 executing program 2: mq_unlink(&(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_retries\x00') r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000180), &(0x7f00000001c0)=0x4) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x40000000000002, 0x2, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x3c) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x34000, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r3, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000200)=0x1, 0x4) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000080)) close(r0) [ 759.374093][T26571] device nr0 entered promiscuous mode 22:00:49 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x3300000000000000, 'c\x86\xdd'}]}, 0xfdef) 22:00:49 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000180)='x', 0x1}], 0x1, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001240)={[{@iocharset={'iocharset', 0x3d, 'none'}}]}) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r2, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r3, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f00000001c0), &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4, 0x0, 0x4, 0x0, 0x6c, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket(0x10, 0x803, 0x0) sendto(r4, &(0x7f00000005c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r4, &(0x7f0000004a40)=[{{0x0, 0x5, 0x0}}], 0x8000000000003b0, 0x0, 0x0) ioctl$SIOCAX25OPTRT(r2, 0x89e7, &(0x7f0000000140)={@null, @default, 0x2, 0x56}) 22:00:49 executing program 3: r0 = syz_open_dev$vivid(&(0x7f0000000040)='/dev/video#\x00', 0x2, 0x2) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) vmsplice(r2, &(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r1, 0x80045700, &(0x7f0000000080)) ioctl$VIDIOC_G_PARM(r0, 0xc0cc5615, &(0x7f0000000140)={0x3}) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) fcntl$F_SET_FILE_RW_HINT(r4, 0x40e, &(0x7f0000000000)=0x5) 22:00:49 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x308, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 760.045367][T26622] device nr0 entered promiscuous mode 22:00:49 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x309, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:49 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) close(r0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) close(r2) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r3, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$VIDIOC_STREAMON(r3, 0x40045612, &(0x7f0000000000)=0x871) 22:00:49 executing program 3: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000000)="1f0000000104ff00fd435463e4af645515b81e0008000100010423dcffdf00", 0x1f) r1 = socket(0x10, 0x2, 0xc) write(r1, &(0x7f00000000c0)="1f0000000104ff00fd4354c007110000f305030008000100010423dcffdf00", 0x1ec) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0xebe5, 0x80) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f00000000c0)=0xf000) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$lock(r3, 0x7, &(0x7f0000000040)={0x0, 0x1, 0x8}) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x81, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlinkat(0xffffffffffffffff, 0x0, &(0x7f00000002c0)=""/78, 0x4e) ioctl$PPPIOCSACTIVE(r2, 0x40107446, &(0x7f0000000340)={0x6, &(0x7f0000000100)=[{0xfffffffffffffff8, 0x5, 0x0, 0x200}, {0x1, 0x6, 0x8, 0xfffffffffffffffb}, {0xa9b9, 0x40, 0x6, 0x9}, {0x80000000, 0x6, 0x3f, 0x1000}, {0x69, 0x6, 0x1e, 0xea}, {0x80000001, 0xfffffffffffffff9, 0x8, 0x100000001}]}) setgid(0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup.net/syz1\xeb', 0x1ff) unshare(0x800) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xffffffffffffff6a) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r4 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) r6 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x3, 0x10000) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r6, 0x84, 0x6f, 0x0, 0x0) write$cgroup_pid(r5, &(0x7f0000000640), 0x12) semget(0x0, 0x0, 0x20) r7 = getpgrp(0xffffffffffffffff) r8 = perf_event_open(&(0x7f0000000200)={0x2, 0xfe, 0xfffffffffffffffc, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x0, 0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x4, 0x2, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfff, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20003, 0x0, 0x0, 0x0, 0x1}, r7, 0xd, 0xffffffffffffffff, 0x0) r9 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r9, &(0x7f00000001c0)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) ioctl$void(r8, 0x0) sendmmsg(r9, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="180000000000000010010000010000007774000000000000f41b25e416d58937e7ee99e0524843c9577f8df71cbddf077798b47ab4a76987477a209522adca7e5454b7dec9d9a67305c04a8ccffca56ccbcabfb25ccd4628348aa54224593c6fbdf200796a8fd217367c017ff176f131c8693ac43b77471be9144abcd87807aa607700008f436706f17b26ae3208e5809f51528fb724993141a5cb7a0a9c50ca0a169355761fd20d1eef7b39787a4d0c82e2d9829219e3d910228437d90fa589a35bd504ebb981d196f1b7256c49aa"], 0x18}}], 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0), 0x0, 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, 0x0) [ 760.373331][T26641] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.3'. 22:00:50 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x30a, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 760.413566][T26641] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.3'. 22:00:50 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x30b, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:50 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) r0 = syz_open_dev$media(&(0x7f00000002c0)='/dev/media#\x00', 0xfffffffffffffffb, 0x400) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000040)={0x1, "80aff72711305ecd059fbcd0035bcecd642b5a5746bfa8cb4763bc8a4d6f13b0", 0x2, 0x1}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x20, 0x0) bind$bt_rfcomm(r0, &(0x7f0000000180)={0x1f, {0x401, 0x9, 0x1, 0x80, 0x0, 0xffffffffffff8001}, 0x2}, 0xa) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r0, &(0x7f00000006c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4000200}, 0xfffffffffffffde1, &(0x7f0000000680)={&(0x7f0000000380)={0x14, r1, 0x400, 0x70bd2d, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x800) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r3, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) setsockopt$RDS_RECVERR(r3, 0x114, 0x5, &(0x7f00000003c0)=0x1, 0x4) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x13001, 0x0) ioctl$PIO_UNISCRNMAP(r4, 0x4b6a, &(0x7f0000000200)="d85f40eaa7f77280b191520b4e58f9c25f059bc27112d35746f2b5a62a188ebb590b6f400511384ac518eb9b407ed3222d90185410392f018d9140986799be74dac92838adaa637925574a1ab1856f977e9fe893f3e9df48b790a011f8f13f7a7f7483b7f80a720f536bc8562914bab9379784a0840727bb0ebd399506a4041b14e10f32d9515a47f96453da972511573798c9b3a31affe7cb25ba9a7ee6ce43c96260031fe22e64072831815982467c") vmsplice(r2, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) getsockopt$llc_int(r2, 0x10c, 0xb, &(0x7f0000000100), &(0x7f0000000140)=0x4) [ 760.748269][T26641] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.3'. [ 760.765722][T26644] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.3'. 22:00:50 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x3b00000000000000, 'c\x86\xdd'}]}, 0xfdef) 22:00:50 executing program 3: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10000000000031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, &(0x7f0000000580), &(0x7f00000005c0)=0x4) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000100)=""/173, 0xad, 0x100, &(0x7f0000000040)={{0x3, @null}, [@null, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null]}, 0x48) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000540)={0x4, &(0x7f00000001c0)=""/253, &(0x7f00000004c0)=[{0x81, 0x27, 0x4, &(0x7f00000002c0)=""/39}, {0x6, 0x6a, 0x5, &(0x7f0000000300)=""/106}, {0x3, 0xaf, 0x6b2a, &(0x7f0000000380)=""/175}, {0x6, 0x50, 0x8, &(0x7f0000000440)=""/80}]}) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000600)='/dev/qat_adf_ctl\x00', 0x100, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") get_mempolicy(0x0, &(0x7f00000000c0), 0x20, &(0x7f0000786000/0x3000)=nil, 0x2) 22:00:50 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x30c, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 761.060712][T26664] device nr0 entered promiscuous mode 22:00:50 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x30d, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:50 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0xc35230c5ed4f7bc1, 0x0, &(0x7f0000000000)) r1 = perf_event_open(&(0x7f0000000300)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) 22:00:50 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0xfffffffffffffd26}], 0x1, 0x0) ioctl$SCSI_IOCTL_SYNC(r2, 0x4) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r3, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000180)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f00000001c0)=0x10) close(r0) 22:00:51 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x30e, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:51 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = dup(0xffffffffffffffff) ioctl$KVM_KVMCLOCK_CTRL(r2, 0xaead) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000640)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b761c6ec25b2bec0ba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377abaece6b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d4bf6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000080)=0x10000000002) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x3}) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 761.531715][T26664] device nr0 entered promiscuous mode 22:00:51 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x30f, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:51 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f00000000c0)=""/229) 22:00:51 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x310, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 762.037387][T26688] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 22:00:51 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000200)={0x27, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x4000000000000023}, 0xfffffffffffffd0d) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000001c0)={0x0, @speck128, 0x0, "41d9f36ead47f820"}) close(r0) r2 = accept4$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @netrom}, [@netrom, @null, @netrom, @netrom, @rose, @rose, @rose]}, &(0x7f0000000080)=0x48, 0x80800) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f00000000c0)) 22:00:51 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x3c00000000000000, 'c\x86\xdd'}]}, 0xfdef) 22:00:51 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x311, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 762.438538][T26711] device nr0 entered promiscuous mode 22:00:52 executing program 3: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) write$P9_RLOCK(r1, &(0x7f0000000000)={0x8, 0x35, 0x2, 0x1}, 0x8) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file1/file0\x00') open$dir(&(0x7f0000000300)='./file1\x00', 0x0, 0x0) r2 = open$dir(&(0x7f00000001c0)='./file2\x00', 0x111000, 0x20) mkdirat(r2, &(0x7f0000000200)='./file1/file0\x00', 0x40) add_key(&(0x7f0000000140)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) 22:00:52 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2d}, 0x113) close(r0) 22:00:52 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x312, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:52 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f00000000c0)={0xb0b1, 0x0, [], {0x0, @bt={0x5, 0x1, 0x1, 0x0, 0x401, 0x4134ba2f, 0x28, 0x3, 0x4, 0x4, 0xfff, 0xfff, 0x400, 0x5, 0x1}}}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000180)={{{@in=@initdev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6}}, &(0x7f0000000280)=0xe8) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r4) setreuid(r2, r4) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:00:52 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) connect$nfc_llcp(r1, &(0x7f0000000080)={0x27, 0x0, 0x1, 0x4, 0xffff, 0x0, "962ef6e5772d1c2e71a50e5ef114116225892bbf6e6142792212ddfa7ed895ce05040fdc78fb391d9302717e4ec086194db17785caf71eac16607338df270d", 0x21}, 0x60) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x1, 0x0, 0x10000000, 0x200, "8811e58754a5f52ef3d640bcaa024d3121ccf6000000e50000000000000000000000000052ad267532666df4ff00", 0x2b}, 0xffffffffffffffe4) close(r0) 22:00:52 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x313, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:52 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x314, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 763.121961][T26711] device nr0 entered promiscuous mode 22:00:52 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x315, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:53 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r0, r1, 0x0) getuid() socketpair$unix(0x1, 0x20000000000002, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x2000, 0x0) getsockname$llc(r5, &(0x7f00000000c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000100)=0x10) io_setup(0x1, &(0x7f0000000080)=0x0) ioctl$sock_inet_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000140)={'veth0\x00', {0x2, 0x4e22, @empty}}) close(r4) inotify_init() write$binfmt_misc(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x103) io_submit(r6, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r4, 0x0}]) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0x1af, &(0x7f00000003c0)=[@op, @assoc={0x0, 0x117, 0x4, 0x7}, @op, @assoc, @op, @assoc={0x0, 0x117, 0x4, 0xffffffff}], 0x0, 0x4000824}], 0x5dc, 0x40) 22:00:53 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x316, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:53 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x3f00000000000000, 'c\x86\xdd'}]}, 0xfdef) 22:00:53 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) shmat(0xffffffffffffffff, &(0x7f0000ffb000/0x3000)=nil, 0x7000) 22:00:53 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x40, 0x12400) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) getsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x4) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) close(r0) 22:00:53 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x317, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 763.991382][T26765] device nr0 entered promiscuous mode 22:00:53 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x318, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:53 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000400001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) r0 = semget$private(0x0, 0x1, 0x0) semtimedop(r0, &(0x7f0000000040), 0x1b9, 0x0) semctl$IPC_INFO(r0, 0x2, 0x3, &(0x7f0000000280)=""/219) semtimedop(r0, &(0x7f0000000000)=[{0x0, 0xfffffffffffffff7}, {0x3, 0x7}, {0x4, 0x8, 0xc00}], 0x3, &(0x7f0000000040)={0x77359400}) 22:00:54 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x319, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:54 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:00:54 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000001c0)=[@window={0x3, 0x4, 0x8d9}, @window={0x3, 0x2}, @mss={0x2, 0x7fff}, @mss={0x2, 0x3}, @timestamp, @timestamp, @sack_perm], 0x7) clone(0x2000000002840100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() tkill(r1, 0x1004000000013) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r2, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) perf_event_open(&(0x7f0000000140)={0x4, 0x70, 0x8000, 0x8, 0x80000000, 0x9, 0x0, 0x8, 0x20000, 0x1, 0x200, 0xfffffffffffffeff, 0x1f, 0x8000, 0x8, 0xa6b4a56, 0x931, 0x3, 0xfffffffffffffff9, 0xffffffffffff8000, 0xfffffffffffffffc, 0x0, 0x9, 0xa6c7, 0x1f, 0x7, 0x99, 0x4, 0x3f, 0x800, 0xfffffffffffffffe, 0x80000001, 0x9, 0x43, 0x100000000000, 0x81, 0x0, 0x4000000000001, 0x0, 0x6, 0x1, @perf_config_ext={0x2, 0xfffffffffffffffd}, 0x20, 0x101, 0x1, 0x2, 0x10001, 0x8f4, 0x7fff}, r1, 0x0, r2, 0x11) r3 = gettid() setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000), 0x4) rt_sigqueueinfo(r3, 0x1f, &(0x7f00000000c0)={0x0, 0x0, 0xffffffff}) ptrace$setopts(0x4206, r3, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x1ff) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x393841, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r4, 0x89e4) socket$l2tp(0x18, 0x1, 0x1) [ 764.691814][T26765] device nr0 entered promiscuous mode 22:00:54 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x31a, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:54 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000040)=0x8) close(r0) 22:00:54 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:00:55 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x4000000000000000, 'c\x86\xdd'}]}, 0xfdef) 22:00:55 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) close(r0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r3, 0x4048ae9b, &(0x7f00000002c0)={0xe0003}) ioctl$KVM_SET_MSRS(r3, 0x8090ae81, &(0x7f0000000000)) fcntl$getflags(r3, 0x408) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000180)=0x14) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r4, 0x40045532, &(0x7f0000000080)) 22:00:55 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x31b, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:55 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x8, 0x10010, r0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) [ 765.542980][T26821] device nr0 entered promiscuous mode 22:00:55 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x31c, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:55 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_BOOT_CPU_ID(r2, 0xae78, &(0x7f0000000000)) close(r0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x40000, 0x0) ioctl$DRM_IOCTL_INFO_BUFS(r3, 0xc0106418, &(0x7f0000000080)={0x4, 0x5, 0x7fff, 0x2, 0x4, 0x9}) 22:00:55 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x4716aa07c4534b9f, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:00:55 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x31d, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 766.352503][T26846] device nr0 entered promiscuous mode 22:00:57 executing program 3: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x5e, 0x20000) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0xe4, r1, 0x100, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfffffffffffff792}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x12d}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x55}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_DAEMON={0x78, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x4}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x6}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond_slave_0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'erspan0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7fff}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_to_bond\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8}]}]}, 0xe4}, 0x1, 0x0, 0x0, 0x3b0f6e1b190160e}, 0x4000020) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r2, 0x40045731, &(0x7f0000000080)=0x1) 22:00:57 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x200, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000040)={0x0, 0x6912, 0x403a}) 22:00:57 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x31e, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:57 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r2, 0x4038ae7a, &(0x7f0000000180)={0x1, 0xb54, &(0x7f0000000000)="acc7eac8c3696d703ac45ae0546e571dbf7f8a27bc6d884b5510b3dc86a6460ffdf3ab2f987498a129ddd50395b114d27c0853643b6114c517664dca0d5dd47f277d92bb8f7a1dc1dc31891fe6d00d927cadac555fad89481241a9fa805b2cdf6602eaef0536d8458882e94effc54ab1abbdd87fc3cad096dc4f12c737f8defd7ccb2a2697c0bcea35485f288a6c12335ecfa5c319c4a5f09bc1", &(0x7f00000000c0)="b60851001f5e4bacc7504f7f38caeda9", 0x9a, 0x10}) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) close(r0) 22:00:57 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x69fd000000000000, 'c\x86\xdd'}]}, 0xfdef) [ 767.883965][T26858] device nr0 entered promiscuous mode 22:00:57 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x31f, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:57 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x8100, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x2000) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="23000000250007031dfffd946fa2830020200a00ffffffffa61d85680c1ba3a20400ff7e2800", 0x26}], 0x1}, 0x0) 22:00:57 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x200000000000008, 0x101000) close(r0) r2 = add_key$keyring(&(0x7f0000000600)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_MODE_GETCRTC(r1, 0xc06864a1, &(0x7f00000001c0)={&(0x7f0000000180)=[0x2, 0x9, 0xfffffffffffffffc], 0x3, 0x1, 0x7, 0x0, 0xd01, 0x8, {0x1, 0x80000000, 0xfffffffffffffffc, 0x1, 0x2, 0x67, 0x1, 0x0, 0xd2, 0x7ff, 0x9, 0x100000001, 0xffffffffffffff01, 0x2b, "88fe18bb748df6b5bac0032d8768ea9dd2a09e1906c6a74b7961d582c1f33a51"}}) keyctl$revoke(0x3, r2) r3 = request_key(&(0x7f0000000040)='cifs.spnego\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)=']em1$\x00', r2) keyctl$invalidate(0x15, r3) 22:00:57 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) mincore(&(0x7f0000ffc000/0x4000)=nil, 0x4000, &(0x7f0000000240)=""/222) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000500)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000440)={0xe35, {{0x2, 0x4e21, @broadcast}}}, 0x88) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$IPT_SO_GET_ENTRIES(r2, 0x0, 0x41, &(0x7f00000016c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=0x1024) keyctl$update(0x2, r0, &(0x7f00000000c0)="5ed731f573180893fc8fe0d35bccb317a891598f11af92187a5457de5641c870c50f88ebc7a7bd68f8ec12ae45d1913ba4e9c051c774d0d927523d1a03be97c332e684292775cfb288cf2a2ef95d04042fd1db10d5dff08ae774045ade7e4b16cfaec97e85f283865943da1e927367ced6694641fe57d1999e7fbe1972d6504905f8c2469cd8b065907615cb7a7ba918ebd901e3301752386847638b689b5a6d9c1c8c22cb474c0ce0a5454c", 0xac) 22:00:57 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r7, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r7, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r8, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r8, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r8, 0xc00c642e, &(0x7f0000000080)={0x0, 0x80000}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r10, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r10, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r7, 0xc00c642e, &(0x7f00000000c0)={r9, 0x0, r10}) r11 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r11, 0x4048ae9b, &(0x7f00000002c0)={0xe0003}) ioctl$KVM_SET_MSRS(r11, 0x8090ae81, &(0x7f0000000000)) ioctl$KVM_DIRTY_TLB(r11, 0x4010aeaa, &(0x7f0000000040)={0x8, 0x7a}) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) 22:00:57 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x320, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:57 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) recvfrom$x25(r1, &(0x7f0000000000)=""/230, 0xe6, 0x80003140, &(0x7f0000000180)={0x9, @remote={[], 0x1}}, 0x12) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r2, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) connect$bt_sco(r2, &(0x7f00000001c0)={0x1f, {0x7fff, 0x9, 0x80, 0x7, 0x3, 0x9}}, 0x8) close(r0) 22:00:58 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x321, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:58 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7, 0x0, &(0x7f00000004c0)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) dup(r2) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f00000000c0)=0x40, 0x4) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x48ae9c8dc19220c0) 22:00:58 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x322, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:58 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x800e000000000000, 'c\x86\xdd'}]}, 0xfdef) 22:00:58 executing program 3: unshare(0x20000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) ioctl$KDSETLED(r1, 0x4b32, 0x76) ioctl$FS_IOC_GETFSMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000000b0300"/64]) 22:00:58 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x323, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 768.870762][T26914] device nr0 entered promiscuous mode 22:00:58 executing program 3: setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000203, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth0_to_hsr\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, r0, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000), 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f0000002440)="0501000008003e0000000200c52cf7c25975e605b02f0800eb2b2ff4dac8897c6b068777faffffff306609000000c5471d130a66321a54e7df305f80a88161b6fd8f24feffff31772f40cfc482d71398d9837b809502639f9048a453995c937ff868c57afb98de2e6cf510f38f37a827b9b779b94b9f82df10e5dc7f94eace7331", 0xff9d, 0x0, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x4, 0x8000) sendto$inet6(r1, &(0x7f00000000c0)="eef376b28b2ad9e6b72adb982333c13c1766365092d147ed464d1b72c5bf0266963fab46c0521e0ca7ee1072dbe295c355edf9f38f868dd0c2d89f2d821dd3c2c669faadcfa8aef989db979c4ae7a1cf9496283c250bcbc1edb0f98b548e936690c1e2fd31211be624c7a16b8f072f671b98d79915f648cb67b12ccc939b80b22de826f9", 0x84, 0x80000, 0x0, 0x0) 22:00:58 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x1000000, &(0x7f00000000c0)={[{@mode={'mode', 0x3d, 0x35}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0xace}}, {@mode={'mode', 0x3d, 0xffffffffffffffe5}}], [{@smackfshat={'smackfshat', 0x3d, '/dev/ptmx\x00'}}, {@hash='hash'}]}) 22:00:58 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x324, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:58 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) mkdirat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x1ff) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) close(r1) 22:00:58 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000380)={{0x80}, 'port1\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x2}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000000)={{}, {0x40000000000080}, 0x0, 0x1, 0x2}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40505330, &(0x7f0000000140)={{0x0, 0x1}, {0x20000000000080}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 22:00:58 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r4, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r4, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$VT_RESIZE(r4, 0x5609, &(0x7f0000000140)={0x752, 0x5e2c, 0x3}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r6, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r6, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r6, 0xc040564a, &(0x7f0000000040)={0x4, 0x0, 0x2009, 0xfffffffffffffffa, 0x24b, 0xfffffffffffffffa}) ioctl(r5, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) 22:00:59 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x325, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 769.401873][T26914] device nr0 entered promiscuous mode 22:00:59 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc4c85513, &(0x7f0000000680)={{0x4, 0x1, 0x4, 0x8, '\x00', 0x81}, 0x1, [0x4, 0x8, 0x9, 0x1f, 0x80000001, 0x2, 0x8000, 0xfffffffffffffff7, 0x10001, 0x7fffffff, 0x80, 0x3, 0x0, 0x6, 0x28, 0x400, 0x7, 0x2, 0x1, 0x55f2, 0x1f, 0x4, 0x0, 0x3, 0x2, 0x1, 0xffffffffffff7fff, 0x40, 0x200, 0x6, 0x7, 0x5, 0x1, 0x4, 0x9, 0x4, 0x74, 0x100, 0x3ab, 0x6, 0x1ff, 0x3f, 0x4, 0xb1, 0x70, 0x1, 0xffffffffffffb85b, 0x1000, 0xfffffffffffffffb, 0x8001, 0x900000000000000, 0x8000, 0x100000001, 0xfffffffffffffff8, 0xfff, 0x0, 0x7fffffff, 0x0, 0x3, 0xff, 0x8000, 0x3f, 0x100000000, 0x1c00000000, 0x19, 0x81, 0x6, 0x7f, 0x11, 0x40, 0xff, 0x91f0, 0x0, 0x9, 0x400, 0x8, 0x80000000, 0x1, 0x1, 0x6, 0x0, 0x1, 0xffffffffffffff81, 0x0, 0x1, 0x8000, 0x0, 0x7, 0x54d1746a, 0x8, 0x3, 0x3, 0x3, 0x7f, 0x9, 0xa4, 0x7, 0x3, 0x13594, 0x2, 0xfffffffffffffffa, 0x0, 0x7fffffff, 0x3ff, 0x6, 0x7, 0x0, 0x20, 0x3, 0x4, 0x401, 0xfff, 0x4, 0x80, 0x4, 0x100, 0x101, 0x3bab, 0x100, 0x9c, 0x80000000, 0x2, 0x52, 0x1, 0x2, 0x5d, 0x6b, 0x8f], {0x77359400}}) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:00:59 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x326, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:00:59 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x8400000000000000, 'c\x86\xdd'}]}, 0xfdef) 22:00:59 executing program 3: mmap(&(0x7f0000011000/0x2000)=nil, 0x2000, 0x4, 0x31, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r4 = accept4$ax25(0xffffffffffffffff, &(0x7f0000000280)={{0x3, @bcast}, [@netrom, @netrom, @remote, @remote, @bcast, @remote, @remote, @rose]}, &(0x7f0000000300)=0x48, 0x800) ioctl$SIOCAX25OPTRT(r4, 0x89e7, &(0x7f0000000340)={@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x2, 0x44}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r5, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r5, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)=0x0) mq_notify(r5, &(0x7f0000000240)={0x0, 0x9, 0x1, @tid=r6}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x18, &(0x7f00000000c0)={r3}, &(0x7f0000000100)=0x14) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000000)={r3, 0x5}, 0x8) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r7, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r7, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) r8 = socket$inet6_sctp(0xa, 0x1, 0x84) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r8, 0x84, 0x18, &(0x7f00000000c0)={r10}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r7, 0x84, 0x10, &(0x7f00000003c0)=@assoc_value={r10, 0x4419}, &(0x7f0000000400)=0x8) readv(r0, &(0x7f0000000380)=[{&(0x7f0000000100)=""/200, 0xc8}], 0x1) syz_open_dev$evdev(&(0x7f0000012fee)='/.%v/\x11%put/event#\x00', 0x0, 0x0) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f0000000080)={&(0x7f0000012000/0x4000)=nil, 0x4000}) 22:00:59 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x327, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 769.949989][T26963] device nr0 entered promiscuous mode 22:00:59 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x328, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 770.076341][T26969] FAULT_FLAG_ALLOW_RETRY missing 70 [ 770.081751][T26969] CPU: 1 PID: 26969 Comm: syz-executor.3 Not tainted 5.3.0-rc6-next-20190830 #75 [ 770.091411][T26969] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 770.101714][T26969] Call Trace: [ 770.105115][T26969] dump_stack+0x172/0x1f0 [ 770.109568][T26969] handle_userfault.cold+0x41/0x5e [ 770.114710][T26969] ? lock_downgrade+0x920/0x920 [ 770.119590][T26969] ? __kasan_check_read+0x11/0x20 [ 770.124732][T26969] ? userfaultfd_ioctl+0x3aa0/0x3aa0 [ 770.130190][T26969] ? find_get_entry+0x4ab/0x7a0 [ 770.135304][T26969] ? find_get_pages_contig+0xa20/0xa20 [ 770.140805][T26969] ? __kasan_check_read+0x11/0x20 [ 770.145863][T26969] ? find_lock_entry+0x1a7/0x560 [ 770.150826][T26969] shmem_getpage_gfp+0x1f51/0x2680 [ 770.155976][T26969] ? shmem_unuse_inode+0x1010/0x1010 [ 770.161293][T26969] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 770.167740][T26969] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 22:00:59 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r5, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r5, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f00000001c0)=@mangle={'mangle\x00', 0x1f, 0x6, 0x668, 0x278, 0x0, 0x0, 0x368, 0x458, 0x598, 0x598, 0x598, 0x598, 0x598, 0x6, &(0x7f0000000040), {[{{@ipv6={@loopback, @remote, [0x807fff00, 0xffffffff, 0xffffff00, 0xffffffff], [0xff000000, 0xff, 0x0, 0xffffffff], 'caif0\x00', 'vcan0\x00', {0xff}, {0x80}, 0x0, 0x655a, 0x7, 0x43}, 0x0, 0xc8, 0x110}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@remote, @ipv6=@empty, 0x15, 0x2a, 0x4}}}, {{@ipv6={@mcast2, @rand_addr="a5adf816aa2b47dfcec25c620a01ef00", [0xff000000, 0x49ed7947e4b588b4, 0xffffff00], [0xffffff00, 0xffffffff, 0xff, 0xffffffff], 'ip_vti0\x00', 'veth1_to_hsr\x00', {}, {}, 0x1, 0x5, 0x6, 0x60}, 0x0, 0x138, 0x168, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}, @common=@hbh={0x48, 'hbh\x00', 0x0, {0x6, 0x2, 0x1, [0x920, 0x5, 0x7fff, 0x4000000000, 0x7, 0x4, 0xffffffffffffff81, 0x9, 0x5, 0x81, 0x3, 0xc6, 0x0, 0x3ff, 0x8000, 0x8], 0x5}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x3f, 0x0, 0x1}, {0x8, 0x3, 0x4}, 0x400, 0x80}}}, {{@ipv6={@local, @remote, [0xffffff00, 0xff, 0x0, 0xffffff00], [0x1ff0000fe, 0x0, 0xff, 0xff], 'nlmon0\x00', 'ip6gretap0\x00', {0xff}, {}, 0x3c, 0x20, 0x1}, 0x0, 0xc8, 0xf0}, @inet=@TOS={0x28, 'TOS\x00', 0x0, {0x400, 0x6}}}, {{@ipv6={@remote, @ipv4={[], [], @remote}, [0xff000000, 0xff, 0xff000000, 0xffff00], [0x0, 0xffffffff, 0xff000000, 0xffffff00], 'ip6gre0\x00', 'bond_slave_1\x00', {}, {}, 0xc, 0x3, 0x4, 0x19}, 0x0, 0xc8, 0xf0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x1, 0x0}, @empty, [0xff000000, 0xff000000], [0xfffffefe, 0xff, 0xff, 0xffffff00], 'gre0\x00', 'bond0\x00', {0xff}, {0xff}, 0x21, 0x80000000, 0x1, 0x40}, 0x0, 0x118, 0x140, 0x0, {}, [@common=@ipv6header={0x28, 'ipv6header\x00', 0x0, {0x0, 0x1, 0x1}}, @common=@ipv6header={0x28, 'ipv6header\x00', 0x0, {0xd4, 0x20}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6c8) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) [ 770.174009][T26969] shmem_fault+0x22a/0x7b0 [ 770.178465][T26969] ? shmem_read_mapping_page_gfp+0x1a0/0x1a0 [ 770.184478][T26969] ? find_lock_entry+0x560/0x560 [ 770.189441][T26969] ? pmd_val+0x85/0x100 [ 770.193764][T26969] ? pmd_val+0x85/0x100 [ 770.198104][T26969] __do_fault+0x111/0x540 [ 770.202608][T26969] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 770.209103][T26969] __handle_mm_fault+0x2cb8/0x3f20 [ 770.214251][T26969] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 770.219835][T26969] ? __kasan_check_read+0x11/0x20 [ 770.225045][T26969] handle_mm_fault+0x1b5/0x6c0 [ 770.230002][T26969] __do_page_fault+0x536/0xdd0 [ 770.230026][T26969] do_page_fault+0x38/0x590 [ 770.230042][T26969] page_fault+0x39/0x40 [ 770.230054][T26969] RIP: 0033:0x453280 [ 770.230071][T26969] Code: 0f 84 c4 0f 00 00 48 89 f1 48 89 f8 48 83 e1 3f 48 83 f9 20 0f 86 7b 02 00 00 48 83 e6 f0 48 83 e1 0f 66 0f ef c0 66 0f ef c9 <66> 0f 74 0e 66 0f d7 d1 48 d3 ea 49 c7 c2 11 00 00 00 49 29 ca 4d [ 770.230083][T26969] RSP: 002b:00007f86673537a8 EFLAGS: 00010202 [ 770.274210][T26969] RAX: 00007f8667353850 RBX: 0000000000000003 RCX: 000000000000000e [ 770.282468][T26969] RDX: 00000000000003ff RSI: 0000000020012fe0 RDI: 00007f8667353850 [ 770.290479][T26969] RBP: 000000000075c118 R08: 00000000000003ff R09: 0000000000000000 [ 770.298491][T26969] R10: 00007f86673549d0 R11: 0000000000000246 R12: 00007f86673546d4 [ 770.306679][T26969] R13: 00000000004c8c84 R14: 00000000004dfc48 R15: 00000000ffffffff 22:00:59 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x1, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21cc9a9d33c7627ffe7a54cdbd77b3060000000000000000000700", 0x2b}, 0x60) close(r0) 22:01:00 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x329, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 770.384500][T26963] device nr0 entered promiscuous mode 22:01:00 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:01:00 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r1 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x81, 0x6400) setsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000200)=0xae90, 0x4) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2e}, 0xfcbc) acct(&(0x7f0000000240)='./file0\x00') pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0x0) vmsplice(r2, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r2, 0x5385, &(0x7f0000000000)=ANY=[@ANYBLOB="d3000000000000000000000000000000000000000000000000000000000000000000000000000000007eba4da6c2ee2bba9c0000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000035bc39e500"/215]) close(r0) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e21, @broadcast}, 0x10) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000280)={0x2f, 0x3, 0x0, {0x3, 0xe, 0x0, 'vboxnet1vmnet0'}}, 0x2f) 22:01:00 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x32a, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:01:00 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x32b, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:01:00 executing program 3: mmap(&(0x7f0000011000/0x2000)=nil, 0x2000, 0x4, 0x31, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r4 = accept4$ax25(0xffffffffffffffff, &(0x7f0000000280)={{0x3, @bcast}, [@netrom, @netrom, @remote, @remote, @bcast, @remote, @remote, @rose]}, &(0x7f0000000300)=0x48, 0x800) ioctl$SIOCAX25OPTRT(r4, 0x89e7, &(0x7f0000000340)={@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x2, 0x44}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r5, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r5, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)=0x0) mq_notify(r5, &(0x7f0000000240)={0x0, 0x9, 0x1, @tid=r6}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x18, &(0x7f00000000c0)={r3}, &(0x7f0000000100)=0x14) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000000)={r3, 0x5}, 0x8) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r7, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r7, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) r8 = socket$inet6_sctp(0xa, 0x1, 0x84) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r8, 0x84, 0x18, &(0x7f00000000c0)={r10}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r7, 0x84, 0x10, &(0x7f00000003c0)=@assoc_value={r10, 0x4419}, &(0x7f0000000400)=0x8) readv(r0, &(0x7f0000000380)=[{&(0x7f0000000100)=""/200, 0xc8}], 0x1) syz_open_dev$evdev(&(0x7f0000012fee)='/.%v/\x11%put/event#\x00', 0x0, 0x0) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f0000000080)={&(0x7f0000012000/0x4000)=nil, 0x4000}) 22:01:00 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x84ffffff00000000, 'c\x86\xdd'}]}, 0xfdef) 22:01:00 executing program 4: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x4, 0x1) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000040), 0x4) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f00000000c0)='\'lomime_type,selinuxnodev@\x00', 0x1) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r4, 0x4048ae9b, &(0x7f00000002c0)={0xe0003}) ioctl$KVM_SET_MSRS(r4, 0x8090ae81, &(0x7f0000000000)) dup3(r1, r4, 0x1c0000) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:01:00 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) close(r0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x8000, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0x88, 0xff, &(0x7f0000000040)="81c3068914dbab44ed8c1de7106db2f00694c25e826cc21d83fb31dfcb962319bb9702acac10d1609638ee8609d8fe88dac626556d7c5f862b9e7ea8b64eaec43a14644dd309cb3df1afa06117945b8d193daecf7991afd1316718662704fd133e8a2091d93d0a56d7424fc54106527f90be5a34fa875a5b3162f2c108d4e5a6f311785d5286cd11", &(0x7f0000000180)=""/255, 0x8}, 0x28) 22:01:00 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x32c, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:01:00 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r5, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r5, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r5, 0xc058534f, &(0x7f0000000040)={{0xffff, 0x1f}, 0x1, 0x7a, 0xcdbc, {0x1, 0xfffffffffffffffe}, 0x8, 0x4}) 22:01:00 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080), 0x10000258, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x400400, 0x2) ioctl$VHOST_SET_VRING_CALL(r1, 0x4008af21, &(0x7f0000000040)={0x3, r2}) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$DRM_IOCTL_FREE_BUFS(r0, 0x4010641a, &(0x7f00000001c0)={0x1, &(0x7f0000000080)=[0xf6]}) bind$nfc_llcp(r3, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x200000, 0x0) close(r3) [ 771.220201][T27023] device nr0 entered promiscuous mode [ 771.228252][T27024] FAULT_FLAG_ALLOW_RETRY missing 70 [ 771.251606][T27024] CPU: 1 PID: 27024 Comm: syz-executor.3 Not tainted 5.3.0-rc6-next-20190830 #75 [ 771.260935][T27024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 771.271838][T27024] Call Trace: [ 771.275371][T27024] dump_stack+0x172/0x1f0 [ 771.279835][T27024] handle_userfault.cold+0x41/0x5e [ 771.284982][T27024] ? lock_downgrade+0x920/0x920 [ 771.290020][T27024] ? __kasan_check_read+0x11/0x20 [ 771.295082][T27024] ? userfaultfd_ioctl+0x3aa0/0x3aa0 [ 771.300503][T27024] ? find_get_entry+0x4ab/0x7a0 [ 771.305513][T27024] ? find_get_pages_contig+0xa20/0xa20 [ 771.311217][T27024] ? debug_smp_processor_id+0x3c/0x214 [ 771.316837][T27024] ? rcu_preempt_deferred_qs_irqrestore+0x4ff/0xd60 [ 771.323582][T27024] ? find_lock_entry+0x1a7/0x560 [ 771.328571][T27024] shmem_getpage_gfp+0x1f51/0x2680 [ 771.333893][T27024] ? shmem_unuse_inode+0x1010/0x1010 [ 771.339224][T27024] shmem_fault+0x22a/0x7b0 [ 771.343667][T27024] ? shmem_read_mapping_page_gfp+0x1a0/0x1a0 [ 771.349897][T27024] ? find_lock_entry+0x560/0x560 [ 771.354854][T27024] ? pmd_val+0x85/0x100 [ 771.359559][T27024] ? pmd_val+0x85/0x100 [ 771.363797][T27024] __do_fault+0x111/0x540 22:01:01 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x6, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f2e1e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x12b}, 0x60) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$MON_IOCQ_URB_LEN(r1, 0x9201) close(r0) 22:01:01 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x32d, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 771.368193][T27024] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 771.368212][T27024] __handle_mm_fault+0x2cb8/0x3f20 [ 771.368232][T27024] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 771.368261][T27024] ? __kasan_check_read+0x11/0x20 [ 771.390523][T27024] handle_mm_fault+0x1b5/0x6c0 [ 771.395676][T27024] __do_page_fault+0x536/0xdd0 [ 771.400486][T27024] do_page_fault+0x38/0x590 [ 771.405335][T27024] page_fault+0x39/0x40 [ 771.409513][T27024] RIP: 0033:0x453280 [ 771.413439][T27024] Code: 0f 84 c4 0f 00 00 48 89 f1 48 89 f8 48 83 e1 3f 48 83 f9 20 0f 86 7b 02 00 00 48 83 e6 f0 48 83 e1 0f 66 0f ef c0 66 0f ef c9 <66> 0f 74 0e 66 0f d7 d1 48 d3 ea 49 c7 c2 11 00 00 00 49 29 ca 4d [ 771.433864][T27024] RSP: 002b:00007f86673537a8 EFLAGS: 00010202 [ 771.439978][T27024] RAX: 00007f8667353850 RBX: 0000000000000003 RCX: 000000000000000e [ 771.439987][T27024] RDX: 00000000000003ff RSI: 0000000020012fe0 RDI: 00007f8667353850 [ 771.439994][T27024] RBP: 000000000075c118 R08: 00000000000003ff R09: 0000000000000000 [ 771.440003][T27024] R10: 00007f86673549d0 R11: 0000000000000246 R12: 00007f86673546d4 [ 771.440012][T27024] R13: 00000000004c8c84 R14: 00000000004dfc48 R15: 00000000ffffffff 22:01:01 executing program 4: prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x14000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) write$P9_RLINK(r0, &(0x7f0000000000)={0x7, 0x47, 0x1}, 0x7) setxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.selinux\x00', &(0x7f00000001c0)='system_u:object_r:tpm_device_t:s0\x00', 0x22, 0x0) listxattr(&(0x7f0000000200)='./file0/file0\x00', &(0x7f0000000240)=""/193, 0xc1) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:01:01 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x129) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$VIDIOC_ENUM_FMT(r1, 0xc0405602, &(0x7f0000000000)={0x3, 0x1, 0x2, "13e924acd8082e9566d43c198b843bf01fca6b089b78863bb822d27f20000422", 0x38414762}) close(r0) 22:01:01 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x32e, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:01:01 executing program 3: mmap(&(0x7f0000011000/0x2000)=nil, 0x2000, 0x4, 0x31, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r4 = accept4$ax25(0xffffffffffffffff, &(0x7f0000000280)={{0x3, @bcast}, [@netrom, @netrom, @remote, @remote, @bcast, @remote, @remote, @rose]}, &(0x7f0000000300)=0x48, 0x800) ioctl$SIOCAX25OPTRT(r4, 0x89e7, &(0x7f0000000340)={@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x2, 0x44}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r5, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r5, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)=0x0) mq_notify(r5, &(0x7f0000000240)={0x0, 0x9, 0x1, @tid=r6}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x18, &(0x7f00000000c0)={r3}, &(0x7f0000000100)=0x14) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000000)={r3, 0x5}, 0x8) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r7, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r7, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) r8 = socket$inet6_sctp(0xa, 0x1, 0x84) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r8, 0x84, 0x18, &(0x7f00000000c0)={r10}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r7, 0x84, 0x10, &(0x7f00000003c0)=@assoc_value={r10, 0x4419}, &(0x7f0000000400)=0x8) readv(r0, &(0x7f0000000380)=[{&(0x7f0000000100)=""/200, 0xc8}], 0x1) syz_open_dev$evdev(&(0x7f0000012fee)='/.%v/\x11%put/event#\x00', 0x0, 0x0) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f0000000080)={&(0x7f0000012000/0x4000)=nil, 0x4000}) 22:01:01 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x88ffffff00000000, 'c\x86\xdd'}]}, 0xfdef) 22:01:01 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x32f, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:01:01 executing program 5: pipe(&(0x7f00000011c0)) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet6(0xa, 0x3, 0x3c) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r8 = ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) r9 = ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r9, 0x4048ae9b, &(0x7f00000002c0)={0xe0003}) ioctl$KVM_SET_MSRS(r9, 0x8090ae81, &(0x7f00000005c0)=ANY=[@ANYBLOB="000000000000041701025d0844cfc72d55c28552b13286029736740f469eb4bbba6c25e1b2b9d2920ed6ad7759404b10d5f3b47bf9f2ab08d2936bfc4b84c060a4a4b17633d451356335ec99076c4ee20c6e869ae132b40d80baf8680936d7e3b06b94852d618c19a52a5401cdbbb7174b6318d152197267257a0f5eb6f7abbce2b18a3515a8b808b9f620fc82008f3e737812bde0fc44fd3ed76487ae333f5317bfcb369ac9950460d69fe5d9dcb37c4d468b701c29ca0a10116619944d836f7d817fa8c3638e213131c0558d1838c203776dd9275e65b30536ee072c1f7df6b224d966383ff2bb8f219c907eaba33abee6885347f80d1aea53f965016067be18964ee4"]) r10 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r11 = ioctl$KVM_CREATE_VM(r10, 0xae01, 0x0) r12 = ioctl$KVM_CREATE_VCPU(r11, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r12, 0x4048ae9b, &(0x7f00000002c0)={0xe0003}) ioctl$KVM_SET_MSRS(r12, 0x8090ae81, &(0x7f0000000000)) r13 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r14 = ioctl$KVM_CREATE_VM(r13, 0xae01, 0x0) r15 = ioctl$KVM_CREATE_VCPU(r14, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r15, 0x4048ae9b, &(0x7f00000002c0)={0xe0003}) ioctl$KVM_SET_MSRS(r15, 0x8090ae81, &(0x7f0000000040)={0x3, 0x0, [{0x2b2, 0x0, 0xffffffff}, {0x613, 0x0, 0x401}, {0x903, 0x0, 0x41}]}) r16 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r16, 0xae01, 0x0) [ 772.121331][T27068] FAULT_FLAG_ALLOW_RETRY missing 70 [ 772.150563][T27071] device nr0 entered promiscuous mode [ 772.161608][T27068] CPU: 0 PID: 27068 Comm: syz-executor.3 Not tainted 5.3.0-rc6-next-20190830 #75 [ 772.170937][T27068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 772.181163][T27068] Call Trace: [ 772.184477][T27068] dump_stack+0x172/0x1f0 [ 772.189012][T27068] handle_userfault.cold+0x41/0x5e [ 772.194428][T27068] ? lock_downgrade+0x920/0x920 [ 772.199325][T27068] ? __kasan_check_read+0x11/0x20 [ 772.204681][T27068] ? userfaultfd_ioctl+0x3aa0/0x3aa0 [ 772.210411][T27068] ? find_get_entry+0x4ab/0x7a0 [ 772.215293][T27068] ? find_get_pages_contig+0xa20/0xa20 [ 772.220925][T27068] ? __kasan_check_read+0x11/0x20 [ 772.225990][T27068] ? find_lock_entry+0x1a7/0x560 [ 772.230964][T27068] shmem_getpage_gfp+0x1f51/0x2680 [ 772.236202][T27068] ? shmem_unuse_inode+0x1010/0x1010 [ 772.241723][T27068] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 772.248350][T27068] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 772.254859][T27068] shmem_fault+0x22a/0x7b0 [ 772.259325][T27068] ? shmem_read_mapping_page_gfp+0x1a0/0x1a0 [ 772.265341][T27068] ? find_lock_entry+0x560/0x560 [ 772.270456][T27068] ? pmd_val+0x85/0x100 [ 772.274642][T27068] ? pmd_val+0x85/0x100 [ 772.278973][T27068] __do_fault+0x111/0x540 [ 772.283542][T27068] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 772.290038][T27068] __handle_mm_fault+0x2cb8/0x3f20 [ 772.295187][T27068] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 772.300858][T27068] ? __kasan_check_read+0x11/0x20 [ 772.306044][T27068] handle_mm_fault+0x1b5/0x6c0 [ 772.310844][T27068] __do_page_fault+0x536/0xdd0 [ 772.316332][T27068] do_page_fault+0x38/0x590 22:01:01 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x330, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 772.321107][T27068] page_fault+0x39/0x40 [ 772.325752][T27068] RIP: 0033:0x453280 [ 772.329995][T27068] Code: 0f 84 c4 0f 00 00 48 89 f1 48 89 f8 48 83 e1 3f 48 83 f9 20 0f 86 7b 02 00 00 48 83 e6 f0 48 83 e1 0f 66 0f ef c0 66 0f ef c9 <66> 0f 74 0e 66 0f d7 d1 48 d3 ea 49 c7 c2 11 00 00 00 49 29 ca 4d [ 772.350014][T27068] RSP: 002b:00007f86673537a8 EFLAGS: 00010202 [ 772.356333][T27068] RAX: 00007f8667353850 RBX: 0000000000000003 RCX: 000000000000000e [ 772.364550][T27068] RDX: 00000000000003ff RSI: 0000000020012fe0 RDI: 00007f8667353850 [ 772.372665][T27068] RBP: 000000000075c118 R08: 00000000000003ff R09: 0000000000000000 [ 772.372674][T27068] R10: 00007f86673549d0 R11: 0000000000000246 R12: 00007f86673546d4 [ 772.372681][T27068] R13: 00000000004c8c84 R14: 00000000004dfc48 R15: 00000000ffffffff 22:01:02 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) syz_open_dev$char_usb(0xc, 0xb4, 0x5) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r0, 0x40045542, &(0x7f0000000000)=0x100000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:01:02 executing program 2: bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) close(0xffffffffffffffff) 22:01:02 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x331, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:01:02 executing program 3: mmap(&(0x7f0000011000/0x2000)=nil, 0x2000, 0x4, 0x31, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r4 = accept4$ax25(0xffffffffffffffff, &(0x7f0000000280)={{0x3, @bcast}, [@netrom, @netrom, @remote, @remote, @bcast, @remote, @remote, @rose]}, &(0x7f0000000300)=0x48, 0x800) ioctl$SIOCAX25OPTRT(r4, 0x89e7, &(0x7f0000000340)={@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x2, 0x44}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r5, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r5, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)=0x0) mq_notify(r5, &(0x7f0000000240)={0x0, 0x9, 0x1, @tid=r6}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x18, &(0x7f00000000c0)={r3}, &(0x7f0000000100)=0x14) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000000)={r3, 0x5}, 0x8) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r7, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r7, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) r8 = socket$inet6_sctp(0xa, 0x1, 0x84) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r8, 0x84, 0x18, &(0x7f00000000c0)={r10}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r7, 0x84, 0x10, &(0x7f00000003c0)=@assoc_value={r10, 0x4419}, &(0x7f0000000400)=0x8) readv(r0, &(0x7f0000000380)=[{&(0x7f0000000100)=""/200, 0xc8}], 0x1) syz_open_dev$evdev(&(0x7f0000012fee)='/.%v/\x11%put/event#\x00', 0x0, 0x0) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f0000000080)={&(0x7f0000012000/0x4000)=nil, 0x4000}) [ 772.737457][T27089] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 [ 772.796602][T27089] CPU: 1 PID: 27089 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 772.806157][T27089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 772.816412][T27089] Call Trace: [ 772.819961][T27089] dump_stack+0x172/0x1f0 [ 772.824510][T27089] dump_header+0x177/0x1152 [ 772.829050][T27089] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 772.834971][T27089] ? ___ratelimit+0x2c8/0x595 [ 772.837772][T27094] Unknown ioctl 1075332607 [ 772.839999][T27089] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 772.850346][T27089] ? lockdep_hardirqs_on+0x418/0x5d0 [ 772.855671][T27089] ? trace_hardirqs_on+0x67/0x240 [ 772.860852][T27089] ? pagefault_out_of_memory+0x11c/0x11c [ 772.866712][T27089] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 772.872546][T27089] ? ___ratelimit+0x60/0x595 [ 772.877161][T27089] ? do_raw_spin_unlock+0x57/0x270 [ 772.882504][T27089] oom_kill_process.cold+0x10/0x15 [ 772.887741][T27089] out_of_memory+0x334/0x1340 [ 772.892450][T27089] ? lock_downgrade+0x920/0x920 22:01:02 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x400, 0x0) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000000040)={0xffffffff, 0x9, 0xffffffffffffffff, 0x6, 0x9, 0x19a7}) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r2, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$RNDADDENTROPY(r2, 0x40085203, &(0x7f0000000180)={0x2, 0x62, "ca11b38661c300afcd83fd9fde497bb38958bbbe7ad16ed187de33d71eda8503629a249f100767dc7048a01998235f9773c37d0c3596c841650eab5b5d2cc4acee3f2b31e05512f090c85c8b129e7380f41dbe8acc4f9e7ee90571e134780e77633a"}) openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x10c01, 0x0) close(r1) 22:01:02 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x332, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 772.897341][T27089] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 772.903481][T27089] ? oom_killer_disable+0x280/0x280 [ 772.910010][T27089] mem_cgroup_out_of_memory+0x1d8/0x240 [ 772.915953][T27089] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 772.921635][T27089] ? do_raw_spin_unlock+0x57/0x270 [ 772.926967][T27089] ? _raw_spin_unlock+0x2d/0x50 [ 772.932885][T27089] try_charge+0xf4b/0x1440 [ 772.937583][T27089] ? perf_trace_lock_acquire+0x20/0x530 [ 772.943556][T27089] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 772.949344][T27089] ? find_held_lock+0x35/0x130 [ 772.954383][T27089] ? get_mem_cgroup_from_mm+0x139/0x320 [ 772.960078][T27089] ? lock_downgrade+0x920/0x920 [ 772.964964][T27089] ? percpu_ref_tryget_live+0x111/0x290 [ 772.970679][T27089] __memcg_kmem_charge_memcg+0x71/0xf0 [ 772.970699][T27089] ? memcg_kmem_put_cache+0x50/0x50 [ 772.970720][T27089] ? get_mem_cgroup_from_mm+0x156/0x320 [ 772.970741][T27089] __memcg_kmem_charge+0x13a/0x3a0 [ 772.970760][T27089] __alloc_pages_nodemask+0x4f7/0x900 [ 772.982567][T27089] ? __pmd_alloc+0x377/0x460 [ 772.982585][T27089] ? __alloc_pages_slowpath+0x2540/0x2540 [ 772.982604][T27089] ? rwlock_bug.part.0+0x90/0x90 [ 772.982626][T27089] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 772.982649][T27089] alloc_pages_current+0x107/0x210 [ 772.982675][T27089] pte_alloc_one+0x1b/0x1a0 [ 772.982692][T27089] __pte_alloc+0x20/0x310 [ 772.982715][T27089] copy_page_range+0x14da/0x1ed0 [ 773.040047][T27089] ? pmd_alloc+0x180/0x180 [ 773.044493][T27089] ? validate_mm_rb+0xa3/0xc0 [ 773.049423][T27089] ? __vma_link_rb+0x5ad/0x770 [ 773.054300][T27089] ? anon_vma_fork+0xd4/0x4a0 [ 773.059445][T27089] dup_mm+0xa67/0x1430 [ 773.063532][T27089] ? vm_area_dup+0x170/0x170 [ 773.068387][T27089] ? debug_mutex_init+0x2d/0x60 [ 773.073705][T27089] copy_process+0x2671/0x6830 [ 773.078548][T27089] ? __cleanup_sighand+0x60/0x60 [ 773.083679][T27089] ? __might_fault+0x12b/0x1e0 [ 773.088658][T27089] ? __might_fault+0x12b/0x1e0 [ 773.094294][T27089] _do_fork+0x146/0xfa0 [ 773.098548][T27089] ? copy_init_mm+0x20/0x20 [ 773.103224][T27089] ? __kasan_check_read+0x11/0x20 [ 773.109791][T27089] ? _copy_to_user+0x118/0x160 [ 773.114959][T27089] __x64_sys_clone+0x1ab/0x270 [ 773.119838][T27089] ? __ia32_sys_vfork+0xd0/0xd0 [ 773.124721][T27089] ? do_syscall_64+0x26/0x760 [ 773.129551][T27089] ? lockdep_hardirqs_on+0x418/0x5d0 [ 773.135222][T27089] ? trace_hardirqs_on+0x67/0x240 [ 773.140317][T27089] do_syscall_64+0xfa/0x760 [ 773.144948][T27089] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 773.151215][T27089] RIP: 0033:0x4598e9 [ 773.155267][T27089] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 773.175587][T27089] RSP: 002b:00007f786c5c7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 773.184419][T27089] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00000000004598e9 [ 773.192570][T27089] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 773.200601][T27089] RBP: 000000000075bfc8 R08: ffffffffffffffff R09: 0000000000000000 [ 773.208993][T27089] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f786c5c86d4 [ 773.217723][T27089] R13: 00000000004bfd7f R14: 00000000004d1b78 R15: 00000000ffffffff [ 773.236360][T27089] memory: usage 307200kB, limit 307200kB, failcnt 27 [ 773.243089][T27089] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 773.287425][T27089] Memory cgroup stats for /syz4: [ 773.288145][T27089] anon 272965632 [ 773.288145][T27089] file 53248 [ 773.288145][T27089] kernel_stack 4456448 [ 773.288145][T27089] slab 10133504 [ 773.288145][T27089] sock 2686976 [ 773.288145][T27089] shmem 81920 [ 773.288145][T27089] file_mapped 0 [ 773.288145][T27089] file_dirty 0 [ 773.288145][T27089] file_writeback 0 [ 773.288145][T27089] anon_thp 216006656 [ 773.288145][T27089] inactive_anon 135168 [ 773.288145][T27089] active_anon 272896000 [ 773.288145][T27089] inactive_file 135168 [ 773.288145][T27089] active_file 118784 [ 773.288145][T27089] unevictable 0 [ 773.288145][T27089] slab_reclaimable 1892352 [ 773.288145][T27089] slab_unreclaimable 8241152 [ 773.288145][T27089] pgfault 49368 [ 773.288145][T27089] pgmajfault 0 [ 773.288145][T27089] workingset_refault 0 [ 773.288145][T27089] workingset_activate 0 [ 773.288145][T27089] workingset_nodereclaim 0 [ 773.288145][T27089] pgrefill 115 [ 773.288145][T27089] pgscan 109 [ 773.288145][T27089] pgsteal 105 22:01:03 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x333, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 773.390848][T27089] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=22056,uid=0 [ 773.421649][T27071] device nr0 entered promiscuous mode [ 773.474759][T27089] Memory cgroup out of memory: Killed process 22056 (syz-executor.4) total-vm:72840kB, anon-rss:2224kB, file-rss:35788kB, shmem-rss:0kB, UID:0 pgtables:143360kB oom_score_adj:1000 [ 773.571027][ T1064] oom_reaper: reaped process 22056 (syz-executor.4), now anon-rss:0kB, file-rss:34828kB, shmem-rss:0kB 22:01:03 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x334, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:01:03 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x89ffffff00000000, 'c\x86\xdd'}]}, 0xfdef) 22:01:03 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x77ff, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, 0x0, 0x33bfb45e) socket$unix(0x1, 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x7, 0x228200) r2 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x8000}, 0x0, 0x0, r1, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f00000004c0)={0x9, @raw_data="1fcb46d02ab6c63c565955597b3a75537c49b43893fc974900400000463f0437f7ffd8500d384ced6347be0711b5c9cc1bf51d241901c2c02cf411338e817d388054685cbb344a3e0244c4ef0915c7c51d07d272610817ba58559342ce7918de9a85638015aef9a5e3cd6a7c9367289b69f9d462ebe0785411a26cfb487d7bc2a5456cb92cfdad5d3c088a2861de26cdb810b47f7095d5b1a0cf189b5b2fc861f8104c4c07882c2e8345bea52167e2d4f9e707d8df10dfbc8b3f2de6d19f8cec666e98588ed484ee"}) r3 = gettid() tkill(r3, 0x20) fcntl$lock(r2, 0x24, &(0x7f0000000000)={0x4, 0x2, 0x1, 0x7ded, r3}) ftruncate(0xffffffffffffffff, 0x0) r4 = socket$inet_sctp(0x2, 0xa3dcdb5a874157d8, 0x84) setsockopt$inet_MCAST_MSFILTER(r4, 0x0, 0x30, &(0x7f00000005c0)={0xbad000000, {{0x2, 0x4e20, @empty}}, 0x1, 0x8, [{{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {{0x2, 0x4e23, @broadcast}}, {{0x2, 0x4e24, @rand_addr=0x9de2}}, {{0x2, 0x4e21, @multicast2}}, {{0x2, 0x4e21, @empty}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @loopback}}]}, 0x490) r5 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x11, r5, 0x0) 22:01:03 executing program 2: bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) close(0xffffffffffffffff) 22:01:03 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x335, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:01:03 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r6, 0x4048ae9b, &(0x7f00000002c0)={0xe0003}) ioctl$KVM_SET_MSRS(r6, 0x8090ae81, &(0x7f0000000000)) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) r8 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r9 = ioctl$KVM_CREATE_VM(r8, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r9, 0xae41, 0x0) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[@ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYPTR=&(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES64=r0, @ANYRESHEX=r6, @ANYRES16=r7, @ANYBLOB="8de158d26425f0b077"], @ANYBLOB="ebc9dec37dcbc34b0c58f34b92fad62ec28d871c15e46ea4dacab080355d47c6a3e98667a60a42a186b010dace84a99563403955e3a69ca844e0ee3a9a917d59e0c9bedd14f67162198a62a288409d7e45e5ba00e3e2d2fe9d9562fa2eb6335c507d35dcb09e1bee2e45e547774df9a5f2228aec73d13c5927570d74a0845d2817547a", @ANYRESOCT=r0]]], 0x8) vmsplice(r1, &(0x7f0000000080), 0x0, 0x0) ioctl$VIDIOC_G_FREQUENCY(r1, 0xc02c5638, &(0x7f0000000000)={0x4, 0x0, 0x100000001}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ff3000/0xd000)=nil, 0xd000, &(0x7f0000000140)=""/229) 22:01:03 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r5, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r5, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) setsockopt$inet_opts(r5, 0x0, 0x9, &(0x7f0000000040)="bf83f2e73c2636c7e05a75a762335f4dfe3ece95c6b2c98bb44cac4e4140b50da2fd549d7e0e1d4fb50373ad2c0e75422c381c9b09ba780cee29f928509fb9baa2d28ecc752d647382d7636add11125010f0bd7ed66efbba8a6884fd637a25a7f704472fd6efabfd7c814516cf5685914fdba44065e5c082f7c72ae3d05255170352f7e3701cd38488a515ee2dfd202cf6b25db71e0e9663b036e7caf4174178b4383e23b465f7dc3535e36802f6bdfb10fe9736829dda584bd7efff198eaf09b5e4f087ffd70634ec6fe070ebf4ecd26119d5ee1f3e5ff661ca154ade15adbd26f64135a7dbf7551ac61c84337da649a377c661", 0xf4) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) r6 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x4, 0x42000) ioctl$TCGETX(r6, 0x5432, &(0x7f00000001c0)) 22:01:03 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x100000004, 0x6, 0x0, 0xff, "8811e78754a503d39c2bd6a40f03c8aa024d00000000ffffffffffff7f261e21ccf67e1d0000e565aa9a9d32b300", 0x7}, 0x60) close(r0) [ 774.168293][T27135] device nr0 entered promiscuous mode 22:01:03 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) syz_open_dev$char_usb(0xc, 0xb4, 0x5) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r0, 0x40045542, &(0x7f0000000000)=0x100000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:01:03 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x336, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 774.408252][T27145] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 [ 774.436431][T27145] CPU: 0 PID: 27145 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 774.446196][T27145] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 774.446203][T27145] Call Trace: [ 774.446243][T27145] dump_stack+0x172/0x1f0 [ 774.446264][T27145] dump_header+0x177/0x1152 [ 774.446280][T27145] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 774.446292][T27145] ? ___ratelimit+0x2c8/0x595 [ 774.446307][T27145] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 774.446324][T27145] ? lockdep_hardirqs_on+0x418/0x5d0 [ 774.446340][T27145] ? trace_hardirqs_on+0x67/0x240 [ 774.446355][T27145] ? pagefault_out_of_memory+0x11c/0x11c [ 774.446374][T27145] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 774.464096][T27145] ? ___ratelimit+0x60/0x595 [ 774.464112][T27145] ? do_raw_spin_unlock+0x57/0x270 [ 774.464134][T27145] oom_kill_process.cold+0x10/0x15 [ 774.464153][T27145] out_of_memory+0x334/0x1340 [ 774.464168][T27145] ? lock_downgrade+0x920/0x920 [ 774.464190][T27145] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 774.537731][T27145] ? oom_killer_disable+0x280/0x280 [ 774.542968][T27145] mem_cgroup_out_of_memory+0x1d8/0x240 [ 774.548546][T27145] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 774.554211][T27145] ? do_raw_spin_unlock+0x57/0x270 [ 774.559376][T27145] ? _raw_spin_unlock+0x2d/0x50 [ 774.564253][T27145] try_charge+0xf4b/0x1440 [ 774.568687][T27145] ? perf_trace_lock_acquire+0x20/0x530 [ 774.574259][T27145] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 774.579831][T27145] ? find_held_lock+0x35/0x130 [ 774.584672][T27145] ? get_mem_cgroup_from_mm+0x139/0x320 [ 774.590262][T27145] ? lock_downgrade+0x920/0x920 [ 774.595134][T27145] ? percpu_ref_tryget_live+0x111/0x290 [ 774.600706][T27145] __memcg_kmem_charge_memcg+0x71/0xf0 22:01:04 executing program 2: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) accept(r1, &(0x7f00000004c0)=@pppoe={0x18, 0x0, {0x0, @remote}}, &(0x7f0000000000)=0x80) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000009c0)={{{@in6, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xa, r2}) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x4000, 0x180, 0xffffffffffffffff, 0x0, [], r2, 0xffffffffffffffff, 0x4}, 0x21) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000100)=""/108}, 0x70) [ 774.606181][T27145] ? memcg_kmem_put_cache+0x50/0x50 [ 774.611811][T27145] ? get_mem_cgroup_from_mm+0x156/0x320 [ 774.617381][T27145] __memcg_kmem_charge+0x13a/0x3a0 [ 774.622516][T27145] __alloc_pages_nodemask+0x4f7/0x900 [ 774.627909][T27145] ? __alloc_pages_slowpath+0x2540/0x2540 [ 774.633642][T27145] ? copy_page_range+0xef4/0x1ed0 [ 774.638697][T27145] ? copy_page_range+0xef4/0x1ed0 [ 774.643753][T27145] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 774.650115][T27145] alloc_pages_current+0x107/0x210 [ 774.655252][T27145] pte_alloc_one+0x1b/0x1a0 [ 774.659767][T27145] __pte_alloc+0x20/0x310 [ 774.664120][T27145] copy_page_range+0x14da/0x1ed0 [ 774.669062][T27145] ? perf_trace_lock_acquire+0xf5/0x530 [ 774.674652][T27145] ? pmd_alloc+0x180/0x180 [ 774.679075][T27145] ? __rb_insert_augmented+0x20c/0xd90 [ 774.684552][T27145] ? validate_mm_rb+0xa3/0xc0 [ 774.689398][T27145] ? __vma_link_rb+0x5ad/0x770 [ 774.694182][T27145] dup_mm+0xa67/0x1430 [ 774.698285][T27145] ? vm_area_dup+0x170/0x170 [ 774.702899][T27145] ? debug_mutex_init+0x2d/0x60 [ 774.707782][T27145] copy_process+0x2671/0x6830 [ 774.712497][T27145] ? __cleanup_sighand+0x60/0x60 [ 774.717448][T27145] ? __might_fault+0x12b/0x1e0 [ 774.722237][T27145] ? __might_fault+0x12b/0x1e0 [ 774.727028][T27145] _do_fork+0x146/0xfa0 [ 774.731331][T27145] ? copy_init_mm+0x20/0x20 [ 774.735875][T27145] ? __kasan_check_read+0x11/0x20 [ 774.740924][T27145] ? _copy_to_user+0x118/0x160 [ 774.745727][T27145] __x64_sys_clone+0x1ab/0x270 [ 774.750515][T27145] ? __ia32_sys_vfork+0xd0/0xd0 [ 774.755386][T27145] ? do_syscall_64+0x26/0x760 [ 774.760068][T27145] ? lockdep_hardirqs_on+0x418/0x5d0 [ 774.765356][T27145] ? trace_hardirqs_on+0x67/0x240 [ 774.770381][T27145] do_syscall_64+0xfa/0x760 [ 774.774889][T27145] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 774.780766][T27145] RIP: 0033:0x4598e9 [ 774.784651][T27145] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 774.804249][T27145] RSP: 002b:00007f786c5c7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 774.812779][T27145] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00000000004598e9 [ 774.820741][T27145] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 774.829135][T27145] RBP: 000000000075bfc8 R08: ffffffffffffffff R09: 0000000000000000 [ 774.837092][T27145] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f786c5c86d4 [ 774.845049][T27145] R13: 00000000004bfd7f R14: 00000000004d1b78 R15: 00000000ffffffff [ 774.857131][T27145] memory: usage 307200kB, limit 307200kB, failcnt 74 [ 774.864008][T27145] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 774.871416][T27145] Memory cgroup stats for /syz4: [ 774.871524][T27145] anon 271036416 [ 774.871524][T27145] file 53248 [ 774.871524][T27145] kernel_stack 4587520 [ 774.871524][T27145] slab 11337728 [ 774.871524][T27145] sock 2686976 [ 774.871524][T27145] shmem 81920 [ 774.871524][T27145] file_mapped 0 [ 774.871524][T27145] file_dirty 0 [ 774.871524][T27145] file_writeback 0 [ 774.871524][T27145] anon_thp 213909504 [ 774.871524][T27145] inactive_anon 135168 [ 774.871524][T27145] active_anon 270966784 [ 774.871524][T27145] inactive_file 135168 [ 774.871524][T27145] active_file 118784 [ 774.871524][T27145] unevictable 0 [ 774.871524][T27145] slab_reclaimable 2162688 [ 774.871524][T27145] slab_unreclaimable 9175040 [ 774.871524][T27145] pgfault 49500 [ 774.871524][T27145] pgmajfault 0 [ 774.871524][T27145] workingset_refault 0 [ 774.871524][T27145] workingset_activate 0 [ 774.871524][T27145] workingset_nodereclaim 0 [ 774.871524][T27145] pgrefill 115 22:01:04 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x337, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 774.871524][T27145] pgscan 109 [ 774.871524][T27145] pgsteal 105 22:01:04 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) [ 775.004097][T27145] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=11170,uid=0 [ 775.020155][T27145] Memory cgroup out of memory: Killed process 11170 (syz-executor.4) total-vm:72840kB, anon-rss:2224kB, file-rss:35784kB, shmem-rss:0kB, UID:0 pgtables:143360kB oom_score_adj:1000 [ 775.044309][T27135] device nr0 entered promiscuous mode [ 775.085846][T27125] syz-executor.4 invoked oom-killer: gfp_mask=0x402dc2(GFP_KERNEL_ACCOUNT|__GFP_HIGHMEM|__GFP_NOWARN|__GFP_ZERO), order=0, oom_score_adj=1000 [ 775.205507][T27125] CPU: 0 PID: 27125 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 775.214664][T27125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 775.224731][T27125] Call Trace: [ 775.228037][T27125] dump_stack+0x172/0x1f0 [ 775.232387][T27125] dump_header+0x177/0x1152 [ 775.236905][T27125] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 775.242715][T27125] ? ___ratelimit+0x2c8/0x595 [ 775.247396][T27125] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 775.253279][T27125] ? lockdep_hardirqs_on+0x418/0x5d0 [ 775.258590][T27125] ? trace_hardirqs_on+0x67/0x240 [ 775.263625][T27125] ? pagefault_out_of_memory+0x11c/0x11c [ 775.269434][T27125] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 775.269450][T27125] ? ___ratelimit+0x60/0x595 [ 775.269463][T27125] ? do_raw_spin_unlock+0x57/0x270 [ 775.269479][T27125] oom_kill_process.cold+0x10/0x15 [ 775.269496][T27125] out_of_memory+0x334/0x1340 [ 775.269511][T27125] ? lock_downgrade+0x920/0x920 [ 775.269530][T27125] ? oom_killer_disable+0x280/0x280 [ 775.269563][T27125] mem_cgroup_out_of_memory+0x1d8/0x240 [ 775.269582][T27125] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 775.316052][T27125] ? do_raw_spin_unlock+0x57/0x270 [ 775.321204][T27125] ? _raw_spin_unlock+0x2d/0x50 [ 775.326088][T27125] try_charge+0xa2d/0x1440 [ 775.330538][T27125] ? perf_trace_lock_acquire+0x20/0x530 [ 775.336209][T27125] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 775.341763][T27125] ? find_held_lock+0x35/0x130 [ 775.346538][T27125] ? get_mem_cgroup_from_mm+0x139/0x320 [ 775.352098][T27125] ? lock_downgrade+0x920/0x920 [ 775.356952][T27125] ? percpu_ref_tryget_live+0x111/0x290 [ 775.362512][T27125] __memcg_kmem_charge_memcg+0x71/0xf0 [ 775.367980][T27125] ? memcg_kmem_put_cache+0x50/0x50 [ 775.373201][T27125] ? get_mem_cgroup_from_mm+0x156/0x320 [ 775.378765][T27125] __memcg_kmem_charge+0x13a/0x3a0 [ 775.383885][T27125] __alloc_pages_nodemask+0x4f7/0x900 [ 775.389263][T27125] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 775.394819][T27125] ? __alloc_pages_slowpath+0x2540/0x2540 [ 775.400725][T27125] ? kasan_unpoison_shadow+0x35/0x50 [ 775.406023][T27125] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 775.412275][T27125] alloc_pages_current+0x107/0x210 [ 775.417401][T27125] __vmalloc_node_range+0x4a9/0x7e0 [ 775.422616][T27125] ? kvm_dev_ioctl+0xc8d/0x1650 [ 775.427475][T27125] __vmalloc_node_flags_caller+0x71/0x90 [ 775.433198][T27125] ? kvm_dev_ioctl+0xc8d/0x1650 [ 775.438064][T27125] kvmalloc_node+0xdc/0x100 [ 775.442625][T27125] kvm_dev_ioctl+0xc8d/0x1650 [ 775.447326][T27125] ? kvm_debugfs_release+0x90/0x90 [ 775.452467][T27125] ? kvm_debugfs_release+0x90/0x90 [ 775.457592][T27125] do_vfs_ioctl+0xdb6/0x13e0 [ 775.463018][T27125] ? ioctl_preallocate+0x210/0x210 [ 775.468142][T27125] ? __fget+0x384/0x560 [ 775.472327][T27125] ? ksys_dup3+0x3e0/0x3e0 [ 775.476767][T27125] ? nsecs_to_jiffies+0x30/0x30 [ 775.481642][T27125] ? tomoyo_file_ioctl+0x23/0x30 [ 775.486600][T27125] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 775.492861][T27125] ? security_file_ioctl+0x8d/0xc0 [ 775.498063][T27125] ksys_ioctl+0xab/0xd0 [ 775.502235][T27125] __x64_sys_ioctl+0x73/0xb0 [ 775.507796][T27125] do_syscall_64+0xfa/0x760 [ 775.512312][T27125] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 775.518205][T27125] RIP: 0033:0x4598e9 [ 775.522106][T27125] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 775.541898][T27125] RSP: 002b:00007f786c5e8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 775.550401][T27125] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004598e9 [ 775.558460][T27125] RDX: 0000000000000000 RSI: 000000000000ae01 RDI: 0000000000000007 [ 775.566449][T27125] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 775.574532][T27125] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f786c5e96d4 [ 775.582502][T27125] R13: 00000000004c2841 R14: 00000000004d5ec8 R15: 00000000ffffffff [ 775.596708][T27125] memory: usage 304540kB, limit 307200kB, failcnt 74 [ 775.618421][T27125] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 775.625732][T27125] Memory cgroup stats for /syz4: [ 775.626114][T27125] anon 268869632 [ 775.626114][T27125] file 53248 [ 775.626114][T27125] kernel_stack 4390912 [ 775.626114][T27125] slab 11337728 [ 775.626114][T27125] sock 2686976 [ 775.626114][T27125] shmem 81920 [ 775.626114][T27125] file_mapped 0 [ 775.626114][T27125] file_dirty 0 [ 775.626114][T27125] file_writeback 0 [ 775.626114][T27125] anon_thp 211812352 [ 775.626114][T27125] inactive_anon 135168 [ 775.626114][T27125] active_anon 268869632 [ 775.626114][T27125] inactive_file 135168 [ 775.626114][T27125] active_file 118784 [ 775.626114][T27125] unevictable 0 [ 775.626114][T27125] slab_reclaimable 2162688 [ 775.626114][T27125] slab_unreclaimable 9175040 [ 775.626114][T27125] pgfault 49500 [ 775.626114][T27125] pgmajfault 0 [ 775.626114][T27125] workingset_refault 0 [ 775.626114][T27125] workingset_activate 0 [ 775.626114][T27125] workingset_nodereclaim 0 [ 775.626114][T27125] pgrefill 115 22:01:05 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x8dffffff00000000, 'c\x86\xdd'}]}, 0xfdef) 22:01:05 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x338, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:01:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x5) flistxattr(r0, 0x0, 0x0) r1 = accept4$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f0000000080)=0x6e, 0x80000) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f00000000c0)={0x2, 0x5, 0xd, 0x3, 0x3ff}) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, 0x0) 22:01:05 executing program 3: perf_event_open(&(0x7f0000000140)={0x4, 0x70, 0x3e9, 0x0, 0x6, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000002c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000140)='cpuset.memory_pressure\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x1) ioctl$KVM_GET_NR_MMU_PAGES(r2, 0xae45, 0x400) [ 775.626114][T27125] pgscan 109 [ 775.626114][T27125] pgsteal 105 [ 775.723571][T27125] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=22637,uid=0 [ 775.745909][T27125] Memory cgroup out of memory: Killed process 22637 (syz-executor.4) total-vm:72708kB, anon-rss:2216kB, file-rss:35788kB, shmem-rss:0kB, UID:0 pgtables:143360kB oom_score_adj:1000 22:01:05 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x218641, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) vmsplice(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0xffffffff, 0x4, 0x80, &(0x7f0000ffd000/0x3000)=nil, 0x7}) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x5, 0x800) fsetxattr$security_evm(r0, &(0x7f0000000240)='security.evm\x00', &(0x7f0000000280)=@v2={0x5, 0x2, 0xe, 0x0, 0x4f, "84ece8d0bf3751c60da251d31f6e93dc0e72f7c34b0cd38fb91be73b66fde1b5d92877525f8b0a46d6ca27ac4fe2012edcfb5a5f94c93145b79101824095f13275590d276ae30da4f29680d880ee52"}, 0x59, 0x2) ioctl$TIOCMBIC(r1, 0x5417, &(0x7f0000000040)=0x7) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) ioctl$KVM_SET_NR_MMU_PAGES(r1, 0xae44, 0x7) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x13, "df0f88595dbb7aacbafe9e0ed327590487fefbe1d78309c6b594d689cd8aa7c2ed56ecea10ffe2388ed49a688871d5c9fc7d74405e019caec8dc63ddeaa4152d", "9a3a700b6854daa70c806ac0e9a988eaac3febb8efd699604d9d98d0be3d7d42", [0xa4, 0xddf6]}) 22:01:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xce, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10304, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="2100000003000000001c00000000000000000000000000000000000000000000008533b43937d3814188770f52e8baaf32eb04c3f572555a49b02586fd33f79c81f1d7c8693b6148973894d1b6aa1f3d90820f61f76bd9816b29ee8f0a58f1f4956caa5223d18695a1b88cd66e8c6613eb5c"], 0x21) [ 775.914356][T27186] device nr0 entered promiscuous mode 22:01:05 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x339, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:01:05 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r3, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000040)={0xa83, 0xb, 0x4, 0x8, {0x77359400}, {0x4, 0x2, 0x2, 0x0, 0x100000000, 0x7, "35cbef87"}, 0xffff, 0x3, @fd=r1, 0x4}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f00000000c0)={0x80000000}) close(r2) r5 = socket$inet6(0xa, 0x3, 0x3c) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r5, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) 22:01:05 executing program 3: r0 = socket$kcm(0xa, 0x522000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000140), 0x4) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0xf7962dfeff881bdc, 0x80fe}, 0x23, &(0x7f00000001c0), 0xc}, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/pso\n\xd8\xf0H\xe5\xa6\x1fc/sys/net/ipv4/\x97s/conntrack\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0bc5310, &(0x7f0000000180)) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r2, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$RTC_AIE_OFF(r2, 0x7002) 22:01:05 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffd, 0x200000000000042) ioctl$FS_IOC_FSGETXATTR(r0, 0x550b, 0x0) eventfd(0xfffffffffffff001) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = getuid() stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f00000002c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0}, &(0x7f0000000340)=0xc) getresuid(&(0x7f0000000380), &(0x7f00000003c0)=0x0, &(0x7f0000000400)) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x6, &(0x7f0000000380)=[r12, r12, r13, r13, 0x0, r12]) stat(&(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x6, &(0x7f0000000380)=[r14, r14, r15, r15, 0x0, r14]) stat(&(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x6, &(0x7f0000000380)=[r16, r16, r17, r17, 0x0, r16]) stat(&(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x6, &(0x7f0000000380)=[r18, r18, r19, r19, 0x0, r18]) fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000500)={{}, {0x1, 0x7}, [{0x2, 0x6, r2}, {0x2, 0x2, r3}, {0x2, 0xe, r4}, {0x2, 0x2, r6}, {0x2, 0x0, r8}, {0x2, 0x1}, {0x2, 0x3ca453f9a77d9f3c, r9}, {0x2, 0x4, r10}, {0x2, 0x1, r11}], {0x4, 0x5}, [{0x8, 0x1, r13}, {0x8, 0x6, r15}, {0x8, 0x2, r17}, {0x8, 0x2, r19}], {0x10, 0x2}, {0x20, 0x7}}, 0x8c, 0x2) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000040)=0x30) 22:01:05 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x33a, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:01:06 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x33b, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 776.462235][T27186] device nr0 entered promiscuous mode 22:01:06 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0xfc00000000000000, 'c\x86\xdd'}]}, 0xfdef) 22:01:06 executing program 2: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x2a, &(0x7f0000000580)=ANY=[@ANYBLOB="01000000000000000a00000000000000ff010000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffee00"/144], 0x90) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x1, 0x0) ioctl$sock_rose_SIOCDELRT(r1, 0x890c, &(0x7f0000000040)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0xcf6, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00', 0x4, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @null, @null, @default, @default]}) 22:01:06 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x33c, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:01:06 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x541042, 0x0) ioctl$NBD_SET_SIZE(r1, 0xab02, 0x80) sendto$isdn(0xffffffffffffffff, &(0x7f0000001140)=ANY=[@ANYBLOB="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"/4110], 0x1008, 0x0, 0x0, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000000)={0x0, 0x0, 0x200079c4}) ioctl$CAPI_REGISTER(0xffffffffffffffff, 0x400c4301, &(0x7f0000000040)={0x3ff, 0x1a, 0x2}) close(r0) [ 776.840606][T27232] device nr0 entered promiscuous mode 22:01:06 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x33d, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:01:06 executing program 4: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/\b\\\n\xd0\x95\xf1&\x01\x00', 0x200, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x802, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000000c0)=[@in6={0xa, 0x4e22, 0x2, @rand_addr="399ec548bf84c27974d6527a45c697ac", 0xa78}, @in={0x2, 0x4e20, @broadcast}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e22, 0x7154, @mcast1, 0x9}, @in6={0xa, 0x4e20, 0x8001, @mcast1, 0xe2b}, @in6={0xa, 0x4e23, 0x3, @empty}], 0x90) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:01:06 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-serpent-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0", 0x10) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) 22:01:06 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x7, 0x18100) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) 22:01:06 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x33e, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:01:06 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-serpent-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e3", 0x12) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f00000012c0)=[{{0x0, 0xffffffffffffff7e, &(0x7f0000001200)=[{&(0x7f0000000200)=""/4096, 0xfe87}, {&(0x7f0000000180)=""/116, 0x74}], 0x2}}], 0x5f, 0x0, 0x0) [ 777.190239][T27249] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 [ 777.252177][T27249] CPU: 1 PID: 27249 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 777.261336][T27249] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 777.271432][T27249] Call Trace: [ 777.275700][T27249] dump_stack+0x172/0x1f0 [ 777.280060][T27249] dump_header+0x177/0x1152 [ 777.284587][T27249] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 777.290416][T27249] ? ___ratelimit+0x2c8/0x595 [ 777.295113][T27249] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 777.300947][T27249] ? lockdep_hardirqs_on+0x418/0x5d0 [ 777.306261][T27249] ? trace_hardirqs_on+0x67/0x240 [ 777.311320][T27249] ? pagefault_out_of_memory+0x11c/0x11c [ 777.316980][T27249] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 777.322805][T27249] ? ___ratelimit+0x60/0x595 [ 777.327413][T27249] ? do_raw_spin_unlock+0x57/0x270 [ 777.332548][T27249] oom_kill_process.cold+0x10/0x15 [ 777.337671][T27249] out_of_memory+0x334/0x1340 [ 777.337687][T27249] ? lock_downgrade+0x920/0x920 [ 777.337706][T27249] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 777.337723][T27249] ? oom_killer_disable+0x280/0x280 [ 777.358331][T27249] mem_cgroup_out_of_memory+0x1d8/0x240 [ 777.363895][T27249] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 777.363919][T27249] ? do_raw_spin_unlock+0x57/0x270 [ 777.363941][T27249] ? _raw_spin_unlock+0x2d/0x50 [ 777.363960][T27249] try_charge+0xf4b/0x1440 [ 777.363980][T27249] ? perf_trace_lock_acquire+0x20/0x530 [ 777.392467][T27249] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 777.398033][T27249] ? find_held_lock+0x35/0x130 [ 777.403081][T27249] ? get_mem_cgroup_from_mm+0x139/0x320 [ 777.408654][T27249] ? lock_downgrade+0x920/0x920 [ 777.413572][T27249] ? percpu_ref_tryget_live+0x111/0x290 [ 777.419149][T27249] __memcg_kmem_charge_memcg+0x71/0xf0 [ 777.424632][T27249] ? memcg_kmem_put_cache+0x50/0x50 [ 777.429853][T27249] ? get_mem_cgroup_from_mm+0x156/0x320 [ 777.435430][T27249] __memcg_kmem_charge+0x13a/0x3a0 [ 777.440563][T27249] __alloc_pages_nodemask+0x4f7/0x900 [ 777.445952][T27249] ? __alloc_pages_slowpath+0x2540/0x2540 [ 777.451677][T27249] ? copy_page_range+0xef4/0x1ed0 [ 777.456797][T27249] ? copy_page_range+0xef4/0x1ed0 [ 777.462612][T27249] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 777.468860][T27249] alloc_pages_current+0x107/0x210 [ 777.474248][T27249] pte_alloc_one+0x1b/0x1a0 [ 777.478758][T27249] __pte_alloc+0x20/0x310 [ 777.483094][T27249] copy_page_range+0x14da/0x1ed0 [ 777.488035][T27249] ? perf_trace_lock_acquire+0xf5/0x530 [ 777.493608][T27249] ? pmd_alloc+0x180/0x180 [ 777.498049][T27249] ? __rb_insert_augmented+0x20c/0xd90 [ 777.503508][T27249] ? validate_mm_rb+0xa3/0xc0 [ 777.508191][T27249] ? __vma_link_rb+0x5ad/0x770 [ 777.512958][T27249] dup_mm+0xa67/0x1430 [ 777.517043][T27249] ? vm_area_dup+0x170/0x170 [ 777.521637][T27249] ? debug_mutex_init+0x2d/0x60 [ 777.526493][T27249] copy_process+0x2671/0x6830 [ 777.531188][T27249] ? __cleanup_sighand+0x60/0x60 [ 777.536228][T27249] ? __might_fault+0x12b/0x1e0 [ 777.540999][T27249] ? __might_fault+0x12b/0x1e0 [ 777.546041][T27249] _do_fork+0x146/0xfa0 [ 777.550219][T27249] ? copy_init_mm+0x20/0x20 [ 777.554753][T27249] ? __kasan_check_read+0x11/0x20 [ 777.559785][T27249] ? _copy_to_user+0x118/0x160 [ 777.564659][T27249] __x64_sys_clone+0x1ab/0x270 [ 777.569427][T27249] ? __ia32_sys_vfork+0xd0/0xd0 [ 777.574446][T27249] ? do_syscall_64+0x26/0x760 [ 777.579145][T27249] ? lockdep_hardirqs_on+0x418/0x5d0 [ 777.584439][T27249] ? trace_hardirqs_on+0x67/0x240 [ 777.589472][T27249] do_syscall_64+0xfa/0x760 [ 777.593996][T27249] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 777.599993][T27249] RIP: 0033:0x4598e9 [ 777.603887][T27249] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 777.623503][T27249] RSP: 002b:00007f786c5e8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 777.632115][T27249] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00000000004598e9 [ 777.640100][T27249] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 22:01:06 executing program 3: mount(0x0, 0x0, 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x80000000b9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r0, 0x8) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000400)={0x0, 0x3}) wait4(0x0, 0x0, 0x80000000, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r1, 0x6) r2 = getpid() ioctl$TIOCGRS485(0xffffffffffffffff, 0x542e, 0x0) tkill(r2, 0x9) pipe(&(0x7f00000004c0)) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r3, &(0x7f0000006580), 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000200000000002e00"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r4 = socket(0x0, 0x3, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) [ 777.648170][T27249] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 777.656150][T27249] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f786c5e96d4 [ 777.664124][T27249] R13: 00000000004bfd7f R14: 00000000004d1b78 R15: 00000000ffffffff 22:01:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffa}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(0x0, 0x1, 0x141001) writev(r0, &(0x7f0000001700)=[{0x0}, {0x0}], 0x2) writev(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet6_tcp_int(r1, 0x6, 0x24, &(0x7f0000000040), &(0x7f0000000080)=0x4) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(0xffffffffffffffff, 0xc008ae05, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x40000001, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r3 = gettid() tkill(r3, 0x1000000000016) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat$usbmon(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 777.783704][T27249] memory: usage 307196kB, limit 307200kB, failcnt 126 [ 777.806451][T27249] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 777.817243][T27249] Memory cgroup stats for /syz4: [ 777.817384][T27249] anon 270958592 [ 777.817384][T27249] file 53248 [ 777.817384][T27249] kernel_stack 4456448 [ 777.817384][T27249] slab 11554816 [ 777.817384][T27249] sock 2686976 [ 777.817384][T27249] shmem 81920 [ 777.817384][T27249] file_mapped 0 [ 777.817384][T27249] file_dirty 0 [ 777.817384][T27249] file_writeback 0 [ 777.817384][T27249] anon_thp 211812352 [ 777.817384][T27249] inactive_anon 135168 [ 777.817384][T27249] active_anon 270958592 [ 777.817384][T27249] inactive_file 135168 [ 777.817384][T27249] active_file 118784 [ 777.817384][T27249] unevictable 0 [ 777.817384][T27249] slab_reclaimable 2162688 [ 777.817384][T27249] slab_unreclaimable 9392128 [ 777.817384][T27249] pgfault 49698 [ 777.817384][T27249] pgmajfault 0 [ 777.817384][T27249] workingset_refault 0 [ 777.817384][T27249] workingset_activate 0 [ 777.817384][T27249] workingset_nodereclaim 0 [ 777.817384][T27249] pgrefill 115 [ 777.817384][T27249] pgscan 109 [ 777.817384][T27249] pgsteal 105 [ 777.963041][T27249] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=22475,uid=0 [ 778.033001][T27232] device nr0 entered promiscuous mode [ 778.057068][T27249] Memory cgroup out of memory: Killed process 22475 (syz-executor.4) total-vm:72708kB, anon-rss:2176kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:143360kB oom_score_adj:1000 22:01:08 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$UI_BEGIN_FF_ERASE(r0, 0xc00c55ca, &(0x7f0000000040)={0x7, 0x4}) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) 22:01:08 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x33f, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:01:08 executing program 3: mkdir(0x0, 0x0) r0 = socket$xdp(0x2c, 0x3, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) dup2(r0, r1) 22:01:08 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0xfe80000000000000, 'c\x86\xdd'}]}, 0xfdef) 22:01:08 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000600)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, r1) r2 = add_key(&(0x7f0000000140)='rxrpc\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="b1e5a4ddf1080b4c44baec246e5083cce3e1ead6cc38792dd40d0b8d08049bf5b604fa5e9a929d366fd48b28f486a7c18a0ed1dee67a30f95d6c19f9ac236a30673f84818cb52f5d5ea67c03630c45927637ecacabafc19a6144ad045acd628d0c05f0fe8be1afb37c8705d8f59d8176bc86850b2a5efc97817ab42c883e1e61a5dc83977660a829d89b28ffc76315e06548e52c556e4ea46fe35785a01ac16486f8236ec5d4c549e3d910c19f9982d1ff2eada44d4170b1695dac4e977546a39bd40d792957", 0xc6, r1) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f00000002c0)={r2, 0x79, 0x7f}, &(0x7f0000000300)={'enc=', 'oaep', ' hash=', {'streebog256\x00'}}, &(0x7f0000000380)="6a4ab575d65dea2d1145137db4329ab2459b553f95dcc29dabd4c79dd3e5063473683ecb18bd9dd3d7da853c55273637969f08a8de241aab96051f25d9915d1f153eee30dd4093b47e6eb91000870e07318555117ec0c0126508a37169373fabaa26cc6ae309197932f1c6caaeeb8e98c4fc6efed4d844de64", &(0x7f0000000400)="3c38f50b7111e9a287056e56c33809dd2e26fd2a240eb06d7e468dc939a154a4fada765a52f954c1f4284bbc1455b7b5dc5bb376ce052e6030c4499a41b47159f9b96ab80514a844a0597ea461eaa7297b24f5ddecd47e00a66c3c7377e3c8732aa5110bb1283a1cbe8e392876d09cc636998a1a8ca904ec3e531aedcf0ace") ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x105) [ 778.644462][T27300] device nr0 entered promiscuous mode [ 778.650066][T27297] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 [ 778.650085][T27297] CPU: 0 PID: 27297 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 778.650094][T27297] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 778.650099][T27297] Call Trace: [ 778.650120][T27297] dump_stack+0x172/0x1f0 [ 778.650142][T27297] dump_header+0x177/0x1152 [ 778.650159][T27297] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 778.650171][T27297] ? ___ratelimit+0x2c8/0x595 [ 778.650183][T27297] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 778.650199][T27297] ? lockdep_hardirqs_on+0x418/0x5d0 [ 778.650222][T27297] ? trace_hardirqs_on+0x67/0x240 [ 778.650238][T27297] ? pagefault_out_of_memory+0x11c/0x11c [ 778.650254][T27297] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 778.650268][T27297] ? ___ratelimit+0x60/0x595 [ 778.650281][T27297] ? do_raw_spin_unlock+0x57/0x270 22:01:08 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x23042a, 0x0) [ 778.650299][T27297] oom_kill_process.cold+0x10/0x15 [ 778.650317][T27297] out_of_memory+0x334/0x1340 [ 778.650330][T27297] ? lock_downgrade+0x920/0x920 [ 778.650350][T27297] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 778.650366][T27297] ? oom_killer_disable+0x280/0x280 [ 778.650393][T27297] mem_cgroup_out_of_memory+0x1d8/0x240 [ 778.650407][T27297] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 778.650441][T27297] ? do_raw_spin_unlock+0x57/0x270 [ 778.689266][T27297] ? _raw_spin_unlock+0x2d/0x50 [ 778.699726][T27297] try_charge+0xf4b/0x1440 [ 778.699747][T27297] ? perf_trace_lock_acquire+0x20/0x530 [ 778.699765][T27297] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 778.699779][T27297] ? find_held_lock+0x35/0x130 [ 778.699795][T27297] ? get_mem_cgroup_from_mm+0x139/0x320 [ 778.699822][T27297] ? lock_downgrade+0x920/0x920 [ 778.821512][T27297] ? percpu_ref_tryget_live+0x111/0x290 [ 778.827050][T27297] __memcg_kmem_charge_memcg+0x71/0xf0 [ 778.832497][T27297] ? memcg_kmem_put_cache+0x50/0x50 [ 778.837685][T27297] ? get_mem_cgroup_from_mm+0x156/0x320 [ 778.843314][T27297] __memcg_kmem_charge+0x13a/0x3a0 [ 778.848416][T27297] __alloc_pages_nodemask+0x4f7/0x900 [ 778.853793][T27297] ? __alloc_pages_slowpath+0x2540/0x2540 [ 778.859497][T27297] ? copy_page_range+0xef4/0x1ed0 [ 778.864507][T27297] ? copy_page_range+0xef4/0x1ed0 [ 778.869784][T27297] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 778.876619][T27297] alloc_pages_current+0x107/0x210 [ 778.881731][T27297] pte_alloc_one+0x1b/0x1a0 [ 778.886229][T27297] __pte_alloc+0x20/0x310 [ 778.890694][T27297] copy_page_range+0x14da/0x1ed0 [ 778.895628][T27297] ? perf_trace_lock_acquire+0xf5/0x530 [ 778.901192][T27297] ? pmd_alloc+0x180/0x180 [ 778.905616][T27297] ? __rb_insert_augmented+0x20c/0xd90 [ 778.911076][T27297] ? validate_mm_rb+0xa3/0xc0 [ 778.916723][T27297] ? __vma_link_rb+0x5ad/0x770 [ 778.921493][T27297] dup_mm+0xa67/0x1430 [ 778.925572][T27297] ? vm_area_dup+0x170/0x170 [ 778.930157][T27297] ? debug_mutex_init+0x2d/0x60 [ 778.935027][T27297] copy_process+0x2671/0x6830 [ 778.939714][T27297] ? do_syscall_64+0xfa/0x760 [ 778.944402][T27297] ? __cleanup_sighand+0x60/0x60 [ 778.949332][T27297] ? __might_fault+0x12b/0x1e0 [ 778.954100][T27297] ? __might_fault+0x12b/0x1e0 [ 778.958865][T27297] _do_fork+0x146/0xfa0 [ 778.963010][T27297] ? copy_init_mm+0x20/0x20 [ 778.967507][T27297] ? __kasan_check_read+0x11/0x20 [ 778.972515][T27297] ? _copy_to_user+0x118/0x160 [ 778.977274][T27297] __x64_sys_clone+0x1ab/0x270 [ 778.982026][T27297] ? __ia32_sys_vfork+0xd0/0xd0 [ 778.986871][T27297] ? do_syscall_64+0x26/0x760 [ 778.991548][T27297] ? lockdep_hardirqs_on+0x418/0x5d0 [ 778.996820][T27297] ? trace_hardirqs_on+0x67/0x240 [ 779.001870][T27297] do_syscall_64+0xfa/0x760 [ 779.006407][T27297] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 779.013242][T27297] RIP: 0033:0x4598e9 [ 779.017133][T27297] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 779.036735][T27297] RSP: 002b:00007f786c5e8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 779.045305][T27297] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00000000004598e9 [ 779.053260][T27297] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 779.061215][T27297] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 779.069204][T27297] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f786c5e96d4 [ 779.077176][T27297] R13: 00000000004bfd7f R14: 00000000004d1b78 R15: 00000000ffffffff [ 779.098883][T27297] memory: usage 307200kB, limit 307200kB, failcnt 143 [ 779.107523][T27297] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 779.116075][T27297] Memory cgroup stats for /syz4: [ 779.116348][T27297] anon 270970880 [ 779.116348][T27297] file 53248 [ 779.116348][T27297] kernel_stack 4456448 [ 779.116348][T27297] slab 11554816 [ 779.116348][T27297] sock 2686976 [ 779.116348][T27297] shmem 81920 [ 779.116348][T27297] file_mapped 0 [ 779.116348][T27297] file_dirty 0 [ 779.116348][T27297] file_writeback 0 [ 779.116348][T27297] anon_thp 213909504 [ 779.116348][T27297] inactive_anon 135168 [ 779.116348][T27297] active_anon 270970880 [ 779.116348][T27297] inactive_file 135168 [ 779.116348][T27297] active_file 118784 [ 779.116348][T27297] unevictable 0 [ 779.116348][T27297] slab_reclaimable 2162688 [ 779.116348][T27297] slab_unreclaimable 9392128 [ 779.116348][T27297] pgfault 49830 [ 779.116348][T27297] pgmajfault 0 [ 779.116348][T27297] workingset_refault 0 [ 779.116348][T27297] workingset_activate 0 [ 779.116348][T27297] workingset_nodereclaim 0 [ 779.116348][T27297] pgrefill 115 [ 779.116348][T27297] pgscan 109 [ 779.116348][T27297] pgsteal 105 22:01:08 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x340, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:01:09 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r5, 0x4048ae9b, &(0x7f00000002c0)={0xe0003}) ioctl$KVM_SET_MSRS(r5, 0x8090ae81, &(0x7f0000000000)) fsetxattr$trusted_overlay_opaque(r5, &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x1) close(r2) r6 = socket$inet6(0xa, 0x3, 0x3c) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r8, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r8, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$TUNSETVNETLE(r8, 0x400454dc, &(0x7f00000000c0)) connect$inet6(r6, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) 22:01:09 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x5e, &(0x7f0000000180)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x28, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @sack={0x5, 0x6, [0x0]}, @sack_perm={0x4, 0x2}]}}}}}}}}, 0x0) [ 779.452127][T27297] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=26751,uid=0 [ 779.468785][T27306] EXT4-fs (sda1): re-mounted. Opts: (null) [ 779.504503][T27297] Memory cgroup out of memory: Killed process 26751 (syz-executor.4) total-vm:73236kB, anon-rss:2248kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 22:01:09 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x341, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:01:09 executing program 3: mount(0x0, 0x0, 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x80000000b9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r0, 0x8) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000400)={0x0, 0x3}) wait4(0x0, 0x0, 0x80000000, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r1, 0x6) r2 = getpid() ioctl$TIOCGRS485(0xffffffffffffffff, 0x542e, 0x0) tkill(r2, 0x9) pipe(&(0x7f00000004c0)) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r3, &(0x7f0000006580), 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000200000000002e00"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 779.635479][T27300] device nr0 entered promiscuous mode [ 779.780263][T27297] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 779.821194][T27297] CPU: 1 PID: 27297 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 779.830359][T27297] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 779.840791][T27297] Call Trace: [ 779.844093][T27297] dump_stack+0x172/0x1f0 [ 779.848436][T27297] dump_header+0x177/0x1152 [ 779.852943][T27297] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 779.859038][T27297] ? ___ratelimit+0x2c8/0x595 [ 779.863721][T27297] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 779.869561][T27297] ? lockdep_hardirqs_on+0x418/0x5d0 [ 779.874861][T27297] ? trace_hardirqs_on+0x67/0x240 [ 779.879922][T27297] ? pagefault_out_of_memory+0x11c/0x11c [ 779.885577][T27297] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 779.891409][T27297] ? ___ratelimit+0x60/0x595 [ 779.896007][T27297] ? do_raw_spin_unlock+0x57/0x270 [ 779.901133][T27297] oom_kill_process.cold+0x10/0x15 [ 779.906280][T27297] out_of_memory+0x334/0x1340 [ 779.910972][T27297] ? lock_downgrade+0x920/0x920 [ 779.915841][T27297] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 779.921675][T27297] ? oom_killer_disable+0x280/0x280 [ 779.926903][T27297] mem_cgroup_out_of_memory+0x1d8/0x240 [ 779.932461][T27297] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 779.938107][T27297] ? do_raw_spin_unlock+0x57/0x270 [ 779.943236][T27297] ? _raw_spin_unlock+0x2d/0x50 [ 779.948099][T27297] try_charge+0xf4b/0x1440 [ 779.952534][T27297] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 779.958171][T27297] ? percpu_ref_tryget_live+0x111/0x290 [ 779.963734][T27297] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 779.969984][T27297] ? __kasan_check_read+0x11/0x20 [ 779.975019][T27297] ? get_mem_cgroup_from_mm+0x156/0x320 [ 779.980571][T27297] mem_cgroup_try_charge+0x136/0x590 [ 779.985868][T27297] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 779.992122][T27297] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 779.997769][T27297] do_huge_pmd_wp_page_fallback+0x24c/0x1740 [ 780.003755][T27297] ? perf_trace_lock_acquire+0xf5/0x530 [ 780.009406][T27297] ? defrag_store+0x360/0x360 [ 780.014097][T27297] ? lock_downgrade+0x920/0x920 [ 780.018959][T27297] ? swp_swapcount+0x540/0x540 [ 780.023730][T27297] ? shrink_huge_zero_page_scan+0x1a0/0x1a0 [ 780.029629][T27297] ? __kasan_check_read+0x11/0x20 [ 780.034654][T27297] ? do_raw_spin_unlock+0x57/0x270 [ 780.039774][T27297] do_huge_pmd_wp_page+0x7ff/0x2300 [ 780.044991][T27297] ? __split_huge_pmd+0x2810/0x2810 [ 780.050199][T27297] ? __kasan_check_read+0x11/0x20 [ 780.055233][T27297] ? pmd_val+0x85/0x100 [ 780.059397][T27297] ? add_mm_counter_fast.part.0+0x40/0x40 [ 780.065124][T27297] ? debug_smp_processor_id+0x3c/0x214 [ 780.070599][T27297] __handle_mm_fault+0x14cf/0x3f20 [ 780.075728][T27297] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 780.081299][T27297] ? __kasan_check_read+0x11/0x20 [ 780.086340][T27297] handle_mm_fault+0x1b5/0x6c0 [ 780.091117][T27297] __do_page_fault+0x536/0xdd0 [ 780.096070][T27297] do_page_fault+0x38/0x590 [ 780.100580][T27297] page_fault+0x39/0x40 [ 780.104740][T27297] RIP: 0010:copy_user_generic_unrolled+0x89/0xc0 [ 780.111067][T27297] Code: 38 4c 89 47 20 4c 89 4f 28 4c 89 57 30 4c 89 5f 38 48 8d 76 40 48 8d 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 <4c> 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a [ 780.131197][T27297] RSP: 0018:ffff888068e87e18 EFLAGS: 00010202 [ 780.137268][T27297] RAX: 0000000000000001 RBX: 0000000000000008 RCX: 0000000000000001 [ 780.145249][T27297] RDX: 0000000000000000 RSI: ffff888068e87e80 RDI: 00000000200000c0 [ 780.153225][T27297] RBP: ffff888068e87e50 R08: 0000000500000004 R09: ffffed100d1d0fd1 [ 780.161202][T27297] R10: ffffed100d1d0fd0 R11: ffff888068e87e87 R12: 00000000200000c0 [ 780.169172][T27297] R13: ffff888068e87e80 R14: 00000000200000c8 R15: 00007ffffffff000 [ 780.177179][T27297] ? _copy_to_user+0x146/0x160 [ 780.181959][T27297] do_pipe2+0xec/0x160 [ 780.186035][T27297] ? __do_pipe_flags+0x250/0x250 [ 780.190980][T27297] ? do_syscall_64+0x26/0x760 [ 780.195662][T27297] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 780.201760][T27297] ? lockdep_hardirqs_on+0x418/0x5d0 [ 780.207053][T27297] __x64_sys_pipe+0x33/0x40 [ 780.211570][T27297] do_syscall_64+0xfa/0x760 [ 780.216088][T27297] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 780.221983][T27297] RIP: 0033:0x4598e9 [ 780.225881][T27297] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 780.245539][T27297] RSP: 002b:00007f786c5e8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000016 [ 780.253975][T27297] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00000000004598e9 [ 780.262317][T27297] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200000c0 [ 780.270425][T27297] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 780.278431][T27297] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f786c5e96d4 [ 780.286425][T27297] R13: 00000000004f5be7 R14: 00000000004db838 R15: 00000000ffffffff 22:01:09 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f00000012c0)=[{{0x0, 0xffffffffffffff7e, &(0x7f0000001200)=[{&(0x7f0000000200)=""/4096, 0xfe87}, {&(0x7f0000000180)=""/116, 0x74}], 0x2}}], 0x5f, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, 0x0, &(0x7f00000013c0)) socket$inet_dccp(0x2, 0x6, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) 22:01:10 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) sync_file_range(r2, 0xfffffffffffffffe, 0x7, 0x6) 22:01:10 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x342, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:01:10 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f00000012c0)=[{{0x0, 0xffffffffffffff7e, &(0x7f0000001200)=[{&(0x7f0000000200)=""/4096, 0xfe87}, {&(0x7f0000000180)=""/116, 0x74}], 0x2}}], 0x5f, 0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0xc0487c04, &(0x7f0000000000)=""/226) ioctl$MON_IOCH_MFLUSH(0xffffffffffffffff, 0x9208, 0x4) [ 780.613531][T27297] memory: usage 307176kB, limit 307200kB, failcnt 195 [ 780.620569][T27297] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 780.657799][T27297] Memory cgroup stats for /syz4: [ 780.658093][T27297] anon 268980224 [ 780.658093][T27297] file 53248 [ 780.658093][T27297] kernel_stack 4456448 [ 780.658093][T27297] slab 11554816 [ 780.658093][T27297] sock 2686976 [ 780.658093][T27297] shmem 81920 [ 780.658093][T27297] file_mapped 0 [ 780.658093][T27297] file_dirty 0 [ 780.658093][T27297] file_writeback 0 [ 780.658093][T27297] anon_thp 213909504 [ 780.658093][T27297] inactive_anon 135168 [ 780.658093][T27297] active_anon 268943360 [ 780.658093][T27297] inactive_file 135168 [ 780.658093][T27297] active_file 118784 [ 780.658093][T27297] unevictable 0 [ 780.658093][T27297] slab_reclaimable 2162688 [ 780.658093][T27297] slab_unreclaimable 9392128 [ 780.658093][T27297] pgfault 49863 [ 780.658093][T27297] pgmajfault 0 [ 780.658093][T27297] workingset_refault 0 [ 780.658093][T27297] workingset_activate 0 [ 780.658093][T27297] workingset_nodereclaim 0 [ 780.658093][T27297] pgrefill 115 [ 780.658093][T27297] pgscan 109 [ 780.658093][T27297] pgsteal 105 22:01:10 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0xfec0000000000000, 'c\x86\xdd'}]}, 0xfdef) [ 780.771362][T27297] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=27294,uid=0 [ 780.789102][T27297] Memory cgroup out of memory: Killed process 27294 (syz-executor.4) total-vm:72708kB, anon-rss:2216kB, file-rss:35784kB, shmem-rss:0kB, UID:0 pgtables:143360kB oom_score_adj:1000 22:01:10 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYPTR64=&(0x7f0000000340)=ANY=[@ANYBLOB="93f36ac84bd910a2c39d1ce4146d3b0cbfea868915b9ee2ec4d11857c327658455abb2c0e6166f46abeb4968907fa800a5552aa33a3483c45f8fc481487167f292a74b7a8f37cdfaa379f607f6b671a86d2469154b72eb755b9852fcd82004fd5c09ed87316f667dc02cb4017cfa7c380d28c249ab1793a169dfa8ff4aaa68a1b9aca5d53995704a7071977dcc61888026430f4d3e82f5589b356ea34b31520cb5d5b81d3404a671d2e6469bf0537492ac6634167d5b767352530f488f937193d8f458c9cfb587eac8757ba49e661d616887038b33628d00d6b6b75f55a4d344aed88dfc9191630a45e8975d6d6fc4d707062a7e8652fe35e56f60032265b6725626cdeb1837167e721abbb635153d10c2c6ff19d5c1303f1a3278cddd61ccae34681eb60dd4e78ac5301ef9549e0ed6fcd2cf060cd6e28e5cb02a830ad2fc6e8cea0ade408ef3daacc78bf96d193000"/351]], 0xfffffffffffffe7d) vmsplice(r0, &(0x7f0000000240), 0x0, 0x1a) getsockname$netrom(r0, &(0x7f0000000000)={{0x3, @rose}, [@bcast, @netrom, @netrom, @remote, @default, @bcast, @rose, @netrom]}, &(0x7f00000001c0)=0x48) semctl$SEM_INFO(0xffffffffffffffff, 0x0, 0x13, &(0x7f00000000c0)=""/216) 22:01:10 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x343, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 780.830182][ T1064] oom_reaper: reaped process 27294 (syz-executor.4), now anon-rss:0kB, file-rss:34832kB, shmem-rss:0kB [ 780.953408][T27362] device nr0 entered promiscuous mode 22:01:10 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x344, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 781.004164][T27363] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 781.046822][T27363] CPU: 1 PID: 27363 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 781.055984][T27363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 781.066229][T27363] Call Trace: [ 781.069538][T27363] dump_stack+0x172/0x1f0 [ 781.074676][T27363] dump_header+0x177/0x1152 [ 781.079200][T27363] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 781.085014][T27363] ? ___ratelimit+0x2c8/0x595 [ 781.089870][T27363] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 781.095705][T27363] ? lockdep_hardirqs_on+0x418/0x5d0 [ 781.101007][T27363] ? trace_hardirqs_on+0x67/0x240 [ 781.106047][T27363] ? pagefault_out_of_memory+0x11c/0x11c [ 781.111707][T27363] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 781.117536][T27363] ? ___ratelimit+0x60/0x595 [ 781.122139][T27363] ? do_raw_spin_unlock+0x57/0x270 [ 781.127269][T27363] oom_kill_process.cold+0x10/0x15 [ 781.133186][T27363] out_of_memory+0x334/0x1340 [ 781.137883][T27363] ? lock_downgrade+0x920/0x920 [ 781.143447][T27363] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 781.149265][T27363] ? oom_killer_disable+0x280/0x280 [ 781.154485][T27363] mem_cgroup_out_of_memory+0x1d8/0x240 [ 781.160049][T27363] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 781.165698][T27363] ? do_raw_spin_unlock+0x57/0x270 [ 781.170823][T27363] ? _raw_spin_unlock+0x2d/0x50 [ 781.175681][T27363] try_charge+0xf4b/0x1440 [ 781.180123][T27363] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 781.185671][T27363] ? percpu_ref_tryget_live+0x111/0x290 [ 781.191229][T27363] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 781.197480][T27363] ? __kasan_check_read+0x11/0x20 [ 781.202512][T27363] ? get_mem_cgroup_from_mm+0x156/0x320 [ 781.208065][T27363] mem_cgroup_try_charge+0x136/0x590 [ 781.213354][T27363] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 781.219872][T27363] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 781.225519][T27363] do_huge_pmd_wp_page_fallback+0x24c/0x1740 [ 781.231504][T27363] ? perf_trace_lock_acquire+0xf5/0x530 [ 781.237143][T27363] ? free_unref_page_list+0x4f3/0x700 [ 781.242561][T27363] ? defrag_store+0x360/0x360 [ 781.247253][T27363] ? lock_downgrade+0x920/0x920 [ 781.252729][T27363] ? swp_swapcount+0x540/0x540 [ 781.257518][T27363] ? shrink_huge_zero_page_scan+0x1a0/0x1a0 [ 781.263434][T27363] ? __kasan_check_read+0x11/0x20 [ 781.268473][T27363] ? do_raw_spin_unlock+0x57/0x270 [ 781.273597][T27363] do_huge_pmd_wp_page+0x7ff/0x2300 [ 781.278812][T27363] ? __split_huge_pmd+0x2810/0x2810 [ 781.284027][T27363] ? __kasan_check_read+0x11/0x20 [ 781.289070][T27363] ? pmd_val+0x85/0x100 [ 781.293236][T27363] ? add_mm_counter_fast.part.0+0x40/0x40 [ 781.298977][T27363] ? debug_smp_processor_id+0x3c/0x214 [ 781.304469][T27363] __handle_mm_fault+0x14cf/0x3f20 [ 781.309631][T27363] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 781.315212][T27363] ? __kasan_check_read+0x11/0x20 [ 781.320365][T27363] handle_mm_fault+0x1b5/0x6c0 [ 781.325152][T27363] __do_page_fault+0x536/0xdd0 [ 781.329953][T27363] do_page_fault+0x38/0x590 [ 781.334467][T27363] page_fault+0x39/0x40 [ 781.338636][T27363] RIP: 0010:copy_user_generic_unrolled+0xa0/0xc0 [ 781.344968][T27363] Code: 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 4c 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a 06 <88> 07 48 ff c6 48 ff c7 ff c9 75 f2 31 c0 0f 1f 00 c3 0f 1f 40 00 [ 781.364805][T27363] RSP: 0018:ffff88805cbdfe68 EFLAGS: 00010202 [ 781.370886][T27363] RAX: 0000000000000000 RBX: 0000000000000002 RCX: 0000000000000002 [ 781.378894][T27363] RDX: 0000000000000002 RSI: ffff88809934c000 RDI: 0000000020000580 [ 781.386876][T27363] RBP: ffff88805cbdfea0 R08: 1ffff11013269800 R09: ffffed1013269801 [ 781.394857][T27363] R10: ffffed1013269800 R11: ffff88809934c001 R12: 0000000020000580 [ 781.402838][T27363] R13: ffff88809934c000 R14: 0000000020000582 R15: 00007ffffffff000 [ 781.410848][T27363] ? _copy_to_user+0x146/0x160 [ 781.415652][T27363] __x64_sys_mincore+0x3cd/0x860 [ 781.420623][T27363] do_syscall_64+0xfa/0x760 [ 781.425155][T27363] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 781.431051][T27363] RIP: 0033:0x4598e9 22:01:10 executing program 3: r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) listen(r0, 0xffeffffefffffffb) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000580)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 22:01:10 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet6(0xa, 0x3, 0x3c) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r3, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) getsockopt$inet_dccp_int(r3, 0x21, 0x5, &(0x7f0000000140), &(0x7f00000001c0)=0x4) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r5, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r5, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) connect$inet6(r5, &(0x7f0000000180)={0xa, 0x0, 0x2000000000, @remote, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$FS_IOC_SETVERSION(r6, 0x40087602, &(0x7f0000000040)=0x100) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) [ 781.435045][T27363] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 781.454747][T27363] RSP: 002b:00007f786c5e8c78 EFLAGS: 00000246 ORIG_RAX: 000000000000001b [ 781.463182][T27363] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004598e9 [ 781.471162][T27363] RDX: 0000000020000580 RSI: 0000000000002000 RDI: 0000000020ffe000 [ 781.471172][T27363] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 781.471181][T27363] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f786c5e96d4 [ 781.471190][T27363] R13: 00000000004c5d52 R14: 00000000004da788 R15: 00000000ffffffff 22:01:11 executing program 2: semop(0x0, &(0x7f0000000240)=[{0x0, 0x0, 0x3800}], 0x1) semop(0x0, &(0x7f0000000080)=[{0x0, 0x101}, {0x0, 0x7fffffff, 0x50b83553767c3926}], 0x2) [ 781.562522][T27363] memory: usage 307200kB, limit 307200kB, failcnt 1258 [ 781.571226][T27363] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 781.585366][T27362] device nr0 entered promiscuous mode [ 781.585872][T27363] Memory cgroup stats for /syz4: [ 781.585994][T27363] anon 270979072 [ 781.585994][T27363] file 53248 [ 781.585994][T27363] kernel_stack 4456448 [ 781.585994][T27363] slab 11554816 [ 781.585994][T27363] sock 2686976 [ 781.585994][T27363] shmem 81920 [ 781.585994][T27363] file_mapped 0 [ 781.585994][T27363] file_dirty 0 [ 781.585994][T27363] file_writeback 0 [ 781.585994][T27363] anon_thp 216006656 [ 781.585994][T27363] inactive_anon 135168 [ 781.585994][T27363] active_anon 270979072 [ 781.585994][T27363] inactive_file 135168 [ 781.585994][T27363] active_file 118784 [ 781.585994][T27363] unevictable 0 [ 781.585994][T27363] slab_reclaimable 2162688 [ 781.585994][T27363] slab_unreclaimable 9392128 [ 781.585994][T27363] pgfault 49929 22:01:11 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x345, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:01:11 executing program 3: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_SIOCINQ(r0, 0x89e5, &(0x7f0000000000)) [ 781.585994][T27363] pgmajfault 0 [ 781.585994][T27363] workingset_refault 0 [ 781.585994][T27363] workingset_activate 0 [ 781.585994][T27363] workingset_nodereclaim 0 [ 781.585994][T27363] pgrefill 115 [ 781.585994][T27363] pgscan 109 [ 781.585994][T27363] pgsteal 105 22:01:11 executing program 2: mount(0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x80000000b9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) wait4(0x0, 0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000200000000002e00"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) 22:01:11 executing program 3: ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x1) ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x47, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x80611166fa8c7c3d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000100)={'#! ', './file1', [{}, {}]}, 0xd) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x23042a, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0xc04, 0x0, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, 0x0) [ 781.746338][T27363] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=26980,uid=0 [ 781.839973][T27363] Memory cgroup out of memory: Killed process 26980 (syz-executor.4) total-vm:72972kB, anon-rss:2232kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 22:01:11 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x346, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 782.021769][T27360] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 782.090885][T27360] CPU: 1 PID: 27360 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 782.100036][T27360] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 782.110203][T27360] Call Trace: [ 782.113772][T27360] dump_stack+0x172/0x1f0 [ 782.118116][T27360] dump_header+0x177/0x1152 [ 782.122626][T27360] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 782.128440][T27360] ? ___ratelimit+0x2c8/0x595 [ 782.133118][T27360] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 782.138914][T27360] ? lockdep_hardirqs_on+0x418/0x5d0 [ 782.144181][T27360] ? trace_hardirqs_on+0x67/0x240 [ 782.149206][T27360] ? pagefault_out_of_memory+0x11c/0x11c [ 782.154822][T27360] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 782.160611][T27360] ? ___ratelimit+0x60/0x595 [ 782.165183][T27360] ? do_raw_spin_unlock+0x57/0x270 [ 782.170278][T27360] oom_kill_process.cold+0x10/0x15 [ 782.175377][T27360] out_of_memory+0x334/0x1340 [ 782.180035][T27360] ? lock_downgrade+0x920/0x920 [ 782.184872][T27360] ? oom_killer_disable+0x280/0x280 [ 782.190064][T27360] mem_cgroup_out_of_memory+0x1d8/0x240 [ 782.195593][T27360] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 782.201215][T27360] ? do_raw_spin_unlock+0x57/0x270 [ 782.206312][T27360] ? _raw_spin_unlock+0x2d/0x50 [ 782.211155][T27360] try_charge+0xa2d/0x1440 [ 782.215603][T27360] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 782.221149][T27360] ? percpu_ref_tryget_live+0x111/0x290 [ 782.226680][T27360] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 782.232904][T27360] ? __kasan_check_read+0x11/0x20 [ 782.237923][T27360] ? get_mem_cgroup_from_mm+0x156/0x320 [ 782.243452][T27360] mem_cgroup_try_charge+0x136/0x590 [ 782.248722][T27360] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 782.254949][T27360] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 782.260570][T27360] wp_page_copy+0x41e/0x1590 [ 782.265152][T27360] ? find_held_lock+0x35/0x130 [ 782.269902][T27360] ? pmd_pfn+0x1d0/0x1d0 [ 782.274141][T27360] ? lock_downgrade+0x920/0x920 [ 782.278976][T27360] ? swp_swapcount+0x540/0x540 [ 782.283724][T27360] ? __kasan_check_read+0x11/0x20 [ 782.288730][T27360] ? do_raw_spin_unlock+0x57/0x270 [ 782.293823][T27360] do_wp_page+0x499/0x14d0 [ 782.298228][T27360] ? finish_mkwrite_fault+0x570/0x570 [ 782.303590][T27360] __handle_mm_fault+0x22f1/0x3f20 [ 782.308697][T27360] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 782.314277][T27360] ? __kasan_check_read+0x11/0x20 [ 782.319292][T27360] handle_mm_fault+0x1b5/0x6c0 [ 782.324055][T27360] __do_page_fault+0x536/0xdd0 [ 782.328810][T27360] do_page_fault+0x38/0x590 [ 782.333295][T27360] page_fault+0x39/0x40 [ 782.337434][T27360] RIP: 0033:0x4150c3 [ 782.341314][T27360] Code: e9 4c 89 e2 ff 74 24 48 4c 8b 4c 24 10 89 ee 4c 8b 44 24 18 48 89 df e8 cb f7 ff ff 66 2e 0f 1f 84 00 00 00 00 00 90 48 f7 d8 <64> 89 04 25 d4 ff ff ff 48 83 c8 ff c3 48 81 ec 98 00 00 00 31 ff [ 782.361082][T27360] RSP: 002b:00007ffee7d140f8 EFLAGS: 00010213 [ 782.367144][T27360] RAX: 000000000000006e RBX: 00000000000003e8 RCX: 00000000004598e9 [ 782.375447][T27360] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 000000000075bf2c [ 782.383412][T27360] RBP: 000000000000002d R08: ffffffffffffffff R09: ffffffffffffffff [ 782.391375][T27360] R10: 00007ffee7d141d0 R11: 0000000000000246 R12: 000000000075bf20 [ 782.399332][T27360] R13: 00000000000bea6e R14: 00000000000bea9b R15: 000000000075bf2c [ 782.464218][T27360] memory: usage 307068kB, limit 307200kB, failcnt 1258 [ 782.474856][T27360] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 782.489026][T27360] Memory cgroup stats for /syz4: [ 782.489379][T27360] anon 270868480 [ 782.489379][T27360] file 53248 [ 782.489379][T27360] kernel_stack 4456448 [ 782.489379][T27360] slab 11554816 [ 782.489379][T27360] sock 2686976 [ 782.489379][T27360] shmem 81920 [ 782.489379][T27360] file_mapped 0 [ 782.489379][T27360] file_dirty 0 [ 782.489379][T27360] file_writeback 0 [ 782.489379][T27360] anon_thp 216006656 [ 782.489379][T27360] inactive_anon 135168 [ 782.489379][T27360] active_anon 270843904 [ 782.489379][T27360] inactive_file 135168 [ 782.489379][T27360] active_file 118784 [ 782.489379][T27360] unevictable 0 [ 782.489379][T27360] slab_reclaimable 2162688 [ 782.489379][T27360] slab_unreclaimable 9392128 [ 782.489379][T27360] pgfault 49929 [ 782.489379][T27360] pgmajfault 0 [ 782.489379][T27360] workingset_refault 0 [ 782.489379][T27360] workingset_activate 0 [ 782.489379][T27360] workingset_nodereclaim 0 [ 782.489379][T27360] pgrefill 115 [ 782.489379][T27360] pgscan 109 [ 782.489379][T27360] pgsteal 105 [ 782.594087][T27360] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=26497,uid=0 [ 782.619824][T27360] Memory cgroup out of memory: Killed process 26497 (syz-executor.4) total-vm:72972kB, anon-rss:2232kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 22:01:12 executing program 3: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000540)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x18}}], 0x10) r2 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) [ 782.741889][T27365] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 [ 782.804673][T27365] CPU: 0 PID: 27365 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 782.814034][T27365] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 782.824282][T27365] Call Trace: [ 782.827574][T27365] dump_stack+0x172/0x1f0 [ 782.827692][T27365] dump_header+0x177/0x1152 [ 782.827709][T27365] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 782.827720][T27365] ? ___ratelimit+0x2c8/0x595 [ 782.827732][T27365] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 782.827748][T27365] ? lockdep_hardirqs_on+0x418/0x5d0 [ 782.827764][T27365] ? trace_hardirqs_on+0x67/0x240 [ 782.827780][T27365] ? pagefault_out_of_memory+0x11c/0x11c [ 782.827796][T27365] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 782.827810][T27365] ? ___ratelimit+0x60/0x595 [ 782.827823][T27365] ? do_raw_spin_unlock+0x57/0x270 [ 782.827841][T27365] oom_kill_process.cold+0x10/0x15 [ 782.827858][T27365] out_of_memory+0x334/0x1340 [ 782.827873][T27365] ? lock_downgrade+0x920/0x920 [ 782.827894][T27365] ? oom_killer_disable+0x280/0x280 [ 782.827929][T27365] mem_cgroup_out_of_memory+0x1d8/0x240 [ 782.827944][T27365] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 782.827963][T27365] ? do_raw_spin_unlock+0x57/0x270 [ 782.827979][T27365] ? _raw_spin_unlock+0x2d/0x50 [ 782.827999][T27365] try_charge+0xa2d/0x1440 [ 782.828016][T27365] ? perf_trace_lock_acquire+0x20/0x530 [ 782.828035][T27365] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 782.941017][T27365] ? find_held_lock+0x35/0x130 [ 782.945914][T27365] ? get_mem_cgroup_from_mm+0x139/0x320 [ 782.951654][T27365] ? lock_downgrade+0x920/0x920 [ 782.956528][T27365] ? percpu_ref_tryget_live+0x111/0x290 [ 782.962081][T27365] __memcg_kmem_charge_memcg+0x71/0xf0 [ 782.967536][T27365] ? memcg_kmem_put_cache+0x50/0x50 [ 782.972728][T27365] ? get_mem_cgroup_from_mm+0x156/0x320 [ 782.978268][T27365] __memcg_kmem_charge+0x13a/0x3a0 [ 782.983400][T27365] __alloc_pages_nodemask+0x4f7/0x900 [ 782.988776][T27365] ? find_held_lock+0x35/0x130 [ 782.993543][T27365] ? __alloc_pages_slowpath+0x2540/0x2540 [ 782.999275][T27365] ? __kasan_check_read+0x11/0x20 [ 783.004300][T27365] ? mark_lock+0xc2/0x1220 [ 783.008710][T27365] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 783.014950][T27365] alloc_pages_current+0x107/0x210 [ 783.020058][T27365] pte_alloc_one+0x1b/0x1a0 [ 783.024585][T27365] __handle_mm_fault+0x34d7/0x3f20 [ 783.029739][T27365] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 783.035293][T27365] ? __kasan_check_read+0x11/0x20 [ 783.040398][T27365] handle_mm_fault+0x1b5/0x6c0 [ 783.045295][T27365] __do_page_fault+0x536/0xdd0 [ 783.050156][T27365] ? page_fault+0x16/0x40 [ 783.054482][T27365] do_page_fault+0x38/0x590 [ 783.058972][T27365] page_fault+0x39/0x40 [ 783.064210][T27365] RIP: 0033:0x4598e9 [ 783.068106][T27365] Code: Bad RIP value. [ 783.072160][T27365] RSP: 002b:00007f786c5e8c78 EFLAGS: 00010246 [ 783.078319][T27365] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 00000000004598e9 [ 783.086291][T27365] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 783.094263][T27365] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 22:01:12 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x800000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:01:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = dup(r0) accept4$inet(r1, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) unshare(0x20600) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/loop-control\x00', 0x0, 0x0) symlink(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000100)={0x0, 0x0, 0x0, [0x0, 0x800000000000000], &(0x7f0000000000)={0x98f900, 0x0, [], @p_u8=0x0}}) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x0, 0x88be}, @val={0x4, 0x0, 0xfff, 0x69, 0x8e64, 0x400}, @llc={@snap={0x0, 0x0, "e3", "509187", 0xc0, "9c1275"}}}, 0x19) ioctl$sock_inet_SIOCSIFNETMASK(r2, 0x891c, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f00000000c0)) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x9) syz_genetlink_get_family_id$SEG6(&(0x7f0000000240)='SEG6\x00') openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000200), 0x2ab, 0x0, 0x0) 22:01:12 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x347, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:01:12 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0xff00000000000000, 'c\x86\xdd'}]}, 0xfdef) 22:01:12 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r5, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r5, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r5, 0x770a, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x4000, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) fdatasync(r0) ioctl$KVM_GET_SUPPORTED_CPUID(r5, 0xc008ae05, &(0x7f00000001c0)=""/192) 22:01:12 executing program 3: syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[], [{@uid_eq={'uid'}}]}) socketpair$unix(0x1, 0x10000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 783.102511][T27365] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f786c5e96d4 [ 783.110498][T27365] R13: 00000000004bfd7f R14: 00000000004d1b78 R15: 00000000ffffffff [ 783.128730][T27365] memory: usage 304356kB, limit 307200kB, failcnt 1258 [ 783.165868][T27365] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 783.173145][T27365] Memory cgroup stats for /syz4: [ 783.173255][T27365] anon 268869632 [ 783.173255][T27365] file 53248 [ 783.173255][T27365] kernel_stack 4390912 [ 783.173255][T27365] slab 11554816 [ 783.173255][T27365] sock 2686976 [ 783.173255][T27365] shmem 81920 [ 783.173255][T27365] file_mapped 0 [ 783.173255][T27365] file_dirty 0 [ 783.173255][T27365] file_writeback 0 [ 783.173255][T27365] anon_thp 216006656 [ 783.173255][T27365] inactive_anon 135168 [ 783.173255][T27365] active_anon 268951552 [ 783.173255][T27365] inactive_file 135168 [ 783.173255][T27365] active_file 118784 [ 783.173255][T27365] unevictable 0 [ 783.173255][T27365] slab_reclaimable 2162688 [ 783.173255][T27365] slab_unreclaimable 9392128 [ 783.173255][T27365] pgfault 49962 [ 783.173255][T27365] pgmajfault 0 [ 783.173255][T27365] workingset_refault 0 [ 783.173255][T27365] workingset_activate 0 [ 783.173255][T27365] workingset_nodereclaim 0 [ 783.173255][T27365] pgrefill 115 [ 783.173255][T27365] pgscan 109 [ 783.173255][T27365] pgsteal 105 [ 783.179764][T27435] device nr0 entered promiscuous mode [ 783.283364][T27365] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=24493,uid=0 22:01:12 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x348, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 783.322247][T27365] Memory cgroup out of memory: Killed process 24493 (syz-executor.4) total-vm:72840kB, anon-rss:2228kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 783.346504][T27437] FAT-fs (loop3): bogus number of reserved sectors [ 783.397237][T27437] FAT-fs (loop3): Can't find a valid FAT filesystem 22:01:13 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x349, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:01:13 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x2, 0x20000) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e20, 0x7fffffff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x80000000}}}, 0x84) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='\x05\x00\x00\x1e\x00', 0x804100, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffd000/0x2000)=nil, 0x2000, &(0x7f0000000080)=""/229) [ 783.751911][T27463] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 [ 783.764631][T27463] CPU: 0 PID: 27463 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 783.773751][T27463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 783.784422][T27463] Call Trace: [ 783.787725][T27463] dump_stack+0x172/0x1f0 [ 783.792075][T27463] dump_header+0x177/0x1152 [ 783.796584][T27463] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 783.802396][T27463] ? ___ratelimit+0x2c8/0x595 [ 783.807079][T27463] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 783.812891][T27463] ? lockdep_hardirqs_on+0x418/0x5d0 [ 783.818186][T27463] ? trace_hardirqs_on+0x67/0x240 [ 783.823212][T27463] ? pagefault_out_of_memory+0x11c/0x11c [ 783.829112][T27463] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 783.834921][T27463] ? ___ratelimit+0x60/0x595 [ 783.839517][T27463] ? do_raw_spin_unlock+0x57/0x270 [ 783.844654][T27463] oom_kill_process.cold+0x10/0x15 [ 783.849766][T27463] out_of_memory+0x334/0x1340 [ 783.854459][T27463] ? lock_downgrade+0x920/0x920 [ 783.859323][T27463] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 783.865133][T27463] ? oom_killer_disable+0x280/0x280 [ 783.870336][T27463] mem_cgroup_out_of_memory+0x1d8/0x240 [ 783.876007][T27463] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 783.881634][T27463] ? do_raw_spin_unlock+0x57/0x270 [ 783.886803][T27463] ? _raw_spin_unlock+0x2d/0x50 [ 783.891677][T27463] try_charge+0xf4b/0x1440 [ 783.896101][T27463] ? perf_trace_lock_acquire+0x20/0x530 [ 783.901639][T27463] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 783.907618][T27463] ? find_held_lock+0x35/0x130 [ 783.912385][T27463] ? get_mem_cgroup_from_mm+0x139/0x320 [ 783.917952][T27463] ? lock_downgrade+0x920/0x920 [ 783.922807][T27463] ? percpu_ref_tryget_live+0x111/0x290 [ 783.928369][T27463] __memcg_kmem_charge_memcg+0x71/0xf0 [ 783.933847][T27463] ? memcg_kmem_put_cache+0x50/0x50 [ 783.939050][T27463] ? get_mem_cgroup_from_mm+0x156/0x320 [ 783.944594][T27463] __memcg_kmem_charge+0x13a/0x3a0 [ 783.949706][T27463] __alloc_pages_nodemask+0x4f7/0x900 [ 783.955098][T27463] ? __alloc_pages_slowpath+0x2540/0x2540 [ 783.960832][T27463] ? __kasan_check_read+0x11/0x20 [ 783.960847][T27463] ? mark_lock+0xc2/0x1220 [ 783.960866][T27463] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 783.960886][T27463] alloc_pages_current+0x107/0x210 [ 783.960905][T27463] pte_alloc_one+0x1b/0x1a0 [ 783.960921][T27463] __handle_mm_fault+0x34d7/0x3f20 [ 783.960941][T27463] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 783.960971][T27463] ? __kasan_check_read+0x11/0x20 [ 783.960993][T27463] handle_mm_fault+0x1b5/0x6c0 [ 783.961013][T27463] __do_page_fault+0x536/0xdd0 [ 783.961024][T27463] ? page_fault+0x16/0x40 [ 783.961046][T27463] do_page_fault+0x38/0x590 [ 783.976682][T27463] page_fault+0x39/0x40 [ 783.976695][T27463] RIP: 0033:0x4598e9 [ 783.976719][T27463] Code: Bad RIP value. [ 783.976726][T27463] RSP: 002b:00007f786c5e8c78 EFLAGS: 00010246 [ 783.976736][T27463] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 00000000004598e9 [ 783.976744][T27463] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 783.976752][T27463] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 783.976760][T27463] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f786c5e96d4 [ 783.976768][T27463] R13: 00000000004bfd7f R14: 00000000004d1b78 R15: 00000000ffffffff [ 783.991191][T27463] memory: usage 307200kB, limit 307200kB, failcnt 1285 [ 784.091781][T27437] FAT-fs (loop3): bogus number of reserved sectors 22:01:13 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) socket$inet_udplite(0x2, 0x2, 0x88) openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0xffe, &(0x7f0000000740)="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") r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x2c2400, 0x0) ioctl$VIDIOC_G_SELECTION(r4, 0xc040565e, &(0x7f0000000080)={0x3, 0x102, 0x0, {0xffffffff, 0x7, 0x101}}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r5, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r5, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x3df}], 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(r5, 0x9208, 0x200) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0xfffffd51) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r6 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000140)=0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r8, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) r9 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r10 = ioctl$KVM_CREATE_VM(r9, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r10, 0xae41, 0x0) r11 = socket$l2tp(0x18, 0x1, 0x1) vmsplice(r11, &(0x7f0000000480), 0x10000223, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) r12 = socket$inet6_sctp(0xa, 0x5, 0x84) r13 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r13, 0xae01, 0x0) r14 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r15 = ioctl$KVM_CREATE_VM(r14, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r15, 0xae41, 0x0) r16 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r17 = ioctl$KVM_CREATE_VM(r16, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r17, 0xae41, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r12, 0x84, 0x1d, &(0x7f0000000900)=ANY=[@ANYRESOCT, @ANYBLOB="fcbad92e34c8d5f72d308d5065e141e3f4c3921d5b63333a1c90b6f8916d0cc5188844ca7197619211c8fa8ba0e073ad1cc8a1801c4d5da41962648c63215630c5d57a9f170db22c2c6c6fbf0198f50ae16f56b50277f01192def8add190bd76c3a1810256439a398447b0fb444568af77a2b720963c7540d523629e80fc9fd8030b35a0d7bf7ea8d006cd4ffb747b5f1e782353583f085034181dc8b93648f45e9181b32f5d7cb3f055d0f6610d12263e5e514a6a1226623386be61dbf59741e278f3", @ANYRESDEC, @ANYRES64=r17, @ANYRESDEC, @ANYRESDEC=0x0, @ANYRESHEX=r6], &(0x7f00000005c0)=0x7) r18 = syz_open_dev$admmidi(&(0x7f0000000440)='/dev/admmidi#\x00', 0x2, 0x44101) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r18, 0x84, 0x18, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r8, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e24, @local}}}, &(0x7f00000002c0)=0x84) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000300)={r19, 0x100000001, 0x2, 0x7fff}, &(0x7f0000000380)=0x10) syz_open_procfs(r7, &(0x7f00000001c0)='net/icmp\x00') splice(r0, 0x0, r2, 0x0, 0x4, 0x0) pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r20, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r20, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$VHOST_GET_FEATURES(r20, 0x8008af00, &(0x7f00000003c0)) [ 784.109945][T27437] FAT-fs (loop3): Can't find a valid FAT filesystem 22:01:13 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x34a, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 784.157094][T27463] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 784.193090][T27463] Memory cgroup stats for /syz4: [ 784.193200][T27463] anon 271228928 [ 784.193200][T27463] file 53248 22:01:13 executing program 2: mount(0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x80000000b9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r0, 0x8) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r1, 0x6) getpid() ioctl$TIOCGRS485(0xffffffffffffffff, 0x542e, 0x0) tkill(0x0, 0x9) pipe(&(0x7f00000004c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r2, &(0x7f0000006580), 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000200000000002e00"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) socket(0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 784.193200][T27463] kernel_stack 4587520 [ 784.193200][T27463] slab 11554816 [ 784.193200][T27463] sock 2686976 [ 784.193200][T27463] shmem 81920 [ 784.193200][T27463] file_mapped 0 [ 784.193200][T27463] file_dirty 0 [ 784.193200][T27463] file_writeback 0 [ 784.193200][T27463] anon_thp 216006656 [ 784.193200][T27463] inactive_anon 135168 [ 784.193200][T27463] active_anon 271228928 [ 784.193200][T27463] inactive_file 135168 [ 784.193200][T27463] active_file 118784 [ 784.193200][T27463] unevictable 0 [ 784.193200][T27463] slab_reclaimable 2162688 22:01:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = dup(r0) accept4$inet(r1, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) unshare(0x20600) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/loop-control\x00', 0x0, 0x0) symlink(0x0, &(0x7f0000000080)='./file0\x00') ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000100)={0x0, 0x1, 0x0, [0x0, 0x800000000000000], &(0x7f0000000000)={0x98f900, 0x0, [], @p_u8=0x0}}) write$tun(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r2, 0x891c, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f00000000c0)) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x9) syz_genetlink_get_family_id$SEG6(&(0x7f0000000240)='SEG6\x00') openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000340)) recvmmsg(0xffffffffffffffff, &(0x7f0000000200), 0x2ab, 0x0, 0x0) [ 784.193200][T27463] slab_unreclaimable 9392128 [ 784.193200][T27463] pgfault 50127 [ 784.193200][T27463] pgmajfault 0 [ 784.193200][T27463] workingset_refault 0 [ 784.193200][T27463] workingset_activate 0 [ 784.193200][T27463] workingset_nodereclaim 0 [ 784.193200][T27463] pgrefill 115 [ 784.193200][T27463] pgscan 109 [ 784.193200][T27463] pgsteal 105 [ 784.335099][T27463] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=24442,uid=0 [ 784.435547][T27463] Memory cgroup out of memory: Killed process 24442 (syz-executor.4) total-vm:72840kB, anon-rss:2228kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 22:01:14 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0xffffff7f00000000, 'c\x86\xdd'}]}, 0xfdef) 22:01:14 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x34b, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 784.531717][T27465] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 [ 784.551590][T27465] CPU: 0 PID: 27465 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 784.560725][T27465] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 784.570909][T27465] Call Trace: [ 784.574407][T27465] dump_stack+0x172/0x1f0 [ 784.578765][T27465] dump_header+0x177/0x1152 [ 784.583289][T27465] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 784.589095][T27465] ? ___ratelimit+0x2c8/0x595 [ 784.593780][T27465] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 784.599677][T27465] ? lockdep_hardirqs_on+0x418/0x5d0 [ 784.604975][T27465] ? trace_hardirqs_on+0x67/0x240 [ 784.610007][T27465] ? pagefault_out_of_memory+0x11c/0x11c [ 784.615757][T27465] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 784.621643][T27465] ? ___ratelimit+0x60/0x595 [ 784.626234][T27465] ? do_raw_spin_unlock+0x57/0x270 [ 784.631364][T27465] oom_kill_process.cold+0x10/0x15 [ 784.636620][T27465] out_of_memory+0x334/0x1340 [ 784.641298][T27465] ? lock_downgrade+0x920/0x920 [ 784.646141][T27465] ? oom_killer_disable+0x280/0x280 [ 784.651443][T27465] mem_cgroup_out_of_memory+0x1d8/0x240 [ 784.657003][T27465] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 784.662631][T27465] ? do_raw_spin_unlock+0x57/0x270 [ 784.667739][T27465] ? _raw_spin_unlock+0x2d/0x50 [ 784.672605][T27465] try_charge+0xa2d/0x1440 [ 784.677144][T27465] ? perf_trace_lock_acquire+0x20/0x530 [ 784.682704][T27465] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 784.688250][T27465] ? find_held_lock+0x35/0x130 [ 784.693001][T27465] ? get_mem_cgroup_from_mm+0x139/0x320 [ 784.698548][T27465] ? lock_downgrade+0x920/0x920 [ 784.703394][T27465] ? percpu_ref_tryget_live+0x111/0x290 [ 784.708979][T27465] __memcg_kmem_charge_memcg+0x71/0xf0 [ 784.714433][T27465] ? memcg_kmem_put_cache+0x50/0x50 [ 784.719632][T27465] ? get_mem_cgroup_from_mm+0x156/0x320 [ 784.725178][T27465] __memcg_kmem_charge+0x13a/0x3a0 [ 784.730309][T27465] __alloc_pages_nodemask+0x4f7/0x900 [ 784.735692][T27465] ? __alloc_pages_slowpath+0x2540/0x2540 [ 784.741421][T27465] ? copy_page_range+0xef4/0x1ed0 [ 784.746465][T27465] ? copy_page_range+0xef4/0x1ed0 [ 784.751497][T27465] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 784.757744][T27465] alloc_pages_current+0x107/0x210 [ 784.762932][T27465] pte_alloc_one+0x1b/0x1a0 [ 784.767439][T27465] __pte_alloc+0x20/0x310 [ 784.771773][T27465] copy_page_range+0x14da/0x1ed0 [ 784.776714][T27465] ? perf_trace_lock_acquire+0xf5/0x530 [ 784.782296][T27465] ? pmd_alloc+0x180/0x180 [ 784.786893][T27465] ? __rb_insert_augmented+0x20c/0xd90 [ 784.792349][T27465] ? validate_mm_rb+0xa3/0xc0 [ 784.797030][T27465] ? __vma_link_rb+0x5ad/0x770 [ 784.801803][T27465] dup_mm+0xa67/0x1430 [ 784.805895][T27465] ? vm_area_dup+0x170/0x170 [ 784.810471][T27465] ? debug_mutex_init+0x2d/0x60 [ 784.815512][T27465] copy_process+0x2671/0x6830 [ 784.820208][T27465] ? __cleanup_sighand+0x60/0x60 [ 784.825142][T27465] ? __might_fault+0x12b/0x1e0 [ 784.829913][T27465] ? __might_fault+0x12b/0x1e0 [ 784.834705][T27465] _do_fork+0x146/0xfa0 [ 784.838866][T27465] ? copy_init_mm+0x20/0x20 [ 784.843371][T27465] ? __kasan_check_read+0x11/0x20 [ 784.848378][T27465] ? _copy_to_user+0x118/0x160 [ 784.853133][T27465] __x64_sys_clone+0x1ab/0x270 [ 784.857899][T27465] ? __ia32_sys_vfork+0xd0/0xd0 [ 784.862800][T27465] ? do_syscall_64+0x26/0x760 [ 784.867570][T27465] ? lockdep_hardirqs_on+0x418/0x5d0 [ 784.872858][T27465] ? trace_hardirqs_on+0x67/0x240 [ 784.877897][T27465] do_syscall_64+0xfa/0x760 [ 784.882506][T27465] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 784.888394][T27465] RIP: 0033:0x4598e9 [ 784.892276][T27465] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 784.911887][T27465] RSP: 002b:00007f786c5c7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 784.920308][T27465] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00000000004598e9 [ 784.928283][T27465] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 784.936270][T27465] RBP: 000000000075bfc8 R08: ffffffffffffffff R09: 0000000000000000 [ 784.944253][T27465] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f786c5c86d4 [ 784.952222][T27465] R13: 00000000004bfd7f R14: 00000000004d1b78 R15: 00000000ffffffff [ 784.962148][T27465] memory: usage 304664kB, limit 307200kB, failcnt 1285 [ 784.969240][T27465] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 784.969338][T27465] Memory cgroup stats for /syz4: [ 784.969597][T27465] anon 269086720 [ 784.969597][T27465] file 53248 [ 784.969597][T27465] kernel_stack 4587520 [ 784.969597][T27465] slab 11554816 [ 784.969597][T27465] sock 2686976 [ 784.969597][T27465] shmem 81920 [ 784.969597][T27465] file_mapped 0 [ 784.969597][T27465] file_dirty 0 [ 784.969597][T27465] file_writeback 0 [ 784.969597][T27465] anon_thp 213909504 [ 784.969597][T27465] inactive_anon 135168 [ 784.969597][T27465] active_anon 269086720 [ 784.969597][T27465] inactive_file 135168 [ 784.969597][T27465] active_file 118784 [ 784.969597][T27465] unevictable 0 [ 784.969597][T27465] slab_reclaimable 2162688 [ 784.969597][T27465] slab_unreclaimable 9392128 [ 784.969597][T27465] pgfault 50127 [ 784.969597][T27465] pgmajfault 0 [ 784.969597][T27465] workingset_refault 0 [ 784.969597][T27465] workingset_activate 0 [ 784.969597][T27465] workingset_nodereclaim 0 [ 784.969597][T27465] pgrefill 115 [ 784.969597][T27465] pgscan 109 [ 784.969597][T27465] pgsteal 105 [ 785.086720][T27465] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=24402,uid=0 [ 785.144398][T27465] Memory cgroup out of memory: Killed process 24402 (syz-executor.4) total-vm:72840kB, anon-rss:2228kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 785.173213][ T1064] oom_reaper: reaped process 24402 (syz-executor.4), now anon-rss:0kB, file-rss:34688kB, shmem-rss:0kB 22:01:14 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x2, 0x3c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r5, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r5, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r5, 0x8953, &(0x7f0000000040)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xf}}, {0x306}, 0x2, {0x2, 0x4e23, @remote}, 'dummy0\x00'}) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) 22:01:14 executing program 2: mount(0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x80000000b9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r0, 0x8) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r1, 0x6) getpid() ioctl$TIOCGRS485(0xffffffffffffffff, 0x542e, 0x0) tkill(0x0, 0x9) pipe(&(0x7f00000004c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r2, &(0x7f0000006580), 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000200000000002e00"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) socket(0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 22:01:14 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x34c, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 785.401635][T27504] device nr0 entered promiscuous mode 22:01:15 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x34d, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:01:15 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x300002, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r3, 0x4048ae9b, &(0x7f00000002c0)={0xe0003}) ioctl$KVM_SET_MSRS(r3, 0x8090ae81, &(0x7f0000000000)) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r7, 0x4048ae9b, &(0x7f00000002c0)={0xe0003}) ioctl$KVM_SET_MSRS(r7, 0x8090ae81, &(0x7f0000000380)=ANY=[@ANYBLOB="0000000000010000cd9c1430fade917ca1611720d7dccd9fa2df72892609302383ec4b2db3d1f30d99272eaac1116bfe5db3b3460715fab1907692f1bb1624bc6c7fa2d5f580fb642b4b07ce2fbe7ac824d4b17345b4417b58a70f35ee11f3ce7548"]) r8 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r9 = ioctl$KVM_CREATE_VM(r8, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r9, 0xae41, 0x0) write$binfmt_elf64(r3, &(0x7f0000000040)=ANY=[@ANYPTR=&(0x7f0000000240)=ANY=[@ANYPTR=&(0x7f0000000180)=ANY=[@ANYRESOCT=r9], @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT=r4], @ANYRESOCT=r7, @ANYPTR64=&(0x7f0000000200)=ANY=[@ANYRESDEC=r0, @ANYPTR64]]], 0x1) vmsplice(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='e', 0x1}], 0x1, 0x0) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r0, 0xc0305616, &(0x7f0000000040)={0x0, {0x8000, 0x36b2}}) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:01:15 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r4) timerfd_gettime(r5, 0x0) 22:01:15 executing program 3: r0 = socket$isdn(0x22, 0x2, 0x21) setsockopt$inet_group_source_req(r0, 0x0, 0x0, 0x0, 0x0) 22:01:15 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x34e, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 785.834258][T27525] syz-executor.4 invoked oom-killer: gfp_mask=0x402dc2(GFP_KERNEL_ACCOUNT|__GFP_HIGHMEM|__GFP_NOWARN|__GFP_ZERO), order=0, oom_score_adj=1000 [ 785.871325][T27531] delete_channel: no stack [ 785.880096][T27531] delete_channel: no stack [ 785.888036][T27525] CPU: 1 PID: 27525 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 785.897169][T27525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 785.907232][T27525] Call Trace: [ 785.910534][T27525] dump_stack+0x172/0x1f0 [ 785.914880][T27525] dump_header+0x177/0x1152 [ 785.919399][T27525] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 785.925202][T27525] ? ___ratelimit+0x2c8/0x595 [ 785.929890][T27525] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 785.935734][T27525] ? lockdep_hardirqs_on+0x418/0x5d0 [ 785.941023][T27525] ? trace_hardirqs_on+0x67/0x240 [ 785.946086][T27525] ? pagefault_out_of_memory+0x11c/0x11c [ 785.951737][T27525] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 785.957588][T27525] ? ___ratelimit+0x60/0x595 [ 785.962180][T27525] ? do_raw_spin_unlock+0x57/0x270 [ 785.967299][T27525] oom_kill_process.cold+0x10/0x15 [ 785.972421][T27525] out_of_memory+0x334/0x1340 [ 785.977128][T27525] ? lock_downgrade+0x920/0x920 [ 785.981991][T27525] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 785.987800][T27525] ? oom_killer_disable+0x280/0x280 [ 785.993019][T27525] mem_cgroup_out_of_memory+0x1d8/0x240 [ 785.998574][T27525] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 786.004219][T27525] ? do_raw_spin_unlock+0x57/0x270 [ 786.009338][T27525] ? _raw_spin_unlock+0x2d/0x50 [ 786.014199][T27525] try_charge+0xf4b/0x1440 [ 786.018637][T27525] ? perf_trace_lock_acquire+0x20/0x530 [ 786.024196][T27525] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 786.032875][T27525] ? find_held_lock+0x35/0x130 22:01:15 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001240)={@dev, @rand_addr="b56ca0a93596d76f91f88f47a46611f5", @mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80084}) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-serpent-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f00000012c0)=[{{0x0, 0xffffffffffffff7e, &(0x7f0000001200)=[{&(0x7f0000000200)=""/4096, 0xfe87}, {&(0x7f0000000180)=""/116, 0x74}], 0x2}}], 0x5f, 0x0, 0x0) [ 786.037655][T27525] ? get_mem_cgroup_from_mm+0x139/0x320 [ 786.043233][T27525] ? lock_downgrade+0x920/0x920 [ 786.048182][T27525] ? percpu_ref_tryget_live+0x111/0x290 [ 786.053747][T27525] __memcg_kmem_charge_memcg+0x71/0xf0 [ 786.059227][T27525] ? memcg_kmem_put_cache+0x50/0x50 [ 786.064448][T27525] ? get_mem_cgroup_from_mm+0x156/0x320 [ 786.070011][T27525] __memcg_kmem_charge+0x13a/0x3a0 [ 786.075130][T27525] __alloc_pages_nodemask+0x4f7/0x900 [ 786.080522][T27525] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 786.086084][T27525] ? __alloc_pages_slowpath+0x2540/0x2540 [ 786.091835][T27525] ? kasan_unpoison_shadow+0x35/0x50 [ 786.097146][T27525] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 786.103431][T27525] alloc_pages_current+0x107/0x210 [ 786.108561][T27525] ? ___might_sleep+0x163/0x280 [ 786.113443][T27525] __vmalloc_node_range+0x4a9/0x7e0 [ 786.118672][T27525] ? kvm_dev_ioctl+0xc8d/0x1650 [ 786.123546][T27525] __vmalloc_node_flags_caller+0x71/0x90 [ 786.129200][T27525] ? kvm_dev_ioctl+0xc8d/0x1650 [ 786.134764][T27525] kvmalloc_node+0xdc/0x100 [ 786.139291][T27525] kvm_dev_ioctl+0xc8d/0x1650 [ 786.143988][T27525] ? kvm_debugfs_release+0x90/0x90 [ 786.149125][T27525] ? kvm_debugfs_release+0x90/0x90 [ 786.154250][T27525] do_vfs_ioctl+0xdb6/0x13e0 [ 786.158855][T27525] ? ioctl_preallocate+0x210/0x210 [ 786.164586][T27525] ? __fget+0x384/0x560 [ 786.168758][T27525] ? ksys_dup3+0x3e0/0x3e0 [ 786.173186][T27525] ? nsecs_to_jiffies+0x30/0x30 [ 786.178055][T27525] ? tomoyo_file_ioctl+0x23/0x30 [ 786.183013][T27525] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 786.189365][T27525] ? security_file_ioctl+0x8d/0xc0 [ 786.194502][T27525] ksys_ioctl+0xab/0xd0 [ 786.198680][T27525] __x64_sys_ioctl+0x73/0xb0 [ 786.203286][T27525] do_syscall_64+0xfa/0x760 [ 786.207811][T27525] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 786.213730][T27525] RIP: 0033:0x4598e9 [ 786.217639][T27525] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 22:01:15 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1b) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) socketpair$unix(0x1, 0x10000000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 786.237260][T27525] RSP: 002b:00007f786c5e8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 786.245701][T27525] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004598e9 [ 786.253702][T27525] RDX: 0000000000000000 RSI: 000000000000ae01 RDI: 000000000000000b [ 786.261717][T27525] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 786.269711][T27525] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f786c5e96d4 [ 786.277696][T27525] R13: 00000000004c2841 R14: 00000000004d5ec8 R15: 00000000ffffffff [ 786.290212][T27525] memory: usage 307200kB, limit 307200kB, failcnt 1330 [ 786.297563][T27525] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 786.305871][T27525] Memory cgroup stats for /syz4: [ 786.306196][T27525] anon 270942208 [ 786.306196][T27525] file 53248 [ 786.306196][T27525] kernel_stack 4456448 [ 786.306196][T27525] slab 12328960 [ 786.306196][T27525] sock 2686976 [ 786.306196][T27525] shmem 81920 [ 786.306196][T27525] file_mapped 0 [ 786.306196][T27525] file_dirty 0 [ 786.306196][T27525] file_writeback 0 [ 786.306196][T27525] anon_thp 213909504 [ 786.306196][T27525] inactive_anon 135168 [ 786.306196][T27525] active_anon 270950400 [ 786.306196][T27525] inactive_file 135168 [ 786.306196][T27525] active_file 118784 [ 786.306196][T27525] unevictable 0 [ 786.306196][T27525] slab_reclaimable 2297856 [ 786.306196][T27525] slab_unreclaimable 10031104 [ 786.306196][T27525] pgfault 50259 [ 786.306196][T27525] pgmajfault 0 [ 786.306196][T27525] workingset_refault 0 [ 786.306196][T27525] workingset_activate 0 [ 786.306196][T27525] workingset_nodereclaim 0 [ 786.306196][T27525] pgrefill 115 [ 786.306196][T27525] pgscan 109 [ 786.306196][T27525] pgsteal 105 [ 786.454843][T27525] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=27523,uid=0 [ 786.501001][T27525] Memory cgroup out of memory: Killed process 27523 (syz-executor.4) total-vm:72708kB, anon-rss:2208kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:143360kB oom_score_adj:1000 [ 786.534882][ T1064] [ 786.537246][ T1064] ============================================ [ 786.543486][ T1064] WARNING: possible recursive locking detected [ 786.546533][ T3892] kobject: 'loop2' (00000000334d1604): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 786.549629][ T1064] 5.3.0-rc6-next-20190830 #75 Not tainted [ 786.549633][ T1064] -------------------------------------------- [ 786.549640][ T1064] oom_reaper/1064 is trying to acquire lock: [ 786.549650][ T1064] ffffffff8904ff60 (mmu_notifier_invalidate_range_start){+.+.}, at: __mmu_notifier_invalidate_range_end+0x0/0x360 [ 786.590724][ T1064] [ 786.590724][ T1064] but task is already holding lock: [ 786.598087][ T1064] ffffffff8904ff60 (mmu_notifier_invalidate_range_start){+.+.}, at: __oom_reap_task_mm+0x196/0x490 [ 786.608773][ T1064] [ 786.608773][ T1064] other info that might help us debug this: [ 786.616629][ T3892] kobject: 'loop3' (000000006c6a7956): kobject_uevent_env [ 786.616832][ T1064] Possible unsafe locking scenario: [ 786.616832][ T1064] [ 786.623950][ T3892] kobject: 'loop3' (000000006c6a7956): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 786.631395][ T1064] CPU0 [ 786.631397][ T1064] ---- [ 786.631399][ T1064] lock(mmu_notifier_invalidate_range_start); [ 786.631406][ T1064] lock(mmu_notifier_invalidate_range_start); [ 786.631412][ T1064] [ 786.631412][ T1064] *** DEADLOCK *** [ 786.631412][ T1064] [ 786.631415][ T1064] May be due to missing lock nesting notation [ 786.631415][ T1064] [ 786.631422][ T1064] 2 locks held by oom_reaper/1064: [ 786.631431][ T1064] #0: ffff8880a87644d0 (&mm->mmap_sem#2){++++}, at: oom_reaper+0x3a7/0x1320 [ 786.691387][ T1064] #1: ffffffff8904ff60 (mmu_notifier_invalidate_range_start){+.+.}, at: __oom_reap_task_mm+0x196/0x490 [ 786.702770][ T1064] [ 786.702770][ T1064] stack backtrace: [ 786.708650][ T1064] CPU: 1 PID: 1064 Comm: oom_reaper Not tainted 5.3.0-rc6-next-20190830 #75 [ 786.717304][ T1064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 786.727338][ T1064] Call Trace: [ 786.730619][ T1064] dump_stack+0x172/0x1f0 [ 786.734930][ T1064] __lock_acquire.cold+0x15d/0x385 [ 786.740024][ T1064] ? debug_smp_processor_id+0x3c/0x214 [ 786.745483][ T1064] ? mark_held_locks+0xf0/0xf0 [ 786.750238][ T1064] ? unmap_page_range+0x1df4/0x2380 [ 786.755422][ T1064] lock_acquire+0x190/0x410 [ 786.759956][ T1064] ? __mmu_notifier_invalidate_range_start+0x210/0x210 [ 786.766798][ T1064] __mmu_notifier_invalidate_range_end+0x3c/0x360 [ 786.773196][ T1064] ? __mmu_notifier_invalidate_range_start+0x210/0x210 [ 786.780029][ T1064] ? __mmu_notifier_invalidate_range_start+0x1a5/0x210 [ 786.786871][ T1064] __oom_reap_task_mm+0x3fa/0x490 [ 786.791887][ T1064] ? process_shares_mm+0x130/0x130 [ 786.796983][ T1064] ? oom_reaper+0x3a7/0x1320 [ 786.801681][ T1064] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 786.807918][ T1064] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 786.813894][ T1064] ? __kasan_check_read+0x11/0x20 [ 786.818905][ T1064] ? do_raw_spin_unlock+0x57/0x270 [ 786.824028][ T1064] oom_reaper+0x2b2/0x1320 [ 786.828463][ T1064] ? __oom_reap_task_mm+0x490/0x490 [ 786.833742][ T1064] ? trace_hardirqs_on+0x67/0x240 [ 786.838757][ T1064] ? finish_wait+0x260/0x260 [ 786.843775][ T1064] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 786.850032][ T1064] ? __kthread_parkme+0x108/0x1c0 [ 786.855293][ T1064] ? __kasan_check_read+0x11/0x20 [ 786.860313][ T1064] kthread+0x361/0x430 [ 786.864363][ T1064] ? __oom_reap_task_mm+0x490/0x490 [ 786.869543][ T1064] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 786.875999][ T1064] ret_from_fork+0x24/0x30 [ 786.883327][ T1064] oom_reaper: reaped process 27523 (syz-executor.4), now anon-rss:0kB, file-rss:34852kB, shmem-rss:0kB [ 786.899864][T27500] kobject: 'nr0' (00000000d0075b91): kobject_cleanup, parent 0000000028a54d85 [ 786.905614][T27525] kobject: 'kvm' (00000000c525ee41): kobject_uevent_env [ 786.909846][T27500] kobject: 'nr0' (00000000d0075b91): calling ktype release [ 786.915989][T27525] kobject: 'kvm' (00000000c525ee41): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 786.926815][T27500] kobject: 'nr0': free name 22:01:16 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0xffffffff00000000, 'c\x86\xdd'}]}, 0xfdef) 22:01:16 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet6(0xa, 0x3, 0x3c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r4, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r4, &(0x7f0000000080), 0x1, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000040)={0x1, 0xffffffff8f6c4099}, 0x2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) 22:01:16 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:01:16 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x34f, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:01:16 executing program 3: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r0, &(0x7f00000000c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "2820deef5e070d410a52e24a392fa0bb5cf173af8c9543f98a98854ce04cddefbe9923a3d7e3f5fb6637c4e411c0890abc38e0a4367f50e91b4fe27b6face3", 0x11}, 0x60) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe05699ca246cde7188b"}, 0x60) 22:01:16 executing program 4: r0 = semget$private(0x0, 0x1, 0x40) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f00000000c0)=""/207) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0xe281, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x8000000106) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) [ 786.947349][T27525] kobject: 'kvm' (00000000c525ee41): kobject_uevent_env [ 786.955227][T27525] kobject: 'kvm' (00000000c525ee41): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 786.987725][ T3892] kobject: 'loop1' (000000004b94d5be): kobject_uevent_env [ 787.004211][T27560] kobject: 'kvm' (00000000c525ee41): kobject_uevent_env [ 787.005697][ T3892] kobject: 'loop1' (000000004b94d5be): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 787.028131][T27560] kobject: 'kvm' (00000000c525ee41): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 787.043983][T27568] kobject: 'nr0' (00000000688e0c6b): kobject_add_internal: parent: 'net', set: 'devices' 22:01:16 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x1fd) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_script(r0, &(0x7f00000003c0)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRES16, @ANYRESOCT, @ANYPTR=&(0x7f0000000140)=ANY=[@ANYRESOCT, @ANYPTR, @ANYRESDEC, @ANYPTR64, @ANYRESDEC], @ANYPTR, @ANYRESOCT, @ANYPTR64=&(0x7f0000000200)=ANY=[@ANYRESDEC, @ANYBLOB="bc82623d2a4f0cd214098f66581300"/37, @ANYPTR, @ANYPTR, @ANYPTR64, @ANYPTR, @ANYRES64, @ANYRESHEX]]], 0x2c7) sendto$inet(r0, &(0x7f0000000100)='Q', 0x564, 0x1003, 0x0, 0x0) [ 787.048822][ T3892] kobject: 'loop4' (0000000052c71ba2): kobject_uevent_env [ 787.075717][T27568] kobject: 'nr0' (00000000688e0c6b): kobject_uevent_env [ 787.087219][ T3892] kobject: 'loop4' (0000000052c71ba2): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 787.100298][T27569] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 [ 787.111994][T27559] kobject: 'kvm' (00000000c525ee41): kobject_uevent_env [ 787.123336][T27569] CPU: 0 PID: 27569 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 787.132497][T27569] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 787.142598][T27569] Call Trace: [ 787.145911][T27569] dump_stack+0x172/0x1f0 [ 787.150014][T27568] kobject: 'nr0' (00000000688e0c6b): fill_kobj_path: path = '/devices/virtual/net/nr0' [ 787.150255][T27569] dump_header+0x177/0x1152 [ 787.164521][T27569] ? ___ratelimit+0xf8/0x595 [ 787.169123][T27569] ? trace_hardirqs_on+0x67/0x240 [ 787.174157][T27569] ? pagefault_out_of_memory+0x11c/0x11c [ 787.174697][T27559] kobject: 'kvm' (00000000c525ee41): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 787.179795][T27569] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 787.179807][T27569] ? ___ratelimit+0x60/0x595 [ 787.179818][T27569] ? do_raw_spin_unlock+0x57/0x270 [ 787.179833][T27569] oom_kill_process.cold+0x10/0x15 [ 787.179847][T27569] out_of_memory+0x334/0x1340 [ 787.179866][T27569] ? lock_downgrade+0x920/0x920 [ 787.202872][T27568] kobject: 'queues' (00000000c434f008): kobject_add_internal: parent: 'nr0', set: '' [ 787.205041][T27569] ? oom_killer_disable+0x280/0x280 [ 787.205055][T27569] ? __kasan_check_read+0x11/0x20 [ 787.205076][T27569] mem_cgroup_out_of_memory+0x1d8/0x240 [ 787.246211][T27569] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 787.251851][T27569] ? do_raw_spin_unlock+0x57/0x270 [ 787.256948][T27569] ? _raw_spin_unlock+0x2d/0x50 [ 787.261797][T27569] try_charge+0xf4b/0x1440 [ 787.266202][T27569] ? perf_trace_lock_acquire+0x20/0x530 [ 787.271731][T27569] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 787.277261][T27569] ? get_mem_cgroup_from_mm+0x139/0x320 [ 787.282797][T27569] ? __kasan_check_read+0x11/0x20 [ 787.287807][T27569] ? lock_downgrade+0x920/0x920 [ 787.292640][T27569] ? percpu_ref_tryget_live+0x111/0x290 [ 787.298176][T27569] __memcg_kmem_charge_memcg+0x71/0xf0 [ 787.303623][T27569] ? memcg_kmem_put_cache+0x50/0x50 [ 787.308804][T27569] ? get_mem_cgroup_from_mm+0x156/0x320 [ 787.314335][T27569] __memcg_kmem_charge+0x13a/0x3a0 [ 787.319431][T27569] __alloc_pages_nodemask+0x4f7/0x900 [ 787.324785][T27569] ? __alloc_pages_slowpath+0x2540/0x2540 [ 787.330489][T27569] ? copy_page_range+0xef4/0x1ed0 [ 787.335491][T27569] ? __kasan_check_read+0x11/0x20 [ 787.340500][T27569] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 787.346723][T27569] alloc_pages_current+0x107/0x210 [ 787.351820][T27569] pte_alloc_one+0x1b/0x1a0 [ 787.356307][T27569] __pte_alloc+0x20/0x310 [ 787.360620][T27569] copy_page_range+0x14da/0x1ed0 [ 787.365552][T27569] ? perf_trace_lock_acquire+0xf5/0x530 [ 787.371089][T27569] ? pmd_alloc+0x180/0x180 [ 787.375515][T27569] ? __rb_insert_augmented+0x20c/0xd90 [ 787.380968][T27569] ? validate_mm_rb+0xa3/0xc0 [ 787.386330][T27569] ? __vma_link_rb+0x5ad/0x770 [ 787.391089][T27569] dup_mm+0xa67/0x1430 [ 787.395153][T27569] ? vm_area_dup+0x170/0x170 [ 787.399730][T27569] ? debug_mutex_init+0x2d/0x60 [ 787.404568][T27569] copy_process+0x2671/0x6830 [ 787.409240][T27569] ? __cleanup_sighand+0x60/0x60 [ 787.414163][T27569] ? __might_fault+0x12b/0x1e0 [ 787.420040][T27569] ? __kasan_check_read+0x11/0x20 [ 787.425052][T27569] _do_fork+0x146/0xfa0 [ 787.429198][T27569] ? copy_init_mm+0x20/0x20 [ 787.433688][T27569] ? __kasan_check_read+0x11/0x20 [ 787.438865][T27569] ? _copy_to_user+0x118/0x160 [ 787.443615][T27569] __x64_sys_clone+0x1ab/0x270 [ 787.448363][T27569] ? __ia32_sys_vfork+0xd0/0xd0 [ 787.453214][T27569] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 787.459270][T27569] ? trace_hardirqs_off_caller+0x65/0x230 [ 787.464987][T27569] ? trace_hardirqs_on+0x67/0x240 [ 787.470007][T27569] do_syscall_64+0xfa/0x760 [ 787.474507][T27569] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 787.480395][T27569] RIP: 0033:0x4598e9 [ 787.484274][T27569] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 22:01:17 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x350, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 787.505274][T27569] RSP: 002b:00007f786c5e8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 787.514694][T27569] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00000000004598e9 [ 787.522658][T27569] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 787.530617][T27569] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 787.538585][T27569] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f786c5e96d4 [ 787.546553][T27569] R13: 00000000004bfd7f R14: 00000000004d1b78 R15: 00000000ffffffff [ 787.562278][ T3892] kobject: 'loop3' (000000006c6a7956): kobject_uevent_env [ 787.567524][T27568] kobject: 'queues' (00000000c434f008): kobject_uevent_env [ 787.579651][T27560] kobject: 'kvm' (00000000c525ee41): kobject_uevent_env [ 787.580067][ T3892] kobject: 'loop3' (000000006c6a7956): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 787.588477][T27560] kobject: 'kvm' (00000000c525ee41): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 787.609241][T27569] memory: usage 307200kB, limit 307200kB, failcnt 1369 [ 787.616408][T27568] kobject: 'queues' (00000000c434f008): kobject_uevent_env: filter function caused the event to drop! [ 787.634738][T27569] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 787.653293][T27569] Memory cgroup stats for /syz4: [ 787.653408][T27569] anon 271073280 [ 787.653408][T27569] file 53248 [ 787.653408][T27569] kernel_stack 4521984 [ 787.653408][T27569] slab 12328960 [ 787.653408][T27569] sock 2686976 [ 787.653408][T27569] shmem 81920 [ 787.653408][T27569] file_mapped 0 [ 787.653408][T27569] file_dirty 0 [ 787.653408][T27569] file_writeback 0 [ 787.653408][T27569] anon_thp 216006656 [ 787.653408][T27569] inactive_anon 135168 [ 787.653408][T27569] active_anon 271126528 [ 787.653408][T27569] inactive_file 135168 [ 787.653408][T27569] active_file 118784 [ 787.653408][T27569] unevictable 0 [ 787.653408][T27569] slab_reclaimable 2297856 [ 787.653408][T27569] slab_unreclaimable 10031104 [ 787.653408][T27569] pgfault 50325 [ 787.653408][T27569] pgmajfault 0 [ 787.653408][T27569] workingset_refault 0 [ 787.653408][T27569] workingset_activate 0 [ 787.653408][T27569] workingset_nodereclaim 0 [ 787.653408][T27569] pgrefill 115 [ 787.653408][T27569] pgscan 109 [ 787.653408][T27569] pgsteal 105 [ 787.681214][T27568] kobject: 'rx-0' (00000000cf058569): kobject_add_internal: parent: 'queues', set: 'queues' 22:01:17 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x351, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 787.755620][T27569] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=24262,uid=0 [ 787.784248][T27568] kobject: 'rx-0' (00000000cf058569): kobject_uevent_env [ 787.792901][T27560] kobject: 'kvm' (00000000c525ee41): kobject_uevent_env [ 787.794939][T27568] kobject: 'rx-0' (00000000cf058569): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' [ 787.803914][T27569] Memory cgroup out of memory: Killed process 24262 (syz-executor.4) total-vm:72840kB, anon-rss:2228kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 787.817428][T27568] kobject: 'tx-0' (0000000025636e04): kobject_add_internal: parent: 'queues', set: 'queues' [ 787.833015][T27560] kobject: 'kvm' (00000000c525ee41): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 787.849025][T27568] kobject: 'tx-0' (0000000025636e04): kobject_uevent_env 22:01:17 executing program 2: mount(0x0, 0x0, 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x80000000b9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) tkill(0x0, 0x9) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000006580), 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000200000000002e00"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 787.872526][T27568] kobject: 'tx-0' (0000000025636e04): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' [ 787.884801][ T3892] kobject: 'loop2' (00000000334d1604): kobject_uevent_env [ 787.895831][ T3892] kobject: 'loop2' (00000000334d1604): fill_kobj_path: path = '/devices/virtual/block/loop2' 22:01:17 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000140)={0x4, 0x9}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r6, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r6, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) bind$inet6(r6, &(0x7f00000001c0)={0xa, 0x4e23, 0x4, @local, 0x7}, 0x1c) ioctl$SG_NEXT_CMD_LEN(r6, 0x2283, &(0x7f0000000040)=0x1f) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") ioctl$RTC_PLL_SET(r5, 0x40207012, &(0x7f0000000200)={0x1, 0x7b5, 0x7, 0x7ff, 0x4, 0x9, 0x9}) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) ioctl$RNDCLEARPOOL(r6, 0x5206, &(0x7f0000000240)=0x4) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) 22:01:17 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) stat(&(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x6, &(0x7f0000000380)=[r0, r0, r1, r1, 0x0, r0]) r2 = getegid() setresgid(r1, r2, 0xee01) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) [ 787.930797][T27574] kobject: 'rx-0' (00000000cf058569): kobject_cleanup, parent 00000000c434f008 [ 787.965277][ T3892] kobject: 'loop5' (00000000c09931bb): kobject_uevent_env [ 787.979344][T27574] kobject: 'rx-0' (00000000cf058569): auto cleanup 'remove' event [ 787.980728][ T3892] kobject: 'loop5' (00000000c09931bb): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 787.994195][T27574] kobject: 'rx-0' (00000000cf058569): kobject_uevent_env [ 788.009264][T27574] kobject: 'rx-0' (00000000cf058569): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' [ 788.044773][ T3892] kobject: 'loop4' (0000000052c71ba2): kobject_uevent_env [ 788.051705][T27600] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 788.054008][T27574] kobject: 'rx-0' (00000000cf058569): auto cleanup kobject_del [ 788.075567][T27600] CPU: 0 PID: 27600 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 788.082994][ T3892] kobject: 'loop4' (0000000052c71ba2): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 788.084698][T27600] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 788.084704][T27600] Call Trace: [ 788.084724][T27600] dump_stack+0x172/0x1f0 [ 788.084745][T27600] dump_header+0x177/0x1152 [ 788.099454][T27574] kobject: 'rx-0' (00000000cf058569): calling ktype release [ 788.105018][T27600] ? ___ratelimit+0xf8/0x595 [ 788.105038][T27600] ? trace_hardirqs_on+0x67/0x240 [ 788.109443][T27574] kobject: 'rx-0': free name [ 788.112622][T27600] ? pagefault_out_of_memory+0x11c/0x11c [ 788.112638][T27600] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 788.112653][T27600] ? ___ratelimit+0x60/0x595 [ 788.119283][T27574] kobject: 'tx-0' (0000000025636e04): kobject_cleanup, parent 00000000c434f008 [ 788.124441][T27600] ? do_raw_spin_unlock+0x57/0x270 [ 788.124458][T27600] oom_kill_process.cold+0x10/0x15 [ 788.124474][T27600] out_of_memory+0x334/0x1340 [ 788.130156][T27574] kobject: 'tx-0' (0000000025636e04): auto cleanup 'remove' event [ 788.134052][T27600] ? lock_downgrade+0x920/0x920 [ 788.134075][T27600] ? oom_killer_disable+0x280/0x280 [ 788.140816][T27574] kobject: 'tx-0' (0000000025636e04): kobject_uevent_env [ 788.144325][T27600] mem_cgroup_out_of_memory+0x1d8/0x240 [ 788.144342][T27600] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 788.152636][T27574] kobject: 'tx-0' (0000000025636e04): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' [ 788.156020][T27600] ? do_raw_spin_unlock+0x57/0x270 [ 788.156043][T27600] ? _raw_spin_unlock+0x2d/0x50 [ 788.168587][T27574] kobject: 'tx-0' (0000000025636e04): auto cleanup kobject_del [ 788.170048][T27600] try_charge+0xf4b/0x1440 [ 788.170069][T27600] ? perf_trace_lock_acquire+0x20/0x530 [ 788.175247][T27574] kobject: 'tx-0' (0000000025636e04): calling ktype release [ 788.179809][T27600] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 788.179824][T27600] ? get_mem_cgroup_from_mm+0x139/0x320 [ 788.179838][T27600] ? __kasan_check_read+0x11/0x20 [ 788.179855][T27600] ? lock_downgrade+0x920/0x920 [ 788.179867][T27600] ? percpu_ref_tryget_live+0x111/0x290 [ 788.179890][T27600] __memcg_kmem_charge_memcg+0x71/0xf0 [ 788.190879][T27574] kobject: 'tx-0': free name [ 788.192499][T27600] ? memcg_kmem_put_cache+0x50/0x50 [ 788.192520][T27600] ? get_mem_cgroup_from_mm+0x156/0x320 [ 788.197794][T27574] kobject: 'queues' (00000000c434f008): kobject_cleanup, parent 0000000028a54d85 [ 788.204707][T27600] __memcg_kmem_charge+0x13a/0x3a0 [ 788.204723][T27600] __alloc_pages_nodemask+0x4f7/0x900 [ 788.204740][T27600] ? __alloc_pages_slowpath+0x2540/0x2540 [ 788.213477][T27574] kobject: 'queues' (00000000c434f008): calling ktype release [ 788.217175][T27600] ? percpu_ref_put_many+0xb6/0x190 [ 788.217194][T27600] ? trace_hardirqs_on+0x67/0x240 [ 788.217205][T27600] ? __kasan_check_read+0x11/0x20 [ 788.217224][T27600] copy_process+0x3f8/0x6830 [ 788.231135][T27574] kobject: 'queues' (00000000c434f008): kset_release [ 788.233138][T27600] ? do_syscall_64+0xfa/0x760 [ 788.233152][T27600] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 788.233173][T27600] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 788.238068][T27574] kobject: 'queues': free name [ 788.245517][T27600] ? debug_smp_processor_id+0x3c/0x214 [ 788.245532][T27600] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 788.245551][T27600] ? __cleanup_sighand+0x60/0x60 [ 788.253417][T27574] kobject: 'nr0' (00000000688e0c6b): kobject_uevent_env [ 788.255466][T27600] ? __might_fault+0x12b/0x1e0 [ 788.255483][T27600] ? __kasan_check_read+0x11/0x20 [ 788.255502][T27600] _do_fork+0x146/0xfa0 [ 788.262880][T27574] kobject: 'nr0' (00000000688e0c6b): fill_kobj_path: path = '/devices/virtual/net/nr0' [ 788.268285][T27600] ? copy_init_mm+0x20/0x20 [ 788.268303][T27600] ? __kasan_check_read+0x11/0x20 [ 788.268315][T27600] ? _copy_to_user+0x118/0x160 [ 788.268334][T27600] __x64_sys_clone+0x1ab/0x270 [ 788.268360][T27600] ? __ia32_sys_vfork+0xd0/0xd0 [ 788.268380][T27600] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 788.268397][T27600] ? trace_hardirqs_off_caller+0x65/0x230 [ 788.475410][T27600] ? trace_hardirqs_on+0x67/0x240 [ 788.480447][T27600] do_syscall_64+0xfa/0x760 [ 788.484948][T27600] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 788.490827][T27600] RIP: 0033:0x4598e9 [ 788.494707][T27600] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 788.514407][T27600] RSP: 002b:00007f786c5e8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 788.522833][T27600] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00000000004598e9 [ 788.530801][T27600] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 788.538757][T27600] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 788.547332][T27600] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f786c5e96d4 [ 788.555306][T27600] R13: 00000000004bfd7f R14: 00000000004d1b78 R15: 00000000ffffffff [ 788.578795][T27568] kobject: 'nr0' (00000000c00b6691): kobject_add_internal: parent: 'net', set: 'devices' [ 788.580230][T27600] memory: usage 307188kB, limit 307200kB, failcnt 1388 [ 788.601258][T27600] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 788.603998][ T3892] kobject: 'loop2' (00000000334d1604): kobject_uevent_env [ 788.613894][T27600] Memory cgroup stats for /syz4: [ 788.613999][T27600] anon 271060992 [ 788.613999][T27600] file 53248 [ 788.613999][T27600] kernel_stack 4521984 [ 788.613999][T27600] slab 12328960 [ 788.613999][T27600] sock 2686976 [ 788.613999][T27600] shmem 81920 [ 788.613999][T27600] file_mapped 0 [ 788.613999][T27600] file_dirty 0 [ 788.613999][T27600] file_writeback 0 [ 788.613999][T27600] anon_thp 213909504 [ 788.613999][T27600] inactive_anon 135168 [ 788.613999][T27600] active_anon 271114240 [ 788.613999][T27600] inactive_file 135168 [ 788.613999][T27600] active_file 118784 [ 788.613999][T27600] unevictable 0 [ 788.613999][T27600] slab_reclaimable 2297856 [ 788.613999][T27600] slab_unreclaimable 10031104 [ 788.613999][T27600] pgfault 50424 [ 788.613999][T27600] pgmajfault 0 [ 788.613999][T27600] workingset_refault 0 [ 788.613999][T27600] workingset_activate 0 [ 788.613999][T27600] workingset_nodereclaim 0 [ 788.613999][T27600] pgrefill 148 [ 788.613999][T27600] pgscan 142 [ 788.613999][T27600] pgsteal 105 [ 788.619202][ T3892] kobject: 'loop2' (00000000334d1604): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 788.620836][T27600] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=24218,uid=0 [ 788.738188][T27568] kobject: 'nr0' (00000000c00b6691): kobject_uevent_env [ 788.745053][ T3892] kobject: 'loop3' (000000006c6a7956): kobject_uevent_env [ 788.745285][T27568] kobject: 'nr0' (00000000c00b6691): fill_kobj_path: path = '/devices/virtual/net/nr0' [ 788.752944][ T3892] kobject: 'loop3' (000000006c6a7956): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 788.765535][T27600] Memory cgroup out of memory: Killed process 24218 (syz-executor.4) total-vm:72840kB, anon-rss:2228kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 788.791237][T27568] kobject: 'queues' (000000004075a99b): kobject_add_internal: parent: 'nr0', set: '' [ 788.801520][T27568] kobject: 'queues' (000000004075a99b): kobject_uevent_env [ 788.809814][ T1064] oom_reaper: reaped process 24218 (syz-executor.4), now anon-rss:0kB, file-rss:34688kB, shmem-rss:0kB [ 788.816246][T27568] kobject: 'queues' (000000004075a99b): kobject_uevent_env: filter function caused the event to drop! [ 788.833636][T27568] kobject: 'rx-0' (00000000f0ca3a78): kobject_add_internal: parent: 'queues', set: 'queues' [ 788.843851][T27568] kobject: 'rx-0' (00000000f0ca3a78): kobject_uevent_env [ 788.850955][T27568] kobject: 'rx-0' (00000000f0ca3a78): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' [ 788.861929][T27568] kobject: 'tx-0' (0000000042255aff): kobject_add_internal: parent: 'queues', set: 'queues' [ 788.872179][T27568] kobject: 'tx-0' (0000000042255aff): kobject_uevent_env [ 788.879284][T27568] kobject: 'tx-0' (0000000042255aff): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' [ 788.891813][ T3892] kobject: 'loop4' (0000000052c71ba2): kobject_uevent_env [ 788.899913][T27574] kobject: 'nr0' (00000000688e0c6b): kobject_cleanup, parent 0000000028a54d85 [ 788.908161][ T3892] kobject: 'loop4' (0000000052c71ba2): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 788.920247][T27574] kobject: 'nr0' (00000000688e0c6b): calling ktype release [ 788.928384][ T3892] kobject: 'loop5' (00000000c09931bb): kobject_uevent_env [ 788.929130][T27574] kobject: 'nr0': free name [ 788.935616][ T3892] kobject: 'loop5' (00000000c09931bb): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 788.949145][T27568] kobject: 'rx-0' (00000000f0ca3a78): kobject_cleanup, parent 000000004075a99b [ 788.960159][T27568] kobject: 'rx-0' (00000000f0ca3a78): auto cleanup 'remove' event [ 788.968201][T27568] kobject: 'rx-0' (00000000f0ca3a78): kobject_uevent_env [ 788.975270][T27568] kobject: 'rx-0' (00000000f0ca3a78): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' [ 788.986614][T27568] kobject: 'rx-0' (00000000f0ca3a78): auto cleanup kobject_del [ 788.994199][T27568] kobject: 'rx-0' (00000000f0ca3a78): calling ktype release [ 789.001596][T27568] kobject: 'rx-0': free name [ 789.006290][T27568] kobject: 'tx-0' (0000000042255aff): kobject_cleanup, parent 000000004075a99b [ 789.015207][T27568] kobject: 'tx-0' (0000000042255aff): auto cleanup 'remove' event [ 789.023064][T27568] kobject: 'tx-0' (0000000042255aff): kobject_uevent_env [ 789.030216][T27568] kobject: 'tx-0' (0000000042255aff): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' [ 789.041183][T27568] kobject: 'tx-0' (0000000042255aff): auto cleanup kobject_del [ 789.048845][T27568] kobject: 'tx-0' (0000000042255aff): calling ktype release [ 789.056112][T27568] kobject: 'tx-0': free name [ 789.060767][T27568] kobject: 'queues' (000000004075a99b): kobject_cleanup, parent 0000000028a54d85 [ 789.069934][T27568] kobject: 'queues' (000000004075a99b): calling ktype release [ 789.077415][T27568] kobject: 'queues' (000000004075a99b): kset_release [ 789.084193][T27568] kobject: 'queues': free name [ 789.089359][T27568] kobject: 'nr0' (00000000c00b6691): kobject_uevent_env [ 789.096475][T27568] kobject: 'nr0' (00000000c00b6691): fill_kobj_path: path = '/devices/virtual/net/nr0' 22:01:18 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x1fd) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_script(r0, &(0x7f00000003c0)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRES16, @ANYRESOCT, @ANYPTR=&(0x7f0000000140)=ANY=[@ANYRESOCT, @ANYPTR, @ANYRESDEC, @ANYPTR64, @ANYRESDEC], @ANYPTR, @ANYRESOCT, @ANYPTR64=&(0x7f0000000200)=ANY=[@ANYRESDEC, @ANYBLOB="bc82623d2a4f0cd214098f66581300"/37, @ANYPTR, @ANYPTR, @ANYPTR64, @ANYPTR, @ANYRES64, @ANYRESHEX]]], 0x2c7) sendto$inet(r0, &(0x7f0000000100)='Q', 0x564, 0x1003, 0x0, 0x0) 22:01:18 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x352, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:01:18 executing program 2: mount(0x0, 0x0, 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x80000000b9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) tkill(0x0, 0x9) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000006580), 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000200000000002e00"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 22:01:18 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x758e}]}, 0xfdef) 22:01:18 executing program 4: prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video37\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) r1 = socket$pppoe(0x18, 0x1, 0x0) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x1) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) 22:01:18 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x6fc0836) splice(r0, 0x0, r2, 0x0, 0x4, 0xc) [ 789.156374][T27568] kobject: 'nr0' (00000000c00b6691): kobject_cleanup, parent 0000000028a54d85 [ 789.165444][T27568] kobject: 'nr0' (00000000c00b6691): calling ktype release [ 789.172986][T27568] kobject: 'nr0': free name 22:01:18 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x1fd) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_script(r0, &(0x7f00000003c0)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRES16, @ANYRESOCT, @ANYPTR=&(0x7f0000000140)=ANY=[@ANYRESOCT, @ANYPTR, @ANYRESDEC, @ANYPTR64, @ANYRESDEC], @ANYPTR, @ANYRESOCT, @ANYPTR64=&(0x7f0000000200)=ANY=[@ANYRESDEC, @ANYBLOB="bc82623d2a4f0cd214098f66581300"/37, @ANYPTR, @ANYPTR, @ANYPTR64, @ANYPTR, @ANYRES64, @ANYRESHEX]]], 0x2c7) sendto$inet(r0, &(0x7f0000000100)='Q', 0x564, 0x1003, 0x0, 0x0) [ 789.225955][ T3892] kobject: 'loop1' (000000004b94d5be): kobject_uevent_env [ 789.237998][T27627] kobject: 'nr0' (000000002ae6f503): kobject_add_internal: parent: 'net', set: 'devices' [ 789.248210][ T3892] kobject: 'loop1' (000000004b94d5be): fill_kobj_path: path = '/devices/virtual/block/loop1' 22:01:18 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/pv\x86x\x00', 0x1b5180, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2000, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) recvmmsg(r0, &(0x7f0000003540), 0x400000000000254, 0x12002, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000002c0)="11dca50d5e0bcfe47bf070") r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) ioctl$SIOCGIFMTU(r4, 0x8921, &(0x7f0000000100)) bind$bt_rfcomm(r2, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff, 0x3}}, 0xa) write$P9_RXATTRWALK(r2, &(0x7f0000000140)={0xf, 0x9}, 0xf) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x400, 0x4) prctl$PR_SET_THP_DISABLE(0x29, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) [ 789.274712][T27627] kobject: 'nr0' (000000002ae6f503): kobject_uevent_env [ 789.283065][ T3892] kobject: 'loop3' (000000006c6a7956): kobject_uevent_env [ 789.296478][T27627] kobject: 'nr0' (000000002ae6f503): fill_kobj_path: path = '/devices/virtual/net/nr0' [ 789.305635][ T3892] kobject: 'loop3' (000000006c6a7956): fill_kobj_path: path = '/devices/virtual/block/loop3' 22:01:18 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x353, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 789.320960][T27627] kobject: 'queues' (0000000048a6643a): kobject_add_internal: parent: 'nr0', set: '' 22:01:18 executing program 2: mount(0x0, 0x0, 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x80000000b9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) tkill(0x0, 0x9) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000006580), 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000200000000002e00"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 789.346654][T27627] kobject: 'queues' (0000000048a6643a): kobject_uevent_env [ 789.365801][T27627] kobject: 'queues' (0000000048a6643a): kobject_uevent_env: filter function caused the event to drop! [ 789.367696][ T3892] kobject: 'loop4' (0000000052c71ba2): kobject_uevent_env [ 789.396032][T27627] kobject: 'rx-0' (00000000a8acb02c): kobject_add_internal: parent: 'queues', set: 'queues' [ 789.404737][ T3892] kobject: 'loop4' (0000000052c71ba2): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 789.425897][T27627] kobject: 'rx-0' (00000000a8acb02c): kobject_uevent_env [ 789.430993][ T3892] kobject: 'loop2' (00000000334d1604): kobject_uevent_env [ 789.437904][T27627] kobject: 'rx-0' (00000000a8acb02c): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' [ 789.458765][T27627] kobject: 'tx-0' (00000000ba2ad34d): kobject_add_internal: parent: 'queues', set: 'queues' [ 789.465957][ T3892] kobject: 'loop2' (00000000334d1604): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 789.469329][T27627] kobject: 'tx-0' (00000000ba2ad34d): kobject_uevent_env 22:01:19 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x1fd) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_script(r0, &(0x7f00000003c0)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRES16, @ANYRESOCT, @ANYPTR=&(0x7f0000000140)=ANY=[@ANYRESOCT, @ANYPTR, @ANYRESDEC, @ANYPTR64, @ANYRESDEC], @ANYPTR, @ANYRESOCT, @ANYPTR64=&(0x7f0000000200)=ANY=[@ANYRESDEC, @ANYBLOB="bc82623d2a4f0cd214098f66581300"/37, @ANYPTR, @ANYPTR, @ANYPTR64, @ANYPTR, @ANYRES64, @ANYRESHEX]]], 0x2c7) sendto$inet(r0, &(0x7f0000000100)='Q', 0x564, 0x1003, 0x0, 0x0) [ 789.487027][T27627] kobject: 'tx-0' (00000000ba2ad34d): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' [ 789.506618][T27638] device nr0 entered promiscuous mode 22:01:19 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x354, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:01:19 executing program 2: mount(0x0, 0x0, 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x80000000b9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) tkill(0x0, 0x9) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000006580), 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000200000000002e00"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 789.560707][ T3892] kobject: 'loop3' (000000006c6a7956): kobject_uevent_env [ 789.579677][ T3892] kobject: 'loop3' (000000006c6a7956): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 789.624004][ T3892] kobject: 'loop2' (00000000334d1604): kobject_uevent_env [ 789.646663][ T3892] kobject: 'loop2' (00000000334d1604): fill_kobj_path: path = '/devices/virtual/block/loop2' 22:01:19 executing program 2: mount(0x0, 0x0, 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x80000000b9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) tkill(0x0, 0x9) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000006580), 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000200000000002e00"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) 22:01:19 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x355, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 789.730029][T27626] kobject: 'rx-0' (00000000a8acb02c): kobject_cleanup, parent 0000000048a6643a [ 789.739352][T27626] kobject: 'rx-0' (00000000a8acb02c): auto cleanup 'remove' event [ 789.747203][T27626] kobject: 'rx-0' (00000000a8acb02c): kobject_uevent_env [ 789.754260][T27626] kobject: 'rx-0' (00000000a8acb02c): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' [ 789.766612][T27626] kobject: 'rx-0' (00000000a8acb02c): auto cleanup kobject_del [ 789.774209][T27626] kobject: 'rx-0' (00000000a8acb02c): calling ktype release [ 789.778316][ T3892] kobject: 'loop2' (00000000334d1604): kobject_uevent_env [ 789.781569][T27626] kobject: 'rx-0': free name [ 789.792653][ T3892] kobject: 'loop2' (00000000334d1604): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 789.799464][T27626] kobject: 'tx-0' (00000000ba2ad34d): kobject_cleanup, parent 0000000048a6643a [ 789.820955][T27626] kobject: 'tx-0' (00000000ba2ad34d): auto cleanup 'remove' event [ 789.829272][T27626] kobject: 'tx-0' (00000000ba2ad34d): kobject_uevent_env [ 789.837385][T27626] kobject: 'tx-0' (00000000ba2ad34d): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' [ 789.848462][T27626] kobject: 'tx-0' (00000000ba2ad34d): auto cleanup kobject_del [ 789.856171][T27626] kobject: 'tx-0' (00000000ba2ad34d): calling ktype release [ 789.863753][T27626] kobject: 'tx-0': free name [ 789.868525][T27626] kobject: 'queues' (0000000048a6643a): kobject_cleanup, parent 0000000028a54d85 [ 789.877782][T27626] kobject: 'queues' (0000000048a6643a): calling ktype release [ 789.886296][T27626] kobject: 'queues' (0000000048a6643a): kset_release [ 789.893099][T27626] kobject: 'queues': free name [ 789.898371][T27626] kobject: 'nr0' (000000002ae6f503): kobject_uevent_env [ 789.912041][T27626] kobject: 'nr0' (000000002ae6f503): fill_kobj_path: path = '/devices/virtual/net/nr0' [ 789.942557][ T3892] kobject: 'loop3' (000000006c6a7956): kobject_uevent_env [ 789.953564][ T3892] kobject: 'loop3' (000000006c6a7956): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 789.964409][T27626] kobject: 'nr0' (000000002ae6f503): kobject_cleanup, parent 0000000028a54d85 [ 789.975824][ T3892] kobject: 'loop4' (0000000052c71ba2): kobject_uevent_env [ 789.983877][ T3892] kobject: 'loop4' (0000000052c71ba2): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 789.996345][T27626] kobject: 'nr0' (000000002ae6f503): calling ktype release [ 790.010557][T27626] kobject: 'nr0': free name [ 790.019336][T27627] kobject: 'nr0' (000000006b6be871): kobject_add_internal: parent: 'net', set: 'devices' [ 790.043218][T27627] kobject: 'nr0' (000000006b6be871): kobject_uevent_env [ 790.043731][ T3892] kobject: 'loop2' (00000000334d1604): kobject_uevent_env [ 790.061550][ T3892] kobject: 'loop2' (00000000334d1604): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 790.068160][T27627] kobject: 'nr0' (000000006b6be871): fill_kobj_path: path = '/devices/virtual/net/nr0' [ 790.080971][ T3892] kobject: 'loop5' (00000000c09931bb): kobject_uevent_env [ 790.082515][T27627] kobject: 'queues' (00000000cc6d12b8): kobject_add_internal: parent: 'nr0', set: '' [ 790.090680][ T3892] kobject: 'loop5' (00000000c09931bb): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 790.108776][T27627] kobject: 'queues' (00000000cc6d12b8): kobject_uevent_env [ 790.132091][T27627] kobject: 'queues' (00000000cc6d12b8): kobject_uevent_env: filter function caused the event to drop! [ 790.146400][T27627] kobject: 'rx-0' (0000000020bd90e0): kobject_add_internal: parent: 'queues', set: 'queues' [ 790.156785][T27627] kobject: 'rx-0' (0000000020bd90e0): kobject_uevent_env [ 790.163881][T27627] kobject: 'rx-0' (0000000020bd90e0): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' [ 790.175240][T27627] kobject: 'tx-0' (000000005dcb3ebb): kobject_add_internal: parent: 'queues', set: 'queues' [ 790.185597][T27627] kobject: 'tx-0' (000000005dcb3ebb): kobject_uevent_env [ 790.192689][T27627] kobject: 'tx-0' (000000005dcb3ebb): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' [ 790.205273][T27633] kobject: 'rx-0' (0000000020bd90e0): kobject_cleanup, parent 00000000cc6d12b8 [ 790.214258][T27633] kobject: 'rx-0' (0000000020bd90e0): auto cleanup 'remove' event [ 790.222484][T27633] kobject: 'rx-0' (0000000020bd90e0): kobject_uevent_env [ 790.229707][T27633] kobject: 'rx-0' (0000000020bd90e0): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' [ 790.240945][T27633] kobject: 'rx-0' (0000000020bd90e0): auto cleanup kobject_del [ 790.248850][T27633] kobject: 'rx-0' (0000000020bd90e0): calling ktype release [ 790.256170][T27633] kobject: 'rx-0': free name [ 790.260847][T27633] kobject: 'tx-0' (000000005dcb3ebb): kobject_cleanup, parent 00000000cc6d12b8 [ 790.269808][T27633] kobject: 'tx-0' (000000005dcb3ebb): auto cleanup 'remove' event [ 790.277737][T27633] kobject: 'tx-0' (000000005dcb3ebb): kobject_uevent_env [ 790.284892][T27633] kobject: 'tx-0' (000000005dcb3ebb): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' [ 790.295991][T27633] kobject: 'tx-0' (000000005dcb3ebb): auto cleanup kobject_del [ 790.303926][T27633] kobject: 'tx-0' (000000005dcb3ebb): calling ktype release [ 790.311238][T27633] kobject: 'tx-0': free name [ 790.315841][T27633] kobject: 'queues' (00000000cc6d12b8): kobject_cleanup, parent 0000000028a54d85 [ 790.325215][T27633] kobject: 'queues' (00000000cc6d12b8): calling ktype release [ 790.332819][T27633] kobject: 'queues' (00000000cc6d12b8): kset_release [ 790.339543][T27633] kobject: 'queues': free name [ 790.344575][T27633] kobject: 'nr0' (000000006b6be871): kobject_uevent_env [ 790.351821][T27633] kobject: 'nr0' (000000006b6be871): fill_kobj_path: path = '/devices/virtual/net/nr0' 22:01:20 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0x3) 22:01:20 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x356, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:01:20 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x1fd) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_script(r0, &(0x7f00000003c0)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRES16, @ANYRESOCT, @ANYPTR=&(0x7f0000000140)=ANY=[@ANYRESOCT, @ANYPTR, @ANYRESDEC, @ANYPTR64, @ANYRESDEC], @ANYPTR, @ANYRESOCT, @ANYPTR64=&(0x7f0000000200)=ANY=[@ANYRESDEC, @ANYBLOB="bc82623d2a4f0cd214098f66581300"/37, @ANYPTR, @ANYPTR, @ANYPTR64, @ANYPTR, @ANYRES64, @ANYRESHEX]]], 0x2c7) 22:01:20 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000000c0)={&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000e00000/0x200000)=nil, &(0x7f0000fe1000/0x2000)=nil, &(0x7f0000ec8000/0x1000)=nil, &(0x7f0000e9d000/0x4000)=nil, &(0x7f0000f6b000/0x2000)=nil, &(0x7f0000e6d000/0x3000)=nil, &(0x7f0000f07000/0x3000)=nil, &(0x7f0000e72000/0x3000)=nil, &(0x7f0000e16000/0x1000)=nil, &(0x7f0000000000)="d354b3615b039d7adbc3d016ad9f936099a00b35c7eed76502af", 0x1a, r1}, 0x68) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:01:20 executing program 2: mount(0x0, 0x0, 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x80000000b9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) tkill(0x0, 0x9) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000006580), 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000200000000002e00"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) 22:01:20 executing program 5: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet6(0xa, 0x3, 0x3c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r6, 0x4048ae9b, &(0x7f00000002c0)={0xe0003}) ioctl$KVM_SET_MSRS(r6, 0x8090ae81, &(0x7f0000000000)) splice(r6, 0x0, r1, 0x0, 0x4, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r7, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r7, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) r8 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r9 = ioctl$KVM_CREATE_VM(r8, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r9, 0xae41, 0x0) ioctl$KVM_CREATE_IRQCHIP(r9, 0xae60) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r7, 0xc058534b, &(0x7f0000000040)={0x0, 0x9, 0x800, 0xc79, 0x21db, 0x7}) [ 790.406505][T27633] kobject: 'nr0' (000000006b6be871): kobject_cleanup, parent 0000000028a54d85 [ 790.415542][T27633] kobject: 'nr0' (000000006b6be871): calling ktype release [ 790.423072][T27633] kobject: 'nr0': free name [ 790.460944][ T3892] kobject: 'loop1' (000000004b94d5be): kobject_uevent_env [ 790.480278][ T3892] kobject: 'loop1' (000000004b94d5be): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 790.502993][T27683] kobject: 'kvm' (00000000c525ee41): kobject_uevent_env [ 790.511756][T27687] kobject: 'nr0' (000000006bcff903): kobject_add_internal: parent: 'net', set: 'devices' [ 790.518008][T27683] kobject: 'kvm' (00000000c525ee41): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 790.539713][T27689] kobject: 'kvm' (00000000c525ee41): kobject_uevent_env 22:01:20 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x357, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:01:20 executing program 2: mount(0x0, 0x0, 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x80000000b9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) tkill(0x0, 0x9) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000200000000002e00"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) 22:01:20 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x1fd) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 790.555898][T27687] kobject: 'nr0' (000000006bcff903): kobject_uevent_env [ 790.590537][ T3892] kobject: 'loop2' (00000000334d1604): kobject_uevent_env [ 790.591214][T27689] kobject: 'kvm' (00000000c525ee41): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 790.601399][T27680] kobject: 'kvm' (00000000c525ee41): kobject_uevent_env [ 790.620370][ T3892] kobject: 'loop2' (00000000334d1604): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 790.632814][T27687] kobject: 'nr0' (000000006bcff903): fill_kobj_path: path = '/devices/virtual/net/nr0' [ 790.642918][T27680] kobject: 'kvm' (00000000c525ee41): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 790.663546][ T3892] kobject: 'loop3' (000000006c6a7956): kobject_uevent_env [ 790.671905][ T3892] kobject: 'loop3' (000000006c6a7956): fill_kobj_path: path = '/devices/virtual/block/loop3' 22:01:20 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) fdatasync(r0) remap_file_pages(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x3ff, 0x1) prctl$PR_GET_FP_MODE(0x2e) clone(0x30784c1d37453b0a, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f00000000c0)=""/229) 22:01:20 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x358, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 790.722576][T27689] kobject: 'kvm' (00000000c525ee41): kobject_uevent_env [ 790.742465][T27687] kobject: 'queues' (00000000db076129): kobject_add_internal: parent: 'nr0', set: '' 22:01:20 executing program 2: mount(0x0, 0x0, 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x80000000b9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000200000000002e00"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) [ 790.769512][T27687] kobject: 'queues' (00000000db076129): kobject_uevent_env [ 790.776551][ T3892] kobject: 'loop4' (0000000052c71ba2): kobject_uevent_env [ 790.779319][T27687] kobject: 'queues' (00000000db076129): kobject_uevent_env: filter function caused the event to drop! [ 790.784065][ T3892] kobject: 'loop4' (0000000052c71ba2): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 790.795780][T27687] kobject: 'rx-0' (000000003d37bb81): kobject_add_internal: parent: 'queues', set: 'queues' [ 790.819332][T27687] kobject: 'rx-0' (000000003d37bb81): kobject_uevent_env [ 790.826850][T27687] kobject: 'rx-0' (000000003d37bb81): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' [ 790.829511][T27689] kobject: 'kvm' (00000000c525ee41): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 790.846601][T27687] kobject: 'tx-0' (000000001a65edae): kobject_add_internal: parent: 'queues', set: 'queues' [ 790.865450][T27687] kobject: 'tx-0' (000000001a65edae): kobject_uevent_env [ 790.891607][T27687] kobject: 'tx-0' (000000001a65edae): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' [ 790.925210][T27714] syz-executor.4 invoked oom-killer: gfp_mask=0x402dc2(GFP_KERNEL_ACCOUNT|__GFP_HIGHMEM|__GFP_NOWARN|__GFP_ZERO), order=0, oom_score_adj=1000 [ 790.940486][T27701] device nr0 entered promiscuous mode [ 790.941918][T27714] CPU: 0 PID: 27714 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 790.955153][T27714] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 790.965209][T27714] Call Trace: [ 790.968509][T27714] dump_stack+0x172/0x1f0 [ 790.972845][T27714] dump_header+0x177/0x1152 [ 790.977375][T27714] ? ___ratelimit+0xf8/0x595 [ 790.981999][T27714] ? trace_hardirqs_on+0x67/0x240 [ 790.987024][T27714] ? pagefault_out_of_memory+0x11c/0x11c [ 790.992827][T27714] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 790.998626][T27714] ? ___ratelimit+0x60/0x595 [ 791.003260][T27714] ? do_raw_spin_unlock+0x57/0x270 [ 791.008356][T27714] oom_kill_process.cold+0x10/0x15 [ 791.013547][T27714] out_of_memory+0x334/0x1340 [ 791.018211][T27714] ? lock_downgrade+0x920/0x920 [ 791.023110][T27714] ? oom_killer_disable+0x280/0x280 [ 791.028301][T27714] mem_cgroup_out_of_memory+0x1d8/0x240 [ 791.033845][T27714] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 791.039461][T27714] ? do_raw_spin_unlock+0x57/0x270 [ 791.044678][T27714] ? _raw_spin_unlock+0x2d/0x50 [ 791.049538][T27714] try_charge+0xf4b/0x1440 [ 791.054116][T27714] ? perf_trace_lock_acquire+0x20/0x530 [ 791.059709][T27714] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 791.065254][T27714] ? get_mem_cgroup_from_mm+0x139/0x320 [ 791.070795][T27714] ? __kasan_check_read+0x11/0x20 [ 791.075809][T27714] ? lock_downgrade+0x920/0x920 [ 791.080642][T27714] ? percpu_ref_tryget_live+0x111/0x290 [ 791.086187][T27714] __memcg_kmem_charge_memcg+0x71/0xf0 [ 791.091723][T27714] ? memcg_kmem_put_cache+0x50/0x50 [ 791.096920][T27714] ? get_mem_cgroup_from_mm+0x156/0x320 [ 791.102450][T27714] __memcg_kmem_charge+0x13a/0x3a0 [ 791.107576][T27714] __alloc_pages_nodemask+0x4f7/0x900 [ 791.112942][T27714] ? __alloc_pages_slowpath+0x2540/0x2540 [ 791.118675][T27714] ? kasan_unpoison_shadow+0x35/0x50 [ 791.123948][T27714] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 791.130186][T27714] alloc_pages_current+0x107/0x210 [ 791.135280][T27714] ? ___might_sleep+0x163/0x280 [ 791.140242][T27714] __vmalloc_node_range+0x4a9/0x7e0 [ 791.145428][T27714] ? kasan_kmalloc+0x9/0x10 [ 791.149936][T27714] ? kvm_dev_ioctl+0xc8d/0x1650 [ 791.154792][T27714] __vmalloc_node_flags_caller+0x71/0x90 [ 791.160422][T27714] ? kvm_dev_ioctl+0xc8d/0x1650 [ 791.165257][T27714] kvmalloc_node+0xdc/0x100 [ 791.169747][T27714] kvm_dev_ioctl+0xc8d/0x1650 [ 791.174416][T27714] ? kvm_debugfs_release+0x90/0x90 [ 791.179518][T27714] ? __kasan_check_read+0x11/0x20 [ 791.184526][T27714] ? kvm_debugfs_release+0x90/0x90 [ 791.189618][T27714] do_vfs_ioctl+0xdb6/0x13e0 [ 791.194189][T27714] ? ioctl_preallocate+0x210/0x210 [ 791.199287][T27714] ? __fget+0x384/0x560 [ 791.203625][T27714] ? ksys_dup3+0x3e0/0x3e0 [ 791.208041][T27714] ? nsecs_to_jiffies+0x30/0x30 [ 791.213322][T27714] ? tomoyo_file_ioctl+0x23/0x30 [ 791.218448][T27714] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 791.224671][T27714] ? security_file_ioctl+0x8d/0xc0 [ 791.229873][T27714] ksys_ioctl+0xab/0xd0 [ 791.234071][T27714] __x64_sys_ioctl+0x73/0xb0 [ 791.238646][T27714] do_syscall_64+0xfa/0x760 [ 791.243137][T27714] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 791.249196][T27714] RIP: 0033:0x4598e9 [ 791.253236][T27714] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 791.272824][T27714] RSP: 002b:00007f786c5e8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 791.278194][T27678] kobject: 'kvm' (00000000c525ee41): kobject_uevent_env [ 791.281233][T27714] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004598e9 [ 791.281241][T27714] RDX: 0000000000000000 RSI: 000000000000ae01 RDI: 0000000000000005 [ 791.281249][T27714] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 791.281255][T27714] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f786c5e96d4 [ 791.281268][T27714] R13: 00000000004c2841 R14: 00000000004d5ec8 R15: 00000000ffffffff [ 791.288960][T27678] kobject: 'kvm' (00000000c525ee41): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 791.304813][T27714] memory: usage 307200kB, limit 307200kB, failcnt 1479 [ 791.318009][ T3892] kobject: 'loop3' (000000006c6a7956): kobject_uevent_env [ 791.320432][T27714] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 791.334850][ T3892] kobject: 'loop3' (000000006c6a7956): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 791.353476][T27714] Memory cgroup stats for /syz4: [ 791.353586][T27714] anon 269672448 [ 791.353586][T27714] file 53248 [ 791.353586][T27714] kernel_stack 4718592 [ 791.353586][T27714] slab 12599296 [ 791.353586][T27714] sock 2686976 [ 791.353586][T27714] shmem 81920 [ 791.353586][T27714] file_mapped 0 [ 791.353586][T27714] file_dirty 0 [ 791.353586][T27714] file_writeback 0 [ 791.353586][T27714] anon_thp 211812352 [ 791.353586][T27714] inactive_anon 135168 [ 791.353586][T27714] active_anon 269672448 [ 791.353586][T27714] inactive_file 135168 [ 791.353586][T27714] active_file 118784 [ 791.353586][T27714] unevictable 0 [ 791.353586][T27714] slab_reclaimable 2297856 [ 791.353586][T27714] slab_unreclaimable 10301440 [ 791.353586][T27714] pgfault 50952 [ 791.353586][T27714] pgmajfault 0 [ 791.353586][T27714] workingset_refault 0 [ 791.353586][T27714] workingset_activate 0 [ 791.353586][T27714] workingset_nodereclaim 0 [ 791.353586][T27714] pgrefill 181 [ 791.353586][T27714] pgscan 175 [ 791.353586][T27714] pgsteal 105 [ 791.429825][T27678] kobject: 'kvm' (00000000c525ee41): kobject_uevent_env [ 791.478507][ T3892] kobject: 'loop2' (00000000334d1604): kobject_uevent_env [ 791.494091][ T3892] kobject: 'loop2' (00000000334d1604): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 791.502504][T27714] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=24173,uid=0 [ 791.520548][T27714] Memory cgroup out of memory: Killed process 24173 (syz-executor.4) total-vm:72840kB, anon-rss:2228kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 791.564550][T27709] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 791.578683][T27709] CPU: 0 PID: 27709 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 791.587805][T27709] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 791.592874][T27678] kobject: 'kvm' (00000000c525ee41): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 791.597849][T27709] Call Trace: [ 791.597870][T27709] dump_stack+0x172/0x1f0 [ 791.597886][T27709] dump_header+0x177/0x1152 [ 791.597899][T27709] ? ___ratelimit+0xf8/0x595 [ 791.597912][T27709] ? trace_hardirqs_on+0x67/0x240 [ 791.597929][T27709] ? pagefault_out_of_memory+0x11c/0x11c [ 791.635003][T27709] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 791.640813][T27709] ? ___ratelimit+0x60/0x595 [ 791.645406][T27709] ? do_raw_spin_unlock+0x57/0x270 [ 791.649914][ T3892] kobject: 'loop5' (00000000c09931bb): kobject_uevent_env [ 791.650544][T27709] oom_kill_process.cold+0x10/0x15 [ 791.659967][ T3892] kobject: 'loop5' (00000000c09931bb): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 791.662705][T27709] out_of_memory+0x334/0x1340 [ 791.662724][T27709] ? lock_downgrade+0x920/0x920 [ 791.682372][T27709] ? oom_killer_disable+0x280/0x280 [ 791.687575][T27709] ? __kasan_check_read+0x11/0x20 [ 791.692616][T27709] mem_cgroup_out_of_memory+0x1d8/0x240 [ 791.698162][T27709] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 791.703892][T27709] ? do_raw_spin_unlock+0x57/0x270 [ 791.709116][T27709] ? _raw_spin_unlock+0x2d/0x50 [ 791.713953][T27709] try_charge+0xa2d/0x1440 [ 791.718528][T27709] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 791.724060][T27709] ? percpu_ref_tryget_live+0x111/0x290 [ 791.729796][T27709] ? get_mem_cgroup_from_mm+0x16/0x320 [ 791.736117][T27709] ? get_mem_cgroup_from_mm+0x156/0x320 [ 791.741658][T27709] mem_cgroup_try_charge+0x136/0x590 [ 791.747254][T27709] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 791.753690][T27709] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 791.759409][T27709] __handle_mm_fault+0x1e34/0x3f20 [ 791.764508][T27709] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 791.770043][T27709] ? __kasan_check_read+0x11/0x20 [ 791.775144][T27709] ? trace_hardirqs_on+0x67/0x240 [ 791.780154][T27709] handle_mm_fault+0x1b5/0x6c0 [ 791.784904][T27709] __do_page_fault+0x536/0xdd0 [ 791.789652][T27709] do_page_fault+0x38/0x590 [ 791.794135][T27709] page_fault+0x39/0x40 [ 791.798286][T27709] RIP: 0033:0x41122f [ 791.802174][T27709] Code: 0f 84 c8 02 00 00 48 83 bd 78 ff ff ff 00 0f 84 f9 04 00 00 48 8b 95 68 ff ff ff 44 89 95 38 ff ff ff 4c 8d ac 10 00 f7 ff ff <49> 89 85 90 06 00 00 49 8d 85 10 03 00 00 49 89 95 98 06 00 00 41 [ 791.821873][T27709] RSP: 002b:00007ffee7d14010 EFLAGS: 00010206 [ 791.827933][T27709] RAX: 00007f786c5a8000 RBX: 0000000000020000 RCX: 000000000045993a [ 791.835885][T27709] RDX: 0000000000021000 RSI: 0000000000021000 RDI: 0000000000000000 [ 791.843857][T27709] RBP: 00007ffee7d140f0 R08: ffffffffffffffff R09: 0000000000000000 [ 791.851825][T27709] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffee7d141e0 [ 791.859780][T27709] R13: 00007f786c5c8700 R14: 0000000000000001 R15: 000000000075bfd4 [ 791.869120][T27709] memory: usage 304924kB, limit 307200kB, failcnt 1479 [ 791.876239][T27709] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 791.883194][T27709] Memory cgroup stats for /syz4: [ 791.883396][T27709] anon 267534336 [ 791.883396][T27709] file 53248 [ 791.883396][T27709] kernel_stack 4718592 [ 791.883396][T27709] slab 12763136 [ 791.883396][T27709] sock 2686976 [ 791.883396][T27709] shmem 81920 [ 791.883396][T27709] file_mapped 0 [ 791.883396][T27709] file_dirty 0 [ 791.883396][T27709] file_writeback 0 [ 791.883396][T27709] anon_thp 209715200 [ 791.883396][T27709] inactive_anon 135168 [ 791.883396][T27709] active_anon 267534336 [ 791.883396][T27709] inactive_file 135168 [ 791.883396][T27709] active_file 118784 [ 791.883396][T27709] unevictable 0 [ 791.883396][T27709] slab_reclaimable 2297856 [ 791.883396][T27709] slab_unreclaimable 10465280 [ 791.883396][T27709] pgfault 50952 [ 791.883396][T27709] pgmajfault 0 [ 791.883396][T27709] workingset_refault 0 [ 791.883396][T27709] workingset_activate 0 [ 791.883396][T27709] workingset_nodereclaim 0 [ 791.883396][T27709] pgrefill 181 [ 791.883396][T27709] pgscan 175 [ 791.883396][T27709] pgsteal 105 [ 791.883510][T27686] kobject: 'rx-0' (000000003d37bb81): kobject_cleanup, parent 00000000db076129 [ 791.888510][T27709] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=24123,uid=0 [ 791.888594][T27709] Memory cgroup out of memory: Killed process 24123 (syz-executor.4) total-vm:72840kB, anon-rss:2228kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 792.022097][ T1064] oom_reaper: reaped process 24123 (syz-executor.4), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB [ 792.022406][T27714] kobject: 'kvm' (00000000c525ee41): kobject_uevent_env [ 792.042241][T27714] kobject: 'kvm' (00000000c525ee41): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 792.055523][T27709] kobject: 'kvm' (00000000c525ee41): kobject_uevent_env [ 792.063953][T27709] kobject: 'kvm' (00000000c525ee41): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 792.064948][T27686] kobject: 'rx-0' (000000003d37bb81): auto cleanup 'remove' event [ 792.091101][T27714] kobject: 'kvm' (00000000c525ee41): kobject_uevent_env [ 792.093026][T27686] kobject: 'rx-0' (000000003d37bb81): kobject_uevent_env [ 792.099163][T27714] kobject: 'kvm' (00000000c525ee41): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 792.111918][T27686] kobject: 'rx-0' (000000003d37bb81): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' [ 792.118199][T27709] kobject: 'kvm' (00000000c525ee41): kobject_uevent_env [ 792.134738][T27686] kobject: 'rx-0' (000000003d37bb81): auto cleanup kobject_del [ 792.137807][T27709] kobject: 'kvm' (00000000c525ee41): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 792.143634][T27686] kobject: 'rx-0' (000000003d37bb81): calling ktype release [ 792.170333][T27686] kobject: 'rx-0': free name [ 792.175281][T27686] kobject: 'tx-0' (000000001a65edae): kobject_cleanup, parent 00000000db076129 [ 792.185537][T27686] kobject: 'tx-0' (000000001a65edae): auto cleanup 'remove' event [ 792.192362][ T3892] kobject: 'loop4' (0000000052c71ba2): kobject_uevent_env [ 792.193670][T27686] kobject: 'tx-0' (000000001a65edae): kobject_uevent_env [ 792.203671][ T3892] kobject: 'loop4' (0000000052c71ba2): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 792.207889][T27686] kobject: 'tx-0' (000000001a65edae): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' [ 792.229074][T27686] kobject: 'tx-0' (000000001a65edae): auto cleanup kobject_del [ 792.237328][T27686] kobject: 'tx-0' (000000001a65edae): calling ktype release [ 792.244636][T27686] kobject: 'tx-0': free name [ 792.249424][T27686] kobject: 'queues' (00000000db076129): kobject_cleanup, parent 0000000028a54d85 [ 792.258842][T27686] kobject: 'queues' (00000000db076129): calling ktype release [ 792.266343][T27686] kobject: 'queues' (00000000db076129): kset_release [ 792.273019][T27686] kobject: 'queues': free name [ 792.278135][T27686] kobject: 'nr0' (000000006bcff903): kobject_uevent_env [ 792.285191][T27686] kobject: 'nr0' (000000006bcff903): fill_kobj_path: path = '/devices/virtual/net/nr0' [ 792.336603][T27686] kobject: 'nr0' (000000006bcff903): kobject_cleanup, parent 0000000028a54d85 [ 792.345745][T27686] kobject: 'nr0' (000000006bcff903): calling ktype release [ 792.353126][T27686] kobject: 'nr0': free name [ 792.358703][T27687] kobject: 'nr0' (00000000656a175a): kobject_add_internal: parent: 'net', set: 'devices' [ 792.369452][T27687] kobject: 'nr0' (00000000656a175a): kobject_uevent_env [ 792.376652][T27687] kobject: 'nr0' (00000000656a175a): fill_kobj_path: path = '/devices/virtual/net/nr0' [ 792.386635][T27687] kobject: 'queues' (00000000ea102f9f): kobject_add_internal: parent: 'nr0', set: '' [ 792.396908][T27687] kobject: 'queues' (00000000ea102f9f): kobject_uevent_env [ 792.404122][T27687] kobject: 'queues' (00000000ea102f9f): kobject_uevent_env: filter function caused the event to drop! [ 792.415638][T27687] kobject: 'rx-0' (000000004e569067): kobject_add_internal: parent: 'queues', set: 'queues' [ 792.425891][T27687] kobject: 'rx-0' (000000004e569067): kobject_uevent_env [ 792.435088][T27687] kobject: 'rx-0' (000000004e569067): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' [ 792.446469][T27687] kobject: 'tx-0' (000000008ca7e9be): kobject_add_internal: parent: 'queues', set: 'queues' [ 792.457036][T27687] kobject: 'tx-0' (000000008ca7e9be): kobject_uevent_env [ 792.464106][T27687] kobject: 'tx-0' (000000008ca7e9be): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' [ 792.477599][T27701] kobject: 'rx-0' (000000004e569067): kobject_cleanup, parent 00000000ea102f9f [ 792.486937][T27701] kobject: 'rx-0' (000000004e569067): auto cleanup 'remove' event [ 792.494754][T27701] kobject: 'rx-0' (000000004e569067): kobject_uevent_env [ 792.502863][T27701] kobject: 'rx-0' (000000004e569067): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' [ 792.514218][T27701] kobject: 'rx-0' (000000004e569067): auto cleanup kobject_del [ 792.521858][T27701] kobject: 'rx-0' (000000004e569067): calling ktype release [ 792.529971][T27701] kobject: 'rx-0': free name [ 792.534594][T27701] kobject: 'tx-0' (000000008ca7e9be): kobject_cleanup, parent 00000000ea102f9f [ 792.543682][T27701] kobject: 'tx-0' (000000008ca7e9be): auto cleanup 'remove' event [ 792.551715][T27701] kobject: 'tx-0' (000000008ca7e9be): kobject_uevent_env [ 792.559139][T27701] kobject: 'tx-0' (000000008ca7e9be): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' [ 792.571211][T27701] kobject: 'tx-0' (000000008ca7e9be): auto cleanup kobject_del [ 792.579159][T27701] kobject: 'tx-0' (000000008ca7e9be): calling ktype release [ 792.586521][T27701] kobject: 'tx-0': free name [ 792.591129][T27701] kobject: 'queues' (00000000ea102f9f): kobject_cleanup, parent 0000000028a54d85 [ 792.600527][T27701] kobject: 'queues' (00000000ea102f9f): calling ktype release [ 792.608171][T27701] kobject: 'queues' (00000000ea102f9f): kset_release [ 792.614857][T27701] kobject: 'queues': free name [ 792.620045][T27701] kobject: 'nr0' (00000000656a175a): kobject_uevent_env [ 792.627149][T27701] kobject: 'nr0' (00000000656a175a): fill_kobj_path: path = '/devices/virtual/net/nr0' 22:01:22 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0x4) 22:01:22 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x1fd) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) 22:01:22 executing program 2: mount(0x0, 0x0, 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x80000000b9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000200000000002e00"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) 22:01:22 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x359, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) 22:01:22 executing program 5: pipe(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x101002, 0x0) perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={@broadcast}, &(0x7f0000000440)=0xffffffffffffffe7) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) r1 = memfd_create(&(0x7f0000000280)='^\x00', 0x0) r2 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) syz_genetlink_get_family_id$net_dm(&(0x7f0000000100)='NET_DM\x00') setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, 0x0, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000500)=""/201) pwritev(r1, &(0x7f0000f50f90), 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) sendfile(r0, r1, 0x0, 0x102002700) getuid() mount$9p_fd(0x0, 0x0, &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000600)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@access_any='access=any'}], [{@euid_eq={'euid'}}, {@dont_appraise='dont_appraise'}]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x1, 0x10900) ioctl$KVM_ASSIGN_PCI_DEVICE(r5, 0x8040ae69, &(0x7f0000000200)={0xe470, 0x4, 0xffffffffffffff7f, 0x0, 0x3}) r6 = socket$inet_udp(0x2, 0x2, 0x0) close(r6) r7 = socket$inet6(0xa, 0x3, 0x3c) r8 = socket$inet_udplite(0x2, 0x2, 0x88) accept$packet(r4, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) ioctl(r8, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(r7, &(0x7f0000000180)={0xa, 0x4e22, 0xfffffffffffffffd, @remote, 0x5}, 0x1c) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r3, 0x0, r6, 0x0, 0x4, 0x0) 22:01:22 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffa000/0x4000)=nil, 0x4000, &(0x7f00000003c0)=""/229) [ 792.676488][T27701] kobject: 'nr0' (00000000656a175a): kobject_cleanup, parent 0000000028a54d85 [ 792.685489][T27701] kobject: 'nr0' (00000000656a175a): calling ktype release [ 792.692885][T27701] kobject: 'nr0': free name [ 792.736157][ T3892] kobject: 'loop1' (000000004b94d5be): kobject_uevent_env [ 792.748940][ T3892] kobject: 'loop1' (000000004b94d5be): fill_kobj_path: path = '/devices/virtual/block/loop1' 22:01:22 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x1fd) [ 792.785768][T27731] kobject: 'ppp0' (00000000df52a21a): kobject_add_internal: parent: 'net', set: 'devices' [ 792.811988][T27731] kobject: 'ppp0' (00000000df52a21a): kobject_uevent_env 22:01:22 executing program 2: mount(0x0, 0x0, 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x80000000b9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x80, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000200000000002e00"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) 22:01:22 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x35a, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 792.835023][ T3892] kobject: 'loop3' (000000006c6a7956): kobject_uevent_env [ 792.848477][ T3892] kobject: 'loop3' (000000006c6a7956): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 792.874890][T27731] kobject: 'ppp0' (00000000df52a21a): fill_kobj_path: path = '/devices/virtual/net/ppp0' 22:01:22 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000600)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, r0) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r0) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/229) 22:01:22 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) [ 792.902666][ T3892] kobject: 'loop2' (00000000334d1604): kobject_uevent_env [ 792.930170][ T3892] kobject: 'loop2' (00000000334d1604): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 792.969035][ T3892] kobject: 'loop4' (0000000052c71ba2): kobject_uevent_env [ 792.985547][T27731] kobject: 'queues' (000000000b97f903): kobject_add_internal: parent: 'ppp0', set: '' [ 793.001614][ T3892] kobject: 'loop4' (0000000052c71ba2): fill_kobj_path: path = '/devices/virtual/block/loop4' 22:01:22 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x35b, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x3c) [ 793.022325][T27731] kobject: 'queues' (000000000b97f903): kobject_uevent_env [ 793.046028][ T3892] kobject: 'loop3' (000000006c6a7956): kobject_uevent_env [ 793.054716][T27731] kobject: 'queues' (000000000b97f903): kobject_uevent_env: filter function caused the event to drop! [ 793.067370][ T3892] kobject: 'loop3' (000000006c6a7956): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 793.086228][T27731] kobject: 'rx-0' (000000005ac5d8ca): kobject_add_internal: parent: 'queues', set: 'queues' [ 793.107602][T27755] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 793.125310][T27731] kobject: 'rx-0' (000000005ac5d8ca): kobject_uevent_env [ 793.131101][T27755] CPU: 1 PID: 27755 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 793.141651][T27755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 793.142507][ T3892] kobject: 'loop3' (000000006c6a7956): kobject_uevent_env [ 793.152677][T27755] Call Trace: [ 793.152699][T27755] dump_stack+0x172/0x1f0 [ 793.152715][T27755] dump_header+0x177/0x1152 [ 793.152732][T27755] ? ___ratelimit+0xf8/0x595 [ 793.160593][T27731] kobject: 'rx-0' (000000005ac5d8ca): fill_kobj_path: path = '/devices/virtual/net/ppp0/queues/rx-0' [ 793.163097][T27755] ? trace_hardirqs_on+0x67/0x240 [ 793.163114][T27755] ? pagefault_out_of_memory+0x11c/0x11c [ 793.163131][T27755] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 793.163145][T27755] ? ___ratelimit+0x60/0x595 [ 793.163156][T27755] ? do_raw_spin_unlock+0x57/0x270 [ 793.163173][T27755] oom_kill_process.cold+0x10/0x15 [ 793.170059][T27731] kobject: 'tx-0' (00000000f7230b68): kobject_add_internal: parent: 'queues', set: 'queues' [ 793.172150][T27755] out_of_memory+0x334/0x1340 [ 793.172166][T27755] ? lock_downgrade+0x920/0x920 [ 793.172186][T27755] ? oom_killer_disable+0x280/0x280 [ 793.172211][T27755] mem_cgroup_out_of_memory+0x1d8/0x240 [ 793.176984][ T3892] kobject: 'loop3' (000000006c6a7956): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 793.187682][T27755] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 793.187697][T27755] ? do_raw_spin_unlock+0x57/0x270 [ 793.187711][T27755] ? _raw_spin_unlock+0x2d/0x50 [ 793.187725][T27755] try_charge+0xf4b/0x1440 [ 793.187743][T27755] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 793.187754][T27755] ? percpu_ref_tryget_live+0x111/0x290 [ 793.187768][T27755] ? get_mem_cgroup_from_mm+0x16/0x320 [ 793.187785][T27755] ? get_mem_cgroup_from_mm+0x156/0x320 [ 793.187800][T27755] mem_cgroup_try_charge+0x136/0x590 [ 793.194180][T27731] kobject: 'tx-0' (00000000f7230b68): kobject_uevent_env [ 793.198416][T27755] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 793.198432][T27755] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 793.198448][T27755] wp_page_copy+0x41e/0x1590 [ 793.198468][T27755] ? page_trans_huge_mapcount+0x166/0x450 [ 793.204548][T27731] kobject: 'tx-0' (00000000f7230b68): fill_kobj_path: path = '/devices/virtual/net/ppp0/queues/tx-0' [ 793.208824][T27755] ? pmd_pfn+0x1d0/0x1d0 [ 793.208840][T27755] ? lock_downgrade+0x920/0x920 [ 793.208857][T27755] ? swp_swapcount+0x540/0x540 [ 793.208872][T27755] ? __kasan_check_read+0x11/0x20 [ 793.208884][T27755] ? do_raw_spin_unlock+0x57/0x270 [ 793.208897][T27755] do_wp_page+0x499/0x14d0 [ 793.208917][T27755] ? finish_mkwrite_fault+0x570/0x570 [ 793.228744][T27736] kobject: 'nr0' (0000000034ba26cb): kobject_add_internal: parent: 'net', set: 'devices' [ 793.229148][T27755] __handle_mm_fault+0x22f1/0x3f20 [ 793.229165][T27755] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 793.229186][T27755] ? __kasan_check_read+0x11/0x20 [ 793.234456][T27736] kobject: 'nr0' (0000000034ba26cb): kobject_uevent_env [ 793.238690][T27755] ? trace_hardirqs_on+0x67/0x240 [ 793.238708][T27755] handle_mm_fault+0x1b5/0x6c0 [ 793.238729][T27755] __do_page_fault+0x536/0xdd0 [ 793.244343][T27736] kobject: 'nr0' (0000000034ba26cb): fill_kobj_path: path = '/devices/virtual/net/nr0' [ 793.249439][T27755] do_page_fault+0x38/0x590 [ 793.249454][T27755] page_fault+0x39/0x40 [ 793.249464][T27755] RIP: 0033:0x40c298 [ 793.249477][T27755] Code: 00 00 49 8d be 88 00 00 00 48 89 ea 48 89 de 0f 85 dd 00 00 00 e8 38 2c 00 00 8b 05 72 bd 32 00 48 8b 15 03 42 66 00 83 c0 01 <89> 05 62 bd 32 00 89 02 48 83 c4 08 5b 5d 41 5c 41 5d 41 5e 41 5f [ 793.249483][T27755] RSP: 002b:00007ffee7d14090 EFLAGS: 00010202 [ 793.249493][T27755] RAX: 0000000000000001 RBX: 0000001b33620014 RCX: 0000001b34620000 [ 793.249508][T27755] RDX: 0000001b33620000 RSI: 00000000000005a2 RDI: ffffffff31a0e5a2 [ 793.261622][T27736] kobject: 'queues' (00000000f680c4ea): kobject_add_internal: parent: 'nr0', set: '' [ 793.265254][T27755] RBP: 0000001b33620018 R08: 0000000031a0e5a2 R09: 0000000031a0e5a6 [ 793.265261][T27755] R10: 00007ffee7d141d0 R11: 0000000000000246 R12: 0000001b3362001c [ 793.265268][T27755] R13: 00000000000c19ab R14: 000000000075bf20 R15: 000000000075bf2c [ 793.302046][T27755] memory: usage 307200kB, limit 307200kB, failcnt 1520 [ 793.304434][ T3892] kobject: 'loop2' (00000000334d1604): kobject_uevent_env [ 793.308291][T27755] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 793.315406][ T3892] kobject: 'loop2' (00000000334d1604): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 793.324923][T27755] Memory cgroup stats for /syz4: [ 793.325026][T27755] anon 269701120 [ 793.325026][T27755] file 53248 [ 793.325026][T27755] kernel_stack 4784128 [ 793.325026][T27755] slab 13172736 [ 793.325026][T27755] sock 2686976 [ 793.325026][T27755] shmem 81920 [ 793.325026][T27755] file_mapped 0 [ 793.325026][T27755] file_dirty 0 [ 793.325026][T27755] file_writeback 0 [ 793.325026][T27755] anon_thp 209715200 [ 793.325026][T27755] inactive_anon 135168 [ 793.325026][T27755] active_anon 269709312 [ 793.325026][T27755] inactive_file 135168 [ 793.325026][T27755] active_file 118784 [ 793.325026][T27755] unevictable 0 [ 793.325026][T27755] slab_reclaimable 2433024 [ 793.325026][T27755] slab_unreclaimable 10739712 [ 793.325026][T27755] pgfault 51084 [ 793.325026][T27755] pgmajfault 0 [ 793.325026][T27755] workingset_refault 0 [ 793.325026][T27755] workingset_activate 0 [ 793.325026][T27755] workingset_nodereclaim 0 [ 793.325026][T27755] pgrefill 181 [ 793.325026][T27755] pgscan 208 [ 793.325026][T27755] pgsteal 105 [ 793.350025][T27736] kobject: 'queues' (00000000f680c4ea): kobject_uevent_env [ 793.353686][T27755] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=24078,uid=0 [ 793.362430][T27736] kobject: 'queues' (00000000f680c4ea): kobject_uevent_env: filter function caused the event to drop! [ 793.363884][T27755] Memory cgroup out of memory: Killed process 24078 (syz-executor.4) total-vm:72840kB, anon-rss:2228kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 793.368657][T27736] kobject: 'rx-0' (0000000045a240d8): kobject_add_internal: parent: 'queues', set: 'queues' [ 793.434806][ T3892] kobject: 'loop4' (0000000052c71ba2): kobject_uevent_env [ 793.453140][T27736] kobject: 'rx-0' (0000000045a240d8): kobject_uevent_env [ 793.464492][ T3892] kobject: 'loop4' (0000000052c71ba2): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 793.473742][T27736] kobject: 'rx-0' (0000000045a240d8): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' [ 793.474485][T27736] kobject: 'tx-0' (00000000c46eafca): kobject_add_internal: parent: 'queues', set: 'queues' [ 793.766877][T27736] kobject: 'tx-0' (00000000c46eafca): kobject_uevent_env [ 793.774024][T27736] kobject: 'tx-0' (00000000c46eafca): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' [ 793.788520][T27736] kobject: 'rx-0' (0000000045a240d8): kobject_cleanup, parent 00000000f680c4ea [ 793.798005][T27736] kobject: 'rx-0' (0000000045a240d8): auto cleanup 'remove' event [ 793.805804][T27736] kobject: 'rx-0' (0000000045a240d8): kobject_uevent_env [ 793.813075][T27736] kobject: 'rx-0' (0000000045a240d8): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' [ 793.824057][T27736] kobject: 'rx-0' (0000000045a240d8): auto cleanup kobject_del [ 793.831707][T27736] kobject: 'rx-0' (0000000045a240d8): calling ktype release [ 793.839046][T27736] kobject: 'rx-0': free name [ 793.843808][T27736] kobject: 'tx-0' (00000000c46eafca): kobject_cleanup, parent 00000000f680c4ea [ 793.853838][T27736] kobject: 'tx-0' (00000000c46eafca): auto cleanup 'remove' event [ 793.862278][T27736] kobject: 'tx-0' (00000000c46eafca): kobject_uevent_env [ 793.869365][T27736] kobject: 'tx-0' (00000000c46eafca): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' [ 793.880287][T27736] kobject: 'tx-0' (00000000c46eafca): auto cleanup kobject_del [ 793.887920][T27736] kobject: 'tx-0' (00000000c46eafca): calling ktype release [ 793.895195][T27736] kobject: 'tx-0': free name [ 793.899841][T27736] kobject: 'queues' (00000000f680c4ea): kobject_cleanup, parent 0000000028a54d85 [ 793.908978][T27736] kobject: 'queues' (00000000f680c4ea): calling ktype release [ 793.916950][T27736] kobject: 'queues' (00000000f680c4ea): kset_release [ 793.923637][T27736] kobject: 'queues': free name [ 793.928845][T27736] kobject: 'nr0' (0000000034ba26cb): kobject_uevent_env [ 793.935901][T27736] kobject: 'nr0' (0000000034ba26cb): fill_kobj_path: path = '/devices/virtual/net/nr0' [ 793.947847][T27730] kobject: 'rx-0' (000000005ac5d8ca): kobject_cleanup, parent 000000000b97f903 [ 793.956850][T27730] kobject: 'rx-0' (000000005ac5d8ca): auto cleanup 'remove' event [ 793.964690][T27730] kobject: 'rx-0' (000000005ac5d8ca): kobject_uevent_env [ 793.971951][T27730] kobject: 'rx-0' (000000005ac5d8ca): fill_kobj_path: path = '/devices/virtual/net/ppp0/queues/rx-0' [ 793.983349][T27730] kobject: 'rx-0' (000000005ac5d8ca): auto cleanup kobject_del [ 793.991106][T27730] kobject: 'rx-0' (000000005ac5d8ca): calling ktype release [ 793.998739][T27730] kobject: 'rx-0': free name [ 794.003587][T27730] kobject: 'tx-0' (00000000f7230b68): kobject_cleanup, parent 000000000b97f903 [ 794.012569][T27730] kobject: 'tx-0' (00000000f7230b68): auto cleanup 'remove' event [ 794.020504][T27730] kobject: 'tx-0' (00000000f7230b68): kobject_uevent_env [ 794.027577][T27730] kobject: 'tx-0' (00000000f7230b68): fill_kobj_path: path = '/devices/virtual/net/ppp0/queues/tx-0' [ 794.038618][T27730] kobject: 'tx-0' (00000000f7230b68): auto cleanup kobject_del [ 794.046519][T27730] kobject: 'tx-0' (00000000f7230b68): calling ktype release [ 794.053796][T27730] kobject: 'tx-0': free name [ 794.058454][T27730] kobject: 'queues' (000000000b97f903): kobject_cleanup, parent 0000000028a54d85 [ 794.067591][T27730] kobject: 'queues' (000000000b97f903): calling ktype release [ 794.075040][T27730] kobject: 'queues' (000000000b97f903): kset_release [ 794.082191][T27730] kobject: 'queues': free name [ 794.087368][T27730] kobject: 'ppp0' (00000000df52a21a): kobject_uevent_env [ 794.094418][T27730] kobject: 'ppp0' (00000000df52a21a): fill_kobj_path: path = '/devices/virtual/net/ppp0' [ 794.104566][T27736] kobject: 'nr0' (0000000034ba26cb): kobject_cleanup, parent 0000000028a54d85 [ 794.105361][T27740] kobject: 'nr0' (00000000d6f7e0a2): kobject_add_internal: parent: 'net', set: 'devices' [ 794.113584][T27736] kobject: 'nr0' (0000000034ba26cb): calling ktype release [ 794.113624][T27736] kobject: 'nr0': free name [ 794.128112][T27740] kobject: 'nr0' (00000000d6f7e0a2): kobject_uevent_env [ 794.144098][T27740] kobject: 'nr0' (00000000d6f7e0a2): fill_kobj_path: path = '/devices/virtual/net/nr0' [ 794.154928][T27740] kobject: 'queues' (000000009750c60c): kobject_add_internal: parent: 'nr0', set: '' [ 794.167470][T27740] kobject: 'queues' (000000009750c60c): kobject_uevent_env [ 794.174724][T27740] kobject: 'queues' (000000009750c60c): kobject_uevent_env: filter function caused the event to drop! [ 794.189453][T27740] kobject: 'rx-0' (0000000076cc2436): kobject_add_internal: parent: 'queues', set: 'queues' [ 794.199645][T27740] kobject: 'rx-0' (0000000076cc2436): kobject_uevent_env [ 794.206942][T27740] kobject: 'rx-0' (0000000076cc2436): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' [ 794.218268][T27740] kobject: 'tx-0' (00000000f9b3bf13): kobject_add_internal: parent: 'queues', set: 'queues' [ 794.228487][T27740] kobject: 'tx-0' (00000000f9b3bf13): kobject_uevent_env [ 794.235515][T27740] kobject: 'tx-0' (00000000f9b3bf13): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' [ 794.248296][T27752] kobject: 'rx-0' (0000000076cc2436): kobject_cleanup, parent 000000009750c60c [ 794.257473][T27752] kobject: 'rx-0' (0000000076cc2436): auto cleanup 'remove' event [ 794.265497][T27752] kobject: 'rx-0' (0000000076cc2436): kobject_uevent_env [ 794.273200][T27752] kobject: 'rx-0' (0000000076cc2436): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' [ 794.284567][T27752] kobject: 'rx-0' (0000000076cc2436): auto cleanup kobject_del [ 794.292269][T27752] kobject: 'rx-0' (0000000076cc2436): calling ktype release [ 794.299586][T27752] kobject: 'rx-0': free name [ 794.304351][T27752] kobject: 'tx-0' (00000000f9b3bf13): kobject_cleanup, parent 000000009750c60c [ 794.314495][T27752] kobject: 'tx-0' (00000000f9b3bf13): auto cleanup 'remove' event [ 794.322777][T27752] kobject: 'tx-0' (00000000f9b3bf13): kobject_uevent_env [ 794.329920][T27752] kobject: 'tx-0' (00000000f9b3bf13): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' [ 794.341610][T27752] kobject: 'tx-0' (00000000f9b3bf13): auto cleanup kobject_del [ 794.349779][T27752] kobject: 'tx-0' (00000000f9b3bf13): calling ktype release [ 794.357238][T27752] kobject: 'tx-0': free name [ 794.361943][T27752] kobject: 'queues' (000000009750c60c): kobject_cleanup, parent 0000000028a54d85 [ 794.371102][T27752] kobject: 'queues' (000000009750c60c): calling ktype release [ 794.378615][T27752] kobject: 'queues' (000000009750c60c): kset_release [ 794.385290][T27752] kobject: 'queues': free name [ 794.390440][T27752] kobject: 'nr0' (00000000d6f7e0a2): kobject_uevent_env [ 794.397534][T27752] kobject: 'nr0' (00000000d6f7e0a2): fill_kobj_path: path = '/devices/virtual/net/nr0' [ 794.407676][T27730] kobject: 'ppp0' (00000000df52a21a): kobject_cleanup, parent 0000000028a54d85 [ 794.416928][T27730] kobject: 'ppp0' (00000000df52a21a): calling ktype release [ 794.424258][T27730] kobject: 'ppp0': free name 22:01:24 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xe) 22:01:24 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) 22:01:24 executing program 2: mount(0x0, 0x0, 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x80000000b9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x80, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000200000000002e00"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) 22:01:24 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=0x0]], 0xfd3f) vmsplice(r3, &(0x7f0000000080)=[{&(0x7f0000000100)='x', 0x1}], 0x1, 0x0) ioctl$VIDIOC_QUERYSTD(r3, 0x8008563f, &(0x7f0000000040)=0x0) ioctl$VIDIOC_S_STD(r1, 0x40085618, &(0x7f00000000c0)=r4) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000140)) r5 = dup(r0) sendmmsg$alg(r5, &(0x7f0000002480)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000680)="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", 0x1000}, {&(0x7f0000000180)="29fca0d78f69c10e9eac49a80b8e55b87e66983396dc4d3283858d80123d2f26cf9b7a19ea9d88edc5bb2344f6349066aa640ff367074aa2c41d61fb5fceb94802fb0e4b765437e218f55677ae79b7c8bbb525fafe137383f6ab3a9a73ae98bf35d0ead811d8941dacb82796846bb9ef8656a9fc27c94c3a376119ba6cc8b79c36d9a20463028966ccd3d05bfcca6e400decfbd4765eb6b988432dd8c1", 0x9d}, {&(0x7f0000000240)="3576b733ba7d2298bc4a77baf254bc0a417f206dc572715bb3db5f188ab36fec9fbe28242c57a807ab6c3904d3580004d6", 0x31}, {&(0x7f0000000280)="700b9337ae32ef4e4d027b49fbf2f099fd93ddf2408cb0c31109f99d6468cd2fb4444052187fb58748249624919731cdf5245da30db24d2831f6b56611b8aaa8495c7d0cabfb8f2c318c2d5d39991fcc9d82064e0a4032e6177d8f79849fa8b290ad46f6609bf91d8539b4e9118c5ff72177873dcdb9eaaf11e63b5afac72bd97f6360ed57d10e0adff0a2776378858524e6eeb10779477fb76e1fb251ac6238f6718146c96433a5dea576effb0650bf982f899fde9555cfdb66ee4d23c96aa88265317981ad68265c81ab2e9155eb71e10a8006c67a87155dc439b1f1a7f9285003fb4dbea485f4b0bd219716", 0xed}, {&(0x7f0000000380)="4de12ed22d1d2f37c5d41259baaebe12de12e7cae1ba33427c6f2399c35b1811af99face085362e24ddbec953fdb3cb7b7630dff4f03af89a16880f7dbe46128b0ea8921d9a3b51b2e27082bf6450881ad2b905b4153caa4cd682e844395500f61da73b47fe5d6bccb24a9867eb71e025d799d8aafa993dd84b742df1ede58f7d916301d73e17aa33ccdb5d01f21971446e968eaa23528b95c2b8364579b9eba434072fe99a07a199935a921defbac1b627218723694f95abce694ee4ecbc54cd67f5e4702eca929da6e0c20530bf9b8c7e3d14dbc4091b59d95aef0493215e1fcb9474a6fd824179f144966", 0xec}], 0x5, &(0x7f0000001680)=[@iv={0x70, 0x117, 0x2, 0x55, "8d77b20014fbc3f5836e82db800b00e421a805e53a095f6aada7edc06cedb59a1c663447d89c007d7148335db221156878b39db216300ceab03086be2f8e7066528211362b24b5c40c220bf60ff735dafbc94ac6be"}, @assoc={0x18, 0x117, 0x4, 0x81}, @assoc={0x18, 0x117, 0x4, 0x401}, @iv={0x58, 0x117, 0x2, 0x40, "ce9e13a7e91e6a35d856333bc77b579efdcd6d04569382c11af51122e76f3424bf466da4796f501b963a6bde175f6ca5e67d54a747eb0d0c3c1a69489d2968c2"}], 0xf8, 0x48804}, {0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000500)="c04d1efa28ccaba6c693e2bafdc84a9d68c022b2697a11", 0x17}, {&(0x7f0000001780)="198ef67d56fa1d75bfe2fc0a2e638e581dadb2021a304e209f07a7f0a39bd9f0a8b8740b94455da79e1c7de30407428caddf693c73d0740695f0fa80cc69e3a8d41be414777c812bea0d398b18aed659a8ad3e7f051d3e39fbfb8917b402ee", 0x5f}], 0x2, &(0x7f0000001800)=[@op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x40}, @iv={0x110, 0x117, 0x2, 0xfc, "994b89e8ef76feca051e5ffb3128b96ecfbb6f5ffef589313de89f08c9f4745b2c708115e0f7ce55a8314847c02115f6fbbdd40e2066305f6ea4325a15c41a76495181ffacdcac7fb627087fa43abae1c6e80e0d66742f8ca913bdf7c63b42ec534496eacffee88c70d29db8c9ffcfc868942bc3de95d52a6e11a6c28b75cd03d0e497cf4f4d119ad80025c33bf36fcc4646ffc81a2b7ef7e6ee576c2a3be9a05d9f46fc195f773f44c749049839c2d430604dce1e3e4744562f4ed5b85c403e96977c3ab0636aa88c849ee5e8e63c29ea543cb2fed1f69fe031eaf6dbc92ed7b6626587baf7acb4a6f746e8ef8cf63c8c3fb54ab0df13c6287f02ee"}, @op={0x18, 0x117, 0x3, 0x4fdd951d1e1ecdaa}], 0x170, 0x40}, {0x0, 0x0, &(0x7f0000001a00)=[{&(0x7f0000001980)="27671f1911950f7f6b5ef8d94a111e441cda2d9fa8d81ad90ca5e3499e2b9d39252f28bb33c870fe86292a2b07ca47b0c074bec70c2bc9bebe51edef8ffd1598ad97d650a16e07460ccee8a38ead5de27a6e8481a068c56c8128ec2cddd0aedf3d03387ba893", 0x66}], 0x1, &(0x7f0000001a40)=[@op={0x18, 0x117, 0x3, 0x3c8805aba1dd6f27}, @op={0x18}, @op={0x18, 0x117, 0x3, 0xbc2614ec6009c282}, @op={0x18}, @assoc={0x18, 0x117, 0x4, 0x55c2e4ce}], 0x78, 0x993e562d25f694f3}, {0x0, 0x0, &(0x7f0000001b40)=[{&(0x7f0000001ac0)="f32b72d673", 0x5}, {&(0x7f0000001b00)="1f6619ee5fc6c82e", 0x8}], 0x2, &(0x7f0000001b80), 0x0, 0x2000060}, {0x0, 0x0, &(0x7f0000002080)=[{&(0x7f0000001bc0)="fc2c8911185fed1c362c076c9bab2ae1e5c6f4dfd8a45fb6c02795098e949d2c2fda8e3a599788d2bdc55f956dadcfb58a24ba13a7fe6736482b2b6cbc581999ddfff2274079dceec28ea07007e7662ac187f032b55221c9a349dc73202bb2d3e7cb5fc91b3cc8303c518e92bad5c49f7fdd82d801d65f20a0960505c694709c2b56f6bc0a98eec1eda98e0a34dc543c0fc7c4610b5929147dd977d3b15e65ec29a9f4", 0xa3}, {&(0x7f0000001c80)="90393fed6c1401fbc307f414b15f61435b0dde8b4160ef23a68eb9f550b9ea727da8f2733b9be9fad0b747f993f14d4e1c7ec3eaf1ae195f2c579f0a3617d7ec369bcb89c9ec60d73e465d4eeff434deca5b2f02d184f0d9264da2128c90df2df76796995dfa16d7e0eca3c546b5900f46db74a35643553b08c928e1df535717e92700c5bfcecc62c5fe79fef9cc819eeeb721927dbcd5ac446631c5d51d7d508aecd52e1411a9e5436dd690fdc31edf5a0ed8b869699ede9dc98f4842e7df69f919108c3869695cb7f18832", 0xcc}, {&(0x7f0000001d80)="e26447332a201fe48d5be21706d7a1d6fbacbbd707be6d24dfa505abaac254b4e4e3ffe032c56938d3852c57e8d3694555f755b2b6fea7fc6d922e5d28301e56f7d35a80f0ade0d3c908efd1b3d3024d51d258237738d93740c51495ff011fa18d012b05d5eeaa1f6b9a387db47abbde792ced2ca228f4e79408c06bd407adffdee3dc46bf75cfb3abf745d8567ed3e19d8afa87cbd67fe12c101cf17f4f7f586118ecfef7c87605e510cb1920e20928fa153906e679ca1c6844283042d03f1a2045ba27ed56cea57e95500fd85dad28cb272dfd30b553123db786a3", 0xdc}, {&(0x7f0000001e80)="3ce5c1600eddd51fab4f893f9a5fa115230bfc903ae0240415c8c0839084281a8c3f20b940a595c6fe0689e7cc176cd5d765b4210c93c08dcdb343e606d2197f9f3d31f5e702747ac63e7983049dd202ce91d2a58d81a2cc519ffd46b4481b88bb671e9b9e8f291e", 0x68}, {&(0x7f0000001f00)="79f9bdf14b5a1e2810ab0e8368b6986987cc538bd5d9ac7173ef297cfe6da8dcf16b8cbb0cb88f4fefd494e0228674a8aa0041168515078da9c6a475d9524c81", 0x40}, {&(0x7f0000001f40)="00d3798f1722c9b3d477ca76b2ec5a89b5e0163cab6985c92cc5a288baca11423939f2d5090a5f3992b271d69d58c5ad112f574578d824f794922948bfe4326659a72c50bb1043f1d9b7a5e4c5f39effcd928bf226562fcfb5a62c398b5998", 0x5f}, {&(0x7f0000001fc0)="96334c58fa6bd7ebf78b3c2c05e11532256ae7703491237a401e92e96470d77f317566207e00736129c30402e5c5e4ee73c51cd6b48a4f9539111975abdbf096cf2a290723fb141d6009ac4f130261f0e1289fab5ef7ea40abef698d8ff630fbf2b5802e27d6f8927b8aa0c9ac76fcce2dbf", 0x72}, {&(0x7f0000002040)="cc2e67f6117a818da3f462d08668497bad96a1de13ae879b2ee170f19c8f2f2199fe18f50ca0ff92d3ab5bda0c5d3f5fc44b7246e47ade5a997d", 0x3a}], 0x8, &(0x7f0000002100)=[@iv={0x28, 0x117, 0x2, 0x13, "7793a740d36584a02d8c0231e995cfe0bda264"}], 0x28, 0x4