c [ 440.144529][T17422] ? do_syscall_64+0x26/0x610 [ 440.149199][T17422] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 440.155243][T17422] ? do_syscall_64+0x26/0x610 [ 440.159904][T17422] __x64_sys_clone+0xbf/0x150 [ 440.164593][T17422] do_syscall_64+0x103/0x610 [ 440.169177][T17422] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 440.175067][T17422] RIP: 0033:0x458079 [ 440.178986][T17422] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 440.198613][T17422] RSP: 002b:00007f3505876c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 440.207019][T17422] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000458079 [ 440.215001][T17422] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 440.222965][T17422] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 440.230944][T17422] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f35058776d4 [ 440.238893][T17422] R13: 00000000004be379 R14: 00000000004cea80 R15: 00000000ffffffff [ 440.251096][T17422] memory: usage 307044kB, limit 307200kB, failcnt 186 [ 440.258153][T17422] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 440.267286][T17422] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 440.274460][T17422] Memory cgroup stats for /syz4: cache:0KB rss:273496KB rss_huge:260096KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:273480KB inactive_file:0KB active_file:8KB unevictable:0KB 14:09:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0x100000) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:09:06 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000040), &(0x7f00000000c0)=0x4) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000440)={'filter\x00', 0x7, 0x4, 0x4a0, 0x278, 0x278, 0x278, 0x3b8, 0x3b8, 0x3b8, 0x4, &(0x7f0000000000), {[{{@uncond, 0xf0, 0x118}, @unspec=@CLASSIFY={0x28, 'CLASSIFY\x00', 0x0, {0x8a}}}, {{@uncond, 0xf0, 0x160}, @unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0xfff, 0x4, 0x7, 0x1, 0x0, "cfd087b10af8fc13caf57a69e2ea12a41b3a966429bb77ce9012cc929a3abc2a3feb7c478561d0b3ed10d775bfcf579142851a99d0c73324e1651370a0c48637"}}}, {{@arp={@dev={0xac, 0x14, 0x14, 0x29}, @rand_addr, 0xff000000, 0xff000000, @mac=@remote, {[0xff]}, @empty, {[0xff, 0xff, 0xff, 0xff]}, 0x6c4a, 0xd930, 0x42ea, 0x0, 0x0, 0x3, 'veth0_to_hsr\x00', 'bcsf0\x00', {0xff}, {0xff}, 0x0, 0x10}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@random="3ea2d7af3bbc", @empty, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4f0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, 0xffffffffffffffff, 0x2000) 14:09:06 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f0000000180)='vboxnet0\x00') r2 = dup2(r0, r0) readlinkat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)=""/203, 0xcb) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000300)={0x6, &(0x7f00000002c0)=[{0x1ff, 0x2f2a477e, 0x81}, {0x3, 0x400000000, 0xfffffffffffffffe, 0x400}, {0x3, 0x80, 0xc6, 0x80}, {0x5868, 0x40, 0x2}, {0x200, 0x1f, 0xf6d, 0x7}, {0x4, 0x7, 0x1, 0x1}]}) ioctl$TIOCMSET(r3, 0x5418, &(0x7f00000000c0)=0x5) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:06 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0xc876cc4f4c420ec8, 0xffffffffffffff9c) syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x20000) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x88800, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) 14:09:06 executing program 0: openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x8000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x43, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x20000, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x1, 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000340)='9p\x00', 0x200000, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@fscache='fscache'}, {@access_client='access=client'}, {@cachetag={'cachetag'}}, {@cache_mmap='cache=mmap'}, {@uname={'uname', 0x3d, '/selinux/mls\x00'}}, {@access_client='access=client'}, {@cache_fscache='cache=fscache'}, {@version_9p2000='version=9p2000'}, {@cache_loose='cache=loose'}, {@nodevmap='nodevmap'}], [{@hash='hash'}, {@uid_eq={'uid', 0x3d, r1}}, {@measure='measure'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'wlan0'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@seclabel='seclabel'}, {@subj_type={'subj_type', 0x3d, '/dev/media#\x00'}}, {@euid_eq={'euid'}}]}}) [ 440.295971][T17422] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=16537,uid=0 [ 440.311464][T17422] Memory cgroup out of memory: Killed process 16537 (syz-executor.4) total-vm:72580kB, anon-rss:2216kB, file-rss:34816kB, shmem-rss:0kB [ 440.404111][T17433] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 [ 440.450599][T17433] CPU: 0 PID: 17433 Comm: syz-executor.4 Not tainted 5.0.0+ #23 [ 440.458247][T17433] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 440.468306][T17433] Call Trace: [ 440.471613][T17433] dump_stack+0x172/0x1f0 [ 440.475983][T17433] dump_header+0x10f/0xb6c [ 440.480433][T17433] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 440.486257][T17433] ? ___ratelimit+0x60/0x595 [ 440.490859][T17433] ? do_raw_spin_unlock+0x57/0x270 [ 440.496000][T17433] oom_kill_process.cold+0x10/0x15 [ 440.501124][T17433] out_of_memory+0x79a/0x1280 [ 440.505817][T17433] ? lock_downgrade+0x880/0x880 [ 440.510703][T17433] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 440.516956][T17433] ? oom_killer_disable+0x280/0x280 [ 440.522183][T17433] ? find_held_lock+0x35/0x130 [ 440.527005][T17433] mem_cgroup_out_of_memory+0x1ca/0x230 [ 440.532568][T17433] ? memcg_event_wake+0x230/0x230 [ 440.537610][T17433] ? do_raw_spin_unlock+0x57/0x270 [ 440.542733][T17433] ? _raw_spin_unlock+0x2d/0x50 [ 440.547595][T17433] try_charge+0x102c/0x15c0 [ 440.552158][T17433] ? find_held_lock+0x35/0x130 [ 440.556933][T17433] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 440.562487][T17433] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 440.562501][T17433] ? find_held_lock+0x35/0x130 [ 440.562516][T17433] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 440.562541][T17433] __memcg_kmem_charge_memcg+0x7c/0x130 [ 440.562556][T17433] ? memcg_kmem_put_cache+0xb0/0xb0 [ 440.562574][T17433] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 440.562611][T17433] __memcg_kmem_charge+0x136/0x300 [ 440.599819][T17433] __alloc_pages_nodemask+0x437/0x7e0 [ 440.605203][T17433] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 440.610923][T17433] ? save_stack+0x45/0xd0 [ 440.615249][T17433] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 440.621058][T17433] ? __lock_acquire+0x548/0x3fb0 [ 440.626001][T17433] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 440.632241][T17433] alloc_pages_current+0x107/0x210 [ 440.637368][T17433] pte_alloc_one+0x1b/0x1a0 [ 440.641882][T17433] __pte_alloc+0x20/0x310 [ 440.646228][T17433] copy_page_range+0x1529/0x1f90 [ 440.651169][T17433] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 440.656889][T17433] ? pmd_alloc+0x180/0x180 [ 440.661303][T17433] ? validate_mm_rb+0xa3/0xc0 [ 440.665972][T17433] ? __vma_link_rb+0x279/0x370 [ 440.670784][T17433] copy_process.part.0+0x568b/0x7980 [ 440.676095][T17433] ? __cleanup_sighand+0x60/0x60 [ 440.681095][T17433] _do_fork+0x257/0xfd0 [ 440.685260][T17433] ? fork_idle+0x1d0/0x1d0 [ 440.689692][T17433] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 440.695189][T17433] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 440.700661][T17433] ? do_syscall_64+0x26/0x610 [ 440.705336][T17433] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 440.705351][T17433] ? do_syscall_64+0x26/0x610 [ 440.705384][T17433] __x64_sys_clone+0xbf/0x150 [ 440.705415][T17433] do_syscall_64+0x103/0x610 [ 440.705432][T17433] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 440.705444][T17433] RIP: 0033:0x458079 [ 440.705459][T17433] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 440.705467][T17433] RSP: 002b:00007f3505855c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 440.763699][T17433] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000458079 [ 440.771684][T17433] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 440.779658][T17433] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 440.787624][T17433] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f35058566d4 [ 440.795584][T17433] R13: 00000000004be379 R14: 00000000004cea80 R15: 00000000ffffffff [ 440.815500][T17433] memory: usage 307044kB, limit 307200kB, failcnt 202 [ 440.825194][T17433] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 440.833792][T17433] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 14:09:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r1) r3 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r2) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000100)={{0x2, 0x4e20}, {0x6, @broadcast}, 0x60, {0x2, 0x4e22, @local}, 'bpq0\x00'}) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r3, &(0x7f0000001a40)=""/4096, 0x1000) 14:09:07 executing program 2: clock_gettime(0x0, &(0x7f0000000000)) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x60000, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000100)={0x0, r1}) r2 = dup(0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x1, 0x1, {0x10000000003ff}, 0x1, 0x0, 0x25}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r3, 0x0) 14:09:07 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000200)=0x9) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) r3 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0xf88, 0x1) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x200000, 0x0) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000001c0)={0x0, &(0x7f00000000c0), 0x0, r4, 0xc}) keyctl$restrict_keyring(0x1d, r2, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$PPPIOCSFLAGS(r5, 0x40047459, &(0x7f0000000240)=0x44822) 14:09:07 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x3, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) ioctl$VIDIOC_G_EDID(r1, 0xc0285628, &(0x7f0000000200)={0x0, 0x4, 0x8, [], &(0x7f00000001c0)=0x202a0615}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000000)={0x0, 0xfffffffffffffffc}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000000c0)={0x0, 0x8, 0x3, 0x4, r3}, &(0x7f0000000140)=0x10) ioctl$KVM_REINJECT_CONTROL(r2, 0xae71, &(0x7f0000000240)={0xffffffffffffffe5}) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x20011, r2, 0x2000) [ 440.840725][T17433] Memory cgroup stats for /syz4: cache:0KB rss:273488KB rss_huge:260096KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:273468KB inactive_file:4KB active_file:4KB unevictable:0KB [ 440.865467][T17433] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=17386,uid=0 [ 440.880987][T17433] Memory cgroup out of memory: Killed process 17386 (syz-executor.4) total-vm:72580kB, anon-rss:2216kB, file-rss:35672kB, shmem-rss:0kB 14:09:07 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) inotify_init1(0x80800) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)={0x0, r1, 0x3, 0x2}, 0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x2000) 14:09:07 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) timerfd_gettime(r0, &(0x7f0000000000)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000080)={0x1f, 0x3c8c800000000, 0x2, 0x5, 0x3, [{0x7, 0xffffffff, 0x2, 0x0, 0x0, 0x1}, {0x8001, 0x5, 0x10001, 0x0, 0x0, 0x100}, {0x9, 0x0, 0x9, 0x0, 0x0, 0x400}]}) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) gettid() [ 441.086114][T17462] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 441.110626][T17462] CPU: 0 PID: 17462 Comm: syz-executor.4 Not tainted 5.0.0+ #23 [ 441.118264][T17462] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 441.128323][T17462] Call Trace: [ 441.131649][T17462] dump_stack+0x172/0x1f0 [ 441.136025][T17462] dump_header+0x10f/0xb6c [ 441.140494][T17462] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 441.146312][T17462] ? ___ratelimit+0x60/0x595 [ 441.150910][T17462] ? do_raw_spin_unlock+0x57/0x270 [ 441.156035][T17462] oom_kill_process.cold+0x10/0x15 [ 441.161176][T17462] out_of_memory+0x79a/0x1280 [ 441.165870][T17462] ? lock_downgrade+0x880/0x880 [ 441.170730][T17462] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 441.176995][T17462] ? oom_killer_disable+0x280/0x280 [ 441.182199][T17462] ? find_held_lock+0x35/0x130 [ 441.186999][T17462] mem_cgroup_out_of_memory+0x1ca/0x230 [ 441.192551][T17462] ? memcg_event_wake+0x230/0x230 [ 441.197638][T17462] ? do_raw_spin_unlock+0x57/0x270 [ 441.202762][T17462] ? _raw_spin_unlock+0x2d/0x50 [ 441.207621][T17462] try_charge+0x102c/0x15c0 [ 441.212127][T17462] ? find_held_lock+0x35/0x130 [ 441.216905][T17462] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 441.222459][T17462] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 441.228720][T17462] ? kasan_check_read+0x11/0x20 [ 441.233588][T17462] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 441.239142][T17462] mem_cgroup_try_charge+0x24d/0x5e0 [ 441.244442][T17462] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 441.250096][T17462] wp_page_copy+0x408/0x1740 [ 441.254692][T17462] ? find_held_lock+0x35/0x130 [ 441.259455][T17462] ? pmd_pfn+0x1d0/0x1d0 [ 441.263692][T17462] ? lock_downgrade+0x880/0x880 [ 441.268545][T17462] ? swp_swapcount+0x540/0x540 [ 441.273308][T17462] ? kasan_check_read+0x11/0x20 [ 441.273324][T17462] ? do_raw_spin_unlock+0x57/0x270 [ 441.273342][T17462] do_wp_page+0x5d8/0x16c0 [ 441.273363][T17462] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 441.273389][T17462] __handle_mm_fault+0x22e8/0x3ec0 [ 441.273410][T17462] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 441.303731][T17462] ? find_held_lock+0x35/0x130 [ 441.308498][T17462] ? handle_mm_fault+0x322/0xb30 [ 441.308524][T17462] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 441.308541][T17462] ? kasan_check_read+0x11/0x20 [ 441.308561][T17462] handle_mm_fault+0x43f/0xb30 [ 441.329328][T17462] __do_page_fault+0x5ef/0xda0 [ 441.329354][T17462] do_page_fault+0x71/0x581 [ 441.338610][T17462] ? page_fault+0x8/0x30 [ 441.342905][T17462] page_fault+0x1e/0x30 [ 441.347067][T17462] RIP: 0033:0x43f371 [ 441.351011][T17462] Code: 8d 15 13 5e 0a 00 8b 0c 8a 8b 04 82 29 c8 c3 66 2e 0f 1f 84 00 00 00 00 00 48 83 fa 20 48 89 f8 73 77 f6 c2 01 74 0b 0f b6 0e <88> 0f 48 ff c6 48 ff c7 f6 c2 02 74 12 0f b7 0e 66 89 0f 48 83 c6 [ 441.370635][T17462] RSP: 002b:00007ffe1c83f7f8 EFLAGS: 00010202 [ 441.376698][T17462] RAX: 0000000020000040 RBX: 000000000073c900 RCX: 000000000000000a 14:09:07 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x9, 0x200002) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r2, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_S390_VCPU_FAULT(r1, 0x4008ae52, &(0x7f00000000c0)=0xe1a) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0x1000000) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:09:07 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'ip6erspan0\x00', 0x0}) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000180)={@ipv4={[], [], @rand_addr=0x5587}, r1}, 0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r3, 0x0) 14:09:07 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) r0 = getpid() capset(&(0x7f0000000080)={0x399f1736, r0}, &(0x7f00000000c0)={0x1, 0x2, 0x10001, 0x8001, 0x6f76}) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x4001) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003180)=[{{&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)=""/99, 0x63}], 0x1, &(0x7f0000000380)=""/177, 0xb1}, 0x100}, {{&(0x7f0000000440)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/186, 0xba}], 0x1, &(0x7f00000005c0)=""/72, 0x48}, 0x7f}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000640)=""/48, 0x30}], 0x1, &(0x7f00000006c0)=""/95, 0x5f}, 0x998}, {{&(0x7f0000000740)=@isdn, 0x80, &(0x7f0000000840)=[{&(0x7f00000007c0)=""/90, 0x5a}], 0x1, &(0x7f0000000880)=""/159, 0x9f}, 0x2}, {{&(0x7f0000000940)=@nfc_llcp, 0x80, &(0x7f0000001c80)=[{&(0x7f00000009c0)=""/40, 0x28}, {&(0x7f0000000a00)=""/107, 0x6b}, {&(0x7f0000000a80)=""/4096, 0x1000}, {&(0x7f0000001a80)=""/223, 0xdf}, {&(0x7f0000001b80)=""/241, 0xf1}], 0x5, &(0x7f0000001d00)=""/146, 0x92}, 0x8}, {{&(0x7f0000001dc0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000002e40)=[{&(0x7f0000001e40)=""/4096, 0x1000}], 0x1, &(0x7f0000002e80)=""/198, 0xc6}, 0x7}, {{&(0x7f0000002f80)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f0000003100)=[{&(0x7f0000003000)=""/227, 0xe3}], 0x1, &(0x7f0000003140)=""/47, 0x2f}, 0x4}], 0x7, 0x2000, &(0x7f0000003340)={0x77359400}) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000003380)={&(0x7f0000000000/0x4000)=nil, 0x4000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x100, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f0000003440)=0x7, 0x4) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KVM_REINJECT_CONTROL(r1, 0xae71, &(0x7f00000034c0)={0x8}) keyctl$restrict_keyring(0x1d, r5, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$P9_RFLUSH(r6, &(0x7f0000003480)={0x7, 0x6d, 0x2}, 0x7) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000100)={0x0, 0x1}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f00000033c0)={r7, 0x3f9, 0x30}, &(0x7f0000003400)=0xc) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:07 executing program 0: openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x8000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x43, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x20000, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000340)='9p\x00', 0x200000, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@fscache='fscache'}, {@access_client='access=client'}, {@cachetag={'cachetag'}}, {@cache_mmap='cache=mmap'}, {@uname={'uname', 0x3d, '/selinux/mls\x00'}}, {@access_client='access=client'}, {@cache_fscache='cache=fscache'}, {@version_9p2000='version=9p2000'}, {@cache_loose='cache=loose'}, {@nodevmap='nodevmap'}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@measure='measure'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'wlan0'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@seclabel='seclabel'}, {@subj_type={'subj_type', 0x3d, '/dev/media#\x00'}}, {@euid_eq={'euid'}}]}}) [ 441.384669][T17462] RDX: 000000000000000b RSI: 0000000000740080 RDI: 0000000020000040 [ 441.392637][T17462] RBP: 000000000073c900 R08: 000000000006ba67 R09: 000000000006ba67 [ 441.392646][T17462] R10: 00007ffe1c83f8c0 R11: 0000000000000246 R12: fffffffffffffffe [ 441.392655][T17462] R13: 000000000006bad1 R14: 00000000000003e8 R15: 000000000073bf0c 14:09:07 executing program 1: ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000440)=0x8e) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000280)={{0x7fff}, 'port0\x00', 0x8, 0x100000, 0x477, 0x7f, 0x80000000, 0x3, 0x0, 0x0, 0x5, 0x3f}) ioctl$KVM_GET_REGS(r0, 0x8090ae81, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_SIGNAL_MASK(r0, 0x4004ae8b, &(0x7f0000000080)={0x46, "7f10d9bf4e8270ecb6db5a17eccf3a4ebad771d9f0fbcb1ace3238f00df78ce73febe77a9ce90a57db97dbc4ceb0053b2e0a80e647f358137379d154b7fc9d815f397abc101e"}) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) ioctl$SIOCX25SCAUSEDIAG(r0, 0x89ec, &(0x7f0000000140)={0x2, 0x6}) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x2000) [ 441.462614][T17462] memory: usage 307176kB, limit 307200kB, failcnt 238 [ 441.469454][T17462] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 441.518117][T17462] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 441.599843][T17462] Memory cgroup stats for /syz4: cache:0KB rss:273468KB rss_huge:260096KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:273544KB inactive_file:4KB active_file:0KB unevictable:0KB [ 441.635468][T17462] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=16654,uid=0 [ 441.673115][T17462] Memory cgroup out of memory: Killed process 16654 (syz-executor.4) total-vm:72580kB, anon-rss:2216kB, file-rss:34816kB, shmem-rss:0kB [ 441.696498][ T1042] oom_reaper: reaped process 16654 (syz-executor.4), now anon-rss:0kB, file-rss:34688kB, shmem-rss:0kB 14:09:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r1) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0xff) r2 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r1) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000680)={0x0, 0x401}, &(0x7f00000006c0)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000700)={r4, 0x4}, 0x8) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/4096, 0x1000) 14:09:07 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r0, 0x4040aea0, &(0x7f0000000080)={0x2, 0x2, 0x3688, 0x0, 0x1ff, 0x4, 0x7fff, 0x2010c61d, 0x8, 0x20, 0x1, 0xffff, 0x0, 0xf9, 0x4, 0x80000000, 0x6, 0x3, 0x400}) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) 14:09:07 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000422}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)={0x68, r2, 0x302, 0x70bd2a, 0x25dfdbfd, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0xa03, @media='udp\x00'}}}, ["", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x40}, 0x4000000) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) inotify_init1(0x80800) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r3, 0x2000) 14:09:07 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) r2 = dup(r0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r2, 0x117, 0x5, 0x0, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x40000, 0x0) ioctl$EVIOCGKEYCODE(r3, 0x80084504, &(0x7f00000001c0)=""/4096) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x4e20, @multicast1}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_FREE_BUFS(r3, 0x4010641a, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[0xffffffffffff0001]}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl(r3, 0x0, &(0x7f00000011c0)="a34732264294993516ea39b873a2adc8d3106d024c63ab266d6314bd52edc0603aa9344cd6073267c529938a38c44d57136be0830b74db79601a0dccc89a08cf287e4032482ab6cfa6bf662f570b7b1bc28b87aa953adb209310c07f74de256b40973c066cecb28673e9b69b5ec349ea") 14:09:08 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r0, 0xc0385720, &(0x7f0000000000)={0x1, {0x77359400}, 0x40, 0x81}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000080)={{0x3, 0x2}, 0x1, 0xb6, 0x99, {0x0, 0x1}, 0x9, 0x3f}) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) 14:09:08 executing program 1: ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r0 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xe9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x20010, r1, 0x0) ioctl$SIOCRSSL2CALL(r0, 0x89e2, &(0x7f0000000000)=@bcast) 14:09:08 executing program 5: syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x2, 0x800) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x20200, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000140)=0x9, 0x4) keyctl$restrict_keyring(0x1d, r2, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r3, 0x4040534e, 0x0) [ 442.074660][T17538] QAT: Invalid ioctl [ 442.146407][T17542] QAT: Invalid ioctl 14:09:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r1) r3 = add_key(&(0x7f0000000140)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r2) r4 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4a, 0x1) write$P9_RMKDIR(r4, &(0x7f0000000100)={0x14, 0x49, 0x2, {0x82, 0x3, 0x6}}, 0x14) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r3, &(0x7f0000000a40)=""/4096, 0x1000) 14:09:08 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) 14:09:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0x2000000) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:09:08 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000080)={0x7, 0x70, 0x4f43, 0x8, 0x8, 0x7, 0x0, 0x7, 0x100, 0x2, 0x0, 0x3ff, 0x6, 0x9, 0x6, 0x7, 0x1ff, 0x7fff, 0x6, 0x6, 0x4, 0x7, 0x5, 0x6, 0x3, 0x1, 0x8000, 0x3, 0x3, 0x9, 0x3f84e717, 0x400, 0x7, 0xfffffffffffffd6e, 0x1fe6, 0xfffffffffffffffd, 0xffffffffffffffce, 0x7ff, 0x0, 0x20, 0x4, @perf_bp={&(0x7f0000000140), 0x1}, 0xa0, 0x4, 0x4b8689ea, 0x2, 0x7fffffff, 0xffffffff, 0xffffffffffffff81}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_int(r1, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x2000) 14:09:08 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, r1) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:08 executing program 0: openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x8000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x43, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x20000, 0x0) mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000340)='9p\x00', 0x200000, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@fscache='fscache'}, {@access_client='access=client'}, {@cachetag={'cachetag'}}, {@cache_mmap='cache=mmap'}, {@uname={'uname', 0x3d, '/selinux/mls\x00'}}, {@access_client='access=client'}, {@cache_fscache='cache=fscache'}, {@version_9p2000='version=9p2000'}, {@cache_loose='cache=loose'}, {@nodevmap='nodevmap'}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@measure='measure'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'wlan0'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@seclabel='seclabel'}, {@subj_type={'subj_type', 0x3d, '/dev/media#\x00'}}, {@euid_eq={'euid'}}]}}) 14:09:08 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000080)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f00000000c0)=0xffffffffffffff26) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x2000) 14:09:08 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f00000001c0)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000000007000030030000180200005004000050040000500400000400000000000000000000000000000000", @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0001802000000000000000000000000000000000000000000000000000028015345434d41524b0000000000000000000000000000000000000000000000010000000600000073797374656d5f753a6f626a6563745f723a73657472616e735f7661725f72756e5f743a73300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0001801000000000000000000000000000000000000000000000000000028004e4651554555450000000000000000000000000000000000000000000003fbff790001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f000200100000000000000000000000000000000000000000000000000003000434f4e4e4d41524b00000000000000000000000000000000000000000001090000000800000006000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x588) socket$rds(0x15, 0x5, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video36\x00', 0x2, 0x0) 14:09:08 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) ioctl$SIOCAX25ADDUID(r0, 0x89e1, &(0x7f0000000580)={0x3, @bcast, r1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x0) 14:09:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f5dc9c575709e3892") r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r1) r3 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r2) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r3, &(0x7f0000000a40)=""/4096, 0x1000) [ 442.622047][T17581] QAT: Invalid ioctl [ 442.727983][T17581] QAT: Invalid ioctl 14:09:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r1) r3 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r2) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r3, &(0x7f0000000a40)=""/4096, 0x44e) 14:09:08 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x200000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f00000003c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000b80)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000dc0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000d80)={&(0x7f0000000bc0)={0x184, r1, 0x300, 0x70bd2c, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x168, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x2c9}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xffffffff}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x697}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8}}}]}}]}, 0x184}, 0x1, 0x0, 0x0, 0x24040000}, 0x40004) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) getsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000400), &(0x7f0000000440)=0x4) keyctl$restrict_keyring(0x1d, r5, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) fchmodat(r6, &(0x7f0000000080)='\x00', 0x61) r7 = semget$private(0x0, 0x7, 0x1) semctl$SEM_INFO(r7, 0x7, 0x13, &(0x7f00000001c0)=""/176) 14:09:09 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x3, 0x420000) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc4c85513, &(0x7f0000000440)={{0x8, 0x3, 0x6, 0x5, '\x00', 0x4}, 0x1, [0x22, 0x4, 0x6beccde20000000, 0x401, 0x81, 0x9, 0x9, 0xae, 0x7, 0x6, 0xfffffffffffffffb, 0xd72d, 0x8001, 0x5, 0x4, 0x2, 0xfb, 0x101, 0xffffffffffffed14, 0x1, 0xee, 0x6, 0x4, 0x1, 0x32, 0x9, 0x8000, 0xffff, 0x1, 0x7, 0x100000000, 0x3, 0x1ff, 0x100, 0x51b063b4, 0xfffffffffffffffb, 0x9, 0x8, 0x7, 0x4, 0x7, 0x6, 0x1, 0x1, 0x4e, 0x8, 0x100000001, 0x1ff, 0x8, 0x3, 0x7, 0x2, 0xe0e, 0x80, 0xae54, 0x100, 0xd3, 0x200, 0x8, 0x2, 0x56, 0x7, 0x80000001, 0x80000001, 0x3, 0x2, 0x3, 0x6, 0x9, 0x0, 0x7, 0x2, 0x3f, 0x0, 0x4, 0x80000001, 0x4, 0x7, 0xfdd2, 0x9, 0x800, 0x1, 0x5, 0x9d, 0x4, 0x2, 0x80000001, 0xb585c30, 0x2, 0x3, 0x7fff, 0x4, 0x3, 0x8, 0x4, 0x8, 0xaf9, 0xbf3, 0x800, 0x1, 0x7000000, 0x4, 0x2, 0x7, 0x9, 0x8, 0x3, 0x5, 0x0, 0x100000001, 0x800000000000, 0x400000000000, 0x401, 0x9, 0x1000, 0x80, 0x6, 0x992, 0x4, 0xf32c, 0x7ff, 0x1ff, 0x9, 0x7, 0x1, 0x5, 0x5b, 0x7]}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x2040, 0x0) ioctl$KVM_IOEVENTFD(r0, 0x4040ae79, &(0x7f0000000100)={0x103000, &(0x7f0000000080), 0x4, r1, 0x4}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x204, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x0) ioctl$UI_SET_ABSBIT(r2, 0x40045567, 0x7) 14:09:09 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000080)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) ioctl$IMADDTIMER(r1, 0x80044940, &(0x7f0000000000)=0xf4254) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f00000001c0)) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$LOOP_GET_STATUS64(r2, 0x4c05, &(0x7f0000000440)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r2, 0xc08c5335, &(0x7f00000002c0)={0x6f8, 0x4, 0x3f, 'queue1\x00', 0x2}) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x2000) 14:09:09 executing program 0: openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x8000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x43, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000340)='9p\x00', 0x200000, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@fscache='fscache'}, {@access_client='access=client'}, {@cachetag={'cachetag'}}, {@cache_mmap='cache=mmap'}, {@uname={'uname', 0x3d, '/selinux/mls\x00'}}, {@access_client='access=client'}, {@cache_fscache='cache=fscache'}, {@version_9p2000='version=9p2000'}, {@cache_loose='cache=loose'}, {@nodevmap='nodevmap'}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@measure='measure'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'wlan0'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@seclabel='seclabel'}, {@subj_type={'subj_type', 0x3d, '/dev/media#\x00'}}, {@euid_eq={'euid'}}]}}) 14:09:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000100)={'syz', 0x2}, 0xfffffffffffffffe, 0x0, 0xfffffffffffffff9) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r1) r3 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r2) clone(0x0, 0x0, 0x0, 0x0, 0x0) r4 = syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x8, 0x460002) ioctl$EVIOCGKEYCODE(r4, 0x80084504, &(0x7f0000000240)=""/40) r5 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x4, 0x8800) ioctl$KVM_SET_CPUID(r5, 0x4008ae8a, &(0x7f0000000640)=ANY=[@ANYRES16=r0, @ANYBLOB="fe1936d383bd9a704e5fffed500d6a5efbe2ba8ddaae344f93bcba0ad4bae546a66bd29295dccc15a4652bc7750ed07380476b6229aff2320bf63ea84d98a924db9544527f508fee5a240f1da427e0b599a7623b4bce9131481e163d3998cb3be990433f95ee51aa7d8740d278fad7c523e965f534f8b5aed6ad1870b4808849c479c8808a7692409c068a19874f735e2fe37cbdfac79d7528c5d7bc154484bf2aa8460a84c5e7dc755f13000232e7757a", @ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYPTR, @ANYBLOB="c7fa480fc609fd364c9abc9bb6453b6bac058fa6ca8b81c07089584a52e47259880136e463ff4b0c5b1b4b7bfe4abe77f828c7e42abb84d3187bd28081d483e186c743ffe476de80ba5211c547281c1317c2c3a38c282a84"], @ANYRESHEX=r5, @ANYRESOCT=r2, @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESHEX=r1, @ANYRESHEX=r0, @ANYPTR64=&(0x7f0000000300)=ANY=[@ANYRES64=0x0, @ANYRESHEX=0x0, @ANYRESOCT, @ANYRES64=r3, @ANYRES64=r0, @ANYRES32=0x0, @ANYBLOB="d0f8fb031585a55ffc53af6e0ae91692da010000001ceb5e2b93ad31b08f70017d3d50678edc4eefe86caa648f23dff748995a0d06f5cfad7468adf6740551e3f22f0cc4ed56cef551218bdf27a4a738e03704ffccffea2a0101b2dc0970b7059114385e6462c0f8e1", @ANYPTR], @ANYRES32=r4], @ANYRESOCT=r3, @ANYRESOCT=r0, @ANYRES32=r1]) keyctl$read(0xb, r3, &(0x7f0000000a40)=""/4096, 0x1000) 14:09:09 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) keyctl$session_to_parent(0x12) r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) 14:09:09 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000140)='bond_slave_0\x00', 0xfffffffffffffffb) r1 = add_key(&(0x7f0000000200)='pkcs7_test\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="b9079c746451ee101d292ab05c353a49a16a51d183b6830dafd3aa38ffcbfa1686dae9f16fced12bb351d2a4b6914b4a124338c3ea3a54fb08eef76b6dbdbbce0c1c2b6d5a2a545eec2c75da94860664e7f1ece4b16c4547a8f538c472f1ef16c0d63817bd3962423a20474a94ca9c1fedf8973593cb7f3cbc501d6c67b46d9337999e14db60cd7a2a50f6b985a2ad5712fcd1636492c4f4a6afcde5b62fc62bd1c6244c051ebb", 0xa7, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', 0x0, 0x0, 0x0, r1) keyctl$restrict_keyring(0x1d, r2, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:09 executing program 1: ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000140)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r0 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000080)=0x10) sendto$ax25(r0, &(0x7f00000000c0)="460e180a8e876368a79a0e3624e30b617b07dd161031", 0x16, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ustat(0x7, &(0x7f0000000000)) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x2000) 14:09:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0x3000000) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:09:09 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x3, 0x1000, 0x10, &(0x7f0000fff000/0x1000)=nil) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) [ 443.458608][T17623] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 443.491874][T17623] CPU: 1 PID: 17623 Comm: syz-executor.4 Not tainted 5.0.0+ #23 14:09:09 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r3 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000080)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r2, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, r3, 0x400, 0x70bd27, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x200008c4) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x2000) [ 443.499536][T17623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 443.509587][T17623] Call Trace: [ 443.512886][T17623] dump_stack+0x172/0x1f0 [ 443.517235][T17623] dump_header+0x10f/0xb6c [ 443.521678][T17623] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 443.527500][T17623] ? ___ratelimit+0x60/0x595 [ 443.532099][T17623] ? do_raw_spin_unlock+0x57/0x270 [ 443.537221][T17623] oom_kill_process.cold+0x10/0x15 [ 443.542361][T17623] out_of_memory+0x79a/0x1280 [ 443.547078][T17623] ? lock_downgrade+0x880/0x880 [ 443.551936][T17623] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 443.558198][T17623] ? oom_killer_disable+0x280/0x280 [ 443.563401][T17623] ? find_held_lock+0x35/0x130 [ 443.568182][T17623] mem_cgroup_out_of_memory+0x1ca/0x230 [ 443.573736][T17623] ? memcg_event_wake+0x230/0x230 [ 443.578775][T17623] ? do_raw_spin_unlock+0x57/0x270 [ 443.583896][T17623] ? _raw_spin_unlock+0x2d/0x50 [ 443.588760][T17623] try_charge+0x102c/0x15c0 [ 443.593269][T17623] ? find_held_lock+0x35/0x130 [ 443.598054][T17623] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 14:09:09 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000000)={0x0, 0xfff, 0x30}, &(0x7f0000000080)=0xc) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000001c0)={r2, @in={{0x2, 0x4e21, @multicast1}}, 0x8, 0x9}, 0x90) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r3, 0x2000) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f00000000c0)={0x5, 0x10001, 0x8, 0x400}) [ 443.603627][T17623] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 443.609876][T17623] ? kasan_check_read+0x11/0x20 [ 443.614764][T17623] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 443.614796][T17623] mem_cgroup_try_charge+0x24d/0x5e0 [ 443.614825][T17623] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 443.631314][T17623] wp_page_copy+0x408/0x1740 [ 443.631330][T17623] ? find_held_lock+0x35/0x130 [ 443.631352][T17623] ? pmd_pfn+0x1d0/0x1d0 [ 443.631369][T17623] ? lock_downgrade+0x880/0x880 [ 443.631384][T17623] ? swp_swapcount+0x540/0x540 [ 443.631410][T17623] ? kasan_check_read+0x11/0x20 [ 443.659418][T17623] ? do_raw_spin_unlock+0x57/0x270 [ 443.664546][T17623] do_wp_page+0x5d8/0x16c0 [ 443.669009][T17623] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 443.674452][T17623] __handle_mm_fault+0x22e8/0x3ec0 [ 443.679618][T17623] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 443.685175][T17623] ? find_held_lock+0x35/0x130 [ 443.689944][T17623] ? handle_mm_fault+0x322/0xb30 [ 443.694911][T17623] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 443.701161][T17623] ? kasan_check_read+0x11/0x20 14:09:09 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x2000) [ 443.706032][T17623] handle_mm_fault+0x43f/0xb30 [ 443.710819][T17623] __do_page_fault+0x5ef/0xda0 [ 443.715620][T17623] do_page_fault+0x71/0x581 [ 443.720128][T17623] ? page_fault+0x8/0x30 [ 443.724376][T17623] page_fault+0x1e/0x30 [ 443.728543][T17623] RIP: 0033:0x40b8ad [ 443.732452][T17623] Code: 48 10 8b 4c 24 4c 88 58 20 48 8b 5c 24 50 80 60 20 01 48 89 2d 5c 06 33 00 89 48 24 48 89 58 18 31 c0 48 8b 8c 04 10 01 00 00 <48> 89 8c 02 30 bf 73 00 48 83 c0 08 48 83 f8 48 75 e6 e8 2c 75 ff [ 443.752063][T17623] RSP: 002b:00007ffe1c83f800 EFLAGS: 00010297 [ 443.758133][T17623] RAX: 0000000000000030 RBX: 0000000000000001 RCX: 0000000000000000 [ 443.766104][T17623] RDX: 00000000000000a0 RSI: 00007f3505855db0 RDI: 000000000073bfa8 [ 443.766114][T17623] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 00007f3505856700 [ 443.766122][T17623] R10: 00007f35058569d0 R11: 0000000000000202 R12: 000000000000001c [ 443.766130][T17623] R13: 0000000000000001 R14: 0000000000000005 R15: 000000000073bfac [ 443.770459][T17623] memory: usage 307200kB, limit 307200kB, failcnt 279 [ 443.805550][T17623] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 443.813776][T17623] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 443.820766][T17623] Memory cgroup stats for /syz4: cache:0KB rss:272012KB rss_huge:258048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:272208KB inactive_file:0KB active_file:4KB unevictable:0KB 14:09:09 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) r1 = syz_open_dev$dmmidi(0x0, 0x0, 0x9000) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0xa4, &(0x7f0000000080)=[@in6={0xa, 0x4e20, 0x6, @local, 0x7f}, @in6={0xa, 0x4e22, 0xff, @rand_addr="8a5d8a7b3a813d8032a05708ac566ad6", 0xcf1}, @in={0x2, 0x4e22, @broadcast}, @in={0x2, 0x4e23, @empty}, @in6={0xa, 0x4e21, 0x7, @empty, 0x2}, @in={0x2, 0x4e23, @remote}, @in={0x2, 0x4e23, @multicast2}, @in={0x2, 0x4e22, @remote}]}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000180)={r2, 0x1}, &(0x7f00000001c0)=0x8) socket$l2tp(0x18, 0x1, 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000200)={{0x2c, @broadcast, 0x4e20, 0x4, 'fo\x00', 0x0, 0x2, 0x3}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e21, 0x2002, 0x6, 0x0, 0x800}}, 0x44) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r3, 0x0) [ 443.856814][T17623] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=16696,uid=0 [ 443.872929][T17623] Memory cgroup out of memory: Killed process 16696 (syz-executor.4) total-vm:72580kB, anon-rss:2216kB, file-rss:34816kB, shmem-rss:0kB [ 443.918677][T17634] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 [ 443.946333][T17634] CPU: 1 PID: 17634 Comm: syz-executor.4 Not tainted 5.0.0+ #23 [ 443.953986][T17634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 443.964038][T17634] Call Trace: 14:09:10 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x1, 0x3}) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x8010, r2, 0x0) [ 443.967336][T17634] dump_stack+0x172/0x1f0 [ 443.971710][T17634] dump_header+0x10f/0xb6c [ 443.976163][T17634] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 443.981986][T17634] ? ___ratelimit+0x60/0x595 [ 443.986585][T17634] ? do_raw_spin_unlock+0x57/0x270 [ 443.991717][T17634] oom_kill_process.cold+0x10/0x15 [ 443.996835][T17634] out_of_memory+0x79a/0x1280 [ 444.001529][T17634] ? oom_killer_disable+0x280/0x280 [ 444.006761][T17634] ? find_held_lock+0x35/0x130 [ 444.011557][T17634] mem_cgroup_out_of_memory+0x1ca/0x230 [ 444.016287][T17659] IPVS: set_ctl: invalid protocol: 44 255.255.255.255:20000 [ 444.017132][T17634] ? memcg_event_wake+0x230/0x230 [ 444.017154][T17634] ? do_raw_spin_unlock+0x57/0x270 [ 444.017173][T17634] ? _raw_spin_unlock+0x2d/0x50 [ 444.017193][T17634] try_charge+0xa87/0x15c0 [ 444.017204][T17634] ? find_held_lock+0x35/0x130 [ 444.017227][T17634] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 444.017241][T17634] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 444.017255][T17634] ? find_held_lock+0x35/0x130 [ 444.017269][T17634] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 444.017296][T17634] __memcg_kmem_charge_memcg+0x7c/0x130 [ 444.017311][T17634] ? memcg_kmem_put_cache+0xb0/0xb0 [ 444.080929][T17634] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 444.080950][T17634] __memcg_kmem_charge+0x136/0x300 [ 444.080971][T17634] __alloc_pages_nodemask+0x437/0x7e0 [ 444.081013][T17634] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 444.097034][T17634] ? is_dynamic_key+0x1c0/0x1c0 [ 444.097052][T17634] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 444.097072][T17634] alloc_pages_current+0x107/0x210 14:09:10 executing program 0: openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x8000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x43, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000340)='9p\x00', 0x200000, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@fscache='fscache'}, {@access_client='access=client'}, {@cachetag={'cachetag'}}, {@cache_mmap='cache=mmap'}, {@uname={'uname', 0x3d, '/selinux/mls\x00'}}, {@access_client='access=client'}, {@cache_fscache='cache=fscache'}, {@version_9p2000='version=9p2000'}, {@cache_loose='cache=loose'}, {@nodevmap='nodevmap'}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@measure='measure'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'wlan0'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@seclabel='seclabel'}, {@subj_type={'subj_type', 0x3d, '/dev/media#\x00'}}, {@euid_eq={'euid'}}]}}) [ 444.097093][T17634] pte_alloc_one+0x1b/0x1a0 [ 444.097116][T17634] __handle_mm_fault+0x3491/0x3ec0 [ 444.128672][T17634] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 444.134247][T17634] ? find_held_lock+0x35/0x130 [ 444.134265][T17634] ? handle_mm_fault+0x322/0xb30 [ 444.134290][T17634] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 444.134308][T17634] ? kasan_check_read+0x11/0x20 [ 444.134335][T17634] handle_mm_fault+0x43f/0xb30 [ 444.150249][T17634] __do_page_fault+0x5ef/0xda0 [ 444.150277][T17634] do_page_fault+0x71/0x581 [ 444.150292][T17634] ? page_fault+0x8/0x30 [ 444.150309][T17634] page_fault+0x1e/0x30 [ 444.178149][T17634] RIP: 0033:0x458079 [ 444.182061][T17634] Code: Bad RIP value. [ 444.186128][T17634] RSP: 002b:00007f3505876c78 EFLAGS: 00010246 [ 444.192200][T17634] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000458079 [ 444.200177][T17634] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 444.208150][T17634] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 444.216126][T17634] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f35058776d4 [ 444.224107][T17634] R13: 00000000004be379 R14: 00000000004cea80 R15: 00000000ffffffff [ 444.247136][T17634] memory: usage 305024kB, limit 307200kB, failcnt 279 [ 444.254108][T17634] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 444.261633][T17634] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 444.268899][T17634] Memory cgroup stats for /syz4: cache:0KB rss:269968KB rss_huge:256000KB [ 444.268936][T17634] shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:270068KB inactive_file:0KB active_file:4KB unevictable:0KB [ 444.293559][T17634] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=16756,uid=0 14:09:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r1) r3 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r2) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r3, &(0x7f0000000a40)=""/4096, 0x1000) 14:09:10 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x162, @tick, 0x1, {0x3ff, 0x6}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x9, 0x200) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) r1 = syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x0) [ 444.309292][T17634] Memory cgroup out of memory: Killed process 16756 (syz-executor.4) total-vm:72580kB, anon-rss:2216kB, file-rss:34816kB, shmem-rss:0kB [ 444.325139][ T1042] oom_reaper: reaped process 16756 (syz-executor.4), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB 14:09:10 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x102) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffb, 0x6, &(0x7f0000001580)=[{&(0x7f00000001c0)="48749262b3bab2614f81cf724e065fd1da0bd5294ce55baed441a93f6ed26dae37f343501b6c130e6506881296e7cc73298221480384e5229320e190cd1439560f797ef7cbe75108203d7e2afbd7cd03adbd51273f206d04cb08", 0x5a, 0x9}, {&(0x7f0000000240)="6dbb34557fbf904053354d52d22fa50e47bf9b775b3c25e3aeade20f6b139b249c2bf2399fcaa6948cfcde0b280cd205ce27ef28f915de8bd0d6ac18f1c753ce04fd1f2a0f649f774cbadebcfcadb3839ea0b39c4717462dd05a415457002eb712b0a6050c1b10a125302d6a6ba6e50abe3c5645aada237908a1b47343384d24624efb8a451140f9bf8ebb50d95aea0ce18a51ce70664a209608c470d68eb705ac1616c32ece87659cba60022d9f36e7bebc624f2e9170a9befe46ef1b21d72b2e57e66b7407b3c41a4fc24afc59d016de8e51863f4f1e6fe00d6629a719bc12bf553cd5bc4691cf7eba7fa08b8c95bcf109", 0xf2, 0x4}, {&(0x7f0000000440)="0f4fa40ab34eadd4bd90e290071cf0ce583a82a2df836d399d915707ae7fd900050474b9e10738cd29c07139cfc96e00da1ceccced9727ba7be5db903cd292da834653b5951811", 0x47, 0x8000}, {&(0x7f00000004c0)="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", 0x1000, 0x100000001}, {&(0x7f00000000c0)="90877db0e8ab5e090804ba03e1dc167d20a686c995773734", 0x18, 0x1}, {&(0x7f00000014c0)="5b371ee133c8ced0a0ed57335b255bcb044f700935e82ab530c7fe82074aa005350aeb4812bc4b02a51b063ba1074ecd4676412781506baf30fe4d52ca9d74543a4d234e246ff82f6d5bdb9007ccadb904414d793fe6b46b9b80020b4e5348550dc5dcebac1cafbe7edc8a510317753cc6b1554e4e1e2ad14dd67a76ac636ddd6c2cb7c22bd0c15d63ad", 0x8a, 0xffffffffffffffff}], 0x10, &(0x7f0000001640)=ANY=[@ANYBLOB="636c6561725f6880d5d1191307ff9ba5457fb7517a63616368652c6e6f7373645f7370726561642c61636c2c73706163655f63616368653d76000000642c6f626a5f726f6c653d706f727430002c61707072616973652c646f6e745f6d6561737572652c736d61636b66737472616e736b7574653d2f6465762f6227002f7573622f30a7"]) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) getsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f0000001700)=""/174, &(0x7f0000000340)=0xae) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x2000) ioctl$VHOST_GET_VRING_BASE(r2, 0xc008af12, &(0x7f0000000140)) 14:09:10 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f00000000c0)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0x6100000) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:09:10 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x800, 0x0) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x300) r0 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x8000, 0x321000) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) 14:09:10 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f0000000180)='vboxnet0\x00') r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x200, 0x0) getpeername$netlink(r2, &(0x7f0000000200), &(0x7f0000000240)=0xc) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:10 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) r1 = syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000100)={0x4, &(0x7f00000000c0)=[{0xd1, 0x0, 0x1, 0x1}, {0x3, 0x100000001, 0x1000, 0x7f}, {0x200, 0x8000, 0x1, 0x69e}, {0x0, 0x1f, 0x100000001, 0x80000001}]}, 0x10) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) getsockopt$X25_QBITINCL(r1, 0x106, 0x1, &(0x7f0000000000), &(0x7f0000000080)=0x4) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x0) 14:09:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, r1) syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x7fffffff, 0x80) r3 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r2) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r3, &(0x7f0000000a40)=""/4096, 0x1000) 14:09:11 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000800)='/dev/usbmon#\x00', 0x1, 0x40000) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000840)='/dev/zero\x00', 0x4001, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000880)={r1, 0x6}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f00000008c0)={0xf, {0x6, 0x4, 0x7, 0x48}, {0x2b, 0x10000, 0x7, 0x8}, {0x5b, 0x8}}) keyctl$restrict_keyring(0x1d, r4, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) epoll_pwait(r5, &(0x7f0000000140)=[{}, {}, {}], 0x3, 0x30, &(0x7f00000001c0)={0x5}, 0x8) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r5, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0xe4, r6, 0x210, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x64, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x80}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9741}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x45}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x80}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6f6}]}, @TIPC_NLA_NODE={0x2c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1000}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x30, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x59743de8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc}]}]}, 0xe4}, 0x1, 0x0, 0x0, 0x8001}, 0x4000000) perf_event_open(0x0, 0x0, 0x5, r2, 0xa) r7 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0xfffffffffffffffc) prctl$PR_CAPBSET_DROP(0x18, 0x1a) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) vmsplice(r5, &(0x7f0000000740)=[{&(0x7f0000000400)="ed13764adc7b6185e2bf552e0868a66ae0c93004f7f3c703ab7313389a8cc63cdb181bcdab9638fee0b1a2dd2293ca45872a41b61303e175471b8778cb1224fd3a0eff329d9278fa61357f9ef26fe98bf1c25f37b9eeefba747a36da75eda6815b80b8c94bb34d1e77b9fd395c4f571a8551f50014b5474ea7653165aa4548a881b8b9031f557ecc43e6238ac92a0757e0e36ec4ec", 0x95}, {&(0x7f00000004c0)="fb4273e7754d7014d99c0b515a7e045d67d9f0c6c4ef56bce82784ad38e5d834db718a3bd785cdc0902ca58edc5f881360b54b00bc72a10a58f5c0bce01f91e9d1578825adc97caee77890c0ea", 0x4d}, {&(0x7f0000000540)="820d8a1bc839883434bc2da4fdbe67f7aa42508b90ec1aef8070af39fcde09ad076a6775b56ae5061c21b131ec4848638db9a871419fe0ef1830b96758e2db5c5171b07d3aaab359ba41401dfbdbda3ab9d812bf2bcc1475229d4d49fc40b511b6", 0x61}, {&(0x7f00000005c0)="425128c6bde6bdc6f2a4cb3f0cea3a95c43a7e558287f0d660c5b2c86f5b0747b8a44435df710700b114cd549395269ddfbb1f9074082718cc38ced1ad9a4863106c4c95fffc98a3c2121a3fe790ea82572cf01959e26212113c1d6d011f3553dd22feb9cdd6eea8179e0c", 0x6b}, {&(0x7f0000000640)="63146a8da303fb56f0efe14255797b06c7d57c92101a0cd6902c008c7701dbc02a171ae7ddaae496da56993c2eefab4c878eedcd6a544846e3f80471d32c950f6f383763da66231758f48f3902a3ee1a9b999c005edb2c59df7b8a75a0a91ca7595fec6fcc2241365578b0d9483b8720a27d4740b873c9a9543200f3419de24e7d7885d49063875d79dd8818747f3326c852038d6010bf4030f2328a00bcc1fb921d490ce715da343199415329adff621842fd6aa55e1fb28ce8c928c85d3b8393a2d37fe1204dfb3fb397e912ae0636734930", 0xd3}], 0x5, 0x8) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) r8 = shmget$private(0x0, 0x1000, 0x28, &(0x7f0000ffc000/0x1000)=nil) shmctl$IPC_RMID(r8, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r7, 0xc004ae02, &(0x7f00000007c0)={0x1, [0x0]}) 14:09:11 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x40) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) ioctl$sock_x25_SIOCDELRT(r1, 0x890c, &(0x7f00000001c0)={@null=' \x00', 0x8, 'erspan0\x00'}) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x2000) 14:09:11 executing program 0: openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x8000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x43, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000340)='9p\x00', 0x200000, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@fscache='fscache'}, {@access_client='access=client'}, {@cachetag={'cachetag'}}, {@cache_mmap='cache=mmap'}, {@uname={'uname', 0x3d, '/selinux/mls\x00'}}, {@access_client='access=client'}, {@cache_fscache='cache=fscache'}, {@version_9p2000='version=9p2000'}, {@cache_loose='cache=loose'}, {@nodevmap='nodevmap'}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@measure='measure'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'wlan0'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@seclabel='seclabel'}, {@subj_type={'subj_type', 0x3d, '/dev/media#\x00'}}, {@euid_eq={'euid'}}]}}) 14:09:11 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x0, 0xf) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ashmem\x00', 0x80040, 0x0) ioctl$FICLONE(r0, 0x40049409, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x0) 14:09:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r1) r3 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r2) timer_create(0x7, &(0x7f0000000080)={0x0, 0x9, 0x2, @tid=0xffffffffffffffff}, &(0x7f0000000100)=0x0) timer_settime(r4, 0x1, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000001c0)) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r3, &(0x7f0000000a40)=""/4096, 0x1000) 14:09:11 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$TIPC_MCAST_REPLICAST(r1, 0x10f, 0x86) r2 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) r3 = mmap$binder(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r2, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000080)={r3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r4, 0x2000) 14:09:11 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) socketpair(0x0, 0x3, 0x1, &(0x7f00000000c0)) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x202, 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0xa000000) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:09:11 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0xe0, 0x20000) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r0, 0x40045542, &(0x7f0000000080)=0x1553) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) 14:09:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0xa00, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r1, &(0x7f0000000480)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000000}, 0xfffffffffffffcfc, &(0x7f0000000280)={&(0x7f0000000300)={0x17c, r2, 0x0, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}]}, @TIPC_NLA_LINK={0xcc, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xbdf}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf0}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfcb2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x18000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xba38}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7fff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xffffffffffff0001}]}, @TIPC_NLA_BEARER={0x3c, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x19c}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xe3ed}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x80000001}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) ioctl$RTC_PLL_GET(r1, 0x80207011, &(0x7f0000000100)) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r3) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000580)={0x0, @in={{0x2, 0x4e21, @multicast2}}, 0x7fffffff, 0x9, 0x0, 0x6, 0x4}, &(0x7f0000000640)=0x98) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000680)={r5, 0xffffffff, 0x7, [0x80000001, 0x9d9, 0x4, 0x8, 0x3, 0x9, 0x3ff]}, 0x16) add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r4) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r1, 0x4040ae72, &(0x7f0000000540)={0x0, 0x7, 0x2, 0x7}) getsockopt$rose(r1, 0x104, 0x7, &(0x7f00000004c0), &(0x7f0000000500)=0x4) 14:09:11 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x100000000000) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x0, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000000000/0x1000)=nil, 0x1000}, &(0x7f0000000080)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, 0xffffffffffffffff, 0x2000) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000000)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@remote, @in=@dev}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000040)=0xe8) 14:09:11 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x880, 0x0) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f00000000c0)=0x588) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:11 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f0000000000)={0x1, 0x0, [{0x2000, 0x95, &(0x7f00000001c0)=""/149}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x2000) 14:09:11 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0xd3c, 0xf196597ae3559d3a) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x101, 0x80) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x509000, 0x0) syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x9, 0x2) openat$vfio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vfio/vfio\x00', 0x800, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x444202, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x4010640d, &(0x7f0000000080)={0x4}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) r2 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r2) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r3, 0x0) [ 445.650942][T17766] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 [ 445.694623][T17766] CPU: 0 PID: 17766 Comm: syz-executor.4 Not tainted 5.0.0+ #23 [ 445.702284][T17766] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 445.712345][T17766] Call Trace: [ 445.715649][T17766] dump_stack+0x172/0x1f0 [ 445.720498][T17766] dump_header+0x10f/0xb6c [ 445.724942][T17766] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 445.730776][T17766] ? ___ratelimit+0x60/0x595 [ 445.735390][T17766] ? do_raw_spin_unlock+0x57/0x270 [ 445.740512][T17766] oom_kill_process.cold+0x10/0x15 [ 445.740531][T17766] out_of_memory+0x79a/0x1280 [ 445.740548][T17766] ? lock_downgrade+0x880/0x880 [ 445.740570][T17766] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 445.750344][T17766] ? oom_killer_disable+0x280/0x280 [ 445.750358][T17766] ? find_held_lock+0x35/0x130 [ 445.750384][T17766] mem_cgroup_out_of_memory+0x1ca/0x230 [ 445.750403][T17766] ? memcg_event_wake+0x230/0x230 [ 445.781969][T17766] ? do_raw_spin_unlock+0x57/0x270 [ 445.787121][T17766] ? _raw_spin_unlock+0x2d/0x50 [ 445.792004][T17766] try_charge+0x102c/0x15c0 [ 445.796509][T17766] ? find_held_lock+0x35/0x130 [ 445.801300][T17766] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 445.806898][T17766] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 445.812438][T17766] ? find_held_lock+0x35/0x130 [ 445.817195][T17766] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 445.822747][T17766] __memcg_kmem_charge_memcg+0x7c/0x130 [ 445.828304][T17766] ? memcg_kmem_put_cache+0xb0/0xb0 [ 445.833505][T17766] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 445.839045][T17766] __memcg_kmem_charge+0x136/0x300 [ 445.844142][T17766] __alloc_pages_nodemask+0x437/0x7e0 [ 445.849498][T17766] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 445.855213][T17766] ? save_stack+0xa9/0xd0 [ 445.859552][T17766] ? kmem_cache_alloc+0x11a/0x6f0 [ 445.864556][T17766] ? anon_vma_fork+0x1ea/0x4a0 [ 445.869300][T17766] ? copy_process.part.0+0x350f/0x7980 [ 445.874753][T17766] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 445.881014][T17766] alloc_pages_current+0x107/0x210 [ 445.886125][T17766] get_zeroed_page+0x14/0x50 [ 445.890698][T17766] __pud_alloc+0x3b/0x250 [ 445.895016][T17766] pud_alloc+0xde/0x150 [ 445.899170][T17766] copy_page_range+0x375/0x1f90 [ 445.904024][T17766] ? find_held_lock+0x35/0x130 [ 445.908816][T17766] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 445.914555][T17766] ? vma_compute_subtree_gap+0x158/0x230 [ 445.920194][T17766] ? vma_gap_callbacks_rotate+0x62/0x80 [ 445.925745][T17766] ? pmd_alloc+0x180/0x180 [ 445.930152][T17766] ? validate_mm_rb+0xa3/0xc0 [ 445.934819][T17766] ? __vma_link_rb+0x279/0x370 [ 445.939591][T17766] copy_process.part.0+0x568b/0x7980 [ 445.944872][T17766] ? __cleanup_sighand+0x60/0x60 [ 445.949799][T17766] _do_fork+0x257/0xfd0 [ 445.953938][T17766] ? fork_idle+0x1d0/0x1d0 [ 445.958343][T17766] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 445.963812][T17766] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 445.969297][T17766] ? do_syscall_64+0x26/0x610 [ 445.973996][T17766] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 445.980054][T17766] ? do_syscall_64+0x26/0x610 [ 445.984728][T17766] __x64_sys_clone+0xbf/0x150 [ 445.989415][T17766] do_syscall_64+0x103/0x610 [ 445.994021][T17766] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 445.999910][T17766] RIP: 0033:0x458079 [ 446.003795][T17766] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 446.023408][T17766] RSP: 002b:00007f3505876c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 446.031800][T17766] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000458079 [ 446.039756][T17766] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 446.047706][T17766] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 446.055678][T17766] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f35058776d4 [ 446.063648][T17766] R13: 00000000004be379 R14: 00000000004cea80 R15: 00000000ffffffff [ 446.072586][T17766] memory: usage 307200kB, limit 307200kB, failcnt 306 [ 446.079373][T17766] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 446.117448][T17766] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 446.128695][T17766] Memory cgroup stats for /syz4: cache:0KB rss:270596KB rss_huge:256000KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:270692KB inactive_file:0KB active_file:0KB unevictable:0KB [ 446.152534][T17766] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=16785,uid=0 14:09:12 executing program 0: openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x8000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x43, 0x0) mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000340)='9p\x00', 0x200000, &(0x7f0000000580)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@fscache='fscache'}, {@access_client='access=client'}, {@cachetag={'cachetag'}}, {@cache_mmap='cache=mmap'}, {@uname={'uname', 0x3d, '/selinux/mls\x00'}}, {@access_client='access=client'}, {@cache_fscache='cache=fscache'}, {@version_9p2000='version=9p2000'}, {@cache_loose='cache=loose'}, {@nodevmap='nodevmap'}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@measure='measure'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'wlan0'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@seclabel='seclabel'}, {@subj_type={'subj_type', 0x3d, '/dev/media#\x00'}}, {@euid_eq={'euid'}}]}}) 14:09:12 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/audio\x00', 0x105000, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000400)={0x4}, 0x4) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$adsp(&(0x7f0000000440)='/dev/adsp#\x00', 0x7fffffff, 0x200001) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) socket$inet_icmp_raw(0x2, 0x3, 0x1) keyctl$restrict_keyring(0x1d, r2, 0x0, &(0x7f0000000180)='vboxnet0\x00') setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000280)=0x1, 0x4) r3 = socket(0x1b, 0x80000, 0xe48) ioctl$IMCLEAR_L2(r3, 0x80044946, &(0x7f00000002c0)=0xfffffffffffffffb) setxattr$trusted_overlay_opaque(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='trusted.overlay.opaque\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) r4 = getpid() perf_event_open(0x0, r4, 0x0, 0xffffffffffffffff, 0x1) r5 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0xa21a78bfcfe41ca8, 0x0) ioctl$SIOCAX25ADDFWD(r5, 0x89ea, &(0x7f00000000c0)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast}) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000140)=0x7) open_by_handle_at(r1, &(0x7f00000001c0)={0x8c, 0xfffffffffffffffa, "521c307c09233d73fa3f9726107cde675a3a8e6b699bc19cbf404bd281a220323b98a0f0666c036fcc8b496772111fdb18b01ae0fcb0dc83d5bc0f699a40c1ca901b1a7e97a6d32fe0e9e3dd4ed2052f84cec598ffe848521464c0897fc1feaf375fbaf2578c73c6306e661a9e341eb11937e6cf526fb0ab97ead31aa5a0aa8c742ddc77"}, 0x6800) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:12 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x10000, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f0000000000)={@broadcast, @broadcast}, 0x8) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) 14:09:12 executing program 1: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x200000, 0x0) r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) [ 446.193463][T17766] Memory cgroup out of memory: Killed process 16785 (syz-executor.4) total-vm:72580kB, anon-rss:2216kB, file-rss:34816kB, shmem-rss:0kB [ 446.214673][T17802] 9pnet: Insufficient options for proto=fd 14:09:12 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x2000) bind$pptp(r1, &(0x7f0000000000)={0x18, 0x2, {0x3, @loopback}}, 0x1e) 14:09:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0xe000000) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:09:12 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) uselib(&(0x7f0000000080)='./file0\x00') ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'erspan0\x00', {0x2, 0x4e24, @rand_addr=0x4}}) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) 14:09:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x422000, 0x0) ioctl$KVM_GET_API_VERSION(r2, 0xae00, 0x0) r3 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r1) r4 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r3) r5 = getpid() r6 = shmget(0x3, 0x1000, 0x80, &(0x7f0000ffd000/0x1000)=nil) shmctl$IPC_INFO(r6, 0x3, &(0x7f0000000300)=""/71) ptrace$peek(0x2, r5, &(0x7f0000000280)) r7 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000380)='/dev/sequencer2\x00', 0x208000, 0x0) ioctl$VIDIOC_PREPARE_BUF(r7, 0xc058565d, &(0x7f0000000100)={0x3, 0x6, 0x4, 0xa0170018, {0x0, 0x2710}, {0x3, 0xe, 0x1, 0x4, 0x50000000, 0x7, "0a81153e"}, 0x3, 0x7, @offset=0xffffffffffff0001, 0x4}) clone(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r4, &(0x7f0000000a40)=""/4096, 0x1af) ioctl$IOC_PR_REGISTER(r7, 0x401870c8, &(0x7f0000000240)={0x6, 0x0, 0x1}) ioctl$SIOCX25GCAUSEDIAG(r2, 0x89e6, &(0x7f0000000080)={0x5f73, 0x7}) 14:09:12 executing program 0: openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x8000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x43, 0x0) mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000340)='9p\x00', 0x200000, &(0x7f0000000580)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@fscache='fscache'}, {@access_client='access=client'}, {@cachetag={'cachetag'}}, {@cache_mmap='cache=mmap'}, {@uname={'uname', 0x3d, '/selinux/mls\x00'}}, {@access_client='access=client'}, {@cache_fscache='cache=fscache'}, {@version_9p2000='version=9p2000'}, {@cache_loose='cache=loose'}, {@nodevmap='nodevmap'}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@measure='measure'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'wlan0'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@seclabel='seclabel'}, {@subj_type={'subj_type', 0x3d, '/dev/media#\x00'}}, {@euid_eq={'euid'}}]}}) 14:09:12 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r2, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x4000, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f00000001c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000080)={0x9, 0x6, 0x2}) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x400, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) [ 446.489966][T17823] 9pnet: Insufficient options for proto=fd 14:09:12 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000002940)='/proc/self/net/pfkey\x00', 0x201, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r1, 0x110, 0x2, &(0x7f0000002980)='/dev/vbi#\x00', 0xa) r2 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r3, 0x2000) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x1c, r4, 0x8, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004040}, 0x50) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000001c0)=""/225) 14:09:12 executing program 0: openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x8000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x43, 0x0) mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000340)='9p\x00', 0x200000, &(0x7f0000000580)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@fscache='fscache'}, {@access_client='access=client'}, {@cachetag={'cachetag'}}, {@cache_mmap='cache=mmap'}, {@uname={'uname', 0x3d, '/selinux/mls\x00'}}, {@access_client='access=client'}, {@cache_fscache='cache=fscache'}, {@version_9p2000='version=9p2000'}, {@cache_loose='cache=loose'}, {@nodevmap='nodevmap'}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@measure='measure'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'wlan0'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@seclabel='seclabel'}, {@subj_type={'subj_type', 0x3d, '/dev/media#\x00'}}, {@euid_eq={'euid'}}]}}) [ 446.641619][T17839] 9pnet: Insufficient options for proto=fd 14:09:12 executing program 0: openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x8000, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000340)='9p\x00', 0x200000, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@fscache='fscache'}, {@access_client='access=client'}, {@cachetag={'cachetag'}}, {@cache_mmap='cache=mmap'}, {@uname={'uname', 0x3d, '/selinux/mls\x00'}}, {@access_client='access=client'}, {@cache_fscache='cache=fscache'}, {@version_9p2000='version=9p2000'}, {@cache_loose='cache=loose'}, {@nodevmap='nodevmap'}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@measure='measure'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'wlan0'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@seclabel='seclabel'}, {@subj_type={'subj_type', 0x3d, '/dev/media#\x00'}}, {@euid_eq={'euid'}}]}}) 14:09:12 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) ioctl$UDMABUF_CREATE(r1, 0x40187542, &(0x7f0000000000)={r1, 0x0, 0x1000, 0xfffffffffffff000}) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) modify_ldt$read_default(0x2, &(0x7f00000001c0)=""/230, 0xe6) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x2000) 14:09:13 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) set_thread_area(&(0x7f0000000000)={0x3f, 0xffffffffffffffff, 0x2000, 0x0, 0x6b, 0x4d, 0x3, 0x3, 0x8, 0x6}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x2000) 14:09:13 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x2000) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000140)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x4, {0xa, 0x4e21, 0x7, @mcast2, 0x6}, r3}}, 0x38) 14:09:13 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x8000400009, 0x301080) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r2, 0x40505330, 0x0) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0xb) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$bt_l2cap(r1, &(0x7f0000000140), &(0x7f0000000180)=0xe, 0x800) r3 = socket$inet_tcp(0x2, 0x1, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r4 = syz_open_dev$usb(&(0x7f00000002c0)='/dev/bus/usb/00#/00#\x00', 0xffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r4, 0x0) 14:09:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0x3f000000) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:09:13 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x400000001) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) accept4$vsock_stream(r1, &(0x7f0000000080)={0x28, 0x0, 0xffffffff, @host}, 0x10, 0x80000) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) ioctl$EVIOCGSW(r1, 0x8040451b, &(0x7f00000001c0)=""/139) r2 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x2000000) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r3, 0x2000) 14:09:13 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x101400, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000280)={&(0x7f0000000100), 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x2c, r1, 0x410, 0x70bd2d, 0x25dfdbfc, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz2\x00'}}, [""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r3) r5 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r4) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r5, &(0x7f0000000a40)=""/4096, 0x1000) 14:09:13 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x7, 0x12001) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:13 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x4000, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000000140)={&(0x7f0000000000/0x2000)=nil, 0x7f, 0x5, 0x5dd12fa0e308d528, &(0x7f0000000000/0x3000)=nil, 0xe99c}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) r1 = syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r0, 0xc0405519, 0x0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000000)={&(0x7f0000000000/0x1000)=nil, 0xa39e, 0x1, 0x4, &(0x7f0000000000/0x2000)=nil, 0x6}) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r3, 0x0) dup3(r1, r3, 0x80000) 14:09:13 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x101240, 0x0) r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000000000/0x1000)=nil, 0x1000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, r2) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:13 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000340)='9p\x00', 0x200000, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@fscache='fscache'}, {@access_client='access=client'}, {@cachetag={'cachetag'}}, {@cache_mmap='cache=mmap'}, {@uname={'uname', 0x3d, '/selinux/mls\x00'}}, {@access_client='access=client'}, {@cache_fscache='cache=fscache'}, {@version_9p2000='version=9p2000'}, {@cache_loose='cache=loose'}, {@nodevmap='nodevmap'}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@measure='measure'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'wlan0'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@seclabel='seclabel'}, {@subj_type={'subj_type', 0x3d, '/dev/media#\x00'}}, {@euid_eq={'euid'}}]}}) [ 447.644749][T17873] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 447.688006][T17873] CPU: 1 PID: 17873 Comm: syz-executor.4 Not tainted 5.0.0+ #23 [ 447.695678][T17873] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 447.705924][T17873] Call Trace: [ 447.709227][T17873] dump_stack+0x172/0x1f0 [ 447.713573][T17873] dump_header+0x10f/0xb6c [ 447.718024][T17873] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 447.723870][T17873] ? ___ratelimit+0x60/0x595 [ 447.728471][T17873] ? do_raw_spin_unlock+0x57/0x270 [ 447.733613][T17873] oom_kill_process.cold+0x10/0x15 [ 447.738732][T17873] out_of_memory+0x79a/0x1280 [ 447.743918][T17873] ? lock_downgrade+0x880/0x880 [ 447.748778][T17873] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 447.755038][T17873] ? oom_killer_disable+0x280/0x280 [ 447.760241][T17873] ? find_held_lock+0x35/0x130 [ 447.765041][T17873] mem_cgroup_out_of_memory+0x1ca/0x230 [ 447.770594][T17873] ? memcg_event_wake+0x230/0x230 [ 447.775627][T17873] ? do_raw_spin_unlock+0x57/0x270 [ 447.780762][T17873] ? _raw_spin_unlock+0x2d/0x50 14:09:13 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e21, @multicast2}}}, &(0x7f0000000080)=0x84) write$capi20_data(r2, &(0x7f0000000280)={{0x10, 0x800, 0xc7, 0x82, 0x3, 0xac22}, 0xd8, "d4d7b97b5f8f08d980fe28c5dff1ec50dedb0bcc09959745848f5f2d5ed87b2b0bfcb6a17116d0aa33f6915148c114019f25ae6f5c5ffedf7ca152e97ee3a26fc8e47b137ee5e035ef1a3762efa543f861394f470194bd0a6982cfe820072e09a483548624621594c1afcaa3c3e6a6cc2ed1f27a4fc2fe3a091e27e159cee4ae9ff31fd40db51881bd18b7883aca00aa3656aab010ea872fea4d4d3bf60609e91098bee569806c47dbb2da085f86c561d56d3ce852997c0c63182b8f31cf3c1895092291335badb836628829ab73ec53781ef9c2220dd142"}, 0xea) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000380)) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f00000000c0)={r3, 0x10001}, &(0x7f0000000140)=0x8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) [ 447.785625][T17873] try_charge+0x102c/0x15c0 [ 447.790138][T17873] ? find_held_lock+0x35/0x130 [ 447.794914][T17873] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 447.800468][T17873] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 447.806027][T17873] ? find_held_lock+0x35/0x130 [ 447.810796][T17873] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 447.816356][T17873] __memcg_kmem_charge_memcg+0x7c/0x130 [ 447.821912][T17873] ? memcg_kmem_put_cache+0xb0/0xb0 [ 447.827169][T17873] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 447.832725][T17873] __memcg_kmem_charge+0x136/0x300 [ 447.837855][T17873] __alloc_pages_nodemask+0x437/0x7e0 [ 447.843233][T17873] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 447.849486][T17873] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 447.855226][T17873] ? copy_process.part.0+0x1d08/0x7980 [ 447.860741][T17873] ? lockdep_hardirqs_on+0x418/0x5d0 [ 447.866087][T17873] ? trace_hardirqs_on+0x67/0x230 [ 447.871126][T17873] ? kasan_check_read+0x11/0x20 [ 447.876001][T17873] copy_process.part.0+0x3e0/0x7980 [ 447.881229][T17873] ? psi_memstall_leave+0x11c/0x180 14:09:14 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x2, 0x2, 0x1f, 0x80, 0x0, 0x80000000, 0x0, 0x4, 0x9, 0x7f, 0xfffffffffffffffc, 0x7ff, 0xcf37, 0x0, 0x4, 0x100000001, 0x80000000, 0x4, 0x1, 0xf8f4, 0x1, 0xafb, 0x5, 0x400, 0x2, 0x20, 0x800, 0x1, 0x95d3, 0x1ff, 0xefd6, 0x4, 0x9, 0x8, 0x4, 0x3, 0x0, 0x3, 0x6, @perf_bp={&(0x7f0000000000), 0xd}, 0x40, 0x8, 0xa5, 0x1, 0x8, 0x4, 0x2}, 0xffffffffffffffff, 0xd, r1, 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) [ 447.886432][T17873] ? sched_clock+0x2e/0x50 [ 447.890853][T17873] ? psi_memstall_leave+0x12e/0x180 [ 447.896056][T17873] ? find_held_lock+0x35/0x130 [ 447.900848][T17873] ? psi_memstall_leave+0x12e/0x180 [ 447.906056][T17873] ? __cleanup_sighand+0x60/0x60 [ 447.911032][T17873] ? __lock_acquire+0x548/0x3fb0 [ 447.915972][T17873] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 447.916014][T17873] _do_fork+0x257/0xfd0 [ 447.916042][T17873] ? fork_idle+0x1d0/0x1d0 [ 447.930830][T17873] ? blkcg_maybe_throttle_current+0x5e2/0xfc0 [ 447.936907][T17873] ? lock_downgrade+0x880/0x880 [ 447.941764][T17873] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 447.948026][T17873] ? blkcg_exit_queue+0x30/0x30 [ 447.952886][T17873] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 447.958354][T17873] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 447.963824][T17873] ? do_syscall_64+0x26/0x610 [ 447.968527][T17873] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 447.974603][T17873] ? do_syscall_64+0x26/0x610 [ 447.979294][T17873] __x64_sys_clone+0xbf/0x150 [ 447.983990][T17873] do_syscall_64+0x103/0x610 14:09:14 executing program 2: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0xff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) getpid() 14:09:14 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000001, 0x10, r2, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) [ 447.988592][T17873] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 447.994480][T17873] RIP: 0033:0x45aa49 [ 447.998387][T17873] Code: ff 48 85 f6 0f 84 d7 8e fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c ae 8e fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 448.018016][T17873] RSP: 002b:00007ffe1c83f6c8 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 448.026457][T17873] RAX: ffffffffffffffda RBX: 00007f3505856700 RCX: 000000000045aa49 14:09:14 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) get_mempolicy(&(0x7f0000000240), &(0x7f0000000280), 0x2c3, &(0x7f0000002000/0x1000)=nil, 0x4) clock_getres(0x3, &(0x7f00000002c0)) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000300)) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x2000) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000000)={0x0}) ioctl$DRM_IOCTL_DMA(r1, 0xc0406429, &(0x7f0000000200)={r3, 0x1, &(0x7f0000000080)=[0x9], &(0x7f00000000c0)=[0x3ff, 0x2], 0x27, 0x5, 0x1fffffffe0000, &(0x7f0000000140)=[0x2, 0x4, 0x2, 0x7, 0x1], &(0x7f00000001c0)=[0x400, 0x5, 0x8, 0x6]}) [ 448.034435][T17873] RDX: 00007f35058569d0 RSI: 00007f3505855db0 RDI: 00000000003d0f00 [ 448.042406][T17873] RBP: 00007ffe1c83f8d0 R08: 00007f3505856700 R09: 00007f3505856700 [ 448.050374][T17873] R10: 00007f35058569d0 R11: 0000000000000202 R12: 0000000000000000 [ 448.050384][T17873] R13: 00007ffe1c83f77f R14: 00007f35058569c0 R15: 000000000073bfac [ 448.092061][T17873] memory: usage 307192kB, limit 307200kB, failcnt 341 [ 448.099765][T17873] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 448.107818][T17873] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 448.128154][T17873] Memory cgroup stats for /syz4: cache:0KB rss:270540KB rss_huge:256000KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:270676KB inactive_file:0KB active_file:0KB unevictable:0KB [ 448.221229][T17873] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=17873,uid=0 [ 448.302671][T17873] Memory cgroup out of memory: Killed process 17873 (syz-executor.4) total-vm:72580kB, anon-rss:2208kB, file-rss:35680kB, shmem-rss:0kB [ 448.319715][ T1042] oom_reaper: reaped process 17873 (syz-executor.4), now anon-rss:0kB, file-rss:34848kB, shmem-rss:0kB 14:09:14 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xcea0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x2000) 14:09:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0x40000000) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:09:14 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@initdev}}, &(0x7f0000000600)=0xe8) fstat(r1, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f00000004c0)='./file0\x00', r2, r3) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) r4 = syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) add_key$keyring(&(0x7f0000000840)='keyring\x00', &(0x7f0000000880)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000008c0)='asymmetric\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000940)="190d71a224e6eac6c8de12c398d95b40af89313085f37b72e97f45592f030eac2a87e970689f36d6822f700111ee4e35d0709fc33277b4d38bdfd53678a96d7cb91033325248c916bab697a375ba6c5f483bad5a50749231931acde181d4c8891f90f071a27b7f", 0x67, 0xfffffffffffffffd) r5 = request_key(&(0x7f0000000ac0)='cifs.spnego\x00', &(0x7f0000000b00)={'syz', 0x1}, &(0x7f0000000b40)='security\\securitybdevGPL\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000009c0)="76f96f62b5f2e08e7451a12fb0a6bc788a4b7cbb53dc125719d22c3140ebeb6d6981f88754ab4e234eef921b3cd39702254bc60abfe404d8ae80bf04c00daa55b1d3f3ea9c8e2f2da80cf457a492f1dc4e0c4c403bcf63c65ad049f7f000220694dc543756ef0f3a14b91f2bccb0a3dd977a73b361fead943b962e68ffc022ef4a93fa921645366cdfe4949b71f315d98328dac89871913b12816c5462709724a931b43f15302de2dab366b726180c44489b8619b900554efe50a4107237c9cf02fc1a06b117162448a0259b30727676babd2ac6f3af545425d6b5e8b35b74331e12857538d4e8e218480ec6636a363de146f6ceafa1e9", 0xf7, r5) request_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='\x00', 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x2) add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff9) request_key(&(0x7f0000000300)='.request_key_auth\x00', &(0x7f0000000340)={'syz', 0x0}, &(0x7f0000000380)='\xfd,vboxnet0%system:]em1)\x00', 0xfffffffffffffff9) r6 = add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r7 = fcntl$getown(r0, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000700)={{0x7, 0x3, 0x6, 0x7, 'syz1\x00', 0x2}, 0x3, 0x20, 0x3, r7, 0x5, 0x6, 'syz0\x00', &(0x7f00000006c0)=['syzkaller\x00', 'id_resolver\x00', 'eth1\x00', 'syzkaller\x00', '.request_key_auth\x00'], 0x37, [], [0x9, 0xe2b, 0x4, 0xbf0e]}) keyctl$restrict_keyring(0x1d, r6, 0x0, 0x0) r8 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r8, 0x0) 14:09:14 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) getsockopt$netlink(r0, 0x10e, 0x5, &(0x7f0000000080)=""/116, &(0x7f0000000140)=0x74) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) sendto$netrom(r1, &(0x7f0000000300)="8074eb6ce1666c66cefe41f2303b24d898fbc72d568cdf4203a2973919b7543d7b84edca0872252afc5f6d601598bd44bddb5440b8e2b04383f3a86f91efab38c8905ce72cfc29cadb28bef6e4e9f141fe4dc7950a77e3da472abff0c3b7ee6927b7e6e41b2f26ac9bc962edec323bb3cfc2be02591d8010a3ae494efd05f151b78232b6c6a5c5e7", 0x88, 0x4, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c12a41d88b070") r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r2) r4 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r3) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r4, &(0x7f0000000a40)=""/4096, 0x1000) 14:09:14 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000340)='9p\x00', 0x200000, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@fscache='fscache'}, {@access_client='access=client'}, {@cachetag={'cachetag'}}, {@cache_mmap='cache=mmap'}, {@uname={'uname', 0x3d, '/selinux/mls\x00'}}, {@access_client='access=client'}, {@cache_fscache='cache=fscache'}, {@version_9p2000='version=9p2000'}, {@cache_loose='cache=loose'}, {@nodevmap='nodevmap'}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@measure='measure'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'wlan0'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@seclabel='seclabel'}, {@subj_type={'subj_type', 0x3d, '/dev/media#\x00'}}, {@euid_eq={'euid'}}]}}) [ 448.498326][T17931] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 448.512105][T17931] CPU: 1 PID: 17931 Comm: syz-executor.4 Not tainted 5.0.0+ #23 [ 448.519758][T17931] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 448.529807][T17931] Call Trace: [ 448.533123][T17931] dump_stack+0x172/0x1f0 [ 448.537467][T17931] dump_header+0x10f/0xb6c [ 448.541905][T17931] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 14:09:14 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000340)='9p\x00', 0x200000, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@fscache='fscache'}, {@access_client='access=client'}, {@cachetag={'cachetag'}}, {@cache_mmap='cache=mmap'}, {@uname={'uname', 0x3d, '/selinux/mls\x00'}}, {@access_client='access=client'}, {@cache_fscache='cache=fscache'}, {@version_9p2000='version=9p2000'}, {@cache_loose='cache=loose'}, {@nodevmap='nodevmap'}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@measure='measure'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'wlan0'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@seclabel='seclabel'}, {@subj_type={'subj_type', 0x3d, '/dev/media#\x00'}}, {@euid_eq={'euid'}}]}}) [ 448.547734][T17931] ? ___ratelimit+0x60/0x595 [ 448.549620][T17942] 9pnet: Insufficient options for proto=fd [ 448.552330][T17931] ? do_raw_spin_unlock+0x57/0x270 [ 448.552350][T17931] oom_kill_process.cold+0x10/0x15 [ 448.552367][T17931] out_of_memory+0x79a/0x1280 [ 448.552384][T17931] ? lock_downgrade+0x880/0x880 [ 448.552408][T17931] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 448.584132][T17931] ? oom_killer_disable+0x280/0x280 [ 448.589334][T17931] ? find_held_lock+0x35/0x130 14:09:14 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000340)='9p\x00', 0x200000, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@fscache='fscache'}, {@access_client='access=client'}, {@cachetag={'cachetag'}}, {@cache_mmap='cache=mmap'}, {@uname={'uname', 0x3d, '/selinux/mls\x00'}}, {@access_client='access=client'}, {@cache_fscache='cache=fscache'}, {@version_9p2000='version=9p2000'}, {@cache_loose='cache=loose'}, {@nodevmap='nodevmap'}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@measure='measure'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'wlan0'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@seclabel='seclabel'}, {@subj_type={'subj_type', 0x3d, '/dev/media#\x00'}}, {@euid_eq={'euid'}}]}}) [ 448.593750][T17944] 9pnet: Insufficient options for proto=fd [ 448.594116][T17931] mem_cgroup_out_of_memory+0x1ca/0x230 [ 448.605437][T17931] ? memcg_event_wake+0x230/0x230 [ 448.610507][T17931] ? do_raw_spin_unlock+0x57/0x270 [ 448.615639][T17931] ? _raw_spin_unlock+0x2d/0x50 [ 448.620510][T17931] try_charge+0x102c/0x15c0 [ 448.625023][T17931] ? find_held_lock+0x35/0x130 [ 448.629795][T17931] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 448.634995][T17946] 9pnet: Insufficient options for proto=fd [ 448.635345][T17931] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 14:09:14 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000340)='9p\x00', 0x200000, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@fscache='fscache'}, {@access_client='access=client'}, {@cachetag={'cachetag'}}, {@cache_mmap='cache=mmap'}, {@uname={'uname', 0x3d, '/selinux/mls\x00'}}, {@access_client='access=client'}, {@cache_fscache='cache=fscache'}, {@version_9p2000='version=9p2000'}, {@cache_loose='cache=loose'}, {@nodevmap='nodevmap'}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@measure='measure'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'wlan0'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@seclabel='seclabel'}, {@subj_type={'subj_type', 0x3d, '/dev/media#\x00'}}, {@euid_eq={'euid'}}]}}) 14:09:14 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000340)='9p\x00', 0x200000, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@fscache='fscache'}, {@access_client='access=client'}, {@cachetag={'cachetag'}}, {@cache_mmap='cache=mmap'}, {@uname={'uname', 0x3d, '/selinux/mls\x00'}}, {@access_client='access=client'}, {@cache_fscache='cache=fscache'}, {@version_9p2000='version=9p2000'}, {@cache_loose='cache=loose'}, {@nodevmap='nodevmap'}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@measure='measure'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'wlan0'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@seclabel='seclabel'}, {@subj_type={'subj_type', 0x3d, '/dev/media#\x00'}}, {@euid_eq={'euid'}}]}}) [ 448.635365][T17931] ? kasan_check_read+0x11/0x20 [ 448.635388][T17931] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 448.657795][T17931] mem_cgroup_try_charge+0x24d/0x5e0 [ 448.663094][T17931] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 448.668741][T17931] wp_page_copy+0x408/0x1740 [ 448.673347][T17931] ? find_held_lock+0x35/0x130 [ 448.678122][T17931] ? pmd_pfn+0x1d0/0x1d0 [ 448.682377][T17931] ? lock_downgrade+0x880/0x880 [ 448.691591][T17931] ? __pte_alloc_kernel+0x220/0x220 14:09:14 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000340)='9p\x00', 0x200000, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@fscache='fscache'}, {@access_client='access=client'}, {@cachetag={'cachetag'}}, {@cache_mmap='cache=mmap'}, {@uname={'uname', 0x3d, '/selinux/mls\x00'}}, {@access_client='access=client'}, {@cache_fscache='cache=fscache'}, {@version_9p2000='version=9p2000'}, {@cache_loose='cache=loose'}, {@nodevmap='nodevmap'}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@measure='measure'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'wlan0'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@seclabel='seclabel'}, {@subj_type={'subj_type', 0x3d, '/dev/media#\x00'}}, {@euid_eq={'euid'}}]}}) [ 448.696795][T17931] ? kasan_check_read+0x11/0x20 [ 448.701652][T17931] ? do_raw_spin_unlock+0x57/0x270 [ 448.706770][T17931] do_wp_page+0x5d8/0x16c0 [ 448.711191][T17931] ? do_raw_spin_lock+0x12a/0x2e0 [ 448.716226][T17931] ? rwlock_bug.part.0+0x90/0x90 [ 448.721527][T17931] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 448.726907][T17931] ? add_mm_counter_fast.part.0+0x40/0x40 [ 448.732642][T17931] __handle_mm_fault+0x22e8/0x3ec0 [ 448.737807][T17931] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 448.743369][T17931] ? find_held_lock+0x35/0x130 14:09:14 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', 0x0, 0x200000, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@fscache='fscache'}, {@access_client='access=client'}, {@cachetag={'cachetag'}}, {@cache_mmap='cache=mmap'}, {@uname={'uname', 0x3d, '/selinux/mls\x00'}}, {@access_client='access=client'}, {@cache_fscache='cache=fscache'}, {@version_9p2000='version=9p2000'}, {@cache_loose='cache=loose'}, {@nodevmap='nodevmap'}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@measure='measure'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'wlan0'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@seclabel='seclabel'}, {@subj_type={'subj_type', 0x3d, '/dev/media#\x00'}}, {@euid_eq={'euid'}}]}}) [ 448.748141][T17931] ? handle_mm_fault+0x322/0xb30 [ 448.753092][T17931] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 448.759345][T17931] ? kasan_check_read+0x11/0x20 [ 448.764214][T17931] handle_mm_fault+0x43f/0xb30 [ 448.769010][T17931] __do_page_fault+0x5ef/0xda0 [ 448.773791][T17931] do_page_fault+0x71/0x581 [ 448.778311][T17931] ? page_fault+0x8/0x30 [ 448.782565][T17931] page_fault+0x1e/0x30 [ 448.786736][T17931] RIP: 0033:0x40d2e8 [ 448.790908][T17931] Code: 8b 34 c6 4a 8d 04 2e 48 3d ff ff ff 7e 0f 86 77 ff ff ff bf e2 d5 4b 00 31 c0 e8 43 46 ff ff 31 ff e8 8c 42 ff ff 0f 1f 40 00 <89> 3c b5 00 00 73 00 eb b6 31 ed 0f 1f 44 00 00 80 3d 7e 31 64 00 [ 448.810505][T17931] RSP: 002b:00007ffe1c83f730 EFLAGS: 00010246 [ 448.816574][T17931] RAX: 00000000735ae296 RBX: 0000000061ba2b68 RCX: 0000001b31d20000 [ 448.824546][T17931] RDX: 0000000000000000 RSI: 0000000000000296 RDI: ffffffff735ae296 [ 448.833043][T17931] RBP: 0000000000000003 R08: 00000000735ae296 R09: 00000000735ae29a [ 448.841022][T17931] R10: 00007ffe1c83f8c0 R11: 0000000000000246 R12: 000000000073bf88 [ 448.849006][T17931] R13: 0000000080000000 R14: 00007f3507878008 R15: 0000000000000003 14:09:15 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', 0x0, 0x200000, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@fscache='fscache'}, {@access_client='access=client'}, {@cachetag={'cachetag'}}, {@cache_mmap='cache=mmap'}, {@uname={'uname', 0x3d, '/selinux/mls\x00'}}, {@access_client='access=client'}, {@cache_fscache='cache=fscache'}, {@version_9p2000='version=9p2000'}, {@cache_loose='cache=loose'}, {@nodevmap='nodevmap'}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@measure='measure'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'wlan0'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@seclabel='seclabel'}, {@subj_type={'subj_type', 0x3d, '/dev/media#\x00'}}, {@euid_eq={'euid'}}]}}) 14:09:15 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)=0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r0, 0x10, &(0x7f00000001c0)={0x2}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x101000, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={0x0, 0x9}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000100)={r2, 0x4}, &(0x7f0000000140)=0x8) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r3, 0x0) [ 448.907414][T17931] memory: usage 307200kB, limit 307200kB, failcnt 354 [ 448.928856][T17931] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 448.960285][T17931] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 448.976498][T17931] Memory cgroup stats for /syz4: cache:0KB rss:270540KB rss_huge:256000KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:270656KB inactive_file:0KB active_file:4KB unevictable:0KB [ 449.010519][T17931] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=16841,uid=0 [ 449.038827][T17931] Memory cgroup out of memory: Killed process 16841 (syz-executor.4) total-vm:72580kB, anon-rss:2216kB, file-rss:34816kB, shmem-rss:0kB [ 449.120060][T17933] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 449.139697][T17933] CPU: 0 PID: 17933 Comm: syz-executor.4 Not tainted 5.0.0+ #23 [ 449.147339][T17933] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 449.157396][T17933] Call Trace: [ 449.160699][T17933] dump_stack+0x172/0x1f0 [ 449.165063][T17933] dump_header+0x10f/0xb6c [ 449.169493][T17933] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 449.175322][T17933] ? ___ratelimit+0x60/0x595 [ 449.179931][T17933] ? do_raw_spin_unlock+0x57/0x270 [ 449.185054][T17933] oom_kill_process.cold+0x10/0x15 [ 449.190172][T17933] out_of_memory+0x79a/0x1280 [ 449.194858][T17933] ? lock_downgrade+0x880/0x880 [ 449.199737][T17933] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 449.206010][T17933] ? oom_killer_disable+0x280/0x280 [ 449.211228][T17933] ? find_held_lock+0x35/0x130 [ 449.216022][T17933] mem_cgroup_out_of_memory+0x1ca/0x230 [ 449.221574][T17933] ? memcg_event_wake+0x230/0x230 [ 449.226606][T17933] ? do_raw_spin_unlock+0x57/0x270 [ 449.231746][T17933] ? _raw_spin_unlock+0x2d/0x50 [ 449.236617][T17933] try_charge+0x102c/0x15c0 [ 449.241141][T17933] ? find_held_lock+0x35/0x130 [ 449.245919][T17933] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 449.251490][T17933] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 449.257739][T17933] ? kasan_check_read+0x11/0x20 [ 449.262614][T17933] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 449.268159][T17933] mem_cgroup_try_charge+0x24d/0x5e0 [ 449.273436][T17933] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 449.279070][T17933] wp_page_copy+0x408/0x1740 [ 449.283661][T17933] ? find_held_lock+0x35/0x130 [ 449.288426][T17933] ? pmd_pfn+0x1d0/0x1d0 [ 449.292651][T17933] ? lock_downgrade+0x880/0x880 [ 449.297506][T17933] ? swp_swapcount+0x540/0x540 [ 449.302271][T17933] ? kasan_check_read+0x11/0x20 [ 449.307121][T17933] ? do_raw_spin_unlock+0x57/0x270 [ 449.312216][T17933] do_wp_page+0x5d8/0x16c0 [ 449.316631][T17933] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 449.322008][T17933] __handle_mm_fault+0x22e8/0x3ec0 [ 449.327213][T17933] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 449.332751][T17933] ? find_held_lock+0x35/0x130 [ 449.337495][T17933] ? handle_mm_fault+0x322/0xb30 [ 449.342424][T17933] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 449.348651][T17933] ? kasan_check_read+0x11/0x20 [ 449.353485][T17933] handle_mm_fault+0x43f/0xb30 [ 449.358255][T17933] __do_page_fault+0x5ef/0xda0 [ 449.363028][T17933] do_page_fault+0x71/0x581 [ 449.367639][T17933] page_fault+0x1e/0x30 [ 449.371788][T17933] RIP: 0010:copy_user_generic_unrolled+0x89/0xc0 [ 449.378134][T17933] Code: 38 4c 89 47 20 4c 89 4f 28 4c 89 57 30 4c 89 5f 38 48 8d 76 40 48 8d 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 <4c> 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a [ 449.397716][T17933] RSP: 0018:ffff88804814f998 EFLAGS: 00010206 [ 449.403761][T17933] RAX: ffffed1009029f4b RBX: 0000000000000028 RCX: 0000000000000005 [ 449.411735][T17933] RDX: 0000000000000000 RSI: ffff88804814fa30 RDI: 000000000070b088 [ 449.419688][T17933] RBP: ffff88804814f9d0 R08: 0000000000006f6c R09: ffffed1009029f4b [ 449.427639][T17933] R10: ffffed1009029f4a R11: ffff88804814fa57 R12: 000000000070b088 [ 449.435593][T17933] R13: ffff88804814fa30 R14: 000000000070b0b0 R15: 00007ffffffff000 [ 449.443590][T17933] ? _copy_to_user+0xf7/0x120 [ 449.448279][T17933] inet_gifconf+0x21d/0x370 [ 449.452796][T17933] ? in_dev_dump_addr.isra.0+0x260/0x260 [ 449.458429][T17933] ? in_dev_dump_addr.isra.0+0x260/0x260 [ 449.464043][T17933] dev_ifconf+0xd2/0x240 [ 449.468276][T17933] sock_do_ioctl+0x266/0x300 [ 449.472849][T17933] ? compat_ifr_data_ioctl+0x160/0x160 [ 449.478294][T17933] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 449.484518][T17933] ? tomoyo_init_request_info+0x105/0x1d0 [ 449.490227][T17933] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 449.496492][T17933] ? tomoyo_path_number_perm+0x263/0x520 [ 449.502123][T17933] sock_ioctl+0x32b/0x610 [ 449.506436][T17933] ? dlci_ioctl_set+0x40/0x40 [ 449.511111][T17933] ? ___might_sleep+0x163/0x280 [ 449.515969][T17933] ? dlci_ioctl_set+0x40/0x40 [ 449.520667][T17933] do_vfs_ioctl+0xd6e/0x1390 [ 449.525243][T17933] ? ioctl_preallocate+0x210/0x210 [ 449.530349][T17933] ? selinux_file_mprotect+0x620/0x620 [ 449.535837][T17933] ? __fget+0x381/0x550 [ 449.540014][T17933] ? ksys_dup3+0x3e0/0x3e0 [ 449.544416][T17933] ? nsecs_to_jiffies+0x30/0x30 [ 449.549264][T17933] ? tomoyo_file_ioctl+0x23/0x30 [ 449.554199][T17933] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 449.560441][T17933] ? security_file_ioctl+0x93/0xc0 [ 449.565536][T17933] ksys_ioctl+0xab/0xd0 [ 449.569682][T17933] __x64_sys_ioctl+0x73/0xb0 [ 449.574262][T17933] do_syscall_64+0x103/0x610 [ 449.578838][T17933] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 449.584707][T17933] RIP: 0033:0x458079 [ 449.588583][T17933] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 449.608167][T17933] RSP: 002b:00007f3505876c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 449.616560][T17933] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458079 [ 449.624512][T17933] RDX: 0000000020000100 RSI: 0000001000008912 RDI: 0000000000000004 [ 449.632472][T17933] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 449.640448][T17933] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f35058776d4 [ 449.648414][T17933] R13: 00000000004bf1d9 R14: 00000000004d0b68 R15: 00000000ffffffff [ 449.658721][T17933] memory: usage 307192kB, limit 307200kB, failcnt 395 [ 449.672405][T17933] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 449.680341][T17933] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 449.687792][T17933] Memory cgroup stats for /syz4: cache:0KB rss:270484KB rss_huge:256000KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:270652KB inactive_file:0KB active_file:0KB unevictable:0KB 14:09:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0x60000000) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:09:15 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x400000, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x200400, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) ioctl$VIDIOC_G_OUTPUT(r0, 0x8004562e, &(0x7f00000002c0)) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f0000000180)='vboxnet0\x00') openat(r1, &(0x7f00000001c0)='./file0\x00', 0x200080, 0x8) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x202, 0x2) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000200)='cifs.spnego\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000480)="141a3a66b40c649e11d8375b88d47e579378073725c8c37fefb81a6d4c7fdcb440fa8bfde7c905e0458354a8e2122f08eb798ca4f1da04a91740de9a9eaf00000000000000000000cf7fc33806cbfca93495c654ee8a02da25e4e489dd716d3439bc82333717d93dc6e78fb83696823e66f0b8d5a973860113c1094d1b37005e092d39c11672365ee9ec5e520e6ba5f8b868ead908e356c2217929be4d31f7ff8173", 0xa2, r3) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r4, 0x6, 0x14, &(0x7f0000000280)=0x3, 0x4) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r1) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x105040, 0x0) ioctl$VIDIOC_G_SELECTION(r3, 0xc040565e, &(0x7f0000000100)={0xf, 0x103, 0x2, {0x10000, 0x5, 0x400, 0x6}}) r4 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r2) fremovexattr(r3, &(0x7f0000000140)=@known='system.sockprotoname\x00') openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x80000, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r4, &(0x7f0000000a40)=""/4096, 0x1000) 14:09:15 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x4, {0x3ff, 0x5}, 0xa, 0x203, 0x4}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x400, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x2000) 14:09:15 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', 0x0, 0x200000, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@fscache='fscache'}, {@access_client='access=client'}, {@cachetag={'cachetag'}}, {@cache_mmap='cache=mmap'}, {@uname={'uname', 0x3d, '/selinux/mls\x00'}}, {@access_client='access=client'}, {@cache_fscache='cache=fscache'}, {@version_9p2000='version=9p2000'}, {@cache_loose='cache=loose'}, {@nodevmap='nodevmap'}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@measure='measure'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'wlan0'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@seclabel='seclabel'}, {@subj_type={'subj_type', 0x3d, '/dev/media#\x00'}}, {@euid_eq={'euid'}}]}}) 14:09:15 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x8010, r0, 0x0) [ 449.709668][T17933] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=17931,uid=0 [ 449.726853][T17933] Memory cgroup out of memory: Killed process 17931 (syz-executor.4) total-vm:72448kB, anon-rss:2208kB, file-rss:35676kB, shmem-rss:0kB [ 449.742910][ T1042] oom_reaper: reaped process 17931 (syz-executor.4), now anon-rss:0kB, file-rss:34848kB, shmem-rss:0kB 14:09:16 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000440)={{0x80}, 'port0\x00', 0x0, 0x10800a, 0x0, 0x2fe258af}) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/15, 0xf}, {&(0x7f00000001c0)=""/242, 0xf2}, {&(0x7f00000002c0)=""/134, 0x86}], 0x3) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x2000) 14:09:16 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@fscache='fscache'}, {@access_client='access=client'}, {@cachetag={'cachetag'}}, {@cache_mmap='cache=mmap'}, {@uname={'uname', 0x3d, '/selinux/mls\x00'}}, {@access_client='access=client'}, {@cache_fscache='cache=fscache'}, {@version_9p2000='version=9p2000'}, {@cache_loose='cache=loose'}, {@nodevmap='nodevmap'}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@measure='measure'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'wlan0'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@seclabel='seclabel'}, {@subj_type={'subj_type', 0x3d, '/dev/media#\x00'}}, {@euid_eq={'euid'}}]}}) 14:09:16 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/dlm-control\x00', 0x600, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000016c0)='bond_slave_0\x00') ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f0000001400)={0x1, 0x8, 0x20dde894}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000001480)={0x1, 0x70, 0x8001, 0x3, 0x400, 0x4, 0x0, 0x81, 0x20, 0x8, 0x401, 0x20, 0x1, 0x80, 0xee64, 0x2, 0xfffffffffffeffff, 0x1, 0x9, 0x1, 0x7f, 0x2, 0x9, 0x2, 0x6, 0x1f, 0x0, 0x1, 0x6, 0x80, 0x3, 0x6, 0x531, 0x4, 0x74, 0x1000, 0x5, 0x100000001, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000001440)}, 0x800, 0x7f, 0x9, 0x0, 0x3, 0x84e, 0x7fff}, r0, 0xf, r1, 0x2) r2 = syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x7, 0x40) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000200)={0x3, 0x5, 0x200, 0x4, 0x4f8, 0x9, 0x7f, 0x7, 0x0}, &(0x7f0000000240)=0x20) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000280)={r3, @in={{0x2, 0x6, @initdev={0xac, 0x1e, 0x0, 0x0}}}, [0x8, 0x9, 0x0, 0x8, 0x2, 0x1ff, 0xffffffff, 0x6, 0x4, 0x8, 0x1000, 0x2, 0x8000, 0x100, 0xb6]}, &(0x7f0000000380)=0x100) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r5, 0x0, &(0x7f0000000180)='vboxnet0\x00') r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000001580)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f0000001680)={&(0x7f0000001540)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000001640)={&(0x7f00000015c0)={0x68, r6, 0x300, 0x70bd28, 0x25dfdbff, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x4, @link='syz0\x00'}}}, [""]}, 0x68}, 0x1, 0x0, 0x0, 0x4004094}, 0x4040000) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r2, 0x84, 0x74, &(0x7f00000003c0)=""/4096, &(0x7f00000000c0)=0x1000) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000001780)='/dev/cachefiles\x00', 0x0, 0x0) fchmod(r0, 0x55) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000001500)={r3, 0x9}, 0x8) r7 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x202, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f0000000140)={'veth1\x00', {0x2, 0x4e21, @empty}}) ioctl$LOOP_CLR_FD(r7, 0x4c01) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) poll(&(0x7f0000001700)=[{r4, 0x80}, {r0}, {r0, 0x4022}, {r7, 0x1052}, {r2, 0x460c}, {r4}, {r7, 0x4400}, {r4, 0x20}, {r1, 0x10}], 0x9, 0x2) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:16 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x800000001, {0x3ff, 0x2}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x46000, 0x0) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000080)=""/190) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) [ 449.981268][T17988] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 450.042631][T17988] CPU: 1 PID: 17988 Comm: syz-executor.4 Not tainted 5.0.0+ #23 [ 450.050308][T17988] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 450.060366][T17988] Call Trace: [ 450.063670][T17988] dump_stack+0x172/0x1f0 [ 450.068029][T17988] dump_header+0x10f/0xb6c [ 450.072469][T17988] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 450.078296][T17988] ? ___ratelimit+0x60/0x595 [ 450.082902][T17988] ? do_raw_spin_unlock+0x57/0x270 [ 450.088027][T17988] oom_kill_process.cold+0x10/0x15 [ 450.093149][T17988] out_of_memory+0x79a/0x1280 [ 450.097838][T17988] ? lock_downgrade+0x880/0x880 [ 450.102699][T17988] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 450.108941][T17988] ? oom_killer_disable+0x280/0x280 [ 450.114152][T17988] ? find_held_lock+0x35/0x130 [ 450.118934][T17988] mem_cgroup_out_of_memory+0x1ca/0x230 [ 450.124517][T17988] ? memcg_event_wake+0x230/0x230 [ 450.129559][T17988] ? do_raw_spin_unlock+0x57/0x270 [ 450.134760][T17988] ? _raw_spin_unlock+0x2d/0x50 14:09:16 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) prctl$PR_SET_TSC(0x1a, 0x3) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80003) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x20000, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nfsfs\x00') write(r0, &(0x7f0000000440)="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", 0x1000) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x101000, 0x0) syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x7, 0x400000) syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x6, 0x2) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$KVM_GET_XCRS(r2, 0x8188aea6, &(0x7f0000000240)={0x2, 0x7fff, [{0x1000, 0x0, 0x8}, {}]}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r3, 0x0) 14:09:16 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) prctl$PR_SET_UNALIGN(0x6, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x2000) [ 450.139624][T17988] try_charge+0x102c/0x15c0 [ 450.144138][T17988] ? find_held_lock+0x35/0x130 [ 450.148918][T17988] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 450.154478][T17988] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 450.160738][T17988] ? kasan_check_read+0x11/0x20 [ 450.165602][T17988] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 450.171159][T17988] mem_cgroup_try_charge+0x24d/0x5e0 [ 450.176460][T17988] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 450.182112][T17988] wp_page_copy+0x408/0x1740 [ 450.186709][T17988] ? find_held_lock+0x35/0x130 [ 450.191482][T17988] ? pmd_pfn+0x1d0/0x1d0 [ 450.195743][T17988] ? lock_downgrade+0x880/0x880 [ 450.200604][T17988] ? __pte_alloc_kernel+0x220/0x220 [ 450.205816][T17988] ? kasan_check_read+0x11/0x20 [ 450.210680][T17988] ? do_raw_spin_unlock+0x57/0x270 [ 450.215802][T17988] do_wp_page+0x5d8/0x16c0 [ 450.220230][T17988] ? do_raw_spin_lock+0x12a/0x2e0 [ 450.225267][T17988] ? rwlock_bug.part.0+0x90/0x90 [ 450.230216][T17988] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 450.235597][T17988] ? add_mm_counter_fast.part.0+0x40/0x40 [ 450.241332][T17988] __handle_mm_fault+0x22e8/0x3ec0 [ 450.246572][T17988] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 450.252132][T17988] ? find_held_lock+0x35/0x130 [ 450.256923][T17988] ? handle_mm_fault+0x322/0xb30 [ 450.261881][T17988] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 450.268153][T17988] ? kasan_check_read+0x11/0x20 [ 450.273030][T17988] handle_mm_fault+0x43f/0xb30 [ 450.277834][T17988] __do_page_fault+0x5ef/0xda0 [ 450.282620][T17988] do_page_fault+0x71/0x581 [ 450.287131][T17988] ? page_fault+0x8/0x30 [ 450.291376][T17988] page_fault+0x1e/0x30 [ 450.295629][T17988] RIP: 0033:0x40d2e8 [ 450.295643][T17988] Code: 8b 34 c6 4a 8d 04 2e 48 3d ff ff ff 7e 0f 86 77 ff ff ff bf e2 d5 4b 00 31 c0 e8 43 46 ff ff 31 ff e8 8c 42 ff ff 0f 1f 40 00 <89> 3c b5 00 00 73 00 eb b6 31 ed 0f 1f 44 00 00 80 3d 7e 31 64 00 [ 450.295651][T17988] RSP: 002b:00007ffe1c83f730 EFLAGS: 00010246 [ 450.295662][T17988] RAX: 00000000735ae296 RBX: 0000000061ba2b68 RCX: 0000001b31d20000 [ 450.295670][T17988] RDX: 0000000000000000 RSI: 0000000000000296 RDI: ffffffff735ae296 [ 450.295678][T17988] RBP: 0000000000000003 R08: 00000000735ae296 R09: 00000000735ae29a [ 450.295686][T17988] R10: 00007ffe1c83f8c0 R11: 0000000000000246 R12: 000000000073bf88 [ 450.295700][T17988] R13: 0000000080000000 R14: 00007f3507878008 R15: 0000000000000003 [ 450.367350][T18014] Unknown ioctl 1079006000 [ 450.392776][T17988] memory: usage 307200kB, limit 307200kB, failcnt 425 [ 450.399555][T17988] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 450.419274][T17988] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 450.426327][T17988] Memory cgroup stats for /syz4: cache:0KB rss:270484KB rss_huge:256000KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:270656KB inactive_file:0KB active_file:0KB unevictable:0KB [ 450.447847][T17988] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=16940,uid=0 [ 450.473298][T17988] Memory cgroup out of memory: Killed process 16940 (syz-executor.4) total-vm:72580kB, anon-rss:2216kB, file-rss:34816kB, shmem-rss:0kB [ 450.479454][T18018] Unknown ioctl 1079006000 [ 450.537398][T17988] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 450.550073][T17988] CPU: 1 PID: 17988 Comm: syz-executor.4 Not tainted 5.0.0+ #23 [ 450.557720][T17988] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 450.567774][T17988] Call Trace: [ 450.571132][T17988] dump_stack+0x172/0x1f0 [ 450.575481][T17988] dump_header+0x10f/0xb6c [ 450.579925][T17988] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 450.585749][T17988] ? ___ratelimit+0x60/0x595 [ 450.590322][T17988] ? do_raw_spin_unlock+0x57/0x270 [ 450.595414][T17988] oom_kill_process.cold+0x10/0x15 [ 450.600510][T17988] out_of_memory+0x79a/0x1280 [ 450.605169][T17988] ? lock_downgrade+0x880/0x880 [ 450.610018][T17988] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 450.616272][T17988] ? oom_killer_disable+0x280/0x280 [ 450.621457][T17988] ? find_held_lock+0x35/0x130 [ 450.626227][T17988] mem_cgroup_out_of_memory+0x1ca/0x230 [ 450.631770][T17988] ? memcg_event_wake+0x230/0x230 [ 450.636794][T17988] ? do_raw_spin_unlock+0x57/0x270 [ 450.641887][T17988] ? _raw_spin_unlock+0x2d/0x50 [ 450.646738][T17988] try_charge+0x102c/0x15c0 [ 450.651229][T17988] ? find_held_lock+0x35/0x130 [ 450.656040][T17988] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 450.661580][T17988] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 450.667834][T17988] ? kasan_check_read+0x11/0x20 [ 450.672668][T17988] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 450.678209][T17988] mem_cgroup_try_charge+0x24d/0x5e0 [ 450.688187][T17988] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 450.693804][T17988] wp_page_copy+0x408/0x1740 [ 450.698373][T17988] ? find_held_lock+0x35/0x130 [ 450.703124][T17988] ? pmd_pfn+0x1d0/0x1d0 [ 450.707352][T17988] ? lock_downgrade+0x880/0x880 [ 450.712201][T17988] ? swp_swapcount+0x540/0x540 [ 450.716947][T17988] ? kasan_check_read+0x11/0x20 [ 450.722236][T17988] ? do_raw_spin_unlock+0x57/0x270 [ 450.727334][T17988] do_wp_page+0x5d8/0x16c0 [ 450.731736][T17988] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 450.737092][T17988] __handle_mm_fault+0x22e8/0x3ec0 [ 450.742190][T17988] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 450.747714][T17988] ? find_held_lock+0x35/0x130 [ 450.752465][T17988] ? handle_mm_fault+0x322/0xb30 [ 450.757519][T17988] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 450.763740][T17988] ? sync_mm_rss+0xa4/0x1c0 [ 450.768225][T17988] handle_mm_fault+0x43f/0xb30 [ 450.772983][T17988] __do_page_fault+0x5ef/0xda0 [ 450.777767][T17988] do_page_fault+0x71/0x581 [ 450.782251][T17988] ? page_fault+0x8/0x30 [ 450.786474][T17988] page_fault+0x1e/0x30 [ 450.790631][T17988] RIP: 0033:0x43f371 [ 450.794513][T17988] Code: 8d 15 13 5e 0a 00 8b 0c 8a 8b 04 82 29 c8 c3 66 2e 0f 1f 84 00 00 00 00 00 48 83 fa 20 48 89 f8 73 77 f6 c2 01 74 0b 0f b6 0e <88> 0f 48 ff c6 48 ff c7 f6 c2 02 74 12 0f b7 0e 66 89 0f 48 83 c6 [ 450.814110][T17988] RSP: 002b:00007ffe1c83f7f8 EFLAGS: 00010202 [ 450.825645][T17988] RAX: 0000000020000040 RBX: 000000000073c900 RCX: 000000000000000a [ 450.833595][T17988] RDX: 000000000000000b RSI: 0000000000740080 RDI: 0000000020000040 [ 450.841563][T17988] RBP: 000000000073c900 R08: 000000000006dd4a R09: 000000000006dd4a [ 450.849529][T17988] R10: 00007ffe1c83f8c0 R11: 0000000000000246 R12: fffffffffffffffe [ 450.857479][T17988] R13: 000000000006dfcb R14: 00000000000003e8 R15: 000000000073bf0c [ 450.870587][T17988] memory: usage 307196kB, limit 307200kB, failcnt 472 [ 450.884835][T17988] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 450.895570][T17988] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 450.903047][T17988] Memory cgroup stats for /syz4: cache:0KB rss:270536KB rss_huge:256000KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:270652KB inactive_file:0KB active_file:0KB unevictable:0KB 14:09:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0xe0000000) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:09:17 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x400000) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x2, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x2000) [ 450.928218][T17988] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=17988,uid=0 [ 450.949358][T17988] Memory cgroup out of memory: Killed process 17988 (syz-executor.4) total-vm:72448kB, anon-rss:2208kB, file-rss:35676kB, shmem-rss:0kB 14:09:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, r1) r3 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r2) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r3, &(0x7f0000000a40)=""/4096, 0x1000) 14:09:17 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x6, 0x20000) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000000c0)={0x0, 0x51}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000001c0)={r3, @in6={{0xa, 0x4e23, 0x100, @dev={0xfe, 0x80, [], 0x27}, 0x8}}, 0x9, 0xffff, 0x4, 0x7}, &(0x7f0000000280)=0x98) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:17 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x420000, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x200, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x4, 0x1) syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x408000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x2, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x44100, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) 14:09:17 executing program 0: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000340)='9p\x00', 0x0, 0x0) [ 451.007372][ T1042] oom_reaper: reaped process 17988 (syz-executor.4), now anon-rss:0kB, file-rss:34716kB, shmem-rss:0kB 14:09:17 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000000), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x2000) 14:09:17 executing program 0: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000340)='9p\x00', 0x0, 0x0) 14:09:17 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000000c0)=0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r0, 0x10, &(0x7f0000000100)={0x3ff}) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000001c0)=[@in6={0xa, 0x4e23, 0x100000000, @loopback, 0x1ff}, @in6={0xa, 0x4e22, 0xff, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x100}, @in6={0xa, 0x4e24, 0x1, @mcast1, 0x1}, @in6={0xa, 0x4e21, 0x9, @local, 0x6}, @in6={0xa, 0x4e20, 0x0, @rand_addr="b5476f8e8f29051815082f361fdb675b", 0x50fc}, @in6={0xa, 0x4e22, 0xffffffffffffff80, @mcast1, 0x3f}, @in6={0xa, 0x4e24, 0x3f, @local, 0x1}, @in6={0xa, 0x4e24, 0x3, @rand_addr="c0dd294fc3c34d852e4205bafcce9405"}], 0xe0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4020000}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="4d90001dd31a2dbde05e22358c027001eb01aea5fd8285d83fb874cf511e69fca3b397a60648f105c45a6b1792a09f7c44ace569a7f0c72d5f1842fe04f35a02112008ec92181c3e4f79b6473a89b764e0458a8ad97b6ce7f47f776994f7e55e0e5b9e83ad5258453e15edb9ae060c9007d327f3afb2e34698fabb9d10b54101e32e39ee05d889", @ANYRES16=r2, @ANYBLOB="100429bd7000fbdbdf250d00000008000400010000000800050002000000080004006a01000044000100080002000200000008000800534d00000c0006006e6f6e650000000014000300ac1414aa0000000000000000000000000800050001000000080004004e2300000800050007000000"], 0x78}, 0x1, 0x0, 0x0, 0x4000}, 0x404c094) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) [ 451.201458][T18039] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 14:09:17 executing program 0: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000340)='9p\x00', 0x0, 0x0) [ 451.244643][T18039] CPU: 0 PID: 18039 Comm: syz-executor.4 Not tainted 5.0.0+ #23 [ 451.252321][T18039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 451.262374][T18039] Call Trace: [ 451.265673][T18039] dump_stack+0x172/0x1f0 [ 451.270047][T18039] dump_header+0x10f/0xb6c [ 451.274480][T18039] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 451.280318][T18039] ? ___ratelimit+0x60/0x595 [ 451.284927][T18039] ? do_raw_spin_unlock+0x57/0x270 [ 451.290066][T18039] oom_kill_process.cold+0x10/0x15 14:09:17 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x800, 0x0) ioctl$SIOCX25SFACILITIES(r2, 0x89e3, &(0x7f00000000c0)={0x2, 0x5, 0x8, 0x4, 0xfff, 0x81}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f00000001c0)={0x20, @time={0x0, 0x989680}, 0x74a74383, {0x6, 0x7}, 0xffffffff, 0x0, 0x100000000000}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r3, 0x1, 0x1, &(0x7f0000000140)={0x4e0000000000000}, 0x4) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) [ 451.295186][T18039] out_of_memory+0x79a/0x1280 [ 451.299871][T18039] ? lock_downgrade+0x880/0x880 [ 451.304725][T18039] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 451.310970][T18039] ? oom_killer_disable+0x280/0x280 [ 451.316183][T18039] ? find_held_lock+0x35/0x130 [ 451.316208][T18039] mem_cgroup_out_of_memory+0x1ca/0x230 [ 451.316222][T18039] ? memcg_event_wake+0x230/0x230 [ 451.316243][T18039] ? do_raw_spin_unlock+0x57/0x270 [ 451.316260][T18039] ? _raw_spin_unlock+0x2d/0x50 [ 451.316279][T18039] try_charge+0x102c/0x15c0 [ 451.316298][T18039] ? find_held_lock+0x35/0x130 [ 451.350792][T18039] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 451.356350][T18039] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 451.362635][T18039] ? kasan_check_read+0x11/0x20 [ 451.367510][T18039] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 451.373088][T18039] mem_cgroup_try_charge+0x24d/0x5e0 [ 451.378392][T18039] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 451.384072][T18039] __handle_mm_fault+0x1e1f/0x3ec0 [ 451.389195][T18039] ? vmf_insert_mixed_mkwrite+0x40/0x40 14:09:17 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x800) ioctl$KVM_GET_DEBUGREGS(r1, 0x8080aea1, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r2 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r3, 0x2000) getsockopt$inet_mreq(r2, 0x0, 0x0, &(0x7f0000000000)={@local, @multicast1}, &(0x7f0000000080)=0x8) [ 451.394778][T18039] ? find_held_lock+0x35/0x130 [ 451.399562][T18039] ? handle_mm_fault+0x322/0xb30 [ 451.404508][T18039] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 451.410757][T18039] ? kasan_check_read+0x11/0x20 [ 451.415644][T18039] handle_mm_fault+0x43f/0xb30 [ 451.420444][T18039] __do_page_fault+0x5ef/0xda0 [ 451.425223][T18039] do_page_fault+0x71/0x581 [ 451.429743][T18039] ? page_fault+0x8/0x30 [ 451.434051][T18039] page_fault+0x1e/0x30 [ 451.438214][T18039] RIP: 0033:0x40b8c4 [ 451.442143][T18039] Code: 33 00 89 48 24 48 89 58 18 31 c0 48 8b 8c 04 10 01 00 00 48 89 8c 02 30 bf 73 00 48 83 c0 08 48 83 f8 48 75 e6 e8 2c 75 ff ff <83> 05 39 47 53 00 01 80 7c 24 0b 00 74 0b f6 44 24 0c 01 0f 84 cd [ 451.461743][T18039] RSP: 002b:00007ffe1c83f800 EFLAGS: 00010217 [ 451.461755][T18039] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000458079 [ 451.461763][T18039] RDX: 0000000000000000 RSI: 0000000000000081 RDI: 000000000073bf08 [ 451.461771][T18039] RBP: 000000000073bf00 R08: 00007f3505877700 R09: 000000000006e24b [ 451.461779][T18039] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000008f3 [ 451.461787][T18039] R13: 0000000000000000 R14: 0000000000000003 R15: 000000000073bf0c [ 451.530227][T18039] memory: usage 307200kB, limit 307200kB, failcnt 490 [ 451.538154][T18039] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 451.548021][T18039] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 451.562707][T18039] Memory cgroup stats for /syz4: cache:0KB rss:270536KB rss_huge:256000KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:270652KB inactive_file:4KB active_file:0KB unevictable:0KB [ 451.609968][T18039] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=16966,uid=0 [ 451.642875][T18039] Memory cgroup out of memory: Killed process 16966 (syz-executor.4) total-vm:72580kB, anon-rss:2216kB, file-rss:34816kB, shmem-rss:0kB [ 451.731268][T18039] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 451.742243][T18039] CPU: 0 PID: 18039 Comm: syz-executor.4 Not tainted 5.0.0+ #23 [ 451.749883][T18039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 451.759947][T18039] Call Trace: [ 451.763280][T18039] dump_stack+0x172/0x1f0 [ 451.767622][T18039] dump_header+0x10f/0xb6c [ 451.772046][T18039] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 451.777864][T18039] ? ___ratelimit+0x60/0x595 [ 451.782471][T18039] ? do_raw_spin_unlock+0x57/0x270 [ 451.787579][T18039] oom_kill_process.cold+0x10/0x15 [ 451.792682][T18039] out_of_memory+0x79a/0x1280 [ 451.797378][T18039] ? lock_downgrade+0x880/0x880 [ 451.802218][T18039] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 451.808469][T18039] ? oom_killer_disable+0x280/0x280 [ 451.813658][T18039] ? find_held_lock+0x35/0x130 [ 451.818418][T18039] mem_cgroup_out_of_memory+0x1ca/0x230 [ 451.823952][T18039] ? memcg_event_wake+0x230/0x230 [ 451.829016][T18039] ? do_raw_spin_unlock+0x57/0x270 [ 451.834125][T18039] ? _raw_spin_unlock+0x2d/0x50 [ 451.838968][T18039] try_charge+0x102c/0x15c0 [ 451.843483][T18039] ? find_held_lock+0x35/0x130 [ 451.848240][T18039] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 451.853786][T18039] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 451.860018][T18039] ? kasan_check_read+0x11/0x20 [ 451.864865][T18039] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 451.870402][T18039] mem_cgroup_try_charge+0x24d/0x5e0 [ 451.875669][T18039] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 451.881285][T18039] wp_page_copy+0x408/0x1740 [ 451.885888][T18039] ? find_held_lock+0x35/0x130 [ 451.890642][T18039] ? pmd_pfn+0x1d0/0x1d0 [ 451.894863][T18039] ? lock_downgrade+0x880/0x880 [ 451.899709][T18039] ? swp_swapcount+0x540/0x540 [ 451.904465][T18039] ? kasan_check_read+0x11/0x20 [ 451.909320][T18039] ? do_raw_spin_unlock+0x57/0x270 [ 451.914415][T18039] do_wp_page+0x5d8/0x16c0 [ 451.918812][T18039] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 451.924197][T18039] __handle_mm_fault+0x22e8/0x3ec0 [ 451.929317][T18039] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 451.934954][T18039] ? find_held_lock+0x35/0x130 [ 451.939718][T18039] ? handle_mm_fault+0x322/0xb30 [ 451.944652][T18039] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 451.950883][T18039] ? kasan_check_read+0x11/0x20 [ 451.955716][T18039] handle_mm_fault+0x43f/0xb30 [ 451.960474][T18039] __do_page_fault+0x5ef/0xda0 [ 451.965243][T18039] do_page_fault+0x71/0x581 [ 451.969746][T18039] ? page_fault+0x8/0x30 [ 451.974001][T18039] page_fault+0x1e/0x30 [ 451.978149][T18039] RIP: 0033:0x40d820 [ 451.982038][T18039] Code: 83 c3 01 e8 82 3e ff ff 39 dd 77 ee 48 8b 44 24 08 89 28 48 83 c4 18 5b 5d 41 5c 41 5d 41 5e 41 5f c3 0f 1f 84 00 00 00 00 00 <89> 3c b5 00 00 73 00 eb 8f 89 eb 48 c1 e3 02 49 8d 6c 1d 00 49 39 [ 452.001653][T18039] RSP: 002b:00007ffe1c83f740 EFLAGS: 00010246 [ 452.007698][T18039] RAX: 000000001a4c38ae RBX: 0000000070f499d3 RCX: 0000001b31d20000 [ 452.015648][T18039] RDX: 0000000000000000 RSI: 00000000000018ae RDI: 000000001a4c38ae [ 452.023620][T18039] RBP: 0000000000000015 R08: 000000001a4c38b2 R09: 000000000006e24b [ 452.031581][T18039] R10: 00007ffe1c83f8c0 R11: 0000000000000246 R12: 000000000073bf88 [ 452.039529][T18039] R13: 00007f3507878004 R14: 00007f3507878000 R15: 0000000000000034 [ 452.048505][T18039] memory: usage 307196kB, limit 307200kB, failcnt 508 [ 452.055482][T18039] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 452.063153][T18039] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 14:09:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0xe8030000) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:09:18 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='net/route\x00') preadv(r0, &(0x7f00000017c0), 0x1be, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) [ 452.070173][T18039] Memory cgroup stats for /syz4: cache:0KB rss:270536KB rss_huge:256000KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:270600KB inactive_file:0KB active_file:0KB unevictable:0KB [ 452.091655][T18039] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=17105,uid=0 [ 452.107100][T18039] Memory cgroup out of memory: Killed process 17105 (syz-executor.4) total-vm:72580kB, anon-rss:2216kB, file-rss:34816kB, shmem-rss:0kB [ 452.138797][T18068] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 14:09:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r1) r3 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.usage_all\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r4, 0x111, 0x3, 0x1, 0x4) clone(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$read(0xb, r3, &(0x7f0000000a40)=""/4096, 0x1000) 14:09:18 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x40, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000100)) r1 = syz_open_dev$dmmidi(0x0, 0x41, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x80000, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000540)={r1, &(0x7f0000000440)="71675570a1de8891c5b86bf7323c8f46915495c0ddcf14adce9a53d167df8f91904ee9da6519c2c3bd9761043c3637076c82c442a808cfd28f1ad23047b40e0f19cd63e22683b8cc218e9b1fedef34ca19586f273dbfbcb0d69955d459744e197ce4ec80f98e69e2195c87da3b0241a2a6b975b2b0fab763ff3f1b9e3da456f9fb0d163310fa89e3b9e1eb00000000043e6754483c644a968f57eaf417914e40638c02c114063a0e238afabe4b7f598f026598352e1ad45fc7e4caf64304eeeea1a0d37020f2537db9f1c1aff189a62fa4d43e57169fb826d7bb1d61321dee94c5cf1dde54334e", &(0x7f0000000300)=""/82}, 0xfffffffffffffea2) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f0000000000)) 14:09:18 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x40, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)={0x1, 0x1, [@dev={[], 0x27}]}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$smack_current(r4, &(0x7f00000002c0)='/dev/vbi#\x00', 0xa) modify_ldt$read(0x0, &(0x7f00000001c0)=""/97, 0x61) syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x2, 0x2) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl(r0, 0x8000, &(0x7f0000000240)="0a9c40585bd215bffd8af80b08d2ae49885bffd0de7b715c65249dce4adb95d1c3536875c01eb96698994740c3fcb007824bcf076d3699522c6b20bec600a8a7776118") 14:09:18 executing program 1: ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r0 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) ioctl$TIOCNOTTY(r0, 0x5422) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000080)) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffd000/0x1000)=nil, 0x1000}, &(0x7f0000000180)=0xfffffffffffffda8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000000)) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x2000) [ 452.181483][T18068] CPU: 0 PID: 18068 Comm: syz-executor.4 Not tainted 5.0.0+ #23 [ 452.189144][T18068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 452.199195][T18068] Call Trace: [ 452.202501][T18068] dump_stack+0x172/0x1f0 [ 452.206869][T18068] dump_header+0x10f/0xb6c [ 452.211287][T18068] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 452.217102][T18068] ? ___ratelimit+0x60/0x595 [ 452.221700][T18068] ? do_raw_spin_unlock+0x57/0x270 [ 452.226857][T18068] oom_kill_process.cold+0x10/0x15 [ 452.231988][T18068] out_of_memory+0x79a/0x1280 [ 452.236685][T18068] ? oom_killer_disable+0x280/0x280 [ 452.241910][T18068] ? find_held_lock+0x35/0x130 [ 452.246694][T18068] mem_cgroup_out_of_memory+0x1ca/0x230 [ 452.252249][T18068] ? memcg_event_wake+0x230/0x230 [ 452.257286][T18068] ? do_raw_spin_unlock+0x57/0x270 [ 452.262426][T18068] ? _raw_spin_unlock+0x2d/0x50 [ 452.267284][T18068] try_charge+0xa87/0x15c0 [ 452.267299][T18068] ? find_held_lock+0x35/0x130 [ 452.267322][T18068] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 452.267335][T18068] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 452.267354][T18068] ? find_held_lock+0x35/0x130 [ 452.276533][T18068] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 452.276559][T18068] __memcg_kmem_charge_memcg+0x7c/0x130 [ 452.276575][T18068] ? memcg_kmem_put_cache+0xb0/0xb0 [ 452.276594][T18068] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 452.276613][T18068] __memcg_kmem_charge+0x136/0x300 [ 452.276645][T18068] __alloc_pages_nodemask+0x437/0x7e0 [ 452.276665][T18068] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 452.276679][T18068] ? __lock_acquire+0x548/0x3fb0 [ 452.276700][T18068] ? is_dynamic_key+0x1c0/0x1c0 [ 452.340255][T18068] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 452.346506][T18068] alloc_pages_current+0x107/0x210 [ 452.351634][T18068] pte_alloc_one+0x1b/0x1a0 [ 452.356155][T18068] __handle_mm_fault+0x3491/0x3ec0 [ 452.361281][T18068] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 452.366845][T18068] ? find_held_lock+0x35/0x130 [ 452.371614][T18068] ? handle_mm_fault+0x322/0xb30 [ 452.376570][T18068] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 452.382817][T18068] ? kasan_check_read+0x11/0x20 [ 452.387682][T18068] handle_mm_fault+0x43f/0xb30 [ 452.392462][T18068] __do_page_fault+0x5ef/0xda0 [ 452.397248][T18068] do_page_fault+0x71/0x581 [ 452.401762][T18068] ? page_fault+0x8/0x30 [ 452.406022][T18068] page_fault+0x1e/0x30 [ 452.410180][T18068] RIP: 0033:0x458079 [ 452.414074][T18068] Code: Bad RIP value. [ 452.418142][T18068] RSP: 002b:00007f3505876c78 EFLAGS: 00010246 [ 452.424205][T18068] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000458079 14:09:18 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000002680), &(0x7f00000026c0)=0x4) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000002700)={'vlan0\x00', 0x47}) r1 = syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000380)={&(0x7f0000000080)=@ax25={{}, [@remote, @default, @netrom, @null, @rose, @bcast, @bcast, @default]}, 0x80, &(0x7f00000025c0)=[{&(0x7f0000000100)=""/115, 0x73}, {&(0x7f0000000180)=""/134, 0x86}, {&(0x7f0000000240)=""/171, 0xab}, {&(0x7f0000000000)=""/40, 0x28}, {&(0x7f0000000440)=""/252, 0xfc}, {&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000300)=""/102, 0x66}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f0000002540)=""/86, 0x56}], 0x9}, 0x40000000) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x20011, r2, 0x0) [ 452.432177][T18068] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 452.440148][T18068] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 452.448127][T18068] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f35058776d4 [ 452.456121][T18068] R13: 00000000004be379 R14: 00000000004cea80 R15: 00000000ffffffff [ 452.500007][T18068] memory: usage 305604kB, limit 307200kB, failcnt 509 [ 452.584039][T18068] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 14:09:18 executing program 0: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x4000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffc1d}]) 14:09:18 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x80045530, &(0x7f0000000200)=""/148) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r2, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) r3 = semget$private(0x0, 0x7, 0x1) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) semtimedop(r3, &(0x7f0000000080)=[{0x3, 0x3, 0x1000}, {0x3, 0x4d2381f2, 0x800}], 0x2, &(0x7f0000000140)={r4, r5+30000000}) 14:09:18 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x100, 0x0) ioctl$SIOCX25SSUBSCRIP(r1, 0x89e1, &(0x7f00000001c0)={'vxcan1\x00', 0x2, 0x80000000000000}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r2 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) r3 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x9, 0x700) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f00000000c0)={0x0, 0x2, 0xfffffffffffffff7, 0x7e}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000002c0)={0x8, 0x8002, 0xc4c, 0x2, r4}, &(0x7f0000000300)=0x10) r5 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f0000000340)) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r5, 0x2000) 14:09:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = request_key(&(0x7f0000000280)='encrypted\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)='\xff\xff\xff', 0xfffffffffffffff8) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r2) r4 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r3) r5 = fcntl$dupfd(r0, 0x406, r0) write$P9_RWRITE(r5, &(0x7f0000000080)={0xb, 0x77, 0x2}, 0xb) ioctl$PPPIOCGMRU(r5, 0x80047453, &(0x7f0000000100)) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$P9_RSYMLINK(r5, &(0x7f0000000140)={0x14, 0x11, 0x1, {0x8, 0x2, 0x4}}, 0x14) keyctl$read(0xb, r4, &(0x7f0000000a40)=""/4096, 0xffffffffffffffea) ioctl$SIOCRSGCAUSE(r5, 0x89e0, &(0x7f00000001c0)) write$FUSE_NOTIFY_INVAL_INODE(r5, &(0x7f0000000000)={0x28, 0x2, 0x0, {0x3, 0x401, 0x10000}}, 0x28) 14:09:18 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000080)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) syz_open_dev$dmmidi(0x0, 0x4000000000, 0x8001) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) [ 452.709672][T18068] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 452.768154][T18068] Memory cgroup stats for /syz4: cache:0KB rss:268736KB rss_huge:253952KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:268632KB inactive_file:0KB active_file:12KB unevictable:0KB [ 452.824366][T18068] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=17702,uid=0 [ 452.923933][T18068] Memory cgroup out of memory: Killed process 17702 (syz-executor.4) total-vm:72580kB, anon-rss:2216kB, file-rss:34816kB, shmem-rss:0kB 14:09:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0xf4010000) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:09:19 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f0000000240)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64IPIN\x00', &(0x7f0000000140)='\x00', 0x1, 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:19 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/create\x00', 0x2, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x1fff) 14:09:19 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) write$cgroup_int(r0, &(0x7f0000000000)=0x8, 0x12) 14:09:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x200000, 0x0) ioctl$VIDIOC_OVERLAY(r1, 0x4004560e, &(0x7f00000001c0)=0x2c) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x20) setsockopt$RXRPC_SECURITY_KEY(r2, 0x110, 0x1, &(0x7f0000000100)='big_key\x00', 0x8) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r3) r5 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r4) clone(0x20000000, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r5, &(0x7f0000000a40)=""/4096, 0x1000) 14:09:19 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x3, 0xb8) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) utimensat(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000380)={{r2, r3/1000+10000}}, 0x100) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400000020000) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) dup3(r0, r0, 0x80000) r4 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x1, 0x2) setsockopt$ARPT_SO_SET_REPLACE(r4, 0x0, 0x60, &(0x7f0000000400)={'filter\x00', 0x7, 0x4, 0x468, 0x0, 0x0, 0x118, 0x380, 0x380, 0x380, 0x4, &(0x7f00000003c0), {[{{@uncond, 0xf0, 0x118}, @unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x100000001, 0x100000000, 0x3}}}, {{@arp={@local, @multicast1, 0xffffff00, 0xffffffff, @empty, {[0x0, 0x0, 0x0, 0xff, 0x0, 0xff]}, @mac=@dev, {[0x0, 0xff, 0xff, 0x0, 0x0, 0xff]}, 0x1, 0x0, 0x100, 0x2, 0x8, 0x9, 'ip6_vti0\x00', 'bcsf0\x00', {}, {0xff}, 0x0, 0x3}, 0xf0, 0x130}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00', 0x96d, 0x4, 0x101}}}, {{@arp={@remote, @local, 0x0, 0xffffff00, @mac=@dev={[], 0xd}, {[0xff, 0xff, 0x0, 0x0, 0xff, 0xff]}, @empty, {[0x0, 0x0, 0xff, 0xff, 0xff, 0xff]}, 0x8, 0x4, 0x1, 0x100, 0x6, 0x0, 'bridge_slave_1\x00', 'veth1\x00', {0xff}}, 0xf0, 0x138}, @unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x1, 0x1ff, 0x2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4b8) lsetxattr$trusted_overlay_redirect(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 14:09:19 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) ioctl$RTC_IRQP_READ(r0, 0x8008700b, &(0x7f00000000c0)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r2, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:19 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r1 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x80000000, 0x100) r2 = syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x5c, r2, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x295}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x4}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x7fffffff}]}, 0x5c}, 0x1, 0x0, 0x0, 0x90}, 0x804) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x1, 0x4012, r0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r3 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffb000/0x1000)=nil, 0x1000}, &(0x7f0000000080)=0x10) r4 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r4, 0x2000) 14:09:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x7, 0x10000) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r1, 0xc0305302, &(0x7f00000001c0)={0x4, 0x9, 0xfffffffffffffe01, 0x81, 0x40000000007, 0x41}) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r2) r4 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r3) fsetxattr$security_smack_entry(r1, &(0x7f0000000340)='security.SMACK64IPIN\x00', &(0x7f0000000240)=',!cgroupself\x00', 0xd, 0x1) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r4, &(0x7f0000000a40)=""/4096, 0x1000) 14:09:19 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = accept(r0, &(0x7f00000001c0)=@in6={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000240)=0x80) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000300)={r2, 0x1}, &(0x7f0000000340)=0x8) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) r4 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x40000, 0x0) ioctl$VIDIOC_S_STD(r4, 0x40085618, &(0x7f0000000140)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:19 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0x3, 0x0, 0x10000, 0x84000, r1}) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x2000) 14:09:19 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x7, @mcast2, 0x6f2}, 0x1c) 14:09:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0x10000000000000) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:09:20 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/autofs\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f0000000440)={0x3f, 0x7, 0x0, 0x34}, 0x10) msgget(0x1, 0x10) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) 14:09:20 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = dup3(r0, r0, 0x80000) ioctl$VIDIOC_S_AUDOUT(r1, 0x40345632, &(0x7f0000000000)={0x0, "086279ed4fe96f4959c7c323b73a779770d69e07aa8dc7b0a7a0f4e3db9d1540", 0x1, 0x1}) r2 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r3, 0x2000) 14:09:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r1) r3 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r2) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) setfsuid(r4) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r3, &(0x7f0000000a40)=""/4096, 0x1000) 14:09:20 executing program 5: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/dlm_plock\x00', 0x2000, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/full\x00', 0x2000, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='/dev/rfkill\x00', 0xfffffffffffffff8) r2 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000380)='keyring\x00', 0x0, 0x0, 0x0, r2) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f0000000080)) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000a40)=0x0) ptrace$getsig(0x4202, r5, 0x7bf, &(0x7f0000000a80)) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video1\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f00000001c0)={0x0, 0xbb65}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r4, 0x84, 0x73, &(0x7f0000000240)={r6, 0xc4, 0x30, 0x353e, 0x8}, &(0x7f0000000280)=0x18) getresuid(&(0x7f0000000880)=0x0, &(0x7f00000008c0), &(0x7f0000000900)) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000940)={0x0, 0x0}, &(0x7f0000000980)=0xc) syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000440)='./file0\x00', 0x2, 0x6, &(0x7f00000007c0)=[{&(0x7f0000000480)="de71d0c80e83e42dc6796ee3cb914418810d8a12d99c122e7f52fa59cc677129f813bb0602e6fe8422071462f1f0d5f323f5cb47bbe7c560abca392420d3b2e8a3d7bcba6dc6a0648c291e6c24c14488cd33e801c456a6905916ba8f67a41b47a0483f0208c221ff34cf3ea8b8caba39fbcf2b784d9fd9be33ea24a6dd3b6ef2a5a234a642603b9b1974ed42c262692f4cacbf67e5b0507125f67dddbf3cc5a6c516be67e31005623b252dfe75fa4117d5073b37b8a3c174e50e63560e6d8694c44553f653cb6e951893cec6eeb511f97ce0d6ff8b2b324fc813baa26541a39d2513f51bdce42bfecc7672336c05d72931cfc4959d3d", 0xf6, 0xfffffffffffffffe}, {&(0x7f0000000580)="22e9a870ecd4de529c230c173cc658320ef8d0d3fc8eef4bc593295e171509677ee1a5b1a3339d4cab4550acaaa83bdb83a91d7a88ebc6e7e1c8a093380edcc2428cf76654600f5f0d534c26e8f9c67a666091dc4a0ff3bec9ffbd3b46786b24967bb7e38e399ad9391bcd65cbea676e1e97a7e35424fe447f4e7858347b1aecf0b7f416f6c0314da43b262a11e90d77402f11099364aca1f17b4632d6f98bcd8ebd23bb2d0b7235b10a59a09d246e0ed005131ad4f72de374f625728092941127c567b88317bd0f61ec7ad285062cbad265ccba", 0xd4, 0x101}, {&(0x7f0000000680)="04c4fd", 0x3, 0x59cf}, {&(0x7f00000006c0)="28a6c261e0c00848871e425723f265016c2cdcc502c638975c86688f0e6eac2f58211bbc392ab27f349e4dccc7639b4be9759caf5dfdc051d88e06aa4d5f26689d947b703296db7bf7a1a837a32067", 0x4f, 0x1000}, {&(0x7f0000000740)="5d496817", 0x4, 0x79e}, {&(0x7f0000000780)="fe5478da3d41db7e120eeb9c62c69e7145d261a55992d8eb90792b1f120ab03c188942f568d5ad07b86ec8bf9851d99717aa62ea560bfcc8", 0x38, 0xdd}], 0x20, &(0x7f00000009c0)={[{@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x6}}], [{@hash='hash'}, {@euid_lt={'euid<', r7}}, {@euid_lt={'euid<', r8}}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x40, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:20 executing program 0: clone(0x1000000000011, 0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000006c0)='fou\x00') waitid(0x0, 0x0, 0x0, 0x1000004, &(0x7f0000000440)) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/policy\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f00000002c0)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r0, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r1, 0x300, 0x70bd2c, 0x25dfdbfd, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x400c004) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) io_setup(0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xabc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) r3 = dup(r2) creat(0x0, 0x0) stat(&(0x7f0000000200)='./bus\x00', &(0x7f00000003c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r2, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000100)='./file0\x00', 0x20141042, 0x1000000000000) prctl$PR_GET_KEEPCAPS(0x7) ftruncate(r4, 0x80080) sendfile(r3, r4, 0x0, 0x2008000fffffffe) 14:09:20 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x60000, 0x0) write$P9_RCLUNK(r1, &(0x7f0000000080)={0x7, 0x79, 0x1}, 0x7) r2 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r3, 0x2000) 14:09:20 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_stats\x00', 0x0, 0x0) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r0, 0x400454ce, r1) r2 = syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x3, 0x0, [{0x413, 0x0, 0x1}, {0xbff, 0x0, 0x4f1}, {0x0, 0x0, 0x80}]}) set_robust_list(&(0x7f0000000140)={&(0x7f0000000080), 0x4, &(0x7f0000000100)={&(0x7f00000000c0)}}, 0x18) r3 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r3, 0x0) 14:09:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r1) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000001c0)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0xd4, 0x1, 0x1, "26933ce2da1cfe06a96d22caccb582eb", "775fa5a092a6fd3d70bb45572ff773d16b50e760b8a3e7e4ccd414b57b7eea00d9259d24e055992d7415c56a206f0b9d268a5f8fb2eb87ff86dcca49810503a550821a8115ef2b654a4d51e12f7a52d5c3486bdd247da654f33231db82cdf11b6c59a29d5aaab820de9181fb077cce0608d6c31249455c614470bbafa49c43f501d5a5edcf19d1f4fed87e364dd525553d8cd0be3b8de428ef4b5f2287fd70745cf27e84060fa13b795532d8a18dd3e1ae6a296bc1845701c555ea2317c8b9"}, 0xd4, 0x2) r3 = add_key(&(0x7f00000002c0)='\x00\x00\x00\xdd\x03\x90\x00\x00', &(0x7f0000000080)={'\xff\xff\xff', 0x2}, 0x0, 0x0, r2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f00000000c0)={0x0, 0x46}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000140)={r4, 0x7ff}, 0x8) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r3, &(0x7f0000000a40)=""/4096, 0x1000) r5 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000000240)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x1c, 0x800) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r5, 0x84, 0x20, &(0x7f0000000400), &(0x7f0000000440)=0x4) 14:09:20 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000001000/0x1000)=nil, 0x1000}, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) r4 = perf_event_open(0x0, 0x0, 0x2, r1, 0xb) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x2000000, 0x10, r4, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:20 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x3, 0x1, 0x40, &(0x7f0000000540)={0xffffffffffffffff}) bind$inet(r0, &(0x7f0000000580)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x17}}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x4002, 0x0) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f0000000440)=[&(0x7f00000001c0)='bond_slave_0\x00', &(0x7f0000000200)='keyringeth1security\x00', &(0x7f0000000240)='keyring\x00', &(0x7f0000000280)='vboxnet0\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='keyring\x00', &(0x7f0000000340)='keyring\x00', &(0x7f0000000380)='vboxnet0,.%+.)bdev\x00', &(0x7f00000003c0)='em1wlan1[{\x00', &(0x7f0000000400)='trusted#wlan1md5sumkeyring\x00'], &(0x7f0000000500)=[&(0x7f00000004c0)='GPL\x00'], 0x1100) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x3) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r4, 0x4038564f, &(0x7f0000000080)={{0x3, @name="51dcb7bff44cc3b9ecdd0b1e514b0e3f7f4456cb9a359471edfe9773e721fc54"}, 0x8, 0x80000001, 0x6}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:20 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x5a, 0xfffffffffffffffe) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) [ 454.670815][T18244] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 454.787161][T18244] CPU: 1 PID: 18244 Comm: syz-executor.4 Not tainted 5.0.0+ #23 [ 454.794851][T18244] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 454.804937][T18244] Call Trace: [ 454.808291][T18244] dump_stack+0x172/0x1f0 [ 454.812642][T18244] dump_header+0x10f/0xb6c [ 454.817077][T18244] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 454.822894][T18244] ? ___ratelimit+0x60/0x595 [ 454.828038][T18244] ? do_raw_spin_unlock+0x57/0x270 [ 454.833164][T18244] oom_kill_process.cold+0x10/0x15 [ 454.838292][T18244] out_of_memory+0x79a/0x1280 [ 454.842999][T18244] ? lock_downgrade+0x880/0x880 [ 454.847888][T18244] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 454.854195][T18244] ? oom_killer_disable+0x280/0x280 [ 454.859402][T18244] ? find_held_lock+0x35/0x130 [ 454.864209][T18244] mem_cgroup_out_of_memory+0x1ca/0x230 [ 454.869786][T18244] ? memcg_event_wake+0x230/0x230 [ 454.874845][T18244] ? do_raw_spin_unlock+0x57/0x270 [ 454.879973][T18244] ? _raw_spin_unlock+0x2d/0x50 [ 454.884855][T18244] try_charge+0x102c/0x15c0 [ 454.889366][T18244] ? find_held_lock+0x35/0x130 [ 454.894154][T18244] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 454.899720][T18244] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 454.905280][T18244] ? find_held_lock+0x35/0x130 [ 454.910064][T18244] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 454.915634][T18244] __memcg_kmem_charge_memcg+0x7c/0x130 [ 454.921185][T18244] ? memcg_kmem_put_cache+0xb0/0xb0 [ 454.926396][T18244] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 454.931993][T18244] __memcg_kmem_charge+0x136/0x300 [ 454.937118][T18244] __alloc_pages_nodemask+0x437/0x7e0 [ 454.942520][T18244] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 454.948822][T18244] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 454.954554][T18244] ? copy_process.part.0+0x1d08/0x7980 [ 454.960026][T18244] ? lockdep_hardirqs_on+0x418/0x5d0 [ 454.965324][T18244] ? trace_hardirqs_on+0x67/0x230 [ 454.970353][T18244] ? kasan_check_read+0x11/0x20 [ 454.975218][T18244] copy_process.part.0+0x3e0/0x7980 [ 454.980442][T18244] ? __lock_acquire+0x548/0x3fb0 [ 454.985387][T18244] ? __fget+0x35a/0x550 [ 454.989577][T18244] ? __might_fault+0x12b/0x1e0 [ 454.994356][T18244] ? __cleanup_sighand+0x60/0x60 [ 454.999302][T18244] ? lock_downgrade+0x880/0x880 [ 455.004185][T18244] _do_fork+0x257/0xfd0 [ 455.008354][T18244] ? fork_idle+0x1d0/0x1d0 [ 455.012789][T18244] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 455.018250][T18244] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 455.023715][T18244] ? do_syscall_64+0x26/0x610 [ 455.028396][T18244] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 455.034483][T18244] ? do_syscall_64+0x26/0x610 [ 455.039175][T18244] __x64_sys_clone+0xbf/0x150 [ 455.043862][T18244] do_syscall_64+0x103/0x610 [ 455.048487][T18244] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 455.054396][T18244] RIP: 0033:0x458079 [ 455.058294][T18244] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 455.077918][T18244] RSP: 002b:00007f3505855c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 455.086528][T18244] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000458079 [ 455.094518][T18244] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 455.102499][T18244] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 455.110479][T18244] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f35058566d4 [ 455.118502][T18244] R13: 00000000004be379 R14: 00000000004cea80 R15: 00000000ffffffff [ 455.192947][T18244] memory: usage 307168kB, limit 307200kB, failcnt 562 [ 455.199783][T18244] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 455.233066][T18244] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 14:09:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0x100000000000000) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:09:21 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x2000) 14:09:21 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, 0x0, 0x0) vmsplice(r2, &(0x7f0000000100)=[{&(0x7f0000000340)="b3", 0x1}], 0x1, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x8001000031, 0xffffffffffffffff, 0x0) splice(r1, 0x0, r4, 0x0, 0x1, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) 14:09:21 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r2, 0x0, &(0x7f0000000180)='vboxnet0\x00') write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x3, 0x4, 0x81}}, 0x30) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x80000000, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) [ 455.263696][T18244] Memory cgroup stats for /syz4: cache:0KB rss:269264KB rss_huge:253952KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:269336KB inactive_file:0KB active_file:0KB unevictable:0KB [ 455.285399][T18244] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=13682,uid=0 [ 455.301234][T18244] Memory cgroup out of memory: Killed process 13682 (syz-executor.4) total-vm:72448kB, anon-rss:2208kB, file-rss:34816kB, shmem-rss:0kB [ 455.425619][T18229] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 455.473373][T18229] CPU: 1 PID: 18229 Comm: syz-executor.4 Not tainted 5.0.0+ #23 [ 455.481020][T18229] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 455.491073][T18229] Call Trace: [ 455.494390][T18229] dump_stack+0x172/0x1f0 [ 455.498738][T18229] dump_header+0x10f/0xb6c [ 455.503166][T18229] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 455.508986][T18229] ? ___ratelimit+0x60/0x595 [ 455.513620][T18229] ? do_raw_spin_unlock+0x57/0x270 [ 455.518861][T18229] oom_kill_process.cold+0x10/0x15 [ 455.523992][T18229] out_of_memory+0x79a/0x1280 [ 455.528709][T18229] ? oom_killer_disable+0x280/0x280 [ 455.533916][T18229] ? find_held_lock+0x35/0x130 [ 455.538687][T18229] mem_cgroup_out_of_memory+0x1ca/0x230 [ 455.544228][T18229] ? memcg_event_wake+0x230/0x230 [ 455.549255][T18229] ? do_raw_spin_unlock+0x57/0x270 [ 455.554368][T18229] ? _raw_spin_unlock+0x2d/0x50 [ 455.559260][T18229] try_charge+0xa87/0x15c0 [ 455.563668][T18229] ? find_held_lock+0x35/0x130 [ 455.568433][T18229] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 455.573987][T18229] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 455.579546][T18229] ? find_held_lock+0x35/0x130 [ 455.584308][T18229] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 455.589861][T18229] __memcg_kmem_charge_memcg+0x7c/0x130 [ 455.595452][T18229] ? memcg_kmem_put_cache+0xb0/0xb0 [ 455.600663][T18229] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 455.606211][T18229] __memcg_kmem_charge+0x136/0x300 [ 455.611347][T18229] __alloc_pages_nodemask+0x437/0x7e0 [ 455.616714][T18229] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 455.622954][T18229] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 455.628686][T18229] ? copy_process.part.0+0x1d08/0x7980 [ 455.634144][T18229] ? lockdep_hardirqs_on+0x418/0x5d0 [ 455.639428][T18229] ? trace_hardirqs_on+0x67/0x230 [ 455.644451][T18229] ? kasan_check_read+0x11/0x20 [ 455.649302][T18229] copy_process.part.0+0x3e0/0x7980 [ 455.654509][T18229] ? psi_memstall_leave+0x11c/0x180 [ 455.659718][T18229] ? sched_clock+0x2e/0x50 [ 455.664141][T18229] ? psi_memstall_leave+0x12e/0x180 [ 455.669333][T18229] ? find_held_lock+0x35/0x130 [ 455.674109][T18229] ? psi_memstall_leave+0x12e/0x180 [ 455.679316][T18229] ? __cleanup_sighand+0x60/0x60 [ 455.684254][T18229] ? __lock_acquire+0x548/0x3fb0 [ 455.689186][T18229] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 455.695439][T18229] _do_fork+0x257/0xfd0 [ 455.699595][T18229] ? fork_idle+0x1d0/0x1d0 [ 455.704018][T18229] ? blkcg_maybe_throttle_current+0x5e2/0xfc0 [ 455.710081][T18229] ? lock_downgrade+0x880/0x880 [ 455.714926][T18229] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 455.721167][T18229] ? blkcg_exit_queue+0x30/0x30 [ 455.726018][T18229] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 455.731474][T18229] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 455.736935][T18229] ? do_syscall_64+0x26/0x610 [ 455.741606][T18229] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 455.747670][T18229] ? do_syscall_64+0x26/0x610 [ 455.752373][T18229] __x64_sys_clone+0xbf/0x150 [ 455.757055][T18229] do_syscall_64+0x103/0x610 [ 455.761679][T18229] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 455.767565][T18229] RIP: 0033:0x45aa49 [ 455.771454][T18229] Code: ff 48 85 f6 0f 84 d7 8e fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c ae 8e fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 455.791062][T18229] RSP: 002b:00007ffe1c83f6c8 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 455.799469][T18229] RAX: ffffffffffffffda RBX: 00007f3505835700 RCX: 000000000045aa49 [ 455.807449][T18229] RDX: 00007f35058359d0 RSI: 00007f3505834db0 RDI: 00000000003d0f00 [ 455.815414][T18229] RBP: 00007ffe1c83f8d0 R08: 00007f3505835700 R09: 00007f3505835700 14:09:21 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'p\a5\xf6\xbb\x1f\x883i\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x2000) [ 455.823379][T18229] R10: 00007f35058359d0 R11: 0000000000000202 R12: 0000000000000000 [ 455.831345][T18229] R13: 00007ffe1c83f77f R14: 00007f35058359c0 R15: 000000000073c04c 14:09:22 executing program 0: clone(0x1000000000011, 0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000006c0)='fou\x00') waitid(0x0, 0x0, 0x0, 0x1000004, &(0x7f0000000440)) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/policy\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f00000002c0)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r0, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r1, 0x300, 0x70bd2c, 0x25dfdbfd, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x400c004) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) io_setup(0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xabc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) r3 = dup(r2) creat(0x0, 0x0) stat(&(0x7f0000000200)='./bus\x00', &(0x7f00000003c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r2, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000100)='./file0\x00', 0x20141042, 0x1000000000000) prctl$PR_GET_KEEPCAPS(0x7) ftruncate(r4, 0x80080) sendfile(r3, r4, 0x0, 0x2008000fffffffe) 14:09:22 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r2, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000b, 0x51011, r1, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:22 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)=0x0) fcntl$setownex(r0, 0xf, &(0x7f00000000c0)={0x3, r1}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x0) [ 455.939199][T18229] memory: usage 305020kB, limit 307200kB, failcnt 562 [ 455.975237][T18229] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 456.002761][T18229] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 456.055628][T18229] Memory cgroup stats for /syz4: cache:0KB rss:267208KB rss_huge:251904KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:267192KB inactive_file:0KB active_file:0KB unevictable:0KB [ 456.192439][T18229] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=13723,uid=0 [ 456.220445][T18229] Memory cgroup out of memory: Killed process 13723 (syz-executor.4) total-vm:72448kB, anon-rss:2208kB, file-rss:34816kB, shmem-rss:0kB 14:09:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0x200000000000000) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:09:22 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x8000}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x8000, 0x2) ioctl$VIDIOC_RESERVED(r1, 0x5601, 0x0) write$sndseq(r0, &(0x7f0000000440)=[{0x0, 0x0, 0x800000000, 0x4, @tick, {0x7}, {0x0, 0x4624}, @time=@tick=0x6}, {0x40000000, 0x5a, 0x1ff, 0x0, @tick=0x8, {0x9, 0x7}, {0xfffffffffffffffe, 0x3}, @quote={{0x1, 0x4}, 0xffffffffffffff57, &(0x7f0000000000)={0x5, 0xffffffff, 0xdd5, 0x5, @time={0x77359400}, {0x7fff, 0x7}, {0x2, 0x3}, @raw32={[0x9, 0x800, 0x7]}}}}, {0x0, 0x0, 0x2, 0x5, @tick=0x3f, {0x5, 0x8}, {0x1, 0x9}, @raw32={[0x7fffffff, 0xaf4, 0x8]}}, {0x80, 0x80, 0x6, 0x21d2, @tick=0x5, {0x3ff, 0xac4}, {0x9a19, 0xa}, @queue={0x8, {0x2, 0x3789}}}, {0x4, 0xc7, 0x10001, 0x4c2ba09b, @tick=0x3, {0x0, 0x9}, {0x8, 0x7}, @ext={0x5a, &(0x7f0000000080)="932cabaa42a19f320e39ea0d4c80f9eaaaeb1adcbbf9353d71f68bdd38034f053885afb28cd2a89811f50a644170dad9466df8dcb7844cd7b63aa78aa7d1c7ac4b40a303f60e7872c3436d6d0b81179e1c2970b9983858e68c9d"}}, {0x8001, 0xfffffffffffffffc, 0xff, 0x23f33d7a, @tick=0x8000, {0x400, 0x29e}, {0x2}, @queue={0xfa26, {0x4, 0x6}}}], 0x120) r2 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x0, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c5000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r2, 0xae03, 0x3) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r3, 0x2000) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f00000001c0)={{0x7fff, 0x3}, 'port0\x00', 0xc3, 0x100000, 0x6, 0x80000000, 0x6, 0x100000001, 0x40, 0x0, 0x2, 0x9}) socket$can_raw(0x1d, 0x3, 0x1) 14:09:22 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000540)='/dev/sequencer\x00', 0x100, 0x0) getsockopt$packet_int(r0, 0x107, 0x800000000000010, &(0x7f0000000700), &(0x7f00000005c0)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") sysfs$1(0x1, &(0x7f0000000280)='/dev/sequencer\x00') r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r3) r5 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r4) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x40240, 0x0) connect$ax25(r6, &(0x7f0000000100)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x6}, [@bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}, 0x48) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) set_tid_address(&(0x7f0000000240)) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000600)={r7}) clone(0x1fffd, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r5, &(0x7f0000000300)=""/198, 0xc6) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000640)={0xffffffffffffffff}, 0x13f, 0x7}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000006c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x1000, @empty}, r8}}, 0x30) clock_gettime(0x0, &(0x7f00000004c0)={0x0, 0x0}) rt_sigtimedwait(&(0x7f0000000400)={0xf2b}, &(0x7f0000000440), &(0x7f0000000500)={r9, r10+10000000}, 0x8) keyctl$read(0xb, r5, &(0x7f0000000a40)=""/4096, 0x1000) 14:09:22 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ae8449a, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:22 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) prctl$PR_SET_PTRACER(0x59616d61, r1) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000000080)={&(0x7f0000ffd000/0x3000)=nil, 0x9, 0x6, 0xa0, &(0x7f0000ffd000/0x1000)=nil}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f00000000c0)={0x0, 0x12, "1653e3ff9a9dad4578519fac20904299b75b"}, &(0x7f0000000100)=0x1a) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000140)={r3, @in6={{0xa, 0x4e23, 0xfffffffffffffbff, @rand_addr="929abeac1843dcea3d7dc706f0c7350d", 0x5}}}, 0x84) syz_open_dev$dmmidi(0x0, 0x7, 0x10004) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r4 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r4, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000280)={0x7, 0x5, 0x4, 0xa0080000, {0x0, 0x7530}, {0x2, 0x8, 0xfffffffffffffffe, 0x7fffffff, 0x347, 0x7fffffff, "c5fe194d"}, 0xb75, 0x3, @planes=&(0x7f0000000240)={0x8, 0x0, @userptr=0xffffffff, 0x8}, 0x4}) 14:09:22 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x800000004) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:22 executing program 0: clone(0x1000000000011, 0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000006c0)='fou\x00') waitid(0x0, 0x0, 0x0, 0x1000004, &(0x7f0000000440)) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/policy\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f00000002c0)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r0, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r1, 0x300, 0x70bd2c, 0x25dfdbfd, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x400c004) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) io_setup(0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xabc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) r3 = dup(r2) creat(0x0, 0x0) stat(&(0x7f0000000200)='./bus\x00', &(0x7f00000003c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r2, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000100)='./file0\x00', 0x20141042, 0x1000000000000) prctl$PR_GET_KEEPCAPS(0x7) ftruncate(r4, 0x80080) sendfile(r3, r4, 0x0, 0x2008000fffffffe) 14:09:22 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) setpriority(0x1, r0, 0xfffffffffffffc00) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000100)={0x0, 0x9c, "41b198451a47eb908034d19d1a9e151547f467a18887c943c9fcab72de77c47e5d31f9e55ef72283a31aaf726078407be3feea17d11b15b29ac9e0d029fd0dfeb2a675e76c1f4bcfae8c5adab0273647ef5640ccc1534b80e34be49958e704cf3c4f7629cdbbd18b7f80d8444ca3c8df9b57c9fe563ae7fdef0c4208f974d640b2d0384b0474804d3978b6fc5dda11274243dba76d526a7ff2e91870"}, &(0x7f00000001c0)=0xa4) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000200)={r2, 0x1, 0x1, 0x7ff}, &(0x7f0000000240)=0x10) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$VIDIOC_SUBDEV_S_SELECTION(r1, 0xc040563e, &(0x7f0000000000)={0x1, 0x0, 0x102, 0x2, {0x0, 0x8, 0x4, 0x57b}}) 14:09:22 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x4000000202000) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000440)={{0x80}, 'port1\x00', 0x0, 0x49e57e40089cd40d, 0x0, 0x1}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x106010, r2, 0x2002) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1a000010", @ANYRES16=r3, @ANYBLOB="00002dbd7000fedbdf250f000000"], 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x20000800) 14:09:22 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) madvise(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x12) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f0000000180)='vboxnet0\x00') r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x7ff, 0x200) ioctl$CAPI_GET_MANUFACTURER(r2, 0xc0044306, &(0x7f00000000c0)=0x2) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:23 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x0, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000000000/0x2000)=nil, 0x2000}, &(0x7f0000000080)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x2000) 14:09:23 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f000000a740)={0x4, &(0x7f000000a700)=[{0x5, 0x4, 0x1, 0x3ffc0000000}, {0x5, 0x4, 0x2, 0x5}, {0xfffffffffffffff7, 0xfffffffffffffffb, 0xfffffffffffffffb, 0xd63}, {0x5, 0x1, 0x1c0000000, 0x8}]}, 0x10) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) recvmmsg(r0, &(0x7f000000a380)=[{{&(0x7f0000000080)=@rc, 0x80, &(0x7f0000000340)=[{&(0x7f0000000100)=""/161, 0xa1}, {&(0x7f00000001c0)=""/141, 0x8d}, {&(0x7f0000000000)=""/4, 0x4}, {&(0x7f0000000280)=""/148, 0x94}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/164, 0xa4}], 0x6}, 0x6b81}, {{&(0x7f0000001500)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000002740)=[{&(0x7f0000001580)=""/225, 0xe1}, {&(0x7f0000001680)=""/4096, 0x1000}, {&(0x7f0000002680)=""/188, 0xbc}], 0x3, &(0x7f0000002780)=""/193, 0xc1}, 0x4}, {{0x0, 0x0, &(0x7f0000003d40)=[{&(0x7f0000002880)=""/25, 0x19}, {&(0x7f00000028c0)=""/62, 0x3e}, {&(0x7f0000002900)=""/35, 0x23}, {&(0x7f0000002940)=""/191, 0xbf}, {&(0x7f0000002a00)=""/225, 0xe1}, {&(0x7f0000002b00)=""/4096, 0x1000}, {&(0x7f0000003b00)=""/178, 0xb2}, {&(0x7f0000003bc0)=""/177, 0xb1}, {&(0x7f0000003c80)=""/150, 0x96}], 0x9, &(0x7f0000003e00)=""/247, 0xf7}, 0x400}, {{&(0x7f0000003f00)=@alg, 0x80, &(0x7f00000040c0)=[{&(0x7f0000003f80)=""/97, 0x61}, {&(0x7f0000004000)=""/8, 0x8}, {&(0x7f0000004040)=""/35, 0x23}, {&(0x7f0000004080)=""/43, 0x2b}], 0x4, &(0x7f0000004100)=""/127, 0x7f}, 0x200}, {{0x0, 0x0, &(0x7f00000053c0)=[{&(0x7f0000004180)=""/4096, 0x1000}, {&(0x7f0000005180)=""/142, 0x8e}, {&(0x7f0000005240)=""/14, 0xe}, {&(0x7f0000005280)=""/239, 0xef}, {&(0x7f0000005380)=""/29, 0x1d}], 0x5, &(0x7f0000005440)=""/68, 0x44}, 0x10000}, {{&(0x7f00000054c0)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000006680)=[{&(0x7f0000005540)=""/149, 0x95}, {&(0x7f0000005600)=""/88, 0x58}, {&(0x7f0000005680)=""/4096, 0x1000}], 0x3, &(0x7f00000066c0)=""/215, 0xd7}, 0x1}, {{&(0x7f00000067c0)=@tipc=@id, 0x80, &(0x7f0000006a40)=[{&(0x7f0000006840)=""/126, 0x7e}, {&(0x7f00000068c0)=""/192, 0xc0}, {&(0x7f0000006980)=""/132, 0x84}], 0x3, &(0x7f0000006a80)=""/4096, 0x1000}, 0xd69}, {{&(0x7f0000007a80)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}}, 0x80, &(0x7f0000008d80)=[{&(0x7f0000007b00)=""/131, 0x83}, {&(0x7f0000007bc0)=""/86, 0x56}, {&(0x7f0000007c40)=""/4096, 0x1000}, {&(0x7f0000008c40)=""/160, 0xa0}, {&(0x7f0000008d00)=""/9, 0x9}, {&(0x7f0000008d40)=""/8, 0x8}], 0x6, &(0x7f0000008e00)=""/85, 0x55}, 0x101}, {{0x0, 0x0, &(0x7f000000a240)=[{&(0x7f0000008e80)=""/4096, 0x1000}, {&(0x7f0000009e80)=""/88, 0x58}, {&(0x7f0000009f00)=""/109, 0x6d}, {&(0x7f0000009f80)=""/191, 0xbf}, {&(0x7f000000a040)=""/217, 0xd9}, {&(0x7f000000a140)=""/54, 0x36}, {&(0x7f000000a180)=""/134, 0x86}], 0x7, &(0x7f000000a2c0)=""/189, 0xbd}, 0x1}], 0x9, 0x115d862bfdca4578, &(0x7f000000a5c0)={0x0, 0x989680}) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f000000a600), 0x4) r2 = syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f000000a6c0)={0x17, 0x70, &(0x7f000000a640)="20a0ff90978736df42c784821e2907098293c54b5980759c016610696488c4cd0285d0749286da039056fd636239d9c65e0f7809d2e1789b4f408f3bd360f7653e7c1313a2b6e4aa954f7f448bd6f4ac8dae16d003733fb1bbc1cabeafac8623f00489eee5a7a669a47abe75e0e477bf"}) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r3, 0x0) 14:09:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0x300000000000000) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:09:23 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:23 executing program 0: clone(0x1000000000011, 0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000006c0)='fou\x00') waitid(0x0, 0x0, 0x0, 0x1000004, &(0x7f0000000440)) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/policy\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f00000002c0)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r0, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r1, 0x300, 0x70bd2c, 0x25dfdbfd, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x400c004) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) io_setup(0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xabc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) r3 = dup(r2) creat(0x0, 0x0) stat(&(0x7f0000000200)='./bus\x00', &(0x7f00000003c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r2, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000100)='./file0\x00', 0x20141042, 0x1000000000000) prctl$PR_GET_KEEPCAPS(0x7) ftruncate(r4, 0x80080) sendfile(r3, r4, 0x0, 0x2008000fffffffe) 14:09:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000500)="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") r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r1) r3 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r2) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r3, &(0x7f0000000a40)=""/4096, 0x1000) 14:09:23 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x82013, r0, 0x0) 14:09:23 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000200)=0x0) get_robust_list(r0, &(0x7f0000000300)=&(0x7f00000002c0)={&(0x7f0000000280)={&(0x7f0000000240)}}, &(0x7f0000000340)=0x18) r1 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r2 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) futimesat(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{}, {r3, r4/1000+30000}}) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000080)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000000)=0x10) r5 = getpid() ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f00000001c0)=0x0) ioctl$sock_netdev_private(r2, 0x89f1, &(0x7f0000000440)="32ea9fa24c8118a126d79659ece190801ab9b626693e7cfd379ab9964b6b9d5e522acce5ad739021c492edc3f4e3cf16f176b5445a8e33701377d6349077b975886d4fefb1188f7d89d4f1b85931694d01a2f2b950fb558dc83dc2d0cd67131208c8766212c67ce9dc0cc983a1f24084b0de9de4373cd29d1455cedf4204cec54c0098a8eb420a2b3f155e47f6dd027898102bb267fd9911f50e95dd8bea0b6720da8634489767a871c5e746d42bdb0b4e84d06651") kcmp(r5, r6, 0x6, r2, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r7, 0x2000) 14:09:23 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) ioctl$IMGETVERSION(r0, 0x80044942, &(0x7f00000000c0)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r2, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TCSETSW(r3, 0x5403, &(0x7f0000000140)={0xfffffffffffffffa, 0x81, 0x257e, 0x0, 0xc, 0x0, 0x200, 0x1, 0x7, 0x0, 0x4, 0x9}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) setxattr$security_smack_entry(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.SMACK64EXEC\x00', &(0x7f0000000240)='keyring\x00', 0x8, 0x2) 14:09:23 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) r0 = syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="90dfbf9aabf271ce1cab8f5d47e85671", 0x10) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) [ 457.722318][T18375] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 [ 457.792594][T18375] CPU: 0 PID: 18375 Comm: syz-executor.4 Not tainted 5.0.0+ #23 [ 457.800262][T18375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 457.810311][T18375] Call Trace: [ 457.813707][T18375] dump_stack+0x172/0x1f0 [ 457.818070][T18375] dump_header+0x10f/0xb6c [ 457.822518][T18375] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 457.828334][T18375] ? ___ratelimit+0x60/0x595 [ 457.832939][T18375] ? do_raw_spin_unlock+0x57/0x270 [ 457.838087][T18375] oom_kill_process.cold+0x10/0x15 [ 457.843212][T18375] out_of_memory+0x79a/0x1280 [ 457.847901][T18375] ? lock_downgrade+0x880/0x880 [ 457.852759][T18375] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 457.859018][T18375] ? oom_killer_disable+0x280/0x280 [ 457.864216][T18375] ? find_held_lock+0x35/0x130 [ 457.869013][T18375] mem_cgroup_out_of_memory+0x1ca/0x230 [ 457.874564][T18375] ? memcg_event_wake+0x230/0x230 [ 457.879614][T18375] ? do_raw_spin_unlock+0x57/0x270 [ 457.884735][T18375] ? _raw_spin_unlock+0x2d/0x50 [ 457.889625][T18375] try_charge+0x102c/0x15c0 [ 457.894144][T18375] ? find_held_lock+0x35/0x130 [ 457.898951][T18375] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 457.904560][T18375] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 457.910118][T18375] ? find_held_lock+0x35/0x130 [ 457.914889][T18375] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 457.920452][T18375] __memcg_kmem_charge_memcg+0x7c/0x130 [ 457.926026][T18375] ? memcg_kmem_put_cache+0xb0/0xb0 [ 457.931237][T18375] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 457.936818][T18375] __memcg_kmem_charge+0x136/0x300 [ 457.941950][T18375] __alloc_pages_nodemask+0x437/0x7e0 [ 457.947575][T18375] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 457.953318][T18375] ? copy_page_range+0x125a/0x1f90 [ 457.958448][T18375] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 457.964707][T18375] alloc_pages_current+0x107/0x210 [ 457.969834][T18375] pte_alloc_one+0x1b/0x1a0 [ 457.974351][T18375] __pte_alloc+0x20/0x310 [ 457.978684][T18375] copy_page_range+0x1529/0x1f90 [ 457.983628][T18375] ? find_held_lock+0x35/0x130 [ 457.988438][T18375] ? pmd_alloc+0x180/0x180 [ 457.992858][T18375] ? __rb_insert_augmented+0x231/0xdf0 [ 457.998323][T18375] ? validate_mm_rb+0xa3/0xc0 [ 458.003022][T18375] ? __vma_link_rb+0x279/0x370 [ 458.007797][T18375] copy_process.part.0+0x568b/0x7980 [ 458.013115][T18375] ? __cleanup_sighand+0x60/0x60 [ 458.018070][T18375] _do_fork+0x257/0xfd0 [ 458.022234][T18375] ? fork_idle+0x1d0/0x1d0 [ 458.026680][T18375] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 458.032151][T18375] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 458.037622][T18375] ? do_syscall_64+0x26/0x610 [ 458.042313][T18375] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 458.048391][T18375] ? do_syscall_64+0x26/0x610 [ 458.053080][T18375] __x64_sys_clone+0xbf/0x150 [ 458.057793][T18375] do_syscall_64+0x103/0x610 [ 458.062392][T18375] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 458.068288][T18375] RIP: 0033:0x458079 [ 458.072215][T18375] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 458.091820][T18375] RSP: 002b:00007f3505876c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 458.100263][T18375] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000458079 [ 458.108240][T18375] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 458.116215][T18375] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 458.124219][T18375] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f35058776d4 [ 458.132198][T18375] R13: 00000000004be379 R14: 00000000004cea80 R15: 00000000ffffffff 14:09:24 executing program 2: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2000, 0x0) getsockname$llc(r0, &(0x7f0000000140)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f00000000c0)=0x10) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) ioctl$PPPIOCGMRU(r0, 0x80047453, &(0x7f0000000100)) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) 14:09:24 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) getsockopt$XDP_STATISTICS(r2, 0x11b, 0x7, &(0x7f00000000c0), &(0x7f0000000140)=0x18) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x110, 0xffffffffffffffff, 0x80) openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x4100, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:24 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r1, &(0x7f0000000000)='./file0\x00', 0x101) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x2000) 14:09:24 executing program 0: clone(0x1000000000011, 0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000006c0)='fou\x00') waitid(0x0, 0x0, 0x0, 0x1000004, &(0x7f0000000440)) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/policy\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f00000002c0)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r0, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r1, 0x300, 0x70bd2c, 0x25dfdbfd, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x400c004) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) io_setup(0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xabc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) r3 = dup(r2) creat(0x0, 0x0) stat(&(0x7f0000000200)='./bus\x00', &(0x7f00000003c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r2, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000100)='./file0\x00', 0x20141042, 0x1000000000000) prctl$PR_GET_KEEPCAPS(0x7) ftruncate(r4, 0x80080) sendfile(r3, r4, 0x0, 0x2008000fffffffe) [ 458.335064][T18375] memory: usage 307200kB, limit 307200kB, failcnt 590 [ 458.342000][T18375] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 458.383420][T18375] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 458.397412][T18375] Memory cgroup stats for /syz4: cache:0KB rss:269440KB rss_huge:253952KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:269340KB inactive_file:0KB active_file:0KB unevictable:0KB [ 458.423807][T18375] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=18374,uid=0 [ 458.465930][T18375] Memory cgroup out of memory: Killed process 18374 (syz-executor.4) total-vm:72580kB, anon-rss:2216kB, file-rss:35656kB, shmem-rss:0kB 14:09:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0x610000000000000) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:09:24 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x70) getsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r2 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x3, 0x2) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff9) r4 = add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$negate(0xd, r3, 0x7, r4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1be0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r5, 0x2000) 14:09:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f0000000100), 0x4) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r2) r4 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r3) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r4, &(0x7f0000000a40)=""/4096, 0x1000) r5 = dup3(r0, r0, 0x80000) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000000080), 0x0) 14:09:24 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_\x9c|n\x00\x00\x00\x00\x00\x00\x00\"\x00', {0x2, 0x4e24, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000300)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000400)=0xe8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000005c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r2, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x800001}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x28, r4, 0x100, 0x70bd2d, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0xc, 0x13, @l2={'ib', 0x3a, 'hsr0\x00'}}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x4008000}, 0x4050) syz_mount_image$f2fs(&(0x7f0000000080)='f2fs\x00', &(0x7f00000000c0)='./file0\x00', 0x22, 0x2, &(0x7f0000000140)=[{&(0x7f00000001c0)="8f89fa5a798b33792997dcdf5446d072f562e05c87d359169dd672ff7384640df6e24e88dafd7bd56a9a123030331a7556ab065b27a56f2a30f5814cdf79fbae3518cfd7e4d2597c8ecdd68f08086c1d942e2a8f35a77f48c842bb6261d108f11fde115411a0ec24d216e7efdbcefd0e2c3537136cce0a3def2a654282a89466d0186c6cb7c412df9de791710a1a1436", 0x90, 0x9}, {&(0x7f0000000280)="3b78f1eaa000e3bcc76de464ca82f271e861ffd4babe3c35de08a1b31160bdb8fc4fbb83cb05ad25122e940dc5ea9377373d634587e08ca068ead40939f3f5383d1ebe3bc115951124d3ddbe5eb8481c61406d371dad902b4fe07dc4ae3288e9020d9cc15e2dbd", 0x67, 0x2}], 0x200c00, &(0x7f0000000440)={[{@noflush_merge='noflush_merge'}, {@background_gc_off='background_gc=off'}, {@prjquota={'prjquota', 0x3d, 'md5sum,'}}, {@whint_mode_fs='whint_mode=fs-based'}, {@disable_ext_identify='disable_ext_identify'}, {@two_active_logs='active_logs=2'}], [{@uid_lt={'uid<', r3}}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@permit_directio='permit_directio'}, {@subj_user={'subj_user', 0x3d, ',\'lo'}}, {@subj_role={'subj_role', 0x3d, '/dev/bus/usb/00#/00#\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x64, 0x37, 0x76, 0x64, 0x39, 0x34, 0x7f, 0x38], 0x2d, [0x37, 0x77, 0x0, 0x34], 0x2d, [0x35, 0x7f, 0x73, 0x35], 0x2d, [0x38, 0x75, 0x33], 0x2d, [0x37, 0x35, 0x30, 0x37, 0x39, 0x62, 0x39, 0x75]}}}, {@pcr={'pcr', 0x3d, 0x2b}}, {@measure='measure'}]}) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:24 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) write$nbd(r0, &(0x7f0000000440)={0x67446698, 0x1, 0x4, 0x0, 0x3, "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"}, 0x1010) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) fcntl$setsig(r0, 0xa, 0x21) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) [ 458.766837][T18442] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 458.782388][T18442] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 458.800336][T18437] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 458.822092][T18442] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 458.871320][T18442] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock [ 458.896169][T18437] CPU: 0 PID: 18437 Comm: syz-executor.4 Not tainted 5.0.0+ #23 [ 458.903810][T18437] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 458.913865][T18437] Call Trace: [ 458.917177][T18437] dump_stack+0x172/0x1f0 [ 458.921519][T18437] dump_header+0x10f/0xb6c [ 458.925959][T18437] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 458.931831][T18437] ? ___ratelimit+0x60/0x595 [ 458.936560][T18437] ? do_raw_spin_unlock+0x57/0x270 [ 458.941683][T18437] oom_kill_process.cold+0x10/0x15 [ 458.946810][T18437] out_of_memory+0x79a/0x1280 [ 458.951496][T18437] ? lock_downgrade+0x880/0x880 [ 458.956355][T18437] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 458.962603][T18437] ? oom_killer_disable+0x280/0x280 [ 458.967819][T18437] ? find_held_lock+0x35/0x130 [ 458.972604][T18437] mem_cgroup_out_of_memory+0x1ca/0x230 [ 458.978162][T18437] ? memcg_event_wake+0x230/0x230 [ 458.983211][T18437] ? do_raw_spin_unlock+0x57/0x270 [ 458.988347][T18437] ? _raw_spin_unlock+0x2d/0x50 [ 458.993221][T18437] try_charge+0x102c/0x15c0 [ 458.997733][T18437] ? find_held_lock+0x35/0x130 [ 459.002512][T18437] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 459.008074][T18437] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 459.014339][T18437] ? kasan_check_read+0x11/0x20 [ 459.019204][T18437] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 459.024773][T18437] mem_cgroup_try_charge+0x24d/0x5e0 [ 459.030070][T18437] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 459.035726][T18437] wp_page_copy+0x408/0x1740 [ 459.040324][T18437] ? find_held_lock+0x35/0x130 [ 459.045100][T18437] ? pmd_pfn+0x1d0/0x1d0 [ 459.049353][T18437] ? lock_downgrade+0x880/0x880 [ 459.054212][T18437] ? swp_swapcount+0x540/0x540 [ 459.059021][T18437] ? kasan_check_read+0x11/0x20 [ 459.063895][T18437] ? do_raw_spin_unlock+0x57/0x270 [ 459.069063][T18437] do_wp_page+0x5d8/0x16c0 [ 459.073497][T18437] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 459.078886][T18437] __handle_mm_fault+0x22e8/0x3ec0 [ 459.084026][T18437] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 459.089582][T18437] ? find_held_lock+0x35/0x130 [ 459.094357][T18437] ? handle_mm_fault+0x322/0xb30 [ 459.099318][T18437] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 459.105572][T18437] ? kasan_check_read+0x11/0x20 [ 459.110438][T18437] handle_mm_fault+0x43f/0xb30 [ 459.115221][T18437] __do_page_fault+0x5ef/0xda0 [ 459.120027][T18437] do_page_fault+0x71/0x581 [ 459.124546][T18437] ? page_fault+0x8/0x30 [ 459.128798][T18437] page_fault+0x1e/0x30 [ 459.132958][T18437] RIP: 0033:0x40d820 [ 459.136921][T18437] Code: 83 c3 01 e8 82 3e ff ff 39 dd 77 ee 48 8b 44 24 08 89 28 48 83 c4 18 5b 5d 41 5c 41 5d 41 5e 41 5f c3 0f 1f 84 00 00 00 00 00 <89> 3c b5 00 00 73 00 eb 8f 89 eb 48 c1 e3 02 49 8d 6c 1d 00 49 39 [ 459.156526][T18437] RSP: 002b:00007ffe1c83f740 EFLAGS: 00010246 [ 459.162611][T18437] RAX: 000000005bdc4d86 RBX: 0000000070f499d3 RCX: 0000001b31d20000 14:09:25 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x2000) 14:09:25 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffff9c) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x200000, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U-'}, 0x28, 0x2) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) r1 = syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) mount(&(0x7f0000000100)=@nullb='/dev/nullb0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='ext4\x00', 0x2000, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) ioctl$EVIOCSABS0(r1, 0x401845c0, &(0x7f0000000000)={0x4, 0x81, 0x8, 0x1, 0x3, 0x1000}) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x0) [ 459.170622][T18437] RDX: 0000000000000000 RSI: 0000000000000d86 RDI: 000000005bdc4d85 [ 459.178608][T18437] RBP: 0000000000000013 R08: 000000005bdc4d89 R09: 000000000006ffc8 [ 459.186585][T18437] R10: 00007ffe1c83f8c0 R11: 0000000000000246 R12: 000000000073bf88 [ 459.194558][T18437] R13: 00007f3507878004 R14: 00007f3507878000 R15: 0000000000000032 [ 459.213414][T18442] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) 14:09:25 executing program 0: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='unconfined_u:system_r:insmod_t:s0-s0:\x00\x00\x00\x00\x00\x00\x00\t\x00\xcc\x13\x88~\xc2\xcb:%\x98\xe31cmI\x98\x06\xfd\xd4\x19\x83i\x8b\xec\xc7\xe3\xe9\x92\xc9\x95=\xa9\x82m\xa2\xe9\xa4\x9bF\x84b\x1bq2', 0x5c, 0x0) [ 459.278712][T18442] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 459.287613][T18437] memory: usage 307052kB, limit 307200kB, failcnt 630 [ 459.298000][T18437] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 459.332640][T18442] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 459.335106][T18437] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 459.371730][T18442] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock [ 459.378937][T18437] Memory cgroup stats for /syz4: cache:0KB rss:269332KB rss_huge:253952KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:269388KB inactive_file:0KB active_file:0KB unevictable:0KB [ 459.408700][T18437] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=13752,uid=0 14:09:25 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000080)=0xa61) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x42, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r3, 0x2000) ioctl$KVM_KVMCLOCK_CTRL(r1, 0xaead) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f00000001c0)={{{@in6, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r4, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getegid() lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r11 = getegid() getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000600)={0x0, 0x0, 0x0}, &(0x7f0000000640)=0xc) getgroups(0x3, &(0x7f0000000680)=[0xee01, 0xee00, 0xffffffffffffffff]) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000006c0)={0x0, 0x0, 0x0}, &(0x7f0000000700)=0xc) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x5, &(0x7f0000000800)=[0x0, 0xffffffffffffffff, 0xee00, 0xee00, 0xee00]) fsetxattr$system_posix_acl(r2, &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000840)={{}, {0x1, 0x1}, [{0x2, 0x6, r5}, {0x2, 0x1, r6}], {0x4, 0x7}, [{0x8, 0x4, r7}, {0x8, 0x3, r8}, {0x8, 0x2, r9}, {0x8, 0x2, r10}, {0x8, 0x3, r11}, {0x8, 0x6, r12}, {0x8, 0x5, r13}, {0x8, 0x1, r14}, {0x8, 0x7, r15}, {0x8, 0x1, r16}], {0x10, 0x5}, {0x20, 0x1}}, 0x84, 0x1) 14:09:25 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x9, 0x10140) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) [ 459.426187][ T26] audit: type=1400 audit(1552658965.544:77): avc: denied { mac_admin } for pid=18461 comm="syz-executor.0" capability=33 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 [ 459.428813][T18437] Memory cgroup out of memory: Killed process 13752 (syz-executor.4) total-vm:72448kB, anon-rss:2208kB, file-rss:34816kB, shmem-rss:0kB [ 459.472791][T18462] SELinux: Context unconfined_u:system_r:insmod_t:s0-s0: is not valid (left unmapped). 14:09:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x80004e22}, 0x1c) listen(r1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r2, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a0676ffffff81004e220000000058000b4824ca944f64009400050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) [ 459.545321][T18464] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 459.580112][T18464] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock 14:09:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0xa00000000000000) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) [ 459.628880][T18464] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) 14:09:25 executing program 0: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0x3, 0x0, 0x10000, 0x84000, r1}) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x2000) 14:09:25 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x0, 0x20000) ioctl$UI_END_FF_UPLOAD(r0, 0x406855c9, &(0x7f0000000080)={0x3, 0x400, {0x57, 0x1, 0x7, {0x0, 0xfffffffffffffff8}, {0x0, 0x40}, @const={0x1, {0x60fe, 0x6, 0x8, 0xcd97}}}, {0x53, 0x3, 0x9, {0x0, 0x2}, {0x1, 0x101}, @const={0x5, {0x0, 0x83, 0x1, 0x9}}}}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) [ 459.684382][T18448] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 [ 459.687686][T18464] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock [ 459.756766][T18464] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 459.803117][T18464] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 459.811508][T18448] CPU: 0 PID: 18448 Comm: syz-executor.4 Not tainted 5.0.0+ #23 [ 459.819151][T18448] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 459.827521][T18464] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 459.829204][T18448] Call Trace: [ 459.829230][T18448] dump_stack+0x172/0x1f0 [ 459.829251][T18448] dump_header+0x10f/0xb6c [ 459.829277][T18448] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 459.843120][T18464] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock [ 459.844632][T18448] ? ___ratelimit+0x60/0x595 [ 459.844650][T18448] ? do_raw_spin_unlock+0x57/0x270 [ 459.844669][T18448] oom_kill_process.cold+0x10/0x15 [ 459.844690][T18448] out_of_memory+0x79a/0x1280 [ 459.882442][T18448] ? oom_killer_disable+0x280/0x280 [ 459.887638][T18448] ? find_held_lock+0x35/0x130 [ 459.892427][T18448] mem_cgroup_out_of_memory+0x1ca/0x230 [ 459.897971][T18448] ? memcg_event_wake+0x230/0x230 [ 459.903029][T18448] ? do_raw_spin_unlock+0x57/0x270 [ 459.908142][T18448] ? _raw_spin_unlock+0x2d/0x50 [ 459.913033][T18448] try_charge+0xa87/0x15c0 [ 459.917457][T18448] ? find_held_lock+0x35/0x130 [ 459.922233][T18448] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 459.927785][T18448] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 459.933327][T18448] ? find_held_lock+0x35/0x130 [ 459.938090][T18448] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 459.943642][T18448] __memcg_kmem_charge_memcg+0x7c/0x130 [ 459.949209][T18448] ? memcg_kmem_put_cache+0xb0/0xb0 [ 459.954408][T18448] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 459.959953][T18448] __memcg_kmem_charge+0x136/0x300 [ 459.965076][T18448] __alloc_pages_nodemask+0x437/0x7e0 [ 459.970444][T18448] ? find_held_lock+0x35/0x130 [ 459.975209][T18448] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 459.980923][T18448] ? sched_clock+0x2e/0x50 [ 459.985345][T18448] ? find_held_lock+0x35/0x130 [ 459.990109][T18448] ? is_dynamic_key+0x1c0/0x1c0 [ 459.994953][T18448] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 460.001203][T18448] alloc_pages_current+0x107/0x210 [ 460.006317][T18448] pte_alloc_one+0x1b/0x1a0 [ 460.010817][T18448] __handle_mm_fault+0x3491/0x3ec0 [ 460.015941][T18448] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 460.021489][T18448] ? find_held_lock+0x35/0x130 [ 460.026251][T18448] ? handle_mm_fault+0x322/0xb30 [ 460.031192][T18448] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 460.037455][T18448] ? kasan_check_read+0x11/0x20 [ 460.042307][T18448] handle_mm_fault+0x43f/0xb30 [ 460.047074][T18448] __do_page_fault+0x5ef/0xda0 [ 460.051858][T18448] do_page_fault+0x71/0x581 [ 460.056359][T18448] ? page_fault+0x8/0x30 [ 460.060595][T18448] page_fault+0x1e/0x30 [ 460.064756][T18448] RIP: 0033:0x458079 [ 460.068657][T18448] Code: Bad RIP value. [ 460.072717][T18448] RSP: 002b:00007f3505876c78 EFLAGS: 00010246 [ 460.078793][T18448] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000458079 [ 460.086794][T18448] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 460.094758][T18448] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 460.102723][T18448] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f35058776d4 [ 460.110686][T18448] R13: 00000000004be379 R14: 00000000004cea80 R15: 00000000ffffffff [ 460.198450][T18448] memory: usage 306716kB, limit 307200kB, failcnt 630 [ 460.209333][T18448] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 460.219520][T18448] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 460.230612][T18448] Memory cgroup stats for /syz4: cache:0KB rss:269324KB rss_huge:253952KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:269320KB inactive_file:0KB active_file:0KB unevictable:0KB [ 460.265855][T18448] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=13790,uid=0 [ 460.298278][T18448] Memory cgroup out of memory: Killed process 13790 (syz-executor.4) total-vm:72448kB, anon-rss:2208kB, file-rss:34816kB, shmem-rss:0kB 14:09:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r1) accept$packet(0xffffffffffffff9c, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'hsr0\x00', 0x3}, 0x18) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000140)={r3, @local, @remote}, 0xc) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x10000, 0x0) ioctl$TIOCGWINSZ(r4, 0x5413, &(0x7f0000000280)) r5 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r2) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r5, &(0x7f0000000a40)=""/4096, 0x1000) socket$inet_udp(0x2, 0x2, 0x0) 14:09:26 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname(r1, &(0x7f0000000080)=@ipx, &(0x7f0000000140)=0x80) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) openat(r2, &(0x7f0000000000)='./file0\x00', 0x40000, 0x20) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x2000) 14:09:26 executing program 0: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f0000000240)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64IPIN\x00', &(0x7f0000000140)='\x00', 0x1, 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:26 executing program 2: syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x6, 0x2400) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000080)={'filter\x00'}, &(0x7f0000000100)=0x44) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x0) 14:09:26 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x111800, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:26 executing program 0: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f0000000240)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64IPIN\x00', &(0x7f0000000140)='\x00', 0x1, 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:26 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x2000) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000080)={0x0, 0x71, "48b257fb6fd13c04b8a9161fcd94e8ebb8e1d8f11fb93d50d867ea72280b33e7d79342ec9209f3c6487457ccef54854dcb243370000be50604dd63753188196d2ad1c752eba5f32479913af008ed97e88ce32bc56d8c324cc7c9b968ab2da468c8c978b44eaf7882d545b91591b2e2f0e8"}, &(0x7f0000000000)=0x79) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000140)={r3, 0x401, 0x30}, 0xc) 14:09:26 executing program 0: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x100, 0x0) ioctl$SIOCX25SSUBSCRIP(r1, 0x89e1, &(0x7f00000001c0)={'vxcan1\x00', 0x2, 0x80000000000000}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r2 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) r3 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x9, 0x700) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f00000000c0)={0x0, 0x2, 0xfffffffffffffff7, 0x7e}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000002c0)={0x8, 0x8002, 0xc4c, 0x2, r4}, &(0x7f0000000300)=0x10) r5 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f0000000340)) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r5, 0x2000) 14:09:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0xe00000000000000) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:09:26 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r0}) connect$x25(r1, &(0x7f0000000240)={0x9, @remote={[], 0x2}}, 0x253) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r2, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$selinux_access(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/access\x00', 0x2, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) lstat(&(0x7f0000000140)='\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SIOCAX25ADDUID(r1, 0x89e1, &(0x7f0000000280)={0x3, @null, r4}) ioctl$IOC_PR_CLEAR(r3, 0x401070cd, &(0x7f00000002c0)={0xffffffffffffffff}) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:26 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @time={0x0, 0x1c9c380}, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) 14:09:26 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, r1, 0x0, 0xb, &(0x7f0000000000)='}selinux[#\x00'}, 0x30) sched_getaffinity(r2, 0x8, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xffffffffffffffff, 0x20011, r0, 0x2000) [ 460.959458][T18537] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 460.976188][T18537] CPU: 0 PID: 18537 Comm: syz-executor.4 Not tainted 5.0.0+ #23 [ 460.983844][T18537] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 460.993914][T18537] Call Trace: [ 460.997245][T18537] dump_stack+0x172/0x1f0 [ 461.001602][T18537] dump_header+0x10f/0xb6c [ 461.006061][T18537] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 461.011907][T18537] ? ___ratelimit+0x60/0x595 [ 461.016506][T18537] ? do_raw_spin_unlock+0x57/0x270 [ 461.021632][T18537] oom_kill_process.cold+0x10/0x15 [ 461.026766][T18537] out_of_memory+0x79a/0x1280 [ 461.031467][T18537] ? lock_downgrade+0x880/0x880 [ 461.036330][T18537] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 461.042577][T18537] ? oom_killer_disable+0x280/0x280 [ 461.047781][T18537] ? find_held_lock+0x35/0x130 [ 461.052564][T18537] mem_cgroup_out_of_memory+0x1ca/0x230 [ 461.058129][T18537] ? memcg_event_wake+0x230/0x230 [ 461.063173][T18537] ? do_raw_spin_unlock+0x57/0x270 [ 461.068305][T18537] ? _raw_spin_unlock+0x2d/0x50 [ 461.073174][T18537] try_charge+0x102c/0x15c0 [ 461.077687][T18537] ? find_held_lock+0x35/0x130 [ 461.082489][T18537] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 461.088067][T18537] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 461.094371][T18537] ? kasan_check_read+0x11/0x20 [ 461.099232][T18537] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 461.104794][T18537] mem_cgroup_try_charge+0x24d/0x5e0 [ 461.110095][T18537] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 461.115742][T18537] wp_page_copy+0x408/0x1740 [ 461.120335][T18537] ? find_held_lock+0x35/0x130 [ 461.125111][T18537] ? pmd_pfn+0x1d0/0x1d0 [ 461.129364][T18537] ? lock_downgrade+0x880/0x880 [ 461.134227][T18537] ? swp_swapcount+0x540/0x540 [ 461.139022][T18537] ? kasan_check_read+0x11/0x20 [ 461.143884][T18537] ? do_raw_spin_unlock+0x57/0x270 [ 461.149046][T18537] do_wp_page+0x5d8/0x16c0 [ 461.153482][T18537] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 461.158877][T18537] __handle_mm_fault+0x22e8/0x3ec0 [ 461.164015][T18537] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 461.169585][T18537] ? find_held_lock+0x35/0x130 [ 461.174360][T18537] ? handle_mm_fault+0x322/0xb30 [ 461.179316][T18537] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 461.185568][T18537] ? kasan_check_read+0x11/0x20 [ 461.190437][T18537] handle_mm_fault+0x43f/0xb30 [ 461.195221][T18537] __do_page_fault+0x5ef/0xda0 [ 461.200020][T18537] do_page_fault+0x71/0x581 [ 461.204541][T18537] ? page_fault+0x8/0x30 [ 461.208812][T18537] page_fault+0x1e/0x30 [ 461.212999][T18537] RIP: 0033:0x4049f7 [ 461.216939][T18537] Code: eb 18 90 45 31 c0 31 c9 ba 80 00 00 00 48 89 de bf ca 00 00 00 e8 79 36 05 00 8b 03 85 c0 74 e3 48 89 ef c7 45 08 00 00 00 00 64 fb ff ff 4c 89 e7 e8 ec e3 ff ff eb e1 66 2e 0f 1f 84 00 00 [ 461.236596][T18537] RSP: 002b:00007f3505876d00 EFLAGS: 00010202 [ 461.242666][T18537] RAX: 0000000000000001 RBX: 000000000073bf08 RCX: 0000000000458079 [ 461.250644][T18537] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 000000000073bf00 [ 461.258619][T18537] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 461.266609][T18537] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000073bf0c [ 461.274583][T18537] R13: 00007ffe1c83f77f R14: 00007f35058779c0 R15: 000000000073bf0c [ 461.286451][T18537] memory: usage 307000kB, limit 307200kB, failcnt 671 [ 461.293408][T18537] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 461.300988][T18537] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 461.308353][T18537] Memory cgroup stats for /syz4: cache:0KB rss:269304KB rss_huge:253952KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:269448KB inactive_file:0KB active_file:0KB unevictable:0KB [ 461.330203][T18537] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=18512,uid=0 [ 461.345947][T18537] Memory cgroup out of memory: Killed process 18537 (syz-executor.4) total-vm:72844kB, anon-rss:2232kB, file-rss:35676kB, shmem-rss:0kB 14:09:27 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) r1 = syz_open_dev$dmmidi(0x0, 0x0, 0x9000) syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x40, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f0000000280)={0x200, {0xffffffffffff9ad1, 0xe3, 0x1a, 0xfffffffffffffe00, 0xfffffffffffffffe, 0x2}}) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0x80045500, &(0x7f0000000000)) pselect6(0x40, &(0x7f00000000c0)={0x1, 0x8, 0x7fff, 0x7, 0x6, 0xffff, 0xed, 0x2}, &(0x7f0000000100)={0xffffffff, 0xffffffffffffffff, 0x100000001, 0x3ff, 0x84e, 0x36, 0x8, 0x7}, &(0x7f0000000140)={0x0, 0x2, 0x3, 0x2, 0x3, 0x8, 0x1aa, 0x4}, &(0x7f0000000180), &(0x7f0000000200)={&(0x7f00000001c0)={0x7}, 0x8}) ioctl$IMCLEAR_L2(r0, 0x80044946, &(0x7f0000000300)=0x9) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f00000002c0)) 14:09:27 executing program 0: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x80045530, &(0x7f0000000200)=""/148) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r2, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) r3 = semget$private(0x0, 0x7, 0x1) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) semtimedop(r3, &(0x7f0000000080)=[{0x3, 0x3, 0x1000}, {0x3, 0x4d2381f2, 0x800}], 0x2, &(0x7f0000000140)={r4, r5+30000000}) 14:09:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r1) r3 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r2) r4 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockname$inet6(r4, &(0x7f00000001c0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000240)=0x1c) clone(0x3, 0x0, 0x0, 0x0, 0x0) r5 = fcntl$dupfd(r0, 0x0, r0) fstat(r4, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r6) ioctl$TCGETS(r5, 0x5401, &(0x7f0000000100)) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000080)={0x3}, 0x1) keyctl$read(0xb, r3, &(0x7f0000000a40)=""/4096, 0x1000) 14:09:27 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x6, 0x4000) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f00000000c0)=0x100, 0x4) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) r2 = dup2(r0, r0) bind$rds(r2, &(0x7f0000000000)={0x2, 0x4e24, @loopback}, 0x10) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r3 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r4, 0x2000) 14:09:27 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000000000/0x1000)=nil, 0x1000}, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000380)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffa) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x1, @mcast2, 0xffffffffefac0a14}}, 0x25, 0x8, 0x7ff, 0x0, 0x2}, &(0x7f0000000000)=0x98) setsockopt$inet_sctp_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f00000003c0)=ANY=[@ANYRES32=r3, @ANYBLOB="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"], 0x6a) fchdir(r0) [ 461.361887][ T1042] oom_reaper: reaped process 18537 (syz-executor.4), now anon-rss:0kB, file-rss:34716kB, shmem-rss:0kB 14:09:27 executing program 0: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)=0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r0, 0x10, &(0x7f00000001c0)={0x2}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x101000, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={0x0, 0x9}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000100)={r2, 0x4}, &(0x7f0000000140)=0x8) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r3, 0x0) 14:09:27 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r2, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000080)=0x0) perf_event_open(0x0, r3, 0xfffffffffffffffb, r0, 0x2) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:27 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x2000) [ 461.657254][T18567] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 461.720386][T18567] CPU: 1 PID: 18567 Comm: syz-executor.4 Not tainted 5.0.0+ #23 [ 461.728058][T18567] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 461.738107][T18567] Call Trace: [ 461.738133][T18567] dump_stack+0x172/0x1f0 [ 461.738154][T18567] dump_header+0x10f/0xb6c [ 461.738174][T18567] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 461.738190][T18567] ? ___ratelimit+0x60/0x595 [ 461.738212][T18567] ? do_raw_spin_unlock+0x57/0x270 [ 461.756020][T18567] oom_kill_process.cold+0x10/0x15 [ 461.756050][T18567] out_of_memory+0x79a/0x1280 [ 461.756070][T18567] ? lock_downgrade+0x880/0x880 [ 461.782525][T18567] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 461.789041][T18567] ? oom_killer_disable+0x280/0x280 [ 461.794237][T18567] ? find_held_lock+0x35/0x130 [ 461.799203][T18567] mem_cgroup_out_of_memory+0x1ca/0x230 [ 461.804751][T18567] ? memcg_event_wake+0x230/0x230 [ 461.809788][T18567] ? do_raw_spin_unlock+0x57/0x270 [ 461.814910][T18567] ? _raw_spin_unlock+0x2d/0x50 [ 461.819764][T18567] try_charge+0x102c/0x15c0 [ 461.824271][T18567] ? find_held_lock+0x35/0x130 [ 461.829064][T18567] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 461.829083][T18567] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 461.829109][T18567] ? kasan_check_read+0x11/0x20 [ 461.845728][T18567] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 461.845749][T18567] mem_cgroup_try_charge+0x24d/0x5e0 [ 461.845774][T18567] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 461.862200][T18567] wp_page_copy+0x408/0x1740 [ 461.866800][T18567] ? find_held_lock+0x35/0x130 [ 461.871579][T18567] ? pmd_pfn+0x1d0/0x1d0 [ 461.875869][T18567] ? lock_downgrade+0x880/0x880 [ 461.880720][T18567] ? swp_swapcount+0x540/0x540 [ 461.885518][T18567] ? kasan_check_read+0x11/0x20 [ 461.890376][T18567] ? do_raw_spin_unlock+0x57/0x270 [ 461.895535][T18567] do_wp_page+0x5d8/0x16c0 [ 461.899967][T18567] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 461.905375][T18567] __handle_mm_fault+0x22e8/0x3ec0 [ 461.910503][T18567] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 461.916142][T18567] ? find_held_lock+0x35/0x130 14:09:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0x3f00000000000000) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:09:27 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x101000, 0x0) getsockname$netlink(r0, &(0x7f0000000080), &(0x7f00000000c0)=0xc) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) 14:09:27 executing program 0: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@initdev}}, &(0x7f0000000600)=0xe8) fstat(r1, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f00000004c0)='./file0\x00', r2, r3) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) r4 = syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) add_key$keyring(&(0x7f0000000840)='keyring\x00', &(0x7f0000000880)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000008c0)='asymmetric\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000940)="190d71a224e6eac6c8de12c398d95b40af89313085f37b72e97f45592f030eac2a87e970689f36d6822f700111ee4e35d0709fc33277b4d38bdfd53678a96d7cb91033325248c916bab697a375ba6c5f483bad5a50749231931acde181d4c8891f90f071a27b7f", 0x67, 0xfffffffffffffffd) r5 = request_key(&(0x7f0000000ac0)='cifs.spnego\x00', &(0x7f0000000b00)={'syz', 0x1}, &(0x7f0000000b40)='security\\securitybdevGPL\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000009c0)="76f96f62b5f2e08e7451a12fb0a6bc788a4b7cbb53dc125719d22c3140ebeb6d6981f88754ab4e234eef921b3cd39702254bc60abfe404d8ae80bf04c00daa55b1d3f3ea9c8e2f2da80cf457a492f1dc4e0c4c403bcf63c65ad049f7f000220694dc543756ef0f3a14b91f2bccb0a3dd977a73b361fead943b962e68ffc022ef4a93fa921645366cdfe4949b71f315d98328dac89871913b12816c5462709724a931b43f15302de2dab366b726180c44489b8619b900554efe50a4107237c9cf02fc1a06b117162448a0259b30727676babd2ac6f3af545425d6b5e8b35b74331e12857538d4e8e218480ec6636a363de146f6ceafa1e9", 0xf7, r5) request_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='\x00', 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x2) add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff9) request_key(&(0x7f0000000300)='.request_key_auth\x00', &(0x7f0000000340)={'syz', 0x0}, &(0x7f0000000380)='\xfd,vboxnet0%system:]em1)\x00', 0xfffffffffffffff9) r6 = add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r7 = fcntl$getown(r0, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000700)={{0x7, 0x3, 0x6, 0x7, 'syz1\x00', 0x2}, 0x3, 0x20, 0x3, r7, 0x5, 0x6, 'syz0\x00', &(0x7f00000006c0)=['syzkaller\x00', 'id_resolver\x00', 'eth1\x00', 'syzkaller\x00', '.request_key_auth\x00'], 0x37, [], [0x9, 0xe2b, 0x4, 0xbf0e]}) keyctl$restrict_keyring(0x1d, r6, 0x0, 0x0) r8 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r8, 0x0) 14:09:27 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0xffffffff, 0x8000) r1 = inotify_add_watch(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x4000000) inotify_rm_watch(r0, r1) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) r2 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mISDNtimer\x00', 0x18200, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r2, 0xc0046686, &(0x7f00000000c0)={0x1, 0x33, "6a862f16176d6922e7e53bd4f15c74d7303dc7465d761e44206f61ce08d6626cf706491931ad9cfee10e01db169d9e190dab85"}) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r4, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) r5 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x2, 0x410100) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r5, 0xc008551b, &(0x7f00000001c0)={0x9, 0x18, [0x9, 0xfae, 0x0, 0x2d, 0x8, 0x8001]}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r6, 0x4040534e, 0x0) [ 461.920929][T18567] ? handle_mm_fault+0x322/0xb30 [ 461.925884][T18567] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 461.932138][T18567] ? kasan_check_read+0x11/0x20 [ 461.937012][T18567] handle_mm_fault+0x43f/0xb30 [ 461.941805][T18567] __do_page_fault+0x5ef/0xda0 [ 461.946597][T18567] do_page_fault+0x71/0x581 [ 461.951120][T18567] ? page_fault+0x8/0x30 [ 461.955367][T18567] page_fault+0x1e/0x30 [ 461.959531][T18567] RIP: 0033:0x40ae38 14:09:28 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x4e20, 0x0, @mcast1}}}, 0x90) r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r1) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x203, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1402000000000000000004000003000000"], 0x14}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = getpgrp(0xffffffffffffffff) getrlimit(0xf, &(0x7f0000000200)) ioprio_get$pid(0x0, 0x0) ioctl(r3, 0x6, &(0x7f0000000040)="93267bb8d7d7f0") r5 = syz_open_dev$mice(&(0x7f00000002c0)='/dev/input/mice\x00', 0x0, 0x0) getsockname$llc(r5, &(0x7f00000007c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000800)=0x10) socket$tipc(0x1e, 0x2, 0x0) setpriority(0x0, r4, 0x10000) r6 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) lsetxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f00000005c0)={'L+', 0x10001}, 0x28, 0x1) setsockopt$inet_sctp6_SCTP_INITMSG(r6, 0x84, 0x2, &(0x7f0000000000)={0x5, 0x80000000, 0x7, 0x10000}, 0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r6, 0x84, 0x73, &(0x7f0000000100)={0x0, 0xc18e, 0x30, 0x7d, 0xa5}, &(0x7f0000000140)=0x18) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r6, 0x84, 0x5, &(0x7f00000004c0)={r7, @in6={{0xa, 0x4e24, 0x3, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xd3f}}}, 0x84) setsockopt$inet6_icmp_ICMP_FILTER(r6, 0x1, 0x1, &(0x7f00000000c0)={0x3}, 0x4) getegid() getgid() ioctl$TUNSETVNETLE(r6, 0x400454dc, 0x0) [ 461.963432][T18567] Code: d9 48 8b 47 78 48 83 f8 ff 0f 84 0b 01 00 00 48 8b 73 18 48 83 fe ff 74 29 48 81 fe e7 03 00 00 0f 87 5e 01 00 00 48 c1 e6 04 86 60 80 73 00 01 48 89 86 68 80 73 00 66 2e 0f 1f 84 00 00 00 [ 461.983033][T18567] RSP: 002b:00007ffe1c83f7d0 EFLAGS: 00010206 [ 461.989096][T18567] RAX: 0000000000000005 RBX: 000000000073bfa0 RCX: 0000000000000001 [ 461.997083][T18567] RDX: 0000000000000001 RSI: 0000000000000050 RDI: 000000000073bfa0 [ 462.005057][T18567] RBP: 000000000073bfa0 R08: 0000000000070a92 R09: 0000000000070a92 [ 462.013027][T18567] R10: 00007ffe1c83f8c0 R11: 0000000000000246 R12: 0000000000070b36 [ 462.021011][T18567] R13: 0000000000070b09 R14: 00000000000003e8 R15: 000000000073bfac [ 462.072970][T18567] memory: usage 307168kB, limit 307200kB, failcnt 708 [ 462.083505][T18567] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 14:09:28 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x111000, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000440)={'filter\x00', 0x1000, "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"}, &(0x7f0000000080)=0x1024) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x13, r1, 0x0) [ 462.126342][T18567] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 462.273190][T18567] Memory cgroup stats for /syz4: cache:0KB rss:269568KB rss_huge:253952KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:269604KB inactive_file:0KB active_file:0KB unevictable:0KB [ 462.294941][T18567] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=18556,uid=0 [ 462.322225][T18567] Memory cgroup out of memory: Killed process 18556 (syz-executor.4) total-vm:72844kB, anon-rss:2232kB, file-rss:34816kB, shmem-rss:0kB [ 462.348915][ T1042] oom_reaper: reaped process 18556 (syz-executor.4), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB [ 462.374787][T18568] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 [ 462.387557][T18568] CPU: 0 PID: 18568 Comm: syz-executor.4 Not tainted 5.0.0+ #23 [ 462.395209][T18568] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 462.405263][T18568] Call Trace: [ 462.408567][T18568] dump_stack+0x172/0x1f0 [ 462.412920][T18568] dump_header+0x10f/0xb6c [ 462.417352][T18568] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 462.423166][T18568] ? ___ratelimit+0x60/0x595 [ 462.427766][T18568] ? do_raw_spin_unlock+0x57/0x270 [ 462.432920][T18568] oom_kill_process.cold+0x10/0x15 [ 462.438040][T18568] out_of_memory+0x79a/0x1280 [ 462.442740][T18568] ? lock_downgrade+0x880/0x880 [ 462.447599][T18568] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 462.453855][T18568] ? oom_killer_disable+0x280/0x280 [ 462.459062][T18568] ? find_held_lock+0x35/0x130 [ 462.463845][T18568] mem_cgroup_out_of_memory+0x1ca/0x230 [ 462.469398][T18568] ? memcg_event_wake+0x230/0x230 [ 462.474444][T18568] ? do_raw_spin_unlock+0x57/0x270 [ 462.479581][T18568] ? _raw_spin_unlock+0x2d/0x50 [ 462.484455][T18568] try_charge+0x102c/0x15c0 [ 462.488964][T18568] ? find_held_lock+0x35/0x130 [ 462.493759][T18568] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 462.499311][T18568] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 462.504866][T18568] ? find_held_lock+0x35/0x130 [ 462.509637][T18568] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 462.515200][T18568] __memcg_kmem_charge_memcg+0x7c/0x130 [ 462.520759][T18568] ? memcg_kmem_put_cache+0xb0/0xb0 [ 462.526000][T18568] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 462.531556][T18568] __memcg_kmem_charge+0x136/0x300 [ 462.536681][T18568] __alloc_pages_nodemask+0x437/0x7e0 [ 462.542067][T18568] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 462.547803][T18568] ? copy_page_range+0x125a/0x1f90 [ 462.552929][T18568] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 462.559179][T18568] alloc_pages_current+0x107/0x210 [ 462.564298][T18568] pte_alloc_one+0x1b/0x1a0 [ 462.568823][T18568] __pte_alloc+0x20/0x310 [ 462.573195][T18568] copy_page_range+0x1529/0x1f90 [ 462.578136][T18568] ? find_held_lock+0x35/0x130 [ 462.582928][T18568] ? pmd_alloc+0x180/0x180 [ 462.587356][T18568] ? __rb_insert_augmented+0x231/0xdf0 [ 462.592832][T18568] ? validate_mm_rb+0xa3/0xc0 [ 462.597532][T18568] ? __vma_link_rb+0x279/0x370 [ 462.602328][T18568] copy_process.part.0+0x568b/0x7980 [ 462.607690][T18568] ? __cleanup_sighand+0x60/0x60 [ 462.612671][T18568] _do_fork+0x257/0xfd0 [ 462.616840][T18568] ? fork_idle+0x1d0/0x1d0 [ 462.621278][T18568] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 462.626746][T18568] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 462.632213][T18568] ? do_syscall_64+0x26/0x610 [ 462.636900][T18568] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 462.642987][T18568] ? do_syscall_64+0x26/0x610 [ 462.647693][T18568] __x64_sys_clone+0xbf/0x150 [ 462.652388][T18568] do_syscall_64+0x103/0x610 [ 462.657009][T18568] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 462.662915][T18568] RIP: 0033:0x458079 [ 462.666856][T18568] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 462.690469][T18568] RSP: 002b:00007f3505876c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 462.698905][T18568] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000458079 [ 462.706887][T18568] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 462.706904][T18568] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 462.724354][T18568] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f35058776d4 [ 462.724364][T18568] R13: 00000000004be379 R14: 00000000004cea80 R15: 00000000ffffffff [ 462.726762][T18568] memory: usage 306960kB, limit 307200kB, failcnt 720 [ 462.747632][T18568] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 462.755532][T18568] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 462.762829][T18568] Memory cgroup stats for /syz4: cache:0KB rss:269568KB rss_huge:253952KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:269488KB inactive_file:0KB active_file:0KB unevictable:0KB [ 462.784723][T18568] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=13861,uid=0 [ 462.801456][T18568] Memory cgroup out of memory: Killed process 13861 (syz-executor.4) total-vm:72448kB, anon-rss:2208kB, file-rss:34816kB, shmem-rss:0kB 14:09:28 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x2000) 14:09:28 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r2, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = dup(r0) ioctl$SNDRV_TIMER_IOCTL_STOP(r3, 0x54a1) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) prctl$PR_GET_NAME(0x10, &(0x7f00000001c0)=""/173) 14:09:28 executing program 0: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r2, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000080)=0x0) perf_event_open(0x0, r3, 0xfffffffffffffffb, r0, 0x2) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) getsockopt$TIPC_DEST_DROPPABLE(r1, 0x10f, 0x81, &(0x7f00000001c0), &(0x7f0000000240)=0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000140), 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r2) r4 = add_key(&(0x7f0000000080)='logon\x00', &(0x7f0000000100)={'\xff\xff\xff'}, 0x0, 0xffffffffffffff4c, r3) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r4, &(0x7f0000000a40)=""/4096, 0x1000) 14:09:28 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1000}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000100)={r2, 0x0, 0x3, [0x0, 0x7f, 0xffffffffffff8001]}, &(0x7f0000000140)=0xe) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r3, 0x0) 14:09:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0x4000000000000000) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) [ 462.816611][ T1042] oom_reaper: reaped process 13861 (syz-executor.4), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB 14:09:29 executing program 0: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@initdev}}, &(0x7f0000000600)=0xe8) fstat(r1, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f00000004c0)='./file0\x00', r2, r3) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) r4 = syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) add_key$keyring(&(0x7f0000000840)='keyring\x00', &(0x7f0000000880)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000008c0)='asymmetric\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000940)="190d71a224e6eac6c8de12c398d95b40af89313085f37b72e97f45592f030eac2a87e970689f36d6822f700111ee4e35d0709fc33277b4d38bdfd53678a96d7cb91033325248c916bab697a375ba6c5f483bad5a50749231931acde181d4c8891f90f071a27b7f", 0x67, 0xfffffffffffffffd) r5 = request_key(&(0x7f0000000ac0)='cifs.spnego\x00', &(0x7f0000000b00)={'syz', 0x1}, &(0x7f0000000b40)='security\\securitybdevGPL\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000009c0)="76f96f62b5f2e08e7451a12fb0a6bc788a4b7cbb53dc125719d22c3140ebeb6d6981f88754ab4e234eef921b3cd39702254bc60abfe404d8ae80bf04c00daa55b1d3f3ea9c8e2f2da80cf457a492f1dc4e0c4c403bcf63c65ad049f7f000220694dc543756ef0f3a14b91f2bccb0a3dd977a73b361fead943b962e68ffc022ef4a93fa921645366cdfe4949b71f315d98328dac89871913b12816c5462709724a931b43f15302de2dab366b726180c44489b8619b900554efe50a4107237c9cf02fc1a06b117162448a0259b30727676babd2ac6f3af545425d6b5e8b35b74331e12857538d4e8e218480ec6636a363de146f6ceafa1e9", 0xf7, r5) request_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='\x00', 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x2) add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff9) request_key(&(0x7f0000000300)='.request_key_auth\x00', &(0x7f0000000340)={'syz', 0x0}, &(0x7f0000000380)='\xfd,vboxnet0%system:]em1)\x00', 0xfffffffffffffff9) r6 = add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r7 = fcntl$getown(r0, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000700)={{0x7, 0x3, 0x6, 0x7, 'syz1\x00', 0x2}, 0x3, 0x20, 0x3, r7, 0x5, 0x6, 'syz0\x00', &(0x7f00000006c0)=['syzkaller\x00', 'id_resolver\x00', 'eth1\x00', 'syzkaller\x00', '.request_key_auth\x00'], 0x37, [], [0x9, 0xe2b, 0x4, 0xbf0e]}) keyctl$restrict_keyring(0x1d, r6, 0x0, 0x0) r8 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r8, 0x0) 14:09:29 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x20080, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x100, 0x101, 0x10000, 0x7, 0x0, 0x3, 0x20217, 0xe, 0x5, 0x1, 0x7ff, 0xffffffffffff0000, 0x4, 0xc8b, 0xfff, 0x5, 0x9, 0x6, 0x5, 0x6, 0x5, 0x2, 0x1, 0x3ff, 0x0, 0xfffffffffffffff7, 0x0, 0x7, 0x400, 0x3f3, 0x400, 0x400, 0x5, 0x0, 0x5, 0x10000, 0x0, 0x7f, 0x2, @perf_config_ext={0x3, 0x2}, 0x10000, 0x4, 0xfff0000000000000, 0x7, 0x7f, 0x7fff, 0x7}, 0xffffffffffffffff, 0x8, r0, 0x2) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) r1 = syz_open_dev$dmmidi(0x0, 0x0, 0x9000) accept4$nfc_llcp(r1, 0x0, &(0x7f0000000100), 0x80800) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x0) 14:09:29 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r2, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) write$apparmor_current(r0, &(0x7f0000000080)=@hat={'permhat ', 0x2, 0x5e, ['[keyring-@+securityself\x00', '/dev/bus/usb/00#/00#\x00', 'securityGPLeth1eth1\x00']}, 0xfffffffffffffcc2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:29 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c93}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x2000) [ 463.134547][T18646] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 [ 463.200641][T18646] CPU: 0 PID: 18646 Comm: syz-executor.4 Not tainted 5.0.0+ #23 [ 463.208306][T18646] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 463.218361][T18646] Call Trace: [ 463.221668][T18646] dump_stack+0x172/0x1f0 [ 463.226042][T18646] dump_header+0x10f/0xb6c [ 463.230472][T18646] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 463.236305][T18646] ? ___ratelimit+0x60/0x595 [ 463.240913][T18646] ? do_raw_spin_unlock+0x57/0x270 [ 463.246033][T18646] oom_kill_process.cold+0x10/0x15 [ 463.251148][T18646] out_of_memory+0x79a/0x1280 [ 463.255831][T18646] ? lock_downgrade+0x880/0x880 [ 463.260697][T18646] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 463.266997][T18646] ? oom_killer_disable+0x280/0x280 [ 463.272202][T18646] ? find_held_lock+0x35/0x130 [ 463.277004][T18646] mem_cgroup_out_of_memory+0x1ca/0x230 [ 463.282561][T18646] ? memcg_event_wake+0x230/0x230 [ 463.287605][T18646] ? do_raw_spin_unlock+0x57/0x270 [ 463.292731][T18646] ? _raw_spin_unlock+0x2d/0x50 [ 463.297587][T18646] try_charge+0x102c/0x15c0 [ 463.302096][T18646] ? find_held_lock+0x35/0x130 [ 463.306882][T18646] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 463.312432][T18646] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 463.317997][T18646] ? find_held_lock+0x35/0x130 [ 463.322765][T18646] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 463.328353][T18646] __memcg_kmem_charge_memcg+0x7c/0x130 [ 463.333934][T18646] ? memcg_kmem_put_cache+0xb0/0xb0 [ 463.339150][T18646] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 463.344711][T18646] __memcg_kmem_charge+0x136/0x300 [ 463.349837][T18646] __alloc_pages_nodemask+0x437/0x7e0 [ 463.355237][T18646] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 463.360962][T18646] ? save_stack+0x45/0xd0 [ 463.365314][T18646] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 463.371130][T18646] ? __lock_acquire+0x548/0x3fb0 [ 463.376077][T18646] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 463.382329][T18646] alloc_pages_current+0x107/0x210 [ 463.387458][T18646] pte_alloc_one+0x1b/0x1a0 [ 463.391975][T18646] __pte_alloc+0x20/0x310 [ 463.396331][T18646] copy_page_range+0x1529/0x1f90 [ 463.401303][T18646] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 463.407069][T18646] ? pmd_alloc+0x180/0x180 [ 463.411495][T18646] ? validate_mm_rb+0xa3/0xc0 [ 463.416180][T18646] ? __vma_link_rb+0x279/0x370 [ 463.416205][T18646] copy_process.part.0+0x568b/0x7980 [ 463.416251][T18646] ? __cleanup_sighand+0x60/0x60 [ 463.416284][T18646] _do_fork+0x257/0xfd0 [ 463.426316][T18646] ? fork_idle+0x1d0/0x1d0 [ 463.426346][T18646] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 463.426361][T18646] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 463.426377][T18646] ? do_syscall_64+0x26/0x610 [ 463.426391][T18646] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 463.426411][T18646] ? do_syscall_64+0x26/0x610 [ 463.439881][T18646] __x64_sys_clone+0xbf/0x150 [ 463.439902][T18646] do_syscall_64+0x103/0x610 [ 463.439920][T18646] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 463.439941][T18646] RIP: 0033:0x458079 [ 463.450857][T18646] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 463.450866][T18646] RSP: 002b:00007f3505855c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 463.450882][T18646] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000458079 [ 463.450891][T18646] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 463.450899][T18646] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 463.450916][T18646] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f35058566d4 14:09:29 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000440)=ANY=[@ANYBLOB="b1b8c8f9e70d93e05a8c7b34c45e628d30ba27e1e243ce03fe9f03d1d29c616eaabaf9f9bf5adb03eee266096765e8d60e6a49747c637b1ab79da80df27aa7e744737770229c4115bf58600e29d4d0d41ccc32402ff216f471132de151e78ed0dfe3afaf14a293c4b948673468fa71a23d7818160b8a6c83968efae6165be6e318fb635b277bbb4debc0119ead8c92d98bd9313486bf6dd50d1874d4401b7504d36a415d9ef7d77136970a22a06b0aa785969d5db26e06649853af8c7aa3d0be533923b3dbb2a9c78a24d866c6512120f44a4474", @ANYRES16=r2, @ANYBLOB="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"], 0x3c8}, 0x1, 0x0, 0x0, 0x2004c801}, 0x80) r3 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x13, r3, 0x2000) 14:09:29 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) r0 = syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000080)=0x14) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) 14:09:29 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) r0 = syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_MAGIC(r0, 0x80046402, &(0x7f0000000000)=0xfffffffffffffc01) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) 14:09:29 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000800)='/dev/usbmon#\x00', 0x1, 0x40000) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000840)='/dev/zero\x00', 0x4001, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000880)={r1, 0x6}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f00000008c0)={0xf, {0x6, 0x4, 0x7, 0x48}, {0x2b, 0x10000, 0x7, 0x8}, {0x5b, 0x8}}) keyctl$restrict_keyring(0x1d, r4, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) epoll_pwait(r5, &(0x7f0000000140)=[{}, {}, {}], 0x3, 0x30, &(0x7f00000001c0)={0x5}, 0x8) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r5, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0xe4, r6, 0x210, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x64, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x80}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9741}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x45}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x80}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6f6}]}, @TIPC_NLA_NODE={0x2c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1000}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x30, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x59743de8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc}]}]}, 0xe4}, 0x1, 0x0, 0x0, 0x8001}, 0x4000000) perf_event_open(0x0, 0x0, 0x5, r2, 0xa) r7 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0xfffffffffffffffc) prctl$PR_CAPBSET_DROP(0x18, 0x1a) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) vmsplice(r5, &(0x7f0000000740)=[{&(0x7f0000000400)="ed13764adc7b6185e2bf552e0868a66ae0c93004f7f3c703ab7313389a8cc63cdb181bcdab9638fee0b1a2dd2293ca45872a41b61303e175471b8778cb1224fd3a0eff329d9278fa61357f9ef26fe98bf1c25f37b9eeefba747a36da75eda6815b80b8c94bb34d1e77b9fd395c4f571a8551f50014b5474ea7653165aa4548a881b8b9031f557ecc43e6238ac92a0757e0e36ec4ec", 0x95}, {&(0x7f00000004c0)="fb4273e7754d7014d99c0b515a7e045d67d9f0c6c4ef56bce82784ad38e5d834db718a3bd785cdc0902ca58edc5f881360b54b00bc72a10a58f5c0bce01f91e9d1578825adc97caee77890c0ea", 0x4d}, {&(0x7f0000000540)="820d8a1bc839883434bc2da4fdbe67f7aa42508b90ec1aef8070af39fcde09ad076a6775b56ae5061c21b131ec4848638db9a871419fe0ef1830b96758e2db5c5171b07d3aaab359ba41401dfbdbda3ab9d812bf2bcc1475229d4d49fc40b511b6", 0x61}, {&(0x7f00000005c0)="425128c6bde6bdc6f2a4cb3f0cea3a95c43a7e558287f0d660c5b2c86f5b0747b8a44435df710700b114cd549395269ddfbb1f9074082718cc38ced1ad9a4863106c4c95fffc98a3c2121a3fe790ea82572cf01959e26212113c1d6d011f3553dd22feb9cdd6eea8179e0c", 0x6b}, {&(0x7f0000000640)="63146a8da303fb56f0efe14255797b06c7d57c92101a0cd6902c008c7701dbc02a171ae7ddaae496da56993c2eefab4c878eedcd6a544846e3f80471d32c950f6f383763da66231758f48f3902a3ee1a9b999c005edb2c59df7b8a75a0a91ca7595fec6fcc2241365578b0d9483b8720a27d4740b873c9a9543200f3419de24e7d7885d49063875d79dd8818747f3326c852038d6010bf4030f2328a00bcc1fb921d490ce715da343199415329adff621842fd6aa55e1fb28ce8c928c85d3b8393a2d37fe1204dfb3fb397e912ae0636734930", 0xd3}], 0x5, 0x8) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) r8 = shmget$private(0x0, 0x1000, 0x28, &(0x7f0000ffc000/0x1000)=nil) shmctl$IPC_RMID(r8, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r7, 0xc004ae02, &(0x7f00000007c0)={0x1, [0x0]}) 14:09:29 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="00000000d548040000000000000000fffffffb000000000000000000000000000040000000000000000004"], 0x2b) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r2, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) [ 463.545140][T18646] R13: 00000000004be379 R14: 00000000004cea80 R15: 00000000ffffffff [ 463.570357][T18646] memory: usage 307196kB, limit 307200kB, failcnt 748 [ 463.630671][T18646] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 463.670192][T18675] sg_write: data in/out 280753/1 bytes for SCSI command 0x0-- guessing data in; [ 463.670192][T18675] program syz-executor.5 not setting count and/or reply_len properly [ 463.676743][T18646] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 463.772253][T18681] sg_write: data in/out 280753/1 bytes for SCSI command 0x0-- guessing data in; [ 463.772253][T18681] program syz-executor.5 not setting count and/or reply_len properly [ 463.772661][T18646] Memory cgroup stats for /syz4: cache:0KB rss:269580KB rss_huge:253952KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:269632KB inactive_file:0KB active_file:0KB unevictable:0KB 14:09:30 executing program 1: r0 = socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000340)) r1 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x101000, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000001c0)={0x850e, {{0xa, 0x4e20, 0x7, @mcast2, 0x1f}}, {{0xa, 0x4e24, 0x6, @mcast2, 0x101}}}, 0x108) ioctl$UI_BEGIN_FF_ERASE(r2, 0xc00c55ca, &(0x7f0000000140)={0x9, 0x5}) r3 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x5, 0x40000) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000080), 0x4) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) syz_genetlink_get_family_id$SEG6(&(0x7f0000000480)='SEG6\x00') r4 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r5, 0x2000) 14:09:30 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000080)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) clock_gettime(0x0, &(0x7f0000000100)) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x0}]}) ioctl$DRM_IOCTL_LOCK(r1, 0x4008642a, &(0x7f0000000200)={r2, 0x8}) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f0000000000)={0x100000000, 0x7ff, 0x6a3b, 0x2}, 0x10) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1000000, 0x20011, r3, 0x0) ioctl$VIDIOC_ENUMSTD(r3, 0xc0485619, &(0x7f0000000240)={0x2, 0x100, "db2af1ec5fe9950c74a68997b57a310fd9545b345913d727", {0x8001, 0xfffffffffffffffb}, 0x20}) 14:09:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r1) r3 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r2) clone(0x0, 0x0, 0x0, 0x0, 0x0) r4 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x80000001, 0x80) r5 = getpgid(0xffffffffffffffff) write$P9_RGETLOCK(r4, &(0x7f0000000100)={0x24, 0x37, 0x2, {0x3, 0x4, 0xfffffffffffffffa, r5, 0x6, 'wlan0}'}}, 0x24) setxattr$security_ima(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7a348dc44407360c906933dc13c3"}, 0xf, 0x3) keyctl$read(0xb, r3, &(0x7f0000000a40)=""/4096, 0x1000) 14:09:30 executing program 0: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x162, @tick, 0x1, {0x3ff, 0x6}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x9, 0x200) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) r1 = syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x0) 14:09:30 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) bind$bt_sco(r0, &(0x7f0000000140)={0x1f, {0x1f, 0xfff, 0x5, 0x7fff800000000, 0x7}}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000001000/0x1000)=nil, 0x1000}, 0x1}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e23, 0x7ff, @loopback, 0xfff}}, 0x4a, 0x4, 0x65, 0xcb6b, 0x4}, &(0x7f0000000280)=0x98) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000002c0)={r5, 0x52, 0x30, 0x3, 0x9}, &(0x7f0000000300)=0x18) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0x6000000000000000) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) [ 463.823245][T18646] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=18632,uid=0 [ 463.845193][T18646] Memory cgroup out of memory: Killed process 18632 (syz-executor.4) total-vm:72580kB, anon-rss:2208kB, file-rss:35676kB, shmem-rss:0kB 14:09:30 executing program 0: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="00000000d548040000000000000000fffffffb000000000000000000000000000040000000000000000004"], 0x2b) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r2, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:30 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0xfffffffffffffffc, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f00000000c0)={0xfffffffffffffc01, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(r2, 0xc0106438, &(0x7f0000000140)={0x7, r3}) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:30 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) mmap$perf(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2000000, 0x40013, r0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x402) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) 14:09:30 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x404000) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'syz_tun\x00', 0x800}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r2 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r3, 0x2000) [ 464.128178][T18695] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 464.190633][T18695] CPU: 1 PID: 18695 Comm: syz-executor.4 Not tainted 5.0.0+ #23 [ 464.192004][T18709] sg_write: data in/out 280753/1 bytes for SCSI command 0x0-- guessing data in; [ 464.192004][T18709] program syz-executor.0 not setting count and/or reply_len properly [ 464.198289][T18695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 464.198296][T18695] Call Trace: [ 464.198321][T18695] dump_stack+0x172/0x1f0 [ 464.198343][T18695] dump_header+0x10f/0xb6c [ 464.198364][T18695] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 464.198382][T18695] ? ___ratelimit+0x60/0x595 [ 464.198399][T18695] ? do_raw_spin_unlock+0x57/0x270 [ 464.198417][T18695] oom_kill_process.cold+0x10/0x15 [ 464.198434][T18695] out_of_memory+0x79a/0x1280 [ 464.198451][T18695] ? lock_downgrade+0x880/0x880 [ 464.198480][T18695] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 464.198503][T18695] ? oom_killer_disable+0x280/0x280 [ 464.198516][T18695] ? find_held_lock+0x35/0x130 [ 464.198541][T18695] mem_cgroup_out_of_memory+0x1ca/0x230 [ 464.198554][T18695] ? memcg_event_wake+0x230/0x230 [ 464.198575][T18695] ? do_raw_spin_unlock+0x57/0x270 [ 464.198593][T18695] ? _raw_spin_unlock+0x2d/0x50 [ 464.198612][T18695] try_charge+0x102c/0x15c0 [ 464.198624][T18695] ? find_held_lock+0x35/0x130 [ 464.198646][T18695] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 464.198663][T18695] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 464.198682][T18695] ? kasan_check_read+0x11/0x20 [ 464.198701][T18695] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 464.198722][T18695] mem_cgroup_try_charge+0x24d/0x5e0 [ 464.341306][T18695] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 464.346962][T18695] wp_page_copy+0x408/0x1740 [ 464.351580][T18695] ? find_held_lock+0x35/0x130 [ 464.356377][T18695] ? pmd_pfn+0x1d0/0x1d0 [ 464.360635][T18695] ? lock_downgrade+0x880/0x880 [ 464.365488][T18695] ? swp_swapcount+0x540/0x540 [ 464.370273][T18695] ? kasan_check_read+0x11/0x20 [ 464.375135][T18695] ? do_raw_spin_unlock+0x57/0x270 [ 464.380257][T18695] do_wp_page+0x5d8/0x16c0 [ 464.384685][T18695] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 464.390085][T18695] __handle_mm_fault+0x22e8/0x3ec0 [ 464.395209][T18695] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 464.400812][T18695] ? find_held_lock+0x35/0x130 [ 464.405583][T18695] ? handle_mm_fault+0x322/0xb30 [ 464.410543][T18695] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 464.416816][T18695] ? kasan_check_read+0x11/0x20 [ 464.421680][T18695] handle_mm_fault+0x43f/0xb30 [ 464.426474][T18695] __do_page_fault+0x5ef/0xda0 [ 464.431296][T18695] do_page_fault+0x71/0x581 [ 464.435992][T18695] ? page_fault+0x8/0x30 [ 464.440245][T18695] page_fault+0x1e/0x30 [ 464.444400][T18695] RIP: 0033:0x40fb5c [ 464.448296][T18695] Code: 89 b5 38 ff ff ff 48 83 c8 01 48 89 05 6d 09 64 00 48 8b 05 46 13 30 00 49 c7 85 c8 02 00 00 90 0e 71 00 49 89 85 c0 02 00 00 <4c> 89 70 08 4c 89 35 29 13 30 00 48 c7 05 3e 09 64 00 00 00 00 00 [ 464.467899][T18695] RSP: 002b:00007ffe1c83f710 EFLAGS: 00010202 [ 464.473968][T18695] RAX: 00007f35058779c0 RBX: 0000000000020000 RCX: 00000000ffffffe0 [ 464.481972][T18695] RDX: 0000000000000040 RSI: 0000000000000001 RDI: 00007f35058566a0 14:09:30 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) r2 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) prctl$PR_SET_FPEMU(0xa, 0x1) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x602080, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r3, 0x2000) fsetxattr$security_evm(r1, &(0x7f0000000080)='security.evm\x00', &(0x7f00000001c0)=@v2={0x5, 0x0, 0x10, 0x32, 0xaa, "0e7b79fe34ae2c9f271e7e1a0c885424f5e0fb022826f351a4b01ca12bbbee9084c1c534fb26e32d351e82cab505df36a7058b413d53c51bbdc7a5732b38e6604e7a69d2cc5e4692045ccf0e1764eb8ce1082bfe37cb3b496121fed41cc9b4da37baf107bf8b2aa9dd0562dc8252378552baf2aa634e0a82ea063ab2d9a678dd5664869523234bd8ceeee5196ac14b84a58e6e6079d5b1acfafc38dff0c3633ca61cae633b44464c2215"}, 0xb4, 0x0) 14:09:30 executing program 0: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) bind$bt_sco(r0, &(0x7f0000000140)={0x1f, {0x1f, 0xfff, 0x5, 0x7fff800000000, 0x7}}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000001000/0x1000)=nil, 0x1000}, 0x1}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e23, 0x7ff, @loopback, 0xfff}}, 0x4a, 0x4, 0x65, 0xcb6b, 0x4}, &(0x7f0000000280)=0x98) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000002c0)={r5, 0x52, 0x30, 0x3, 0x9}, &(0x7f0000000300)=0x18) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:30 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r2, 0x0, &(0x7f0000000180)='vboxnet0\x00') r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f00000001c0)=0xc) r5 = getpgrp(0x0) r6 = getpgrp(0xffffffffffffffff) r7 = getuid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0xffffffffffffffff, r0, 0x0, 0x8, &(0x7f0000000780)='keyring\x00', 0xffffffffffffffff}, 0x30) r9 = getpgid(0xffffffffffffffff) sendmsg$netlink(r3, &(0x7f0000000e80)={&(0x7f00000000c0)=@kern={0x10, 0x0, 0x0, 0x12002104}, 0xc, &(0x7f0000000e00)=[{&(0x7f0000000200)={0x424, 0x40, 0x800, 0x70bd27, 0x25dfdbfb, "", [@typed={0x8, 0x17, @ipv4=@multicast2}, @nested={0x98, 0xc, [@generic="2181f3e579f6de1e9000514bba198e3dcc83f1436a6246e6cfde4938b69b3ce3f32eed868d2c0c4c4d26b7e589b510b25b227aa0514672368e71c3c9f6ef713017480211ecf4bdb0c1ade272028f5698a3188f9eeab75ce4caeaff2dc3b2f26b96edb498", @typed={0x8, 0x67, @uid=r4}, @typed={0x1c, 0x74, @str='[(-posix_acl_access$$\x00'}, @typed={0x4, 0x1e}, @typed={0x8, 0x68, @str='\x00'}]}, @generic="2be5dcec839001bf0e76b38aaea0cc323d7b0efec163611fdb654721e865512c286a313f6882f35ca4f135d8860738137de32c661bf0ebd1db57486332f2ebd86463d1cb414ff508334b0ed6ba823a8652abe2522ae7aa9b882d1f752e003f647bdc8add256a33df65170cdb20bef71b12775f63fd3b80dfa4eea1526b86e1f0c2abc2fd4274dfcebb602abe", @generic="8a424d86eeeb41df4586fee0e9ef2f6e2163f35a507b5470fbd9ca7511d295b00855782f0a4ec8ecaa2de34b764761819acf7ca0240486ab37304d35152c315bd4b53dd2072c153aa61b5dc069748bab74f3c643dc2583303d453e5105d1c38ee0d8658ec5a32ab0939df46abe9579e0d10919f19d34c132053b89d9e599a00fb6b75c13cd43dec377530900105646c43e52448693cfd3850623c21ad6c4131ed809e9009a1c8492277c832f2490e4fe41bef1abcac2731591657b5b2138b66ff949bc", @nested={0x224, 0x81, [@generic="a9acfeed1c8c843d37fcefff873503f245b9565fd4229804821701dee2d627096cb600926e524b02f3d77cf0ce0cfb9d8b53872face08f8165a66703e3a9537215a64a77b179932055a500c67ae35ae0cd4dff21b53f14690a923c7eca0ddf73", @typed={0xb0, 0x45, @binary="e0d91b6ad9a254adcec0866229da14380759abed875b9f67e9467807c9f79e4552ef1e6ead5d323c6c21d639456c7b1cd355d5dd3cbc2da859cad793527795954681518d4172ab62f587d2202d70e62e88f67b6372ad9c8c45bcd0042cd20f407c503dd5f9828c0de491e8f93f5a8b7682a6e6bbd337e075d8cf4e55cb0f13d1b198af838148185e1cdfbc8e82df280c9a3e5e7ad42c01429bde26a981739c7f5585e0578e302cdcea79fc"}, @typed={0x14, 0xb, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}, @typed={0xc, 0x49, @u64=0x3796}, @typed={0x8, 0xb, @pid=r5}, @typed={0x1c, 0x38, @str='/dev/bus/usb/00#/00#\x00'}, @generic="f12e2ee6ef115a1f32c8dbab92647f9deaf7538ba62e9e6a348df74601af22266b4fcf7a6dd55f844470798383a49ebae2f4678469979c1f29aa37cc67f20ad7e3cc50cf075ddccc539f607b26b59adc76f59dcae7b0d16d36fdd1fae1e11a6440c32accc7d4a2f345317228f724b41c1e5ed52c908fa4097041838fd830410cb65cd911a649852e0101abd4c51fc38ac8bcc0f8ec8d96c6c04d3d5e13f8f6bfa66ea5026e19fa28ea6836d059c344112e4824174414743bb7f9f8f1f4ec5f3714d25e85f0aed5f46b2f2e"]}]}, 0x424}, {&(0x7f0000000640)=ANY=[@ANYBLOB="2c010000390010042abd7000fcdbdf2504000700200018000d82ab881582df42db77bbf0b663e9e2561375929cfe4497e700000008006c00", @ANYRES32=r0, @ANYBLOB="14004400000000000000000000000000000000010c741c5a13050a4422e5d710d8dcad4269a15cb0608748b0d7aa46332ae72b29cb75549fac908fbf2c18f4c0abaa5bc94ded1c9c82e0876dc6451ade94a66a2950c206b7d451d138ed237809c2b4ec2f0cf2b6b98a58d0ce865fa57a48be047cc19b22d7e41a319adf5e1d929d34a9bb3f1f8b24d1b18b8e8c0627c03244e1c45d1e713a56fecaaa729a24c4878af1b1008074c9fc1dc6fba0b46410347f723be2d8fc17283fe97598ef4b615641544fa65eecc9080011", @ANYRES32=r6, @ANYBLOB="20007b0008007b000100000008006a00", @ANYRES32=r0, @ANYBLOB='\b\x00)\x00', @ANYRES32=r0, @ANYBLOB="0400130000"], 0x12c}, {&(0x7f0000001500)=ANY=[@ANYBLOB="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", @ANYRES32=r7, @ANYBLOB="08001600", @ANYRES32=r8, @ANYBLOB="080058eec95f016ae45e71afe847379b700000ac141401000000000002000708006800", @ANYRES32=r9, @ANYBLOB="0047c71c77b355fbd93a7ff10d23981f67b3c63a2f6b971e3e068272d0ec4e5b1cc17668faa7b0fe5b038feff3669de1dcfee51530e18dc6efd622ae141762215362cca1eb7e79b9dd3248c7f482c7e294afda9562000000000000"], 0x5d0}], 0x3, &(0x7f0000000e40)=[@rights={0x28, 0x1, 0x1, [r0, r1, r1, r0, r0]}], 0x28, 0x20000000}, 0x8004) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) [ 464.489960][T18695] RBP: 00007ffe1c83f7f0 R08: 0000000000712800 R09: 0000000000712800 [ 464.497963][T18695] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffe1c83f8d0 [ 464.505943][T18695] R13: 00007f3505856700 R14: 00007f35058569c0 R15: 000000000073bfac [ 464.555832][T18695] memory: usage 307164kB, limit 307200kB, failcnt 777 [ 464.596118][T18695] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 14:09:30 executing program 0: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000140)='bond_slave_0\x00', 0xfffffffffffffffb) r1 = add_key(&(0x7f0000000200)='pkcs7_test\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="b9079c746451ee101d292ab05c353a49a16a51d183b6830dafd3aa38ffcbfa1686dae9f16fced12bb351d2a4b6914b4a124338c3ea3a54fb08eef76b6dbdbbce0c1c2b6d5a2a545eec2c75da94860664e7f1ece4b16c4547a8f538c472f1ef16c0d63817bd3962423a20474a94ca9c1fedf8973593cb7f3cbc501d6c67b46d9337999e14db60cd7a2a50f6b985a2ad5712fcd1636492c4f4a6afcde5b62fc62bd1c6244c051ebb", 0xa7, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', 0x0, 0x0, 0x0, r1) keyctl$restrict_keyring(0x1d, r2, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) [ 464.681872][T18695] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 464.757560][T18695] Memory cgroup stats for /syz4: cache:0KB rss:269580KB rss_huge:253952KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:269672KB inactive_file:0KB active_file:0KB unevictable:0KB [ 464.837106][T18695] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=13887,uid=0 [ 464.857082][T18695] Memory cgroup out of memory: Killed process 13887 (syz-executor.4) total-vm:72448kB, anon-rss:2208kB, file-rss:34816kB, shmem-rss:0kB 14:09:31 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vfio/vfio\x00', 0x40, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, &(0x7f00000002c0)=0x7fff, 0x4) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r1, &(0x7f00000000c0)="0be9169a528bfc30e059a767ca09305d52bf0f0b43c25a350a753e4d74012640c8739351c6df1c35bab2a3adfbb8bd4f73f4fe8793ba63cbb52f6282010f385fd9e2dc921d607969a4b0601ac96aaef807c08a75161ad9e7d3d309b989039ec44206ffd624c411382f06f2efbe219896c22b433c9e18c8a3f8353facb8b9012576a98da92e1deacc16019a81fd6695cd9ee43a6b33964b37feb02153c64cfceb497ddcbbe7bd9be422cddfb85336402dc8a38d9b72f5c6234849c95bc4b6c942a6efc89a78e8a4adf8b5f4784c189e89c4fe594071d7e490df8c824ea09ff41170b3e03d09b3f557b47c9b9967", &(0x7f00000001c0)=""/66}, 0x18) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x0) 14:09:31 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f00000000c0)={0x0, 0x70}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000001c0)={0x100, 0x7, 0x4, 0xfffffffffffffffc, 0x3, 0x6, 0x400, 0x8, r3}, &(0x7f0000000200)=0x20) r4 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$VHOST_SET_VRING_BASE(r4, 0x4008af12, &(0x7f0000000080)={0x3, 0x2}) 14:09:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r1) r3 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r2) clone(0x20000800, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r3, &(0x7f0000000a40)=""/4096, 0x1000) 14:09:31 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f00000000c0)) r2 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x20000, 0x0) ioctl$SIOCX25SFACILITIES(r3, 0x89e3, &(0x7f0000000140)={0x19, 0x3a1, 0x8, 0x8, 0x6}) r4 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x0, 0x20011, r4, 0x1ffc) 14:09:31 executing program 0: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000000)={0x0, 0xfff, 0x30}, &(0x7f0000000080)=0xc) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000001c0)={r2, @in={{0x2, 0x4e21, @multicast1}}, 0x8, 0x9}, 0x90) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r3, 0x2000) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f00000000c0)={0x5, 0x10001, 0x8, 0x400}) 14:09:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0xe000000000000000) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:09:31 executing program 0: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000000)={0x0, 0xfff, 0x30}, &(0x7f0000000080)=0xc) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000001c0)={r2, @in={{0x2, 0x4e21, @multicast1}}, 0x8, 0x9}, 0x90) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r3, 0x2000) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f00000000c0)={0x5, 0x10001, 0x8, 0x400}) 14:09:31 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x100, 0x0) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000180)=0xfffffffffffffffd, 0x4) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f00000001c0)={{0x8, 0x5}, {0x6, 0xade9}, 0x1, 0x1, 0x569a}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x40000, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r1, 0x80dc5521, &(0x7f00000000c0)=""/118) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x400880, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x0) 14:09:31 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) ioctl$SG_GET_SCSI_ID(r2, 0x2276, &(0x7f0000000080)) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x80011, r0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r1) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x0, 0x0) r4 = syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x1, 0x20000) ioctl$VT_GETMODE(r4, 0x5601, &(0x7f0000000240)) timer_create(0x7, &(0x7f0000000100)={0x0, 0x1b, 0x1}, &(0x7f0000000140)=0x0) timer_getoverrun(r5) ioctl$BINDER_SET_MAX_THREADS(r3, 0x40046205, 0x575e) mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0xe) add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r2) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r2, &(0x7f0000001a40)=""/4096, 0x2b) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000000280)=0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x4, 0x2, 0x1, 0x1f, 0x0, 0x4, 0x62, 0x8, 0x10000, 0x2, 0xffffffff, 0x8, 0x3f800000000000, 0xffffffff, 0x20e5, 0x1ff, 0x6, 0x3, 0x6, 0x18b5, 0x3, 0x1, 0x8, 0x8, 0x1, 0x7f, 0xffffffffffffffc1, 0x2, 0x6000, 0xffff, 0x8, 0x9, 0xda9, 0x3, 0xfffffffffffffff7, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x9}, 0x10480, 0x800, 0x9, 0x6, 0xffffffff, 0x7ff, 0x1}, r6, 0x8, r4, 0x2) 14:09:31 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a, 0x0, 0x2000}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) fchmod(r0, 0x100) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000001000/0x4000)=nil, 0x2000}, &(0x7f0000000180)=0xfffffffffffffe25) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000300)={0xffff, 0x9, 0x40, 0x1cec000000000000, 0x2, 0x6, 0x9, 0x0, 0x7, 0x0, 0x9}, 0xb) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r1, 0x40a85323, &(0x7f00000001c0)={{0x5, 0xfffffffffffffffc}, 'port1\x00', 0x40, 0x80800, 0x17b, 0xffffffff00000001, 0x6, 0xf9, 0x6, 0x0, 0x1, 0xff700000000000}) syz_extract_tcp_res(&(0x7f0000000080), 0x8, 0x3) fsetxattr$security_ima(r0, &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "465554c06519f78ee213afdec14d3152c5eabaa0"}, 0x15, 0x3) ioctl$EVIOCGREP(r1, 0x80084503, &(0x7f0000000280)=""/85) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x2000) 14:09:31 executing program 0: ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000140)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r0 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000080)=0x10) sendto$ax25(r0, &(0x7f00000000c0)="460e180a8e876368a79a0e3624e30b617b07dd161031", 0x16, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ustat(0x7, &(0x7f0000000000)) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x2000) 14:09:31 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f0000000000)={0x5, 0x5, 0x40, 0x4, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x5}) 14:09:31 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x5, 0x5, 0x0, 0x3, 0x18, 0x0, "03362c5e64c062b44f0a33ba628ac395255a5bf13233e92242a8a0af6b419bf99564495882b5b7197eeb4f30ce62b9ca30d81c08babf07556d56aa2bb074be49", "9b60bd2868f522de479a537d97a430f3f88a0ad8ba835646a0c5f49c76cadfd816b0c343e16060c1378527d55d1b247e98e825ebd82acb94172c18f5366bfe17", "04702ccbe5ea7b7aa2c7b88343771db5f70597b4f630a324b5b742ee81f157f5", [0x5, 0x80000001]}) 14:09:31 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x2000) 14:09:31 executing program 0: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x100, 0x0) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000180)=0xfffffffffffffffd, 0x4) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f00000001c0)={{0x8, 0x5}, {0x6, 0xade9}, 0x1, 0x1, 0x569a}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x40000, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r1, 0x80dc5521, &(0x7f00000000c0)=""/118) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x400880, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x0) 14:09:31 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) ioprio_set$pid(0x2, r0, 0x6) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r2 = add_key$keyring(&(0x7f0000001400)='keyring\x00', &(0x7f0000001440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r2, 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) 14:09:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0xe803000000000000) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:09:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'nlmon0\x00', 0x2010}) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r1) r3 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r2) syz_init_net_socket$llc(0x1a, 0x1, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r3, &(0x7f0000000a40)=""/4096, 0x1000) 14:09:31 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, 0x0) accept4$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote}, &(0x7f00000000c0)=0x1c, 0x80800) 14:09:31 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)=0x7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x2000) getsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000000), &(0x7f0000000080)=0x4) 14:09:31 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) 14:09:31 executing program 0: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000080)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) ioctl$IMADDTIMER(r1, 0x80044940, &(0x7f0000000000)=0xf4254) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f00000001c0)) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$LOOP_GET_STATUS64(r2, 0x4c05, &(0x7f0000000440)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r2, 0xc08c5335, &(0x7f00000002c0)={0x6f8, 0x4, 0x3f, 'queue1\x00', 0x2}) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x2000) 14:09:32 executing program 5: openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001400)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000001440)='/dev/rfkill\x00', 0x40000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000001600)='/dev/autofs\x00', 0x200, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000014c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, 0x0) r1 = add_key(&(0x7f00000000c0)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="fb86a6a3ba0a35d13cf7dee3a4d8a7e7012430ece4dc3fb8aac138a77e9f2d6b6f7ac48abd95ae270b82580e15de5826bc20ae2ef13400a66ae4c962e9bbdae9de5d1c85f899af802793245a966be6d6809986272e8ce3729978f3f078d217a5ae024b40b13f0407a6e2190160cbb99bb2c02e6c2f97ecbb709b6aaeb8869c86e3fcb7b2a38f18183a1d499fb3741191b7b0d25e69297d501bd8f3edb96a08231bbf52da825783d1b0f8e21ecc68ded6891a7017da0757b233e0e1138f42e28d744cfffdc50d9465d00ed9a6085749ba06e67f39a56349e1e526db7d542bc7ac4fd9a86126b095b942d89a6de9a6cda89d1becccc77327fc683f7b342ce3735db67310c470a0fea89803c42b67055153b3ba19ee3cbcd6aec48c56f377b5737c2838c63245ce523e9a3e45f038ad7ffda2de686d8a54a5d5945eacc67813f80f5463822f4fdff903dc96432e224c6f29f412177f10bb2fd5db8385578d7f8e297f2048f168c98578d7e2d176a530ec9591fd331aa36a0934e0c3ebd3c0672027f25cecdfe0ede1286ebd36ca6ce0ee91a8c14452062127bd492e16d3aa8c2f95e7fd519853069f4730f4eea4b1fc4b6984ddf7d80157b59ef62e91cb43b74009a21d319d2fcf3dc3b14a7a28a993b30e5859377b7767d44ce91386f65c005ce06efd17235e5b1b8bd0661733729c8b27c7681c28dc9fdb42be9c41db6eb63d6341de9aba090363f7901e2d3a198a17ddf4af5a15f7c3947376edf13b76b8a5f63758c2c62675c44c05c9fcfa01a81bce5a167effa3bb8381d05393c760b36bfce2e3e2d2506be34b1b2d89d1b0acc3bbe058aed25060971d097da8000391976bb09bb6d289458c6bccba67292f3467904db00d2ccea8812f3a10894f16d29b5b105588f1b0519215b739d100b1188edd48a08bdd13e1944b0d381f208646cacdefc5473cecb5a24e506d88ac3f9063af2e6e257f24367938c024e46677c8a1f96cd01ea817065f5c810f30f196fd53f3cad08a61341c8bae5f1bf832af4619960a100bda0a90800f6a32b3396b6d911491415b814ddbab3664c453d09d7ac0a6e71a429e7f60708b3ba1ba0d434d8dc67db2f575c261b696d77132bc7cfb188b29f3ac1f228b2864825094f992bf72acddb79267297057a973e0465125c8546ba80378a4af3975c55a6ac17d6e2e5b0817ceafaa4677684b8b9761b5b52409792ff01c1f734f092f21cea90f0555e54b25c989f28e60f451f823aededea2b090c914e252fb20e61c6e7f00c1fd95d03e3a78c312455526277363004913aa28e240cad0dbbc0ce570e25066426cf670bee0074558f71b8a7ed2d6c4152cceb9e2d077608e49aaaf501a919a8997635e32f7a0ebc112213b40206ce3f158b7244550b6b06b4f1545f96b96e665139dd7c2584e6312fc314ec93d80065dc59b027912e2d9af87ec23dc2a526804cde9e44484def243f635fe66bacc6cfec584572fe4af4f2545ff2467e1519adb4f2f0a70e5606e2487f7d811780847f0f9ee9fe1a9f5daf0c344fc270f8a13b8edb0f01cd3c42b55438b7b33619b453033ab919de6b289b9adaa6ef86ab8d17a40cd01fd29890614e307c27f1c12091fc8aa4c1ca4e890b06853adf91af41daf87fa700ba74713860e7ea1b670024761756891b2211c4b137e28a14254fc35b1f6d766083aef9c213b532aeeee8a506ad30461205997d9ce9e8387573839fff34a945e0692dea32e37cbd9e961a4e1b15c32bf6e8880919b12a436f279f16d9509e6956de6db94c34ce36152318bb66dabdd6bc788a08a4fc79e809f37c52d45ee284b30e73862fee50025e3010fb9e0cd6fe35115a2870a4956927f76eabd03fc187721006e108341d0ad8483d984492269c61481f03b79b5080643442c42b35d8b033122057627cb6e7b60eb635bb133ae57d7361563abb5b416b6d41ca9897ec0720e4fdc284b1a6340466a9c754e7658592af1d5a829a00b6b45cfb00c9bdf3a5729d33650b921bffc20da60464378db65190e1fecc3bf8344fc20317fb690d171a981d1c6918be6742dd9b5b1ebd5005095f9570f0f7044834bbc979956bfb85087eae389682f92d47f7be618de95fb24271b75319f4e1de848696266de462c71f9e64c92d7f139cca9567a3b813f32c8d637b7b651d0315443a298cd23631c9c4ccecdf8826b521c5275fbdb5a14a70b1ca847c7aca8955140749b9950432ba1daf10063992c8596b2ec59db16bb215ec7d8b0da609987ca191a693f97e7fa2c1e63e50237aa03d144c44a89084e60041514fcb4fd14ef4ba6b35468289a17f3dbb629595ae1b31ad183411b6f0dd5f057be9e016e4b3fcb21980478c57e80c93e8b60fa3021781de44d17a0068a7f1c001eae2713fe1de60cabee1833f369f738de3a742f4e3bb7a6986662b361216e575c0b8a743cfadfdee6ab2ff1b8d6fe7a1eff6bf21733c49f5ec5b661010bd5f4707a94f2bbdc8cef7498969fd90606cc6f2ffb3f1ef0d4584ab0c4db47d8de9216326010ff927b20a58c2b3258a63a02c5d4d8f2a5fb2042cef302a128c53cf6e3a89c9605f3aa558b74ef26ee72ae9dfa4b75fe78827eb2e4554df583029a2a5a829c763e627810a459efe5fc508e44a26c742643fad9fca4d1d6ea7553c1b4beee35cad62aa2080af19077319991eb4d76fb99fe3ad24cb56d3435977d68087d3d34a3b0733391bc4045178884f6f1c5cf21433ff8c34efb1c4e9a2e44954b2fc6d9af3827bb621090cafe918db03e0595d6f382797ed16f06a04be14b402e4e41e529e465f18bc241efe073d430bd348557a5d87c40497b5bf9a54a1101ef4fc7280bfd827894506a61969c5835a92bc034b5b1b7fd674fbadc0f7a3e2015eb5bf2bbc262ecf48aca6654adb8826063dcc3ecf774c055d557770032a93b3359d4e349372847dcd9684ac159784d27d96d10cb28da72253ca4528422139ac9132bebc31b60cae8154a349422f4fc8077ed598daf0b0ccf8be0da2f17c526c5fc59bd4558983d7c9472f43a06119f8f82b770a11df37d1704e64ca51f3cb539331523a32e4f7a47e84ebe786139585909e1d7602847261feb97560039e64bcea1a02fbaca0911ddb83ab435945b62f83031fe83b20a6c7fac9998185e96a3c43bba93ebe2cd203226d82f3a63d526f757a79cc6ddff3675cddeb0fdb5642bee5c35f3a2e4a39ed94df3207726134f8d5049f74a841b67c6abf070eb15b859535852d332d397c4a85568eed0787277fe4f608b41f67a08845bec7ec8761b10de6bee51ffe6d652a60005492fd730235a33c5c7fb7cfbc7a5a290c94bcd2e6cbda16e5fcba8b4cae6bed3432b8b28df0af80e6a09b4efb81599d9267b6c008712b3d7fe59202a2bb15bb61232d552c8ec99d44b634078da0c7096131c00430782371f4d7694c749098bf30c3a17ced9af85a8139b25ad025f9d3544417afb64b3dca55716c3a058ca78da7d5351c72bee3b16c773b5a406b6af8f252988550f21e766fcd5ae541276713d11c9b1ef82f13b36549125b41ad69f5a0ec7b8cbdda4358c4a4c3a1190f2b512f63981ac55f1be7d78339aa7f19af69c8e4fbcbb5e7e5329f82f72407d775675ef0279c5f75fe92e4656ac526934aef6b4d01bb9a0c540358a6fa6e806cbc64bccf19da6d94463c293297c271fce01f9ab9341d92073215bd0c47ef58f180f042666a402d8987dd6241083a51b19a19ae2be6aab3ecb66ebc92d6ba0e443e0002ed334ee61ebef76c4f5cee07f0009d3b644db108522c17d1e828b8755b474ba586d944d6ae1f048ea765106ec86adde782f4eb298ecdb706c2ffcf09617aad1c96636777cdca036330621cf6fe3aa52099519788d2747f95b1f0bf3209a29a3c92c3a27e592d8580719c92c6c175dbee231056728b5065eda83e1a0fc03255ed26f001025e7850ced729461307b8a0c132f1fcd7af791ed38433dac85aad4aad122aa1eb38fb052adab3adebf2a11ee8d4d981c8933197c1a2824cd858f0cde3017a541b1f86cdcfc676edd5dd3a977488256c9953579576477cc1b006dc12271d1a7916670bc19a654e0e5bb3a0880ef3c1ffd5630eb5108f8a8474e71828f6a5b30e2a98d2bf12dc0a773253f2f5ec8a4ef44cdccda4076aacc2087800652038e75ff6ab8e788789b7d532cf8453e06259c010a0c4f4f13932b1bedaa59f00a03582dbd91fb4579211fb5062ff1d14d3667bd892fb39f9054314c81cb99bd85dee7e16427fc925c9c98e6ff91313cc0ca6f41aa1db126ce9be01235f70b6af9faffdf16ad5e19fa0030e3ff9938699f4d6a65c4018ddc23b012ed2ca955086064f74bbcb60d5860ede743633439fad35978ba409bf5ad285c004c55316822b73f3d1a0dc4696d0d40dd3ea325e91aa5e8e383e5e685b7283679ffd013e59fb0ca2eabba53b3f28aff1fbeb5f60950712d8c0610b999b54918955e5c11b0f8826901175c3f5f31a7b54b117cfc67365f8515d1a8e9c3b561d3a8ad3eeb8afc50664ac889308e6d69f3d1ecef8979b1e6446795728c14b84df7900c6b3cfc6ca4aa27749a88e2745f973947358e453cae75af96f8237cc573e5c103f8e62f1fa48225c8a978a678945e34b14d8a9e500161ef6d0326a51a14e823ee9a734b8aaa5517da239a659c9c20a2cd98e2d6839947ad97ccf11ecb48f6f1c7fbaa6b02cfd6c4e6416438c1e3457f82d0d7fc5e9d79dc857303af69786be108de8cd803260e815e4c18f3fcc7f1886c64b2ef4a54bda666d0132344f0eee0d941c883bc8aa5f9086a6bf37229bd97a97a5a20f9cfd097a9a24c40eb36c7aca5688aa1db721c4c4095c10c476183f654886dff3d461b868a4a76bb7959cb82d0a088db984e04c7c6c915c5bf1dd0b10681e862d37ea62fdffe0387f3e5360ed25ab0abeb838dd6cd062ea5ba0d2edc4b4774bdeca8c4a87da485daeb6c08de87b9b71daf97de5759242415a9851b59e6432745f8c394c7f29583b91d22617fbc3154dda2df76605926eaaf1eb5923b50e6e0b152af465722e672e9782fc83b8f77f2d3e187f1746a28c73798ec67abf7f6ec7bb93937944d16f503c8151592004d6a94813d855a41ad6f960b051151e09910c998cd96502c7bfe3ec298a804bd646f1ce845539cbd142e2d1d4421d2e0737a322309f40bbd0af74716223caac352cf63805dc71b545fb0a5a1d91d0a0fd9a1847435ebd68cdb8a6e34a361d04b86f090b77d8336944fb4e3c9ba370a26f58aa380813187adac4ecceef596cf81196788129dad51ea33b1f612f305f4c4c964001d181093e687a0e4eed2a28c385df76c4055a9db04bd04b681a0b7195b8420ee7d35acb0ff42e7d9767d2ec998d2ce24955e0d5c502223f02310f44d6e45ab06c4e7460cd2e63aa3fc15469fa78de34d56fcd7bbf1abc9e7490f690f701ebc2e815637876d8ea58dab7dae6ba3de260b203b5eff3dc6bc6d98264ac7df8becbb95e22cf35d67538aabf32900ec53e59a73eee57173c6e09adbe23a759ca03af3b530f2eb68af32fa751335e8cd8bde7d02f9cddb4c2243b82b5ba1bf7b9a4f2e00f9394c8e570e191e0dba25e89cb2a5ab83b64923a4ce8736252bcd34fe763be47424ea06a772f8d4b89b104cee78462d267b3af218a0c1f6ac8d4049dc396057e33556f436739d2cd99faa5d4e6a3f7339645029a793e74571c9f714a55d35b35bdc34257b787e104d2388b9e45fb93d81fc73791408a6f7462e344a8034a1a23b8eed5a53aa", 0x1000, 0xfffffffffffffff8) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f00000011c0)={r1, 0x8001, 0x19800}, 0x0, &(0x7f0000001200)="4acff51aa455607685b45352eef0c8283c6cc660ad90ac91a34e13", &(0x7f0000001240)="afcb231eceb4025094c180d990f9a506f934698e9a0c4286194816713f3d2f79e7cd05374aba450758e6b059caa31dcaed8f731b7aa6a45d1430e6cbe6ddbe2ddfb90698b6398e1bf141260bce41eda20ce52fd06b86547af9feee1a1f2f5f9bbef8664b7242d3e3c522e39020de29e931a41a5f803811e1fe35d5903cf68a7c84c6219b5022313845ea60b6e332565193193fb9bd") getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x40000, @loopback}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r4, 0x40a85323, &(0x7f0000001340)={{0x8, 0x4}, 'port0\x00', 0x6, 0x100000, 0x100000000, 0x9, 0x0, 0xfffffffffffffc01, 0xffffffff, 0x0, 0x6, 0x1000}) write$USERIO_CMD_REGISTER(r4, &(0x7f0000001300)={0x0, 0x2}, 0x2) setsockopt$inet_tcp_int(r4, 0x6, 0x1d, &(0x7f0000000080)=0x200, 0x4) 14:09:32 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x1) r0 = request_key(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000180)='posix_acl_accessselinux\x00', 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) 14:09:32 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_ima(r0, &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "6d0498d976d383bbd791b54c628f044970a01713"}, 0x15, 0x2) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x2000) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'L+', 0x9}, 0x28, 0x3) 14:09:32 executing program 0: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000080)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) ioctl$IMADDTIMER(r1, 0x80044940, &(0x7f0000000000)=0xf4254) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f00000001c0)) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$LOOP_GET_STATUS64(r2, 0x4c05, &(0x7f0000000440)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r2, 0xc08c5335, &(0x7f00000002c0)={0x6f8, 0x4, 0x3f, 'queue1\x00', 0x2}) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x2000) 14:09:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r1) r3 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r2) clone(0x0, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') keyctl$read(0xb, r3, &(0x7f0000000a40)=""/4096, 0x1000) 14:09:32 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) mbind(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1, &(0x7f0000000000)=0x3, 0x2, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) 14:09:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0xf401000000000000) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:09:33 executing program 0: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000080)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) ioctl$IMADDTIMER(r1, 0x80044940, &(0x7f0000000000)=0xf4254) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f00000001c0)) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$LOOP_GET_STATUS64(r2, 0x4c05, &(0x7f0000000440)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r2, 0xc08c5335, &(0x7f00000002c0)={0x6f8, 0x4, 0x3f, 'queue1\x00', 0x2}) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x2000) 14:09:33 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x2000) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x4c, &(0x7f0000000080)=[@in={0x2, 0x4e24, @multicast2}, @in6={0xa, 0x4e24, 0x0, @mcast1, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x22}}, @in={0x2, 0x4e24, @broadcast}]}, &(0x7f0000000140)=0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000240)={0x2, 0x6, 0x4, 'queue0\x00', 0xffffffffffff8ca6}) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000001c0)={r3, 0x5, 0xfffffffffffffffa, 0x6e4}, &(0x7f0000000200)=0x10) 14:09:33 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) syz_open_dev$dmmidi(0x0, 0x1ffffffffffffffd, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) 14:09:33 executing program 5: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x482840, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000080)=0x8, 0x4) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x200000, 0x0) setsockopt$TIPC_MCAST_BROADCAST(r2, 0x10f, 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r4, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) r5 = perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r2, &(0x7f0000000580)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x12000008}, 0xc, &(0x7f0000000540)={&(0x7f0000000300)={0x238, r6, 0xe4452b93f974def2, 0x70bd2b, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x3c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x100}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0x58, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffff8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8}]}]}, @TIPC_NLA_BEARER={0x30, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1e}}}, {0x14, 0x2, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1f}}}}}]}, @TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}]}]}, @TIPC_NLA_BEARER={0x6c, 0x1, [@TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'syzkaller0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6807}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x593}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_LINK={0xdc, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xb6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fffffff}]}]}]}, 0x238}, 0x1, 0x0, 0x0, 0x4000}, 0x200408c1) accept$packet(r5, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) 14:09:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r1) r3 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r2) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r3, &(0x7f0000000a40)=""/4096, 0x1000) r4 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000000100)=[@in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}], 0x10) 14:09:33 executing program 0: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000080)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) ioctl$IMADDTIMER(r1, 0x80044940, &(0x7f0000000000)=0xf4254) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f00000001c0)) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$LOOP_GET_STATUS64(r2, 0x4c05, &(0x7f0000000440)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r2, 0xc08c5335, &(0x7f00000002c0)={0x6f8, 0x4, 0x3f, 'queue1\x00', 0x2}) 14:09:33 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) r0 = syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) bind$netlink(r0, &(0x7f0000000240)={0x10, 0x0, 0x25dfdbfc, 0x1000004}, 0xc) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="e8000000", @ANYRES16=r1, @ANYBLOB="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"], 0xe8}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x0) 14:09:33 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x2000) 14:09:33 executing program 0: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000080)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) ioctl$IMADDTIMER(r1, 0x80044940, &(0x7f0000000000)=0xf4254) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f00000001c0)) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$LOOP_GET_STATUS64(r2, 0x4c05, &(0x7f0000000440)) 14:09:33 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x13e, @tick, 0x1, {}, 0x101, 0x0, 0x7}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, 0x0) r1 = syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$IOC_PR_RELEASE(r1, 0x401070ca, &(0x7f0000000080)={0x3, 0x2}) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) ioctl$RNDGETENTCNT(r1, 0x80045200, &(0x7f0000000000)) getsockopt$nfc_llcp(r1, 0x118, 0x2, &(0x7f00000001c0)=""/239, 0xef) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) ioctl$VIDIOC_TRY_FMT(r1, 0xc0d05640, &(0x7f00000000c0)={0xa, @sdr={0x0, 0x401}}) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x0) ioctl$DRM_IOCTL_GET_MAP(r2, 0xc0286404, &(0x7f00000002c0)={&(0x7f0000000000/0xb000)=nil, 0x2, 0x45c56c9d030249a0, 0x8, &(0x7f0000008000/0x3000)=nil, 0x3129}) 14:09:33 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x2000) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) 14:09:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0xffffffff00000000) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:09:34 executing program 0: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000080)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) ioctl$IMADDTIMER(r1, 0x80044940, &(0x7f0000000000)=0xf4254) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f00000001c0)) socket$inet_smc(0x2b, 0x1, 0x0) 14:09:34 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xd, 0x200000) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x402, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) 14:09:34 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) accept4$nfc_llcp(r1, &(0x7f0000000080), &(0x7f0000000000)=0x60, 0x80800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x2000) 14:09:34 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x1, 0x0, 0x2, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x100000000, 0x0, 0x3, 0x0, 0x0, 0x80, 0x5f21df58, 0xfffffffffffffffc, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x9}, 0x80000000000000, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x5, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10, r1, 0x0) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, 0x0) 14:09:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r1) r3 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r2) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r3, &(0x7f0000000a40)=""/4096, 0x1000) tee(r0, r0, 0x196c27b5, 0x2) 14:09:34 executing program 1: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x20400, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000240)={0x3b, @dev={0xac, 0x14, 0x14, 0x3}, 0x4e21, 0x3, 'fo\x00', 0x2, 0x4, 0x6e}, 0x2c) r1 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x2, 0x2) getsockname$inet(r1, &(0x7f0000000140)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) r2 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r3 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x43d, 0x505302) ioctl$RNDZAPENTCNT(r3, 0x5204, &(0x7f0000000080)=0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r4 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r5, 0x2000) 14:09:34 executing program 0: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000080)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) ioctl$IMADDTIMER(r1, 0x80044940, &(0x7f0000000000)=0xf4254) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f00000001c0)) 14:09:34 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) r0 = syz_open_dev$dmmidi(0x0, 0x0, 0x9000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x2) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) 14:09:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r1) add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r2) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r1, &(0x7f0000001a40)=""/4096, 0x1000) 14:09:34 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x0, 0x2) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r2, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000080)='NET_DM\x00') 14:09:34 executing program 0: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000080)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) ioctl$IMADDTIMER(r1, 0x80044940, &(0x7f0000000000)=0xf4254) [ 468.649628][T18967] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 468.669451][T18967] CPU: 1 PID: 18967 Comm: syz-executor.4 Not tainted 5.0.0+ #23 [ 468.677116][T18967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 468.687169][T18967] Call Trace: [ 468.690470][T18967] dump_stack+0x172/0x1f0 [ 468.694831][T18967] dump_header+0x10f/0xb6c [ 468.699257][T18967] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 468.705074][T18967] ? ___ratelimit+0x60/0x595 [ 468.709675][T18967] ? do_raw_spin_unlock+0x57/0x270 [ 468.714817][T18967] oom_kill_process.cold+0x10/0x15 [ 468.720351][T18967] out_of_memory+0x79a/0x1280 [ 468.725055][T18967] ? lock_downgrade+0x880/0x880 [ 468.729923][T18967] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 468.736225][T18967] ? oom_killer_disable+0x280/0x280 [ 468.741431][T18967] ? find_held_lock+0x35/0x130 [ 468.746245][T18967] mem_cgroup_out_of_memory+0x1ca/0x230 [ 468.751799][T18967] ? memcg_event_wake+0x230/0x230 [ 468.756836][T18967] ? do_raw_spin_unlock+0x57/0x270 [ 468.761961][T18967] ? _raw_spin_unlock+0x2d/0x50 [ 468.766833][T18967] try_charge+0x102c/0x15c0 [ 468.771342][T18967] ? find_held_lock+0x35/0x130 [ 468.776125][T18967] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 468.781675][T18967] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 468.787229][T18967] ? find_held_lock+0x35/0x130 [ 468.792010][T18967] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 468.797603][T18967] __memcg_kmem_charge_memcg+0x7c/0x130 [ 468.803156][T18967] ? memcg_kmem_put_cache+0xb0/0xb0 [ 468.808369][T18967] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 468.813926][T18967] __memcg_kmem_charge+0x136/0x300 [ 468.819055][T18967] __alloc_pages_nodemask+0x437/0x7e0 [ 468.824434][T18967] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 468.831231][T18967] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 468.836997][T18967] ? copy_process.part.0+0x1d08/0x7980 [ 468.842467][T18967] ? lockdep_hardirqs_on+0x418/0x5d0 [ 468.847769][T18967] ? trace_hardirqs_on+0x67/0x230 [ 468.852809][T18967] ? kasan_check_read+0x11/0x20 [ 468.857669][T18967] copy_process.part.0+0x3e0/0x7980 [ 468.862928][T18967] ? psi_memstall_leave+0x11c/0x180 [ 468.868136][T18967] ? sched_clock+0x2e/0x50 [ 468.872564][T18967] ? psi_memstall_leave+0x12e/0x180 [ 468.877772][T18967] ? find_held_lock+0x35/0x130 [ 468.882545][T18967] ? psi_memstall_leave+0x12e/0x180 [ 468.887763][T18967] ? __cleanup_sighand+0x60/0x60 [ 468.892703][T18967] ? __lock_acquire+0x548/0x3fb0 [ 468.897671][T18967] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 468.903936][T18967] _do_fork+0x257/0xfd0 [ 468.908115][T18967] ? fork_idle+0x1d0/0x1d0 [ 468.912554][T18967] ? blkcg_maybe_throttle_current+0x5e2/0xfc0 [ 468.918628][T18967] ? lock_downgrade+0x880/0x880 [ 468.923482][T18967] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 468.929755][T18967] ? blkcg_exit_queue+0x30/0x30 [ 468.934614][T18967] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 468.940082][T18967] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 468.945574][T18967] ? do_syscall_64+0x26/0x610 [ 468.950265][T18967] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 468.956347][T18967] ? do_syscall_64+0x26/0x610 [ 468.961050][T18967] __x64_sys_clone+0xbf/0x150 [ 468.965737][T18967] do_syscall_64+0x103/0x610 [ 468.970338][T18967] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 468.976237][T18967] RIP: 0033:0x45aa49 [ 468.980142][T18967] Code: ff 48 85 f6 0f 84 d7 8e fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c ae 8e fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 14:09:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$selinux_load(r2, &(0x7f0000000100)={0xf97cff8c, 0x8, 'SE Linux', "965a253092bb846867e82af2d1281545dc6369fefda6ac4f0bee9afd50b6e67f448815f1a29b985ba91847404d66fe543b390924a999539e918376172ec76bdc5d22ccdb7b056d573b6f78a70e895ec485d76e3beb2dbb1be393bb5ed8c5476f3afb3d4db55b39d8f083e7e07cf9647dc4083eb2c5770ff1de3e03fd5c05698aa3330ca41f89a099f66ae4f7fe217a5ede35724b20eeb4a8683274"}, 0xab) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:09:35 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rfkill\x00', 0x10000, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000340)=ANY=[@ANYRES32=0x0, @ANYBLOB="7673020000000180e3e6c9be77c9352c"], &(0x7f0000000280)=0xc) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f00000002c0)={r3, 0x20, 0x8, 0xd1, 0x6, 0x401}, 0x14) ioctl$VHOST_NET_SET_BACKEND(r2, 0x4008af30, &(0x7f0000000300)={0x3, r2}) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f0000000080)=@sack_info={0x0, 0xfff, 0xffff}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000140)={r4, 0xfffffffffffffffe, 0x30}, &(0x7f00000001c0)=0xc) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r5 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r5, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x8851, r5, 0x2000) 14:09:35 executing program 0: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000080)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) ioctl$IMADDTIMER(r1, 0x80044940, &(0x7f0000000000)=0xf4254) 14:09:35 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2, 0x220011, r0, 0x0) socket$isdn(0x22, 0x3, 0x23) 14:09:35 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r0, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) [ 468.999743][T18967] RSP: 002b:00007ffe1c83f6c8 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 469.008153][T18967] RAX: ffffffffffffffda RBX: 00007f3505856700 RCX: 000000000045aa49 [ 469.016126][T18967] RDX: 00007f35058569d0 RSI: 00007f3505855db0 RDI: 00000000003d0f00 [ 469.024098][T18967] RBP: 00007ffe1c83f8d0 R08: 00007f3505856700 R09: 00007f3505856700 [ 469.032072][T18967] R10: 00007f35058569d0 R11: 0000000000000202 R12: 0000000000000000 [ 469.040050][T18967] R13: 00007ffe1c83f77f R14: 00007f35058569c0 R15: 000000000073bfac [ 469.053395][T18967] memory: usage 307176kB, limit 307200kB, failcnt 817 [ 469.063659][T18967] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 469.104876][T18967] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 469.137842][T18967] Memory cgroup stats for /syz4: cache:0KB rss:268548KB rss_huge:251904KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:268532KB inactive_file:0KB active_file:4KB unevictable:0KB 14:09:35 executing program 0: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000080)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) 14:09:35 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000002c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) sendto$isdn(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0xff, 0x8000, &(0x7f0000000000)={0x22, 0x2, 0x1, 0xeea, 0x7}, 0x6) setsockopt$packet_buf(r1, 0x107, 0x1, &(0x7f0000000080)="657999ed5c1c637ed79c6519f1342973da9b864d3cbca9e4ccd2cba2305975ef1ff5", 0x22) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x2000) 14:09:35 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r2, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r0, 0x0, 0xf, &(0x7f0000000080)='mime_typewlan1\x00', 0xffffffffffffffff}, 0x30) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000140)=0x0) perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dsp\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@initdev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000300)=0xe8) ioctl$sock_inet6_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000340)={@ipv4={[], [], @rand_addr=0x8}, 0x29, r5}) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:35 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x4, 0x3, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) shmctl$IPC_RMID(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x7fffffff, 0x800) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) [ 469.225613][T18967] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=13911,uid=0 [ 469.380076][T18967] Memory cgroup out of memory: Killed process 13911 (syz-executor.4) total-vm:72448kB, anon-rss:2208kB, file-rss:34816kB, shmem-rss:0kB 14:09:35 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x1, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='memory.events\x00', 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f00000000c0)=0x6) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1000006, 0x20011, r3, 0x0) 14:09:35 executing program 0: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000080)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) 14:09:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r1) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000080)={'ipddp0\x00', {0x2, 0x4e20, @rand_addr=0x6}}) r3 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r2) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r3, &(0x7f0000000a40)=""/4096, 0x1000) 14:09:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x5, 0x40) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:09:36 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x18101, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x6, r1, 0x1, 0x8, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$KVM_SIGNAL_MSI(r0, 0x4020aea5, &(0x7f0000000000)={0x0, 0x1000, 0xffff, 0x1, 0x3}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$key(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="020a00092800000026bd7000fddbdf251a00180000a3c800e72937d589ac4711841bc37e23341792a60199aa5d0e55545c16a3e5c620b444393729943c7cae32702cce817836439312ca38da9d74a72b2538419382faf47154178608bc76f408244bbdea65cd56165334390d681c1fc81eaeab7a14f82484dd33d50aa1c43b3e628e59a32315e50b35f056db47a08f884c1f0628011d1b3e31df2054700560809c3934107d86d329d641ebdac8e6bddb3c929080c42839bf52d89a66a163317164ae94c3f21f172b56b7b5c757e354106eb8397d65a397c1549d56f5c5a90e9226d8010015004e21000008001800060632004c293a4f0e40208ca92920c744fd67a098ee476f8871076ee54b6e1399ca0eef3463825e62059e6c4e15b059401b4397934c00000000000002001000000004d6000004d400000000010015004e230000"], 0x140}}, 0x20000000) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000380)={@rand_addr="42e2f77e5b97ca748082aefee2915fb6", r1}, 0x14) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f00000001c0)={'filter\x00', 0x0, 0x3, 0xd8, [], 0x4, &(0x7f0000000080)=[{}, {}, {}, {}], &(0x7f00000000c0)=""/216}, &(0x7f0000000240)=0x78) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f0000000440)=@req={0x101, 0x2, 0x200, 0x1}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='\xb8emory.events\x00', 0x0, 0x0) 14:09:36 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x3, 0x2) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r0, 0xc0405519, &(0x7f00000001c0)={0x1, 0x7, 0x8, 0x1, 'syz0\x00', 0xff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r2, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockopt$netlink(r3, 0x10e, 0x5, &(0x7f0000000080)=""/100, &(0x7f0000000100)=0x64) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, 0x0) 14:09:36 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000000)={0x1, 0x8}, 0x2) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x2000) 14:09:36 executing program 0: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000080)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) 14:09:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000300)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x80404532, &(0x7f00000005c0)=""/237) ioctl(r0, 0x1000028912, &(0x7f0000000040)='\x00\x00\x00\x00\x00') r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x14000, 0x0) getsockopt$MISDN_TIME_STAMP(r2, 0x0, 0x1, &(0x7f0000000580), &(0x7f0000000540)=0x1) add_key(&(0x7f0000000140)='syzkaller\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000240)="f7f3f9424344eb79ffd40e25bfa9a8889e26b19906587ce2", 0x18, 0xfffffffffffffff8) request_key(&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='em1\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000004c0)='nodev].security.Hbdevem1lo*wlan0bdevselfuser}\x00', 0xfffffffffffffffe) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000280)='/dev/video36\x00', 0x2, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f0000000100)={@multicast1, @local}, 0x8) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000080)={0xfffffffffffffffd, 0x1, 0x7}, 0xc) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0x0) r4 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff', 0x0}, 0x0, 0x0, r3) ioctl$VIDIOC_G_PARM(r1, 0xc0cc5615, &(0x7f00000006c0)={0xc, @capture={0x1000, 0x1, {0x40, 0x7}, 0x3, 0x50}}) clone(0x8200, 0x0, 0x0, 0x0, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) keyctl$read(0xb, r4, &(0x7f0000000a40)=""/4096, 0xfffffffffffffe87) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 14:09:36 executing program 0: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000080)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) 14:09:36 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f0000000000)={0x2, 0x3, 0x3}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) r2 = syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) getsockopt$inet6_dccp_int(r2, 0x21, 0x3, &(0x7f0000000080), &(0x7f00000000c0)=0x4) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) ptrace$cont(0x1f, r3, 0x0, 0x800) r4 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r4, 0x0) 14:09:36 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)=0x0) perf_event_open(0x0, r2, 0x2, 0xffffffffffffff9c, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r1) r3 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r2) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) ioctl$KVM_GET_SREGS(r4, 0x8138ae83, &(0x7f0000000300)) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r3, &(0x7f0000000a40)=""/4096, 0x1000) 14:09:36 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x80000) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x2000) 14:09:36 executing program 0: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000080)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) 14:09:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0106426, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r3, 0x4010641c, &(0x7f0000000180)={r6, &(0x7f0000000140)=""/33}) splice(r2, 0x0, r4, 0x0, 0x200010005, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:09:36 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x100000000000000, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40, 0x0) ioctl$SG_GET_SG_TABLESIZE(r2, 0x227f, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x20001, 0x10, r3, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:36 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000080)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x101, 0x0) mknodat(r0, &(0x7f0000000180)='./file0\x00', 0x60, 0x6) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)=0x80) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) r2 = syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0xa, 0x3, 0x2, 0xd108, '\x00', 0x3e}) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r3, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r2, 0x8040ae69, &(0x7f0000000200)={0x9, 0x7f, 0x0, 0x2, 0x7fffffff}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r4, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c00000006060541ff0080fffdffff2e0a0000000c000100060000007d0a00010c000200000022ff02f10000"], 0x2c}}, 0x0) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video37\x00', 0x2, 0x0) 14:09:36 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000080)='./file0\x00') syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) 14:09:36 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x44103) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x2000) 14:09:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r1) r3 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r2) clone(0x0, 0x0, 0x0, 0x0, 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0xe0002, 0x19) ioctl$sock_bt_hidp_HIDPCONNDEL(r4, 0x400448c9, &(0x7f0000000100)={{0x7f, 0xffffffffffffffff, 0xbc0, 0x0, 0x7, 0x2}, 0x9}) keyctl$read(0xb, r3, &(0x7f0000000a40)=""/4096, 0x1000) 14:09:37 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) 14:09:37 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x20011, r2, 0x2000) 14:09:37 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:37 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) 14:09:37 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) 14:09:37 executing program 4: mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3, &(0x7f0000000100)=0x6, 0x2, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x3ffff, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000300)=[@in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x80, 0x0}}, @in={0x2, 0x4e23, @loopback}, @in6={0xa, 0x4e22, 0x9, @dev={0xfe, 0x80, [], 0x19}, 0x1b0}, @in6={0xa, 0x4e21, 0x953a, @remote, 0x2965}, @in6={0xa, 0x4e22, 0x6, @mcast1, 0x5}, @in6={0xa, 0x4e23, 0x8, @dev={0xfe, 0x80, [], 0x13}, 0x3}, @in6={0xa, 0x4e21, 0xfae6, @mcast1, 0x800}, @in={0x2, 0x4e24, @remote}], 0xbc) add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r2) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 471.396309][T19130] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 [ 471.409441][T19130] CPU: 1 PID: 19130 Comm: syz-executor.4 Not tainted 5.0.0+ #23 [ 471.417097][T19130] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 471.427160][T19130] Call Trace: [ 471.430476][T19130] dump_stack+0x172/0x1f0 [ 471.434852][T19130] dump_header+0x10f/0xb6c [ 471.439280][T19130] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 471.445099][T19130] ? ___ratelimit+0x60/0x595 [ 471.449725][T19130] ? do_raw_spin_unlock+0x57/0x270 [ 471.454857][T19130] oom_kill_process.cold+0x10/0x15 [ 471.459974][T19130] out_of_memory+0x79a/0x1280 [ 471.464671][T19130] ? lock_downgrade+0x880/0x880 [ 471.469539][T19130] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 471.475789][T19130] ? oom_killer_disable+0x280/0x280 [ 471.481000][T19130] ? find_held_lock+0x35/0x130 [ 471.485801][T19130] mem_cgroup_out_of_memory+0x1ca/0x230 [ 471.491364][T19130] ? memcg_event_wake+0x230/0x230 [ 471.496402][T19130] ? do_raw_spin_unlock+0x57/0x270 [ 471.501527][T19130] ? _raw_spin_unlock+0x2d/0x50 [ 471.506386][T19130] try_charge+0x102c/0x15c0 [ 471.510899][T19130] ? find_held_lock+0x35/0x130 [ 471.515679][T19130] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 471.521232][T19130] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 471.526785][T19130] ? find_held_lock+0x35/0x130 [ 471.531562][T19130] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 471.537127][T19130] __memcg_kmem_charge_memcg+0x7c/0x130 [ 471.542681][T19130] ? memcg_kmem_put_cache+0xb0/0xb0 [ 471.547890][T19130] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 471.553452][T19130] __memcg_kmem_charge+0x136/0x300 [ 471.558571][T19130] __alloc_pages_nodemask+0x437/0x7e0 [ 471.563969][T19130] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 471.569712][T19130] ? copy_page_range+0x125a/0x1f90 [ 471.574834][T19130] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 471.581086][T19130] alloc_pages_current+0x107/0x210 [ 471.586213][T19130] pte_alloc_one+0x1b/0x1a0 [ 471.590733][T19130] __pte_alloc+0x20/0x310 [ 471.595089][T19130] copy_page_range+0x1529/0x1f90 [ 471.600036][T19130] ? find_held_lock+0x35/0x130 [ 471.604837][T19130] ? pmd_alloc+0x180/0x180 [ 471.609264][T19130] ? __rb_insert_augmented+0x231/0xdf0 [ 471.614736][T19130] ? validate_mm_rb+0xa3/0xc0 [ 471.619416][T19130] ? __vma_link_rb+0x279/0x370 [ 471.624200][T19130] copy_process.part.0+0x568b/0x7980 [ 471.629526][T19130] ? __cleanup_sighand+0x60/0x60 [ 471.634605][T19130] _do_fork+0x257/0xfd0 [ 471.638774][T19130] ? fork_idle+0x1d0/0x1d0 [ 471.643211][T19130] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 471.648684][T19130] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 471.654151][T19130] ? do_syscall_64+0x26/0x610 [ 471.658833][T19130] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 471.664913][T19130] ? do_syscall_64+0x26/0x610 [ 471.669618][T19130] __x64_sys_clone+0xbf/0x150 [ 471.674315][T19130] do_syscall_64+0x103/0x610 [ 471.678912][T19130] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 471.684808][T19130] RIP: 0033:0x458079 [ 471.688721][T19130] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 471.708327][T19130] RSP: 002b:00007f3505876c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 471.716746][T19130] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000458079 [ 471.724737][T19130] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 471.732723][T19130] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 471.740693][T19130] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f35058776d4 [ 471.748668][T19130] R13: 00000000004be379 R14: 00000000004cea80 R15: 00000000ffffffff [ 471.760782][T19130] memory: usage 307200kB, limit 307200kB, failcnt 873 [ 471.768080][T19130] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 471.776202][T19130] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 14:09:37 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) r0 = syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) ioctl$SG_SET_TIMEOUT(r0, 0x2201, &(0x7f0000000000)=0x4) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) 14:09:37 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) 14:09:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) dup3(r0, r1, 0x80000) 14:09:37 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0xffffffffffffffff, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000000000/0x1000)=nil, 0x1000}, &(0x7f0000000080)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x2000) 14:09:37 executing program 5: r0 = syz_open_dev$radio(&(0x7f00000002c0)='/dev/radio#\x00', 0x2, 0x2) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000300)={{0x1, 0x800}, {0x81, 0x400}, 0x81, 0x2, 0x158}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) r1 = request_key(&(0x7f0000000140)='.dead\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)='bo\x00\x00\x00\x00\x00\x7f\x00', 0xfffffffffffffffb) add_key(&(0x7f0000000080)='.request_key_auth\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f00000001c0)="5971f1db635fc213b88e045918ede60719dc2e66e27fd6bcecb31ef84c9c1259dca3006ee5f508ec9aa305daae0156eb2996fc6cd4c1c618a3cdd7aedbc83d7e3ee36a12128337c4efb2050d41f4945233", 0x51, r1) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000040)={'bo\x00\x00\x00\x00\x00\x7f\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x3, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) [ 471.783223][T19130] Memory cgroup stats for /syz4: cache:0KB rss:267108KB rss_huge:249856KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:267208KB inactive_file:0KB active_file:4KB unevictable:0KB [ 471.804811][T19130] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=13943,uid=0 [ 471.820443][T19130] Memory cgroup out of memory: Killed process 13943 (syz-executor.4) total-vm:72448kB, anon-rss:2208kB, file-rss:34816kB, shmem-rss:0kB 14:09:38 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x3, 0x103000) connect$unix(r0, &(0x7f0000000100)=@abs={0x1, 0x0, 0x4e21}, 0x6e) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000400)="0a88b070d041c64c1ad9c95b264e629538e9763a4cf6e511c49daac748e9e2c041eaeca7de98895a005d02213698e7cfd5d249b77d15a5c11dd01c2c4792a0d7aa3b4a50fcac444b45e0313aa3336f231cd8c42dfc4ac437febe6ac4768d040900731f30aa938ce0526202c5128ec1489c094ce1b8dc4e0e1655154b28257c52fc95aa6011b0e97cc2e966d660b5e3998fea4427e90450f54828b2d187e19a2cf335042e98a2ecfe2953f9039c085452610fbca9944d260a5de423cd7b8c0c02b58aad57bab744220c5fe3") r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r3) r4 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r2, &(0x7f0000004a40)=""/4096, 0x1000) 14:09:38 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) [ 472.012236][T19160] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 [ 472.056809][T19160] CPU: 1 PID: 19160 Comm: syz-executor.4 Not tainted 5.0.0+ #23 [ 472.064476][T19160] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 472.074548][T19160] Call Trace: [ 472.077849][T19160] dump_stack+0x172/0x1f0 [ 472.082195][T19160] dump_header+0x10f/0xb6c [ 472.086629][T19160] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 472.092440][T19160] ? ___ratelimit+0x60/0x595 [ 472.097041][T19160] ? do_raw_spin_unlock+0x57/0x270 [ 472.097063][T19160] oom_kill_process.cold+0x10/0x15 [ 472.097080][T19160] out_of_memory+0x79a/0x1280 [ 472.097100][T19160] ? lock_downgrade+0x880/0x880 [ 472.107299][T19160] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 472.107316][T19160] ? oom_killer_disable+0x280/0x280 [ 472.107329][T19160] ? find_held_lock+0x35/0x130 [ 472.107354][T19160] mem_cgroup_out_of_memory+0x1ca/0x230 [ 472.107369][T19160] ? memcg_event_wake+0x230/0x230 [ 472.107392][T19160] ? do_raw_spin_unlock+0x57/0x270 [ 472.107413][T19160] ? _raw_spin_unlock+0x2d/0x50 14:09:38 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x44103) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x2000) [ 472.153574][T19160] try_charge+0x102c/0x15c0 [ 472.158088][T19160] ? find_held_lock+0x35/0x130 [ 472.162875][T19160] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 472.168427][T19160] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 472.173999][T19160] ? find_held_lock+0x35/0x130 [ 472.178771][T19160] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 472.184339][T19160] __memcg_kmem_charge_memcg+0x7c/0x130 [ 472.189895][T19160] ? memcg_kmem_put_cache+0xb0/0xb0 [ 472.195108][T19160] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 472.200663][T19160] __memcg_kmem_charge+0x136/0x300 14:09:38 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) [ 472.205792][T19160] __alloc_pages_nodemask+0x437/0x7e0 [ 472.211172][T19160] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 472.216912][T19160] ? copy_page_range+0x125a/0x1f90 [ 472.222040][T19160] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 472.228291][T19160] alloc_pages_current+0x107/0x210 [ 472.233421][T19160] pte_alloc_one+0x1b/0x1a0 [ 472.237942][T19160] __pte_alloc+0x20/0x310 [ 472.242303][T19160] copy_page_range+0x1529/0x1f90 [ 472.247240][T19160] ? find_held_lock+0x35/0x130 [ 472.247280][T19160] ? pmd_alloc+0x180/0x180 [ 472.247297][T19160] ? __rb_insert_augmented+0x231/0xdf0 [ 472.247312][T19160] ? validate_mm_rb+0xa3/0xc0 [ 472.247329][T19160] ? __vma_link_rb+0x279/0x370 [ 472.247350][T19160] copy_process.part.0+0x568b/0x7980 [ 472.247390][T19160] ? __cleanup_sighand+0x60/0x60 [ 472.247422][T19160] _do_fork+0x257/0xfd0 [ 472.285809][T19160] ? fork_idle+0x1d0/0x1d0 [ 472.290243][T19160] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 472.295709][T19160] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 472.301173][T19160] ? do_syscall_64+0x26/0x610 [ 472.305856][T19160] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 472.311930][T19160] ? do_syscall_64+0x26/0x610 [ 472.316621][T19160] __x64_sys_clone+0xbf/0x150 [ 472.321311][T19160] do_syscall_64+0x103/0x610 [ 472.325912][T19160] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 472.331804][T19160] RIP: 0033:0x458079 [ 472.335708][T19160] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:09:38 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x5, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) syz_open_dev$dmmidi(0x0, 0x8001, 0x342) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) [ 472.355317][T19160] RSP: 002b:00007f3505876c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 472.363736][T19160] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000458079 [ 472.371709][T19160] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 472.379695][T19160] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 472.387689][T19160] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f35058776d4 [ 472.395665][T19160] R13: 00000000004be379 R14: 00000000004cea80 R15: 00000000ffffffff 14:09:38 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) 14:09:38 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x40c00, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x8000, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x80000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) r1 = syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000080)={'security\x00'}, &(0x7f0000000000)=0x54) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x0) 14:09:38 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000080)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) 14:09:38 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)=[&(0x7f00000000c0)='bond_slave_0\x00', &(0x7f0000000140)='vboxnet0\x00', &(0x7f00000001c0)='bond_slave_0\x00', &(0x7f0000000200)='keyring\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='vboxnet0\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', &(0x7f0000000380)='vboxnet0\x00', &(0x7f00000003c0)='security\x00', &(0x7f0000000400)='md5sum+\x00']) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) [ 472.535034][T19160] memory: usage 307200kB, limit 307200kB, failcnt 900 [ 472.560267][T19160] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 14:09:38 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) [ 472.616279][T19160] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 472.630918][T19160] Memory cgroup stats for /syz4: cache:0KB rss:267108KB rss_huge:249856KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:267204KB inactive_file:0KB active_file:4KB unevictable:0KB [ 472.748822][T19160] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=13964,uid=0 14:09:38 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x61, 0x2) r1 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x8001, 0x200) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet_udp(0x2, 0x2, 0x0) close(r6) r7 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r7, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r7, 0x80047437, &(0x7f0000000080)) getsockopt$bt_l2cap_L2CAP_OPTIONS(r5, 0x6, 0x1, &(0x7f0000000000), &(0x7f0000000100)=0xc) write$binfmt_misc(r5, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r4, 0x0, r6, 0x0, 0x200010005, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:09:38 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000080)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) [ 472.827724][T19160] Memory cgroup out of memory: Killed process 13964 (syz-executor.4) total-vm:72448kB, anon-rss:2208kB, file-rss:34816kB, shmem-rss:0kB [ 472.941179][T19160] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 [ 472.962956][T19160] CPU: 1 PID: 19160 Comm: syz-executor.4 Not tainted 5.0.0+ #23 [ 472.970614][T19160] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 472.980686][T19160] Call Trace: [ 472.983999][T19160] dump_stack+0x172/0x1f0 [ 472.988311][T19160] dump_header+0x10f/0xb6c [ 472.992774][T19160] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 472.998598][T19160] ? ___ratelimit+0x60/0x595 [ 473.003176][T19160] ? do_raw_spin_unlock+0x57/0x270 [ 473.008279][T19160] oom_kill_process.cold+0x10/0x15 [ 473.013384][T19160] out_of_memory+0x79a/0x1280 [ 473.018053][T19160] ? lock_downgrade+0x880/0x880 [ 473.022884][T19160] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 473.029100][T19160] ? oom_killer_disable+0x280/0x280 [ 473.034284][T19160] ? find_held_lock+0x35/0x130 [ 473.039085][T19160] mem_cgroup_out_of_memory+0x1ca/0x230 [ 473.044609][T19160] ? memcg_event_wake+0x230/0x230 [ 473.049615][T19160] ? do_raw_spin_unlock+0x57/0x270 [ 473.054708][T19160] ? _raw_spin_unlock+0x2d/0x50 [ 473.059537][T19160] try_charge+0x102c/0x15c0 [ 473.064018][T19160] ? find_held_lock+0x35/0x130 [ 473.068764][T19160] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 473.074298][T19160] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 473.079865][T19160] ? find_held_lock+0x35/0x130 [ 473.084607][T19160] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 473.090131][T19160] __memcg_kmem_charge_memcg+0x7c/0x130 [ 473.095653][T19160] ? memcg_kmem_put_cache+0xb0/0xb0 [ 473.100831][T19160] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 473.106356][T19160] __memcg_kmem_charge+0x136/0x300 [ 473.111443][T19160] __alloc_pages_nodemask+0x437/0x7e0 [ 473.116797][T19160] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 473.122519][T19160] ? copy_page_range+0x125a/0x1f90 [ 473.127626][T19160] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 473.133859][T19160] alloc_pages_current+0x107/0x210 [ 473.138966][T19160] pte_alloc_one+0x1b/0x1a0 [ 473.143459][T19160] __pte_alloc+0x20/0x310 [ 473.147765][T19160] copy_page_range+0x1529/0x1f90 [ 473.152690][T19160] ? find_held_lock+0x35/0x130 [ 473.157478][T19160] ? pmd_alloc+0x180/0x180 [ 473.161882][T19160] ? __rb_insert_augmented+0x231/0xdf0 [ 473.167318][T19160] ? validate_mm_rb+0xa3/0xc0 [ 473.171971][T19160] ? __vma_link_rb+0x279/0x370 [ 473.176727][T19160] copy_process.part.0+0x568b/0x7980 [ 473.182010][T19160] ? __cleanup_sighand+0x60/0x60 [ 473.186937][T19160] _do_fork+0x257/0xfd0 [ 473.191074][T19160] ? fork_idle+0x1d0/0x1d0 [ 473.195476][T19160] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 473.200913][T19160] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 473.206349][T19160] ? do_syscall_64+0x26/0x610 [ 473.211008][T19160] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 473.217051][T19160] ? do_syscall_64+0x26/0x610 [ 473.221705][T19160] __x64_sys_clone+0xbf/0x150 [ 473.226379][T19160] do_syscall_64+0x103/0x610 [ 473.230946][T19160] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 473.236817][T19160] RIP: 0033:0x458079 [ 473.240693][T19160] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 473.260272][T19160] RSP: 002b:00007f3505876c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 473.268674][T19160] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000458079 [ 473.276623][T19160] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 473.284574][T19160] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 473.292529][T19160] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f35058776d4 [ 473.300495][T19160] R13: 00000000004be379 R14: 00000000004cea80 R15: 00000000ffffffff [ 473.310452][T19160] memory: usage 307200kB, limit 307200kB, failcnt 919 [ 473.317800][T19160] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 473.325559][T19160] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 14:09:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r1) r3 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r2) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r3, &(0x7f0000000a40)=""/4096, 0xfceb) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x4000, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r4, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x68, r5, 0xd256728049f3035e, 0x70bd2c, 0x25dfdbff, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x2, @media='eth\x00'}}}, ["", "", "", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x40000}, 0x40) 14:09:39 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) r0 = syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000000)) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000080)={0xfffffffffffffffd, 0x0, 0x1, 'queue1\x00', 0xeb2}) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) 14:09:39 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) [ 473.332639][T19160] Memory cgroup stats for /syz4: cache:0KB rss:267216KB rss_huge:249856KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:267200KB inactive_file:0KB active_file:0KB unevictable:0KB [ 473.354468][T19160] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=19156,uid=0 [ 473.370201][T19160] Memory cgroup out of memory: Killed process 19156 (syz-executor.4) total-vm:72580kB, anon-rss:2216kB, file-rss:35660kB, shmem-rss:0kB 14:09:39 executing program 5: r0 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x5, 0x20000) ioctl$RTC_PLL_GET(r0, 0x80207011, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000140)=0x2, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r2, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) ioctl$CAPI_GET_PROFILE(r0, 0xc0404309, &(0x7f00000001c0)=0x6a8) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:39 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000080)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) 14:09:39 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000080)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) 14:09:39 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) 14:09:39 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={r1, r0, 0xf, 0x2}, 0x10) keyctl$restrict_keyring(0x1d, r2, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x2, 0x3000}, 0x4) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:39 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x400, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) syz_open_dev$dmmidi(0x0, 0x5, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) [ 473.630603][T19226] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 473.680629][T19226] CPU: 1 PID: 19226 Comm: syz-executor.4 Not tainted 5.0.0+ #23 [ 473.688306][T19226] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 473.698368][T19226] Call Trace: [ 473.701683][T19226] dump_stack+0x172/0x1f0 [ 473.706039][T19226] dump_header+0x10f/0xb6c [ 473.710498][T19226] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 473.716313][T19226] ? ___ratelimit+0x60/0x595 [ 473.720903][T19226] ? do_raw_spin_unlock+0x57/0x270 [ 473.726038][T19226] oom_kill_process.cold+0x10/0x15 [ 473.731158][T19226] out_of_memory+0x79a/0x1280 [ 473.735843][T19226] ? lock_downgrade+0x880/0x880 [ 473.740699][T19226] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 473.746947][T19226] ? oom_killer_disable+0x280/0x280 [ 473.752154][T19226] ? find_held_lock+0x35/0x130 [ 473.756933][T19226] mem_cgroup_out_of_memory+0x1ca/0x230 [ 473.762480][T19226] ? memcg_event_wake+0x230/0x230 [ 473.767543][T19226] ? do_raw_spin_unlock+0x57/0x270 [ 473.772667][T19226] ? _raw_spin_unlock+0x2d/0x50 [ 473.777531][T19226] try_charge+0x102c/0x15c0 [ 473.782035][T19226] ? find_held_lock+0x35/0x130 [ 473.786819][T19226] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 473.792462][T19226] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 473.798722][T19226] ? kasan_check_read+0x11/0x20 [ 473.803588][T19226] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 473.809150][T19226] mem_cgroup_try_charge+0x24d/0x5e0 [ 473.814449][T19226] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 473.820111][T19226] wp_page_copy+0x408/0x1740 [ 473.824709][T19226] ? find_held_lock+0x35/0x130 [ 473.829486][T19226] ? pmd_pfn+0x1d0/0x1d0 [ 473.833747][T19226] ? lock_downgrade+0x880/0x880 [ 473.838648][T19226] ? swp_swapcount+0x540/0x540 [ 473.843443][T19226] ? kasan_check_read+0x11/0x20 [ 473.848298][T19226] ? do_raw_spin_unlock+0x57/0x270 [ 473.853418][T19226] do_wp_page+0x5d8/0x16c0 [ 473.857852][T19226] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 473.863245][T19226] __handle_mm_fault+0x22e8/0x3ec0 [ 473.868373][T19226] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 473.873929][T19226] ? find_held_lock+0x35/0x130 [ 473.878707][T19226] ? handle_mm_fault+0x322/0xb30 [ 473.883672][T19226] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 473.890173][T19226] ? kasan_check_read+0x11/0x20 [ 473.895040][T19226] handle_mm_fault+0x43f/0xb30 [ 473.899821][T19226] __do_page_fault+0x5ef/0xda0 [ 473.904600][T19226] do_page_fault+0x71/0x581 [ 473.909127][T19226] ? page_fault+0x8/0x30 [ 473.913387][T19226] page_fault+0x1e/0x30 [ 473.917548][T19226] RIP: 0033:0x413903 [ 473.921441][T19226] Code: e9 4c 89 e2 ff 74 24 48 4c 8b 4c 24 10 89 ee 4c 8b 44 24 18 48 89 df e8 cb f7 ff ff 66 2e 0f 1f 84 00 00 00 00 00 90 48 f7 d8 <64> 89 04 25 d4 ff ff ff 48 83 c8 ff c3 48 81 ec 98 00 00 00 31 ff [ 473.941054][T19226] RSP: 002b:00007ffe1c83f7f8 EFLAGS: 00010213 [ 473.947122][T19226] RAX: 000000000000006e RBX: 000000000000002d RCX: 0000000000458079 [ 473.955095][T19226] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 000000000073bf0c [ 473.963080][T19226] RBP: 000000000073bf00 R08: 00000000000739a5 R09: 00000000000739a5 [ 473.971079][T19226] R10: 00007ffe1c83f8c0 R11: 0000000000000246 R12: 00000000000739f0 14:09:40 executing program 0: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) [ 473.979054][T19226] R13: 00000000000739c3 R14: 00000000000003e8 R15: 000000000073bf0c [ 474.042700][T19226] memory: usage 307176kB, limit 307200kB, failcnt 981 [ 474.069774][T19226] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 14:09:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:09:40 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r0, 0x0, &(0x7f0000000180)='vboxnet0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) [ 474.091914][T19226] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 474.111801][T19226] Memory cgroup stats for /syz4: cache:0KB rss:267220KB rss_huge:249856KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:267208KB inactive_file:0KB active_file:0KB unevictable:0KB [ 474.140795][T19226] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=13987,uid=0 [ 474.158326][T19226] Memory cgroup out of memory: Killed process 13987 (syz-executor.4) total-vm:72448kB, anon-rss:2208kB, file-rss:34816kB, shmem-rss:0kB [ 474.206831][T19238] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 [ 474.224605][T19238] CPU: 1 PID: 19238 Comm: syz-executor.4 Not tainted 5.0.0+ #23 [ 474.232272][T19238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 474.242325][T19238] Call Trace: [ 474.245629][T19238] dump_stack+0x172/0x1f0 [ 474.249964][T19238] dump_header+0x10f/0xb6c [ 474.254399][T19238] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 474.260220][T19238] ? ___ratelimit+0x60/0x595 [ 474.264816][T19238] ? do_raw_spin_unlock+0x57/0x270 [ 474.269933][T19238] oom_kill_process.cold+0x10/0x15 [ 474.275060][T19238] out_of_memory+0x79a/0x1280 [ 474.279756][T19238] ? oom_killer_disable+0x280/0x280 [ 474.284961][T19238] ? find_held_lock+0x35/0x130 [ 474.289750][T19238] mem_cgroup_out_of_memory+0x1ca/0x230 [ 474.295312][T19238] ? memcg_event_wake+0x230/0x230 [ 474.300345][T19238] ? do_raw_spin_unlock+0x57/0x270 [ 474.305468][T19238] ? _raw_spin_unlock+0x2d/0x50 [ 474.310330][T19238] try_charge+0xa87/0x15c0 [ 474.314752][T19238] ? find_held_lock+0x35/0x130 [ 474.319538][T19238] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 474.325103][T19238] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 474.330651][T19238] ? find_held_lock+0x35/0x130 [ 474.335422][T19238] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 474.340994][T19238] __memcg_kmem_charge_memcg+0x7c/0x130 [ 474.346560][T19238] ? memcg_kmem_put_cache+0xb0/0xb0 [ 474.351778][T19238] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 474.357338][T19238] __memcg_kmem_charge+0x136/0x300 [ 474.362461][T19238] __alloc_pages_nodemask+0x437/0x7e0 [ 474.367876][T19238] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 474.373606][T19238] ? is_dynamic_key+0x1c0/0x1c0 [ 474.378467][T19238] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 474.384750][T19238] alloc_pages_current+0x107/0x210 [ 474.389873][T19238] pte_alloc_one+0x1b/0x1a0 [ 474.394387][T19238] __handle_mm_fault+0x3491/0x3ec0 [ 474.399554][T19238] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 474.405107][T19238] ? find_held_lock+0x35/0x130 [ 474.409874][T19238] ? handle_mm_fault+0x322/0xb30 [ 474.414826][T19238] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 474.421078][T19238] ? kasan_check_read+0x11/0x20 [ 474.425941][T19238] handle_mm_fault+0x43f/0xb30 [ 474.430728][T19238] __do_page_fault+0x5ef/0xda0 [ 474.435538][T19238] do_page_fault+0x71/0x581 [ 474.440051][T19238] ? page_fault+0x8/0x30 [ 474.444301][T19238] page_fault+0x1e/0x30 [ 474.448461][T19238] RIP: 0033:0x458079 [ 474.452376][T19238] Code: Bad RIP value. [ 474.456441][T19238] RSP: 002b:00007f3505876c78 EFLAGS: 00010246 [ 474.462512][T19238] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000458079 [ 474.470508][T19238] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 474.478486][T19238] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 474.486469][T19238] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f35058776d4 [ 474.494536][T19238] R13: 00000000004be379 R14: 00000000004cea80 R15: 00000000ffffffff [ 474.506782][T19238] memory: usage 304888kB, limit 307200kB, failcnt 981 [ 474.514104][T19238] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 474.521713][T19238] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 474.535866][T19238] Memory cgroup stats for /syz4: cache:0KB rss:265076KB rss_huge:247808KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:265080KB inactive_file:0KB active_file:0KB unevictable:0KB [ 474.557606][T19238] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=14012,uid=0 [ 474.575811][T19238] Memory cgroup out of memory: Killed process 14012 (syz-executor.4) total-vm:72448kB, anon-rss:2208kB, file-rss:34816kB, shmem-rss:0kB [ 474.602546][T19227] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 474.614572][T19227] CPU: 1 PID: 19227 Comm: syz-executor.4 Not tainted 5.0.0+ #23 [ 474.622220][T19227] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 474.632278][T19227] Call Trace: [ 474.635584][T19227] dump_stack+0x172/0x1f0 [ 474.639922][T19227] dump_header+0x10f/0xb6c [ 474.644367][T19227] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 474.650186][T19227] ? ___ratelimit+0x60/0x595 [ 474.654784][T19227] ? do_raw_spin_unlock+0x57/0x270 [ 474.659902][T19227] oom_kill_process.cold+0x10/0x15 [ 474.665030][T19227] out_of_memory+0x79a/0x1280 [ 474.669728][T19227] ? oom_killer_disable+0x280/0x280 [ 474.674934][T19227] ? find_held_lock+0x35/0x130 [ 474.679739][T19227] mem_cgroup_out_of_memory+0x1ca/0x230 [ 474.685292][T19227] ? memcg_event_wake+0x230/0x230 [ 474.690335][T19227] ? do_raw_spin_unlock+0x57/0x270 [ 474.695457][T19227] ? _raw_spin_unlock+0x2d/0x50 [ 474.700319][T19227] try_charge+0xa87/0x15c0 [ 474.704744][T19227] ? find_held_lock+0x35/0x130 [ 474.709534][T19227] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 474.715098][T19227] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 474.721801][T19227] ? kasan_check_read+0x11/0x20 [ 474.726665][T19227] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 474.732225][T19227] mem_cgroup_try_charge+0x24d/0x5e0 [ 474.737537][T19227] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 474.743187][T19227] wp_page_copy+0x408/0x1740 [ 474.747780][T19227] ? find_held_lock+0x35/0x130 [ 474.752564][T19227] ? pmd_pfn+0x1d0/0x1d0 [ 474.756819][T19227] ? lock_downgrade+0x880/0x880 [ 474.761679][T19227] ? swp_swapcount+0x540/0x540 [ 474.766456][T19227] ? kasan_check_read+0x11/0x20 [ 474.771353][T19227] ? do_raw_spin_unlock+0x57/0x270 [ 474.776480][T19227] do_wp_page+0x5d8/0x16c0 [ 474.780918][T19227] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 474.786308][T19227] __handle_mm_fault+0x22e8/0x3ec0 [ 474.791436][T19227] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 474.797004][T19227] ? find_held_lock+0x35/0x130 [ 474.801777][T19227] ? handle_mm_fault+0x322/0xb30 [ 474.806739][T19227] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 474.813015][T19227] ? kasan_check_read+0x11/0x20 [ 474.817877][T19227] handle_mm_fault+0x43f/0xb30 [ 474.822662][T19227] __do_page_fault+0x5ef/0xda0 [ 474.827972][T19227] do_page_fault+0x71/0x581 [ 474.832503][T19227] ? page_fault+0x8/0x30 [ 474.836754][T19227] page_fault+0x1e/0x30 [ 474.840920][T19227] RIP: 0033:0x40468e [ 474.844863][T19227] Code: 48 8b 55 40 48 8b 75 38 48 8b 7d 30 ff 75 70 ff 75 68 ff 75 60 4c 8b 4d 58 4c 8b 45 50 ff d0 48 83 c4 20 48 89 c3 48 83 fb ff <48> 89 5d 78 41 8b 04 24 0f 85 d4 00 00 00 85 c0 0f 85 cc 00 00 00 [ 474.864472][T19227] RSP: 002b:00007f3505876c90 EFLAGS: 00010207 [ 474.870574][T19227] RAX: 0000000000000000 RBX: 00000000000004bf RCX: 0000000000458079 [ 474.878546][T19227] RDX: 0000000000404646 RSI: 0000000000000000 RDI: 0000000000000000 [ 474.886524][T19227] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 474.894505][T19227] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f35058776d4 [ 474.902477][T19227] R13: 00000000004be379 R14: 00000000004cea80 R15: 00000000ffffffff [ 474.918578][T19227] memory: usage 302716kB, limit 307200kB, failcnt 981 [ 474.927610][T19227] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 474.938914][T19227] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 474.948035][T19227] Memory cgroup stats for /syz4: cache:0KB rss:262932KB rss_huge:245760KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:262936KB inactive_file:0KB active_file:0KB unevictable:0KB [ 474.982809][T19227] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=14031,uid=0 14:09:41 executing program 0: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) 14:09:41 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000005c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) signalfd4(r0, &(0x7f0000000600)={0x1f}, 0x8, 0x80000) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000680)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000780)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x8100008}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x68, r1, 0x8, 0x70bd2d, 0x25dfdbfc, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x3, @link='syz0\x00'}}}, ["", "", "", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$security_capability(r3, &(0x7f0000000140)='security.capability\x00', &(0x7f0000000240)=@v3={0x3000000, [{0x3, 0x5}, {0x8, 0x9}], r4}, 0x18, 0x3) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000000280)=0x0) ioctl$sock_FIOSETOWN(r3, 0x8901, &(0x7f00000002c0)=r5) sendto$x25(r3, &(0x7f0000000080)="d8f3ddfbaf36f8e414db6012dca2896ab13075661f88c4e4bf043b82c4b4d520c56e961c44dd164750908c724040713d4656352dcbdaf3bedce74644e8147cafa436ee49d8d689159b64feae1c32cf79dcd0c428edaf9fb9515fdb", 0x5b, 0x8000, &(0x7f0000000100)={0x9, @null=' \x00'}, 0x12) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) io_setup(0x4, &(0x7f0000000300)=0x0) io_submit(r7, 0x1, &(0x7f0000000480)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x2, 0x9, r2, &(0x7f0000000340)="2e78fb3a29f54cc8ddccafddd801085a349a5cc20bd5824474b2e38af33a48d32015f1b26458f1a16f2b62848f481d4387baf4b178977ad8eb55b8e64e6eb14cdd2237", 0x43, 0x7fffffff, 0x0, 0x1, r6}]) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f00000004c0)={0x0, 0x9}, &(0x7f0000000500)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000540)={r8, 0x6}, &(0x7f0000000580)=0x8) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r9 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2000008, 0x400000020011, r9, 0x0) fsync(r2) 14:09:41 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000080)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) 14:09:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, r1) r3 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r2) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r3, &(0x7f0000000a40)=""/4096, 0x1000) 14:09:41 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) openat$userio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/userio\x00', 0x440100, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, 0x0) accept4$vsock_stream(r2, &(0x7f00000000c0)={0x28, 0x0, 0xffffffff, @my=0x0}, 0x10, 0x80800) 14:09:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$pppoe(0x18, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x3, 0x5b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000100), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x64, 0x6a05, 'teql0\x00', 'ip_vti0\x00', 'veth1_to_bond\x00', 'vcan0\x00', @remote, [0xff, 0xff], @empty, [0x0, 0x0, 0x0, 0xff, 0xff, 0xff], 0x118, 0x1c0, 0x210, [@pkttype={'pkttype\x00', 0x8, {{0x2, 0x1}}}, @ip6={'ip6\x00', 0x50, {{@mcast2, @dev={0xfe, 0x80, [], 0x13}, [0xffffffff, 0xff, 0x0, 0xd26930bbc89fafe2], [0xff, 0xff, 0x0, 0xffffffff], 0x80, 0x7f, 0x3f, 0x12, 0x4e22, 0x4e20, 0x4e21, 0x4e21}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x6, 0x8000, 0x8000, 0x0, 0x0, "8eecfa6944dca6fdb6c9fc5b78274ceac93cd8dd74e5114735473a9537bd3a109d746b19ac7c2772653224a7fa16d48c7e61c2370b3ec8efe315be7c8da77af3"}}}, @common=@AUDIT={'AUDIT\x00', 0x8}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz0\x00', 0x3}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x2, [{{{0x0, 0x49, 0x6002, 'gre0\x00', 'rose0\x00', 'team_slave_1\x00', 'caif0\x00', @empty, [0xff, 0xff, 0xff], @dev={[], 0x19}, [0xff, 0x0, 0xff, 0x1a4060c81aa0913b], 0x118, 0x160, 0x1b0, [@realm={'realm\x00', 0x10, {{0x10001, 0x6}}}, @rateest={'rateest\x00', 0x48, {{'syz_tun\x00', 'netdevsim0\x00', 0xf, 0x3, 0x9e39, 0x8, 0x7f, 0x1ff, 0x5, 0x5}}}]}, [@common=@ERROR={'ERROR\x00', 0x20, {"6c5a644acd00998653525348cfcfb03c3ac9d7615d44647a7f4529394e79"}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x0, 0x9870, 0x5}}}}, {{{0x11, 0x40, 0xdada, 'nr0\x00', 'nr0\x00', 'rose0\x00', '\x00', @dev={[], 0x16}, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @random="333e07ef9e9d", [0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x120, 0x168}, [@common=@NFLOG={'NFLOG\x00', 0x50, {{0x3ff, 0x7, 0x7, 0x0, 0x0, "d654326daf0ff576374a87eda6b881c5a1b043743b5b74f50245387832dd25ab64950af2adfb403c1ac397d36ad349733e6b52e123f48b1760fab2221a870989"}}}, @common=@mark={'mark\x00', 0x10, {{0xfffffff0, 0xffffffffffffffff}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x20, 0x0, 0x8}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffc}]}, 0x630) connect$pppoe(r5, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000000)={0x14}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) [ 474.998425][T19227] Memory cgroup out of memory: Killed process 14031 (syz-executor.4) total-vm:72448kB, anon-rss:2208kB, file-rss:34816kB, shmem-rss:0kB [ 475.013600][ T1042] oom_reaper: reaped process 14031 (syz-executor.4), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB 14:09:41 executing program 0: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) 14:09:41 executing program 1: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000080)='./file0\x00') syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) [ 475.293856][T19286] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 [ 475.312672][T19286] CPU: 0 PID: 19286 Comm: syz-executor.4 Not tainted 5.0.0+ #23 [ 475.320316][T19286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 475.330378][T19286] Call Trace: [ 475.333707][T19286] dump_stack+0x172/0x1f0 [ 475.338054][T19286] dump_header+0x10f/0xb6c 14:09:41 executing program 1: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) [ 475.342505][T19286] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 475.348323][T19286] ? ___ratelimit+0x60/0x595 [ 475.352927][T19286] ? do_raw_spin_unlock+0x57/0x270 [ 475.358049][T19286] oom_kill_process.cold+0x10/0x15 [ 475.363172][T19286] out_of_memory+0x79a/0x1280 [ 475.367851][T19286] ? lock_downgrade+0x880/0x880 [ 475.367868][T19286] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 475.367888][T19286] ? oom_killer_disable+0x280/0x280 [ 475.378945][T19286] ? find_held_lock+0x35/0x130 [ 475.378970][T19286] mem_cgroup_out_of_memory+0x1ca/0x230 [ 475.379011][T19286] ? memcg_event_wake+0x230/0x230 [ 475.379035][T19286] ? do_raw_spin_unlock+0x57/0x270 [ 475.379057][T19286] ? _raw_spin_unlock+0x2d/0x50 [ 475.409492][T19286] try_charge+0x102c/0x15c0 [ 475.414023][T19286] ? find_held_lock+0x35/0x130 [ 475.418821][T19286] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 475.424398][T19286] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 475.429957][T19286] ? find_held_lock+0x35/0x130 [ 475.434754][T19286] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 475.440318][T19286] __memcg_kmem_charge_memcg+0x7c/0x130 [ 475.445868][T19286] ? memcg_kmem_put_cache+0xb0/0xb0 [ 475.451074][T19286] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 475.456632][T19286] __memcg_kmem_charge+0x136/0x300 [ 475.461757][T19286] __alloc_pages_nodemask+0x437/0x7e0 [ 475.467142][T19286] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 475.472990][T19286] ? copy_page_range+0x125a/0x1f90 [ 475.478123][T19286] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 475.484374][T19286] alloc_pages_current+0x107/0x210 [ 475.489498][T19286] pte_alloc_one+0x1b/0x1a0 [ 475.494028][T19286] __pte_alloc+0x20/0x310 [ 475.498372][T19286] copy_page_range+0x1529/0x1f90 [ 475.503316][T19286] ? perf_trace_lock+0xeb/0x510 [ 475.508199][T19286] ? pmd_alloc+0x180/0x180 [ 475.512627][T19286] ? __rb_insert_augmented+0x231/0xdf0 [ 475.518088][T19286] ? validate_mm_rb+0xa3/0xc0 [ 475.522773][T19286] ? __vma_link_rb+0x279/0x370 [ 475.527551][T19286] copy_process.part.0+0x568b/0x7980 [ 475.532883][T19286] ? __cleanup_sighand+0x60/0x60 [ 475.537848][T19286] _do_fork+0x257/0xfd0 [ 475.542035][T19286] ? fork_idle+0x1d0/0x1d0 [ 475.546473][T19286] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 475.551939][T19286] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 475.557418][T19286] ? do_syscall_64+0x26/0x610 [ 475.562102][T19286] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 475.568173][T19286] ? do_syscall_64+0x26/0x610 [ 475.572861][T19286] __x64_sys_clone+0xbf/0x150 [ 475.577548][T19286] do_syscall_64+0x103/0x610 [ 475.582146][T19286] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 475.588089][T19286] RIP: 0033:0x458079 [ 475.592014][T19286] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 475.611620][T19286] RSP: 002b:00007f3505855c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 475.620037][T19286] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000458079 [ 475.628025][T19286] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 475.636018][T19286] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 14:09:41 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) 14:09:41 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x200000, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r2, 0x900, 0x70bd2a, 0x25dfdbff, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x8000) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r4, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0xb, r0, 0x2) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) [ 475.644011][T19286] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f35058566d4 [ 475.652004][T19286] R13: 00000000004be379 R14: 00000000004cea80 R15: 00000000ffffffff 14:09:41 executing program 1: syz_open_dev$sndseq(0x0, 0x0, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) 14:09:41 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) r0 = syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) write$P9_RSYMLINK(r0, &(0x7f0000000000)={0x14, 0x11, 0x2, {0x1, 0x4, 0x2}}, 0x14) ioctl(r1, 0x0, &(0x7f0000000080)="b874fd2a72c703df083fc58292db42de94975715ca8e00a2eb41867b0207387d57ddd6bb2e1d031dcadb60cb0422ccbc1e0276261568dacbc020e25258f910d96035515c072f934f5d1f3a3b075bbea91319286931dd29e836e1ef59b1434df522a7ec712e5622432ea028c61c2f2159874c82c03efe086144edfb45ede5b66bb87180e01ca29bc9cec168df84f65fd3dc09a28822470439a2e3e1dac0cc08679b6363088da28193a958514ab6d866cd08083891ef659f827618956d73b46b3508eaf78c2bd56672761b8a") mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, &(0x7f0000000180)) 14:09:41 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) [ 475.757585][T19286] memory: usage 307200kB, limit 307200kB, failcnt 993 [ 475.776261][T19286] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 475.842741][T19286] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 14:09:42 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x48000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f00000001c0)={0x20, 0x1f, 0x0, {0x0, 0x1c9c380}, 0xfffffffffffffffe, 0x7fffffff}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r2, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) r4 = semget$private(0x0, 0x4, 0x40) semctl$SEM_INFO(r4, 0x7, 0x13, &(0x7f00000000c0)=""/52) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_G_INPUT(r3, 0x80045626, &(0x7f0000000080)) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) [ 475.883754][T19286] Memory cgroup stats for /syz4: cache:0KB rss:267144KB rss_huge:249856KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:267216KB inactive_file:0KB active_file:0KB unevictable:0KB [ 475.956864][T19286] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=19276,uid=0 [ 476.007453][T19286] Memory cgroup out of memory: Killed process 19276 (syz-executor.4) total-vm:72580kB, anon-rss:2212kB, file-rss:35668kB, shmem-rss:0kB 14:09:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r1) r3 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r2) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r3, &(0x7f0000000a40)=""/4096, 0x1000) r4 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x80080, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f0000000100)=0x400) 14:09:42 executing program 1: syz_open_dev$sndseq(0x0, 0x0, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) 14:09:42 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) 14:09:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6(0xa, 0x806, 0x9) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'syz_tun\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) splice(r2, 0x0, r4, 0x0, 0x200010005, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x5, 0xffffffffffffff81, 0x401, 0x5, 0x2, 0x3f, 0x40, {0x0, @in6={{0xa, 0x4e20, 0x8, @local, 0x100000000}}, 0x7ff, 0x10001, 0x7, 0xff}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000200)={r6, 0xfff000000000000}, &(0x7f0000000240)=0x8) 14:09:42 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000002000/0x3000)=nil, 0x3000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x2200) ioctl$SCSI_IOCTL_GET_PCI(r1, 0x5387, &(0x7f0000000200)) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x400000, 0x0) ioctl$KVM_DIRTY_TLB(r3, 0x4010aeaa, &(0x7f00000000c0)={0xfffffffffffffffd, 0xffffffff}) ioctl$UI_DEV_CREATE(r3, 0x5501) keyctl$restrict_keyring(0x1d, r2, 0x0, &(0x7f0000000300)='/dev/bus/usb/00#/00#\x00') ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f00000002c0)={'veth1_to_team\x00', {0x2, 0x4e21, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000180)) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:42 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) r0 = syz_open_dev$dmmidi(0x0, 0x0, 0x9000) accept4$nfc_llcp(r0, 0x0, &(0x7f0000000000), 0x80000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) 14:09:42 executing program 1: syz_open_dev$sndseq(0x0, 0x0, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) 14:09:42 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) 14:09:42 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) [ 476.294171][T19330] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 14:09:42 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x61, 0x2) r1 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x8001, 0x200) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet_udp(0x2, 0x2, 0x0) close(r6) r7 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r7, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r7, 0x80047437, &(0x7f0000000080)) getsockopt$bt_l2cap_L2CAP_OPTIONS(r5, 0x6, 0x1, &(0x7f0000000000), &(0x7f0000000100)=0xc) write$binfmt_misc(r5, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r4, 0x0, r6, 0x0, 0x200010005, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) [ 476.356103][T19330] CPU: 0 PID: 19330 Comm: syz-executor.4 Not tainted 5.0.0+ #23 [ 476.363765][T19330] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 476.373817][T19330] Call Trace: [ 476.373844][T19330] dump_stack+0x172/0x1f0 [ 476.373866][T19330] dump_header+0x10f/0xb6c [ 476.373891][T19330] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 476.391685][T19330] ? ___ratelimit+0x60/0x595 [ 476.391704][T19330] ? do_raw_spin_unlock+0x57/0x270 [ 476.391728][T19330] oom_kill_process.cold+0x10/0x15 [ 476.406516][T19330] out_of_memory+0x79a/0x1280 [ 476.411218][T19330] ? lock_downgrade+0x880/0x880 [ 476.416077][T19330] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 476.422333][T19330] ? oom_killer_disable+0x280/0x280 [ 476.427539][T19330] ? find_held_lock+0x35/0x130 [ 476.432325][T19330] mem_cgroup_out_of_memory+0x1ca/0x230 [ 476.437879][T19330] ? memcg_event_wake+0x230/0x230 [ 476.442923][T19330] ? do_raw_spin_unlock+0x57/0x270 [ 476.448048][T19330] ? _raw_spin_unlock+0x2d/0x50 [ 476.452915][T19330] try_charge+0x102c/0x15c0 [ 476.457439][T19330] ? find_held_lock+0x35/0x130 [ 476.462229][T19330] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 476.467781][T19330] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 476.473330][T19330] ? find_held_lock+0x35/0x130 [ 476.478105][T19330] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 476.483681][T19330] __memcg_kmem_charge_memcg+0x7c/0x130 [ 476.489247][T19330] ? memcg_kmem_put_cache+0xb0/0xb0 [ 476.494456][T19330] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 476.500031][T19330] __memcg_kmem_charge+0x136/0x300 [ 476.505158][T19330] __alloc_pages_nodemask+0x437/0x7e0 [ 476.510542][T19330] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 476.516277][T19330] ? copy_page_range+0x125a/0x1f90 [ 476.521399][T19330] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 476.527654][T19330] alloc_pages_current+0x107/0x210 [ 476.532779][T19330] pte_alloc_one+0x1b/0x1a0 [ 476.537290][T19330] __pte_alloc+0x20/0x310 [ 476.541645][T19330] copy_page_range+0x1529/0x1f90 [ 476.546611][T19330] ? find_held_lock+0x35/0x130 [ 476.551429][T19330] ? pmd_alloc+0x180/0x180 [ 476.555857][T19330] ? __rb_insert_augmented+0x231/0xdf0 [ 476.561318][T19330] ? validate_mm_rb+0xa3/0xc0 [ 476.566036][T19330] ? __vma_link_rb+0x279/0x370 [ 476.570813][T19330] copy_process.part.0+0x568b/0x7980 [ 476.576134][T19330] ? __cleanup_sighand+0x60/0x60 [ 476.581098][T19330] _do_fork+0x257/0xfd0 [ 476.585269][T19330] ? fork_idle+0x1d0/0x1d0 [ 476.589703][T19330] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 476.595172][T19330] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 476.600638][T19330] ? do_syscall_64+0x26/0x610 [ 476.605320][T19330] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 476.611389][T19330] ? do_syscall_64+0x26/0x610 [ 476.616081][T19330] __x64_sys_clone+0xbf/0x150 [ 476.620772][T19330] do_syscall_64+0x103/0x610 [ 476.625370][T19330] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 476.631264][T19330] RIP: 0033:0x458079 [ 476.635169][T19330] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 476.654780][T19330] RSP: 002b:00007f3505876c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 476.663284][T19330] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000458079 [ 476.671254][T19330] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 476.679270][T19330] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 476.687244][T19330] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f35058776d4 [ 476.695217][T19330] R13: 00000000004be379 R14: 00000000004cea80 R15: 00000000ffffffff 14:09:42 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(0x0, 0x202, 0x0) [ 476.704487][T19330] memory: usage 307200kB, limit 307200kB, failcnt 1018 [ 476.720749][T19330] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 476.737069][T19330] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 14:09:42 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) [ 476.751526][T19330] Memory cgroup stats for /syz4: cache:0KB rss:267192KB rss_huge:249856KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:267228KB inactive_file:0KB active_file:0KB unevictable:0KB [ 476.820127][T19330] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=19264,uid=0 [ 476.847054][T19330] Memory cgroup out of memory: Killed process 19264 (syz-executor.4) total-vm:72712kB, anon-rss:2224kB, file-rss:34816kB, shmem-rss:0kB [ 476.959071][T19361] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 [ 476.971718][T19361] CPU: 0 PID: 19361 Comm: syz-executor.4 Not tainted 5.0.0+ #23 [ 476.979358][T19361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 476.989416][T19361] Call Trace: [ 476.992720][T19361] dump_stack+0x172/0x1f0 [ 476.997078][T19361] dump_header+0x10f/0xb6c [ 477.001509][T19361] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 477.007322][T19361] ? ___ratelimit+0x60/0x595 [ 477.011921][T19361] ? do_raw_spin_unlock+0x57/0x270 [ 477.017053][T19361] oom_kill_process.cold+0x10/0x15 [ 477.022171][T19361] out_of_memory+0x79a/0x1280 [ 477.026855][T19361] ? lock_downgrade+0x880/0x880 [ 477.031714][T19361] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 477.037962][T19361] ? oom_killer_disable+0x280/0x280 [ 477.043182][T19361] ? find_held_lock+0x35/0x130 [ 477.047972][T19361] mem_cgroup_out_of_memory+0x1ca/0x230 [ 477.053574][T19361] ? memcg_event_wake+0x230/0x230 [ 477.058610][T19361] ? do_raw_spin_unlock+0x57/0x270 [ 477.063730][T19361] ? _raw_spin_unlock+0x2d/0x50 [ 477.068613][T19361] try_charge+0x102c/0x15c0 [ 477.073124][T19361] ? find_held_lock+0x35/0x130 [ 477.077904][T19361] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 477.083472][T19361] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 477.089037][T19361] ? find_held_lock+0x35/0x130 [ 477.093831][T19361] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 477.099392][T19361] __memcg_kmem_charge_memcg+0x7c/0x130 [ 477.104969][T19361] ? memcg_kmem_put_cache+0xb0/0xb0 [ 477.110199][T19361] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 477.115748][T19361] __memcg_kmem_charge+0x136/0x300 [ 477.120871][T19361] __alloc_pages_nodemask+0x437/0x7e0 [ 477.126273][T19361] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 477.132023][T19361] ? copy_page_range+0x125a/0x1f90 [ 477.137146][T19361] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 477.143401][T19361] alloc_pages_current+0x107/0x210 [ 477.148529][T19361] pte_alloc_one+0x1b/0x1a0 [ 477.153033][T19361] __pte_alloc+0x20/0x310 [ 477.157443][T19361] copy_page_range+0x1529/0x1f90 [ 477.162363][T19361] ? find_held_lock+0x35/0x130 [ 477.167118][T19361] ? pmd_alloc+0x180/0x180 [ 477.171517][T19361] ? __rb_insert_augmented+0x231/0xdf0 [ 477.176956][T19361] ? validate_mm_rb+0xa3/0xc0 [ 477.181620][T19361] ? __vma_link_rb+0x279/0x370 [ 477.186367][T19361] copy_process.part.0+0x568b/0x7980 [ 477.191645][T19361] ? __cleanup_sighand+0x60/0x60 [ 477.196573][T19361] _do_fork+0x257/0xfd0 [ 477.200711][T19361] ? fork_idle+0x1d0/0x1d0 [ 477.205126][T19361] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 477.210586][T19361] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 477.216053][T19361] ? do_syscall_64+0x26/0x610 [ 477.220733][T19361] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 477.226802][T19361] ? do_syscall_64+0x26/0x610 [ 477.231486][T19361] __x64_sys_clone+0xbf/0x150 [ 477.236194][T19361] do_syscall_64+0x103/0x610 [ 477.236213][T19361] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 477.236225][T19361] RIP: 0033:0x458079 [ 477.236260][T19361] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 477.270180][T19361] RSP: 002b:00007f3505855c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 477.278577][T19361] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000458079 [ 477.286533][T19361] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 477.294485][T19361] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 477.302462][T19361] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f35058566d4 [ 477.310429][T19361] R13: 00000000004be379 R14: 00000000004cea80 R15: 00000000ffffffff [ 477.319894][T19361] memory: usage 307196kB, limit 307200kB, failcnt 1027 [ 477.326953][T19361] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 477.334693][T19361] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 14:09:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r1) r3 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r2) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000080)={0x2cdf, 0x2, 0x8, 0xffff, 0x9, 0x10000}) keyctl$read(0xb, r3, &(0x7f0000000a40)=""/4096, 0x1000) 14:09:43 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(0x0, 0x202, 0x0) 14:09:43 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) [ 477.341590][T19361] Memory cgroup stats for /syz4: cache:0KB rss:267160KB rss_huge:249856KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:267192KB inactive_file:0KB active_file:0KB unevictable:0KB [ 477.363392][T19361] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=19327,uid=0 [ 477.378849][T19361] Memory cgroup out of memory: Killed process 19327 (syz-executor.4) total-vm:72712kB, anon-rss:2216kB, file-rss:35664kB, shmem-rss:0kB 14:09:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000080)) syslog(0xa, &(0x7f00000002c0)=""/215, 0xd7) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x8, @mcast1, 0x3f}, 0x1c) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:09:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$selinux_load(r2, &(0x7f0000000100)={0xf97cff8c, 0x8, 'SE Linux', "965a253092bb846867e82af2d1281545dc6369fefda6ac4f0bee9afd50b6e67f448815f1a29b985ba91847404d66fe543b390924a999539e918376172ec76bdc5d22ccdb7b056d573b6f78a70e895ec485d76e3beb2dbb1be393bb5ed8c5476f3afb3d4db55b39d8f083e7e07cf9647dc4083eb2c5770ff1de3e03fd5c05698aa3330ca41f89a099f66ae4f7fe217a5ede35724b20eeb4a8683274"}, 0xab) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:09:43 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x0, 0x101000) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r2, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:43 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(0x0, 0x202, 0x0) [ 477.509076][T19388] device lo entered promiscuous mode 14:09:43 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) [ 477.551270][T19386] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 [ 477.590678][T19386] CPU: 1 PID: 19386 Comm: syz-executor.4 Not tainted 5.0.0+ #23 [ 477.598325][T19386] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 477.608385][T19386] Call Trace: [ 477.611712][T19386] dump_stack+0x172/0x1f0 [ 477.616052][T19386] dump_header+0x10f/0xb6c [ 477.620473][T19386] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 477.626287][T19386] ? ___ratelimit+0x60/0x595 [ 477.630882][T19386] ? do_raw_spin_unlock+0x57/0x270 [ 477.636006][T19386] oom_kill_process.cold+0x10/0x15 [ 477.641136][T19386] out_of_memory+0x79a/0x1280 [ 477.645822][T19386] ? lock_downgrade+0x880/0x880 [ 477.650677][T19386] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 477.656921][T19386] ? oom_killer_disable+0x280/0x280 [ 477.662126][T19386] ? find_held_lock+0x35/0x130 [ 477.666908][T19386] mem_cgroup_out_of_memory+0x1ca/0x230 [ 477.672452][T19386] ? memcg_event_wake+0x230/0x230 [ 477.681834][T19386] ? do_raw_spin_unlock+0x57/0x270 [ 477.686951][T19386] ? _raw_spin_unlock+0x2d/0x50 [ 477.691819][T19386] try_charge+0x102c/0x15c0 [ 477.696320][T19386] ? find_held_lock+0x35/0x130 [ 477.701093][T19386] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 477.706641][T19386] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 477.712186][T19386] ? find_held_lock+0x35/0x130 [ 477.716954][T19386] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 477.722531][T19386] __memcg_kmem_charge_memcg+0x7c/0x130 [ 477.728092][T19386] ? memcg_kmem_put_cache+0xb0/0xb0 [ 477.733295][T19386] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 477.738843][T19386] __memcg_kmem_charge+0x136/0x300 [ 477.743966][T19386] __alloc_pages_nodemask+0x437/0x7e0 [ 477.749359][T19386] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 477.755097][T19386] ? copy_page_range+0x125a/0x1f90 [ 477.760212][T19386] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 477.766458][T19386] alloc_pages_current+0x107/0x210 [ 477.771580][T19386] pte_alloc_one+0x1b/0x1a0 [ 477.776089][T19386] __pte_alloc+0x20/0x310 [ 477.780428][T19386] copy_page_range+0x1529/0x1f90 [ 477.785365][T19386] ? find_held_lock+0x35/0x130 [ 477.790163][T19386] ? pmd_alloc+0x180/0x180 [ 477.794603][T19386] ? __rb_insert_augmented+0x231/0xdf0 [ 477.800086][T19386] ? validate_mm_rb+0xa3/0xc0 [ 477.804780][T19386] ? __vma_link_rb+0x279/0x370 [ 477.809587][T19386] copy_process.part.0+0x568b/0x7980 [ 477.814913][T19386] ? __cleanup_sighand+0x60/0x60 [ 477.819877][T19386] _do_fork+0x257/0xfd0 [ 477.824043][T19386] ? fork_idle+0x1d0/0x1d0 [ 477.828489][T19386] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 477.833967][T19386] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 477.839438][T19386] ? do_syscall_64+0x26/0x610 [ 477.844201][T19386] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 477.850263][T19386] ? do_syscall_64+0x26/0x610 [ 477.854955][T19386] __x64_sys_clone+0xbf/0x150 [ 477.859643][T19386] do_syscall_64+0x103/0x610 [ 477.864238][T19386] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 477.870125][T19386] RIP: 0033:0x458079 [ 477.874042][T19386] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 477.893652][T19386] RSP: 002b:00007f3505876c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 477.902072][T19386] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000458079 [ 477.910037][T19386] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 477.918009][T19386] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 477.925993][T19386] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f35058776d4 [ 477.933962][T19386] R13: 00000000004be379 R14: 00000000004cea80 R15: 00000000ffffffff 14:09:44 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) 14:09:44 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) 14:09:44 executing program 5: pipe2(&(0x7f0000000280), 0x84800) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0x200003, 0x0) syz_open_dev$midi(&(0x7f0000000300)='/dev/midi#\x00', 0x101, 0x181040) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0xa00, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r2, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000080)={0x0, 0x1, 0x30}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f00000001c0)=ANY=[@ANYRES32=r4, @ANYBLOB="54000000027e4da7ea434a5099152b43257e1df94e78abf12739aeff45df8d731f878ae49bfeb7425f23bee0ac56bce434e46b79c18e418a87f1b85a16e069e8f5ac4bd394bcd425b39637a995d013169be328219445ec73"], &(0x7f0000000140)=0x5c) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r3, 0x80045301, &(0x7f0000000240)) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:44 executing program 1: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) [ 478.323046][T19386] memory: usage 307200kB, limit 307200kB, failcnt 1050 [ 478.337292][T19386] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 478.378114][T19386] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 478.392097][T19386] Memory cgroup stats for /syz4: cache:0KB rss:267244KB rss_huge:249856KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:267220KB inactive_file:0KB active_file:4KB unevictable:0KB [ 478.416797][T19386] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=14053,uid=0 [ 478.440080][T19386] Memory cgroup out of memory: Killed process 14053 (syz-executor.4) total-vm:72448kB, anon-rss:2208kB, file-rss:34816kB, shmem-rss:0kB [ 478.550078][T19424] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 478.560556][T19424] CPU: 0 PID: 19424 Comm: syz-executor.4 Not tainted 5.0.0+ #23 [ 478.568179][T19424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 478.578240][T19424] Call Trace: [ 478.581521][T19424] dump_stack+0x172/0x1f0 [ 478.585833][T19424] dump_header+0x10f/0xb6c [ 478.590234][T19424] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 478.596020][T19424] ? ___ratelimit+0x60/0x595 [ 478.600596][T19424] ? do_raw_spin_unlock+0x57/0x270 [ 478.605688][T19424] oom_kill_process.cold+0x10/0x15 [ 478.610778][T19424] out_of_memory+0x79a/0x1280 [ 478.615434][T19424] ? lock_downgrade+0x880/0x880 [ 478.620274][T19424] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 478.626497][T19424] ? oom_killer_disable+0x280/0x280 [ 478.631848][T19424] ? find_held_lock+0x35/0x130 [ 478.636597][T19424] mem_cgroup_out_of_memory+0x1ca/0x230 [ 478.642132][T19424] ? memcg_event_wake+0x230/0x230 [ 478.647163][T19424] ? do_raw_spin_unlock+0x57/0x270 [ 478.652255][T19424] ? _raw_spin_unlock+0x2d/0x50 [ 478.657088][T19424] try_charge+0x102c/0x15c0 [ 478.661570][T19424] ? find_held_lock+0x35/0x130 [ 478.666320][T19424] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 478.671844][T19424] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 478.678085][T19424] ? kasan_check_read+0x11/0x20 [ 478.682929][T19424] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 478.688460][T19424] mem_cgroup_try_charge+0x24d/0x5e0 [ 478.693742][T19424] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 478.699376][T19424] wp_page_copy+0x408/0x1740 [ 478.703944][T19424] ? find_held_lock+0x35/0x130 [ 478.708700][T19424] ? pmd_pfn+0x1d0/0x1d0 [ 478.712931][T19424] ? lock_downgrade+0x880/0x880 [ 478.717762][T19424] ? swp_swapcount+0x540/0x540 [ 478.722512][T19424] ? kasan_check_read+0x11/0x20 [ 478.727345][T19424] ? do_raw_spin_unlock+0x57/0x270 [ 478.732446][T19424] do_wp_page+0x5d8/0x16c0 [ 478.736869][T19424] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 478.742239][T19424] __handle_mm_fault+0x22e8/0x3ec0 [ 478.747333][T19424] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 478.752857][T19424] ? find_held_lock+0x35/0x130 [ 478.757661][T19424] ? handle_mm_fault+0x322/0xb30 [ 478.762595][T19424] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 478.768820][T19424] ? kasan_check_read+0x11/0x20 [ 478.773681][T19424] handle_mm_fault+0x43f/0xb30 [ 478.778444][T19424] __do_page_fault+0x5ef/0xda0 [ 478.783198][T19424] do_page_fault+0x71/0x581 [ 478.787685][T19424] ? page_fault+0x8/0x30 [ 478.791918][T19424] page_fault+0x1e/0x30 [ 478.796069][T19424] RIP: 0033:0x4049f0 [ 478.799962][T19424] Code: 8d 5d 08 4c 8d 65 0c eb 18 90 45 31 c0 31 c9 ba 80 00 00 00 48 89 de bf ca 00 00 00 e8 79 36 05 00 8b 03 85 c0 74 e3 48 89 ef 45 08 00 00 00 00 e8 64 fb ff ff 4c 89 e7 e8 ec e3 ff ff eb e1 [ 478.819584][T19424] RSP: 002b:00007f3505855d00 EFLAGS: 00010202 [ 478.825656][T19424] RAX: 0000000000000001 RBX: 000000000073bfa8 RCX: 0000000000458079 [ 478.833607][T19424] RDX: 00000000004bdeea RSI: 0000000000000081 RDI: 000000000073bfa0 [ 478.841556][T19424] RBP: 000000000073bfa0 R08: 000000000000000d R09: 0000000000000000 [ 478.849826][T19424] R10: ffffffffffffffff R11: 0000000000000246 R12: 000000000073bfac [ 478.857778][T19424] R13: 00007ffe1c83f77f R14: 00007f35058569c0 R15: 000000000073bfac [ 478.868794][T19424] memory: usage 307200kB, limit 307200kB, failcnt 1094 [ 478.875857][T19424] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 478.883425][T19424] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 478.890271][T19424] Memory cgroup stats for /syz4: cache:0KB rss:267128KB rss_huge:249856KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:267220KB inactive_file:0KB active_file:0KB unevictable:0KB [ 478.911721][T19424] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=19383,uid=0 [ 478.927833][T19424] Memory cgroup out of memory: Killed process 19383 (syz-executor.4) total-vm:72580kB, anon-rss:2216kB, file-rss:35660kB, shmem-rss:0kB 14:09:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r1) r3 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r2) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x203, 0x0) setsockopt$bt_BT_VOICE(r4, 0x112, 0xb, &(0x7f0000000100)=0x63, 0x2) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r3, &(0x7f0000000a40)=""/4096, 0x100000192) 14:09:45 executing program 1: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) 14:09:45 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) 14:09:45 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x600100, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) write$sndseq(r2, &(0x7f00000001c0)=[{0x9, 0x7, 0x0, 0x2, @tick, {0x8000, 0x90ca}, {0x3, 0x3}, @addr={0x488e, 0x7}}, {0x6824, 0xce, 0x7, 0x1ff, @time={0x0, 0x1c9c380}, {0x1, 0x5}, {0xd86b, 0xed4}, @connect={{0x3, 0x6}, {0x20, 0x7ff}}}, {0x1, 0x8, 0x3, 0xfffffffffffffffe, @time={0x0, 0x1c9c380}, {0x7, 0x5}, {0x10001, 0x2}, @result={0xe48, 0x10000}}, {0x9, 0x1000, 0x847c, 0x200020000000, @time={0x77359400}, {0x5, 0xff}, {0x1, 0x101}, @result={0x20, 0x5}}, {0x1, 0x3, 0x8000, 0x1fd2, @tick=0x10000, {0x1, 0x80000001}, {0x0, 0x2}, @time=@tick=0x3ff}, {0x47b9, 0x5, 0x4, 0xa58, @tick=0x8000, {0x81, 0x4}, {0x80000000, 0x9}, @raw8={"5b47d5e77aebaf7094bea2bb"}}], 0x120) 14:09:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$selinux_load(r2, &(0x7f0000000100)={0xf97cff8c, 0x8, 'SE Linux', "965a253092bb846867e82af2d1281545dc6369fefda6ac4f0bee9afd50b6e67f448815f1a29b985ba91847404d66fe543b390924a999539e918376172ec76bdc5d22ccdb7b056d573b6f78a70e895ec485d76e3beb2dbb1be393bb5ed8c5476f3afb3d4db55b39d8f083e7e07cf9647dc4083eb2c5770ff1de3e03fd5c05698aa3330ca41f89a099f66ae4f7fe217a5ede35724b20eeb4a8683274"}, 0xab) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:09:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) [ 478.942955][ T1042] oom_reaper: reaped process 19383 (syz-executor.4), now anon-rss:0kB, file-rss:34836kB, shmem-rss:0kB [ 478.955224][T19427] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 [ 478.999133][T19427] CPU: 0 PID: 19427 Comm: syz-executor.4 Not tainted 5.0.0+ #23 [ 479.006788][T19427] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 479.016842][T19427] Call Trace: [ 479.020151][T19427] dump_stack+0x172/0x1f0 [ 479.024481][T19427] dump_header+0x10f/0xb6c [ 479.028900][T19427] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 479.034715][T19427] ? ___ratelimit+0x60/0x595 [ 479.039307][T19427] ? do_raw_spin_unlock+0x57/0x270 [ 479.044405][T19427] oom_kill_process.cold+0x10/0x15 [ 479.049506][T19427] out_of_memory+0x79a/0x1280 [ 479.054176][T19427] ? oom_killer_disable+0x280/0x280 [ 479.059352][T19427] ? find_held_lock+0x35/0x130 [ 479.064117][T19427] mem_cgroup_out_of_memory+0x1ca/0x230 [ 479.069675][T19427] ? memcg_event_wake+0x230/0x230 [ 479.074730][T19427] ? do_raw_spin_unlock+0x57/0x270 [ 479.079862][T19427] ? _raw_spin_unlock+0x2d/0x50 [ 479.084730][T19427] try_charge+0xa87/0x15c0 [ 479.089155][T19427] ? find_held_lock+0x35/0x130 [ 479.093964][T19427] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 479.099532][T19427] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 479.105140][T19427] ? find_held_lock+0x35/0x130 [ 479.109913][T19427] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 479.115479][T19427] __memcg_kmem_charge_memcg+0x7c/0x130 [ 479.121078][T19427] ? memcg_kmem_put_cache+0xb0/0xb0 [ 479.126295][T19427] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 479.131863][T19427] __memcg_kmem_charge+0x136/0x300 [ 479.137026][T19427] __alloc_pages_nodemask+0x437/0x7e0 [ 479.142430][T19427] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 479.148205][T19427] ? is_dynamic_key+0x1c0/0x1c0 [ 479.153068][T19427] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 479.159325][T19427] alloc_pages_current+0x107/0x210 [ 479.164461][T19427] pte_alloc_one+0x1b/0x1a0 [ 479.169002][T19427] __handle_mm_fault+0x3491/0x3ec0 [ 479.174137][T19427] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 479.179693][T19427] ? find_held_lock+0x35/0x130 [ 479.184471][T19427] ? handle_mm_fault+0x322/0xb30 [ 479.189436][T19427] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 479.195695][T19427] ? kasan_check_read+0x11/0x20 [ 479.200563][T19427] handle_mm_fault+0x43f/0xb30 [ 479.205350][T19427] __do_page_fault+0x5ef/0xda0 [ 479.210134][T19427] do_page_fault+0x71/0x581 [ 479.214651][T19427] ? page_fault+0x8/0x30 [ 479.218929][T19427] page_fault+0x1e/0x30 [ 479.223093][T19427] RIP: 0033:0x458079 [ 479.227020][T19427] Code: Bad RIP value. [ 479.231105][T19427] RSP: 002b:00007f3505876c78 EFLAGS: 00010246 [ 479.237179][T19427] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000458079 14:09:45 executing program 1: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) [ 479.245155][T19427] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 479.253130][T19427] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 479.261106][T19427] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f35058776d4 [ 479.269083][T19427] R13: 00000000004be379 R14: 00000000004cea80 R15: 00000000ffffffff [ 479.281976][T19427] memory: usage 307100kB, limit 307200kB, failcnt 1098 14:09:45 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) 14:09:45 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) r2 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x1000, 0x101000) setsockopt$bt_hci_HCI_DATA_DIR(r2, 0x0, 0x1, &(0x7f00000000c0)=0x5, 0x4) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000140)) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) [ 479.377232][T19427] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 479.464595][T19427] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 14:09:45 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) [ 479.503463][T19427] Memory cgroup stats for /syz4: cache:0KB rss:267260KB rss_huge:249856KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:267272KB inactive_file:0KB active_file:4KB unevictable:0KB 14:09:45 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(0x0, 0x202, 0x0) [ 479.584332][T19427] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=19427,uid=0 [ 479.629824][T19427] Memory cgroup out of memory: Killed process 19427 (syz-executor.4) total-vm:72580kB, anon-rss:2216kB, file-rss:34816kB, shmem-rss:0kB 14:09:45 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x111000, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, r3, 0x1, 0x70bd27, 0x25dfdbff, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x1, 0x9, @l2={'eth', 0x3a, 'team0\x00'}}}}, ["", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x24000000}, 0x4040000) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) [ 479.714191][ T1042] oom_reaper: reaped process 19427 (syz-executor.4), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB 14:09:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r1) r3 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r2) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r3, &(0x7f0000000a40)=""/4096, 0x1000) 14:09:46 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) 14:09:46 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) 14:09:46 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f00000001c0)={0x0, 0x6, 0x9, 0x0, 0x0, [{r0, 0x0, 0x80000000}, {r0, 0x0, 0x1}, {r0, 0x0, 0x6}, {r0, 0x0, 0x1}, {r0, 0x0, 0xffff}, {r0}, {r0, 0x0, 0x7}, {r0, 0x0, 0x3f}, {r0, 0x0, 0x9}]}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r2, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$selinux_load(r2, &(0x7f0000000100)={0xf97cff8c, 0x8, 'SE Linux', "965a253092bb846867e82af2d1281545dc6369fefda6ac4f0bee9afd50b6e67f448815f1a29b985ba91847404d66fe543b390924a999539e918376172ec76bdc5d22ccdb7b056d573b6f78a70e895ec485d76e3beb2dbb1be393bb5ed8c5476f3afb3d4db55b39d8f083e7e07cf9647dc4083eb2c5770ff1de3e03fd5c05698aa3330ca41f89a099f66ae4f7fe217a5ede35724b20eeb4a8683274"}, 0xab) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:09:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$pppoe(0x18, 0x1, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000140)=@sack_info={0x0, 0xffffffff, 0x80000000}, &(0x7f0000000180)=0xc) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000200)={r6, 0x82}, &(0x7f0000000240)=0x8) connect$pppoe(r5, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000080)) ioctl$DRM_IOCTL_AGP_INFO(r2, 0x80386433, &(0x7f0000000000)=""/11) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:09:46 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) 14:09:46 executing program 0: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000002000/0x3000)=nil, 0x3000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x2200) ioctl$SCSI_IOCTL_GET_PCI(r1, 0x5387, &(0x7f0000000200)) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x400000, 0x0) ioctl$KVM_DIRTY_TLB(r3, 0x4010aeaa, &(0x7f00000000c0)={0xfffffffffffffffd, 0xffffffff}) ioctl$UI_DEV_CREATE(r3, 0x5501) keyctl$restrict_keyring(0x1d, r2, 0x0, &(0x7f0000000300)='/dev/bus/usb/00#/00#\x00') ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f00000002c0)={'veth1_to_team\x00', {0x2, 0x4e21, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000180)) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:46 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$UI_SET_PHYS(r2, 0x4008556c, &(0x7f0000000080)='syz1\x00') 14:09:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, r1) r3 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x3, 0x2) r4 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000100)='keyring\x00', 0xffffffffffffffff}, 0x30) ptrace$pokeuser(0x6, r5, 0x6, 0x8) clone(0x0, 0x0, 0x0, 0x0, 0x0) accept4$x25(r3, &(0x7f0000000240)={0x9, @remote}, &(0x7f0000000280)=0x12, 0x80800) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000300)=0x2) keyctl$read(0xb, r4, &(0x7f0000000a40)=""/4096, 0x1000) 14:09:46 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) 14:09:46 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(0x0, 0x202, 0x0) 14:09:46 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(0x0, 0x202, 0x0) 14:09:46 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(0x0, 0x202, 0x0) 14:09:46 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) 14:09:47 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) 14:09:47 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) 14:09:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f0000000000)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'nr0\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:09:47 executing program 1: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2, 0x220011, r0, 0x0) socket$isdn(0x22, 0x3, 0x23) 14:09:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$selinux_load(r2, &(0x7f0000000100)={0xf97cff8c, 0x8, 'SE Linux', "965a253092bb846867e82af2d1281545dc6369fefda6ac4f0bee9afd50b6e67f448815f1a29b985ba91847404d66fe543b390924a999539e918376172ec76bdc5d22ccdb7b056d573b6f78a70e895ec485d76e3beb2dbb1be393bb5ed8c5476f3afb3d4db55b39d8f083e7e07cf9647dc4083eb2c5770ff1de3e03fd5c05698aa3330ca41f89a099f66ae4f7fe217a5ede35724b20eeb4a8683274"}, 0xab) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0x0) 14:09:47 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r2, 0x0, &(0x7f0000000180)='vboxnet0\x00') sendto$llc(r0, &(0x7f00000001c0)="16788d2163bc1e90e3b0a44bddd7acc4eb1bae3663e2da167a0afacda4e9f05f1fdb60982c4a598d2b82e0ab3523d79f8f87eeade90eb046bde0f6bc590569ea111b484ae5ae38ab9c0a950dbdaf40c70a571261689dc5c7589456d4325a3068944f37d24c5626649603f1ee8943b622645b45cd1a69584715d6b997cc8524308bc2c75c22", 0x85, 0x40, &(0x7f0000000080)={0x1a, 0x114, 0xd2, 0x5, 0x7, 0x8, @local}, 0x10) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:47 executing program 0: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000002000/0x3000)=nil, 0x3000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x2200) ioctl$SCSI_IOCTL_GET_PCI(r1, 0x5387, &(0x7f0000000200)) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x400000, 0x0) ioctl$KVM_DIRTY_TLB(r3, 0x4010aeaa, &(0x7f00000000c0)={0xfffffffffffffffd, 0xffffffff}) ioctl$UI_DEV_CREATE(r3, 0x5501) keyctl$restrict_keyring(0x1d, r2, 0x0, &(0x7f0000000300)='/dev/bus/usb/00#/00#\x00') ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f00000002c0)={'veth1_to_team\x00', {0x2, 0x4e21, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000180)) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r1) r3 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r2) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r4, 0x80e85411, &(0x7f0000000300)=""/138) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r3, &(0x7f0000000a40)=""/4096, 0x1000) socket$pptp(0x18, 0x1, 0x2) 14:09:47 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x482840, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000080)=0x8, 0x4) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x200000, 0x0) setsockopt$TIPC_MCAST_BROADCAST(r2, 0x10f, 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r4, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) r5 = perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r2, &(0x7f0000000580)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x12000008}, 0xc, &(0x7f0000000540)={&(0x7f0000000300)={0x238, r6, 0xe4452b93f974def2, 0x70bd2b, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x3c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x100}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0x58, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffff8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8}]}]}, @TIPC_NLA_BEARER={0x30, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1e}}}, {0x14, 0x2, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1f}}}}}]}, @TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}]}]}, @TIPC_NLA_BEARER={0x6c, 0x1, [@TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'syzkaller0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6807}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x593}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_LINK={0xdc, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xb6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fffffff}]}]}]}, 0x238}, 0x1, 0x0, 0x0, 0x4000}, 0x200408c1) accept$packet(r5, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) 14:09:47 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f00000001c0)='/dev/bus/usb/00#/00#\x00') keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) r2 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x30aa166a, 0x100) bind$rds(r2, &(0x7f00000000c0)={0x2, 0x4e24, @multicast2}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f0000000080)={0x2, 0x7}) 14:09:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0xe400, 0x1) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r1) r3 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r2) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r3, &(0x7f0000000a40)=""/4096, 0x1000) 14:09:47 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000080)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) ioctl$IMADDTIMER(r1, 0x80044940, &(0x7f0000000000)=0xf4254) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f00000001c0)) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$LOOP_GET_STATUS64(r2, 0x4c05, &(0x7f0000000440)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r2, 0xc08c5335, &(0x7f00000002c0)={0x6f8, 0x4, 0x3f, 'queue1\x00', 0x2}) 14:09:47 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001400)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000001440)='/dev/rfkill\x00', 0x40000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000001600)='/dev/autofs\x00', 0x200, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000014c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, 0x0) r1 = add_key(&(0x7f00000000c0)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="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", 0x1000, 0xfffffffffffffff8) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f00000011c0)={r1, 0x8001, 0x19800}, 0x0, &(0x7f0000001200)="4acff51aa455607685b45352eef0c8283c6cc660ad90ac91a34e13", &(0x7f0000001240)="afcb231eceb4025094c180d990f9a506f934698e9a0c4286194816713f3d2f79e7cd05374aba450758e6b059caa31dcaed8f731b7aa6a45d1430e6cbe6ddbe2ddfb90698b6398e1bf141260bce41eda20ce52fd06b86547af9feee1a1f2f5f9bbef8664b7242d3e3c522e39020de29e931a41a5f803811e1fe35d5903cf68a7c84c6219b5022313845ea60b6e332565193193fb9bd") getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x40000, @loopback}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r4, 0x40a85323, &(0x7f0000001340)={{0x8, 0x4}, 'port0\x00', 0x6, 0x100000, 0x100000000, 0x9, 0x0, 0xfffffffffffffc01, 0xffffffff, 0x0, 0x6, 0x1000}) write$USERIO_CMD_REGISTER(r4, &(0x7f0000001300)={0x0, 0x2}, 0x2) setsockopt$inet_tcp_int(r4, 0x6, 0x1d, &(0x7f0000000080)=0x200, 0x4) 14:09:47 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter6\x00') getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r2, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) [ 481.868378][T19583] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 481.934637][T19583] CPU: 1 PID: 19583 Comm: syz-executor.4 Not tainted 5.0.0+ #23 [ 481.942514][T19583] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 481.952662][T19583] Call Trace: [ 481.955975][T19583] dump_stack+0x172/0x1f0 [ 481.960340][T19583] dump_header+0x10f/0xb6c [ 481.964772][T19583] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 481.970613][T19583] ? ___ratelimit+0x60/0x595 [ 481.975209][T19583] ? do_raw_spin_unlock+0x57/0x270 [ 481.980329][T19583] oom_kill_process.cold+0x10/0x15 [ 481.985452][T19583] out_of_memory+0x79a/0x1280 [ 481.990148][T19583] ? lock_downgrade+0x880/0x880 [ 481.995049][T19583] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 482.001310][T19583] ? oom_killer_disable+0x280/0x280 [ 482.006516][T19583] ? find_held_lock+0x35/0x130 [ 482.011299][T19583] mem_cgroup_out_of_memory+0x1ca/0x230 [ 482.016851][T19583] ? memcg_event_wake+0x230/0x230 [ 482.021892][T19583] ? do_raw_spin_unlock+0x57/0x270 [ 482.027028][T19583] ? _raw_spin_unlock+0x2d/0x50 [ 482.031890][T19583] try_charge+0x102c/0x15c0 [ 482.036398][T19583] ? find_held_lock+0x35/0x130 [ 482.041180][T19583] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 482.046733][T19583] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 482.052283][T19583] ? find_held_lock+0x35/0x130 [ 482.057053][T19583] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 482.062625][T19583] __memcg_kmem_charge_memcg+0x7c/0x130 [ 482.068204][T19583] ? memcg_kmem_put_cache+0xb0/0xb0 [ 482.073433][T19583] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 482.078990][T19583] __memcg_kmem_charge+0x136/0x300 [ 482.084137][T19583] __alloc_pages_nodemask+0x437/0x7e0 [ 482.089525][T19583] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 482.095779][T19583] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 482.101514][T19583] ? copy_process.part.0+0x1d08/0x7980 [ 482.106993][T19583] ? lockdep_hardirqs_on+0x418/0x5d0 [ 482.112289][T19583] ? trace_hardirqs_on+0x67/0x230 [ 482.117323][T19583] ? kasan_check_read+0x11/0x20 [ 482.122185][T19583] copy_process.part.0+0x3e0/0x7980 [ 482.127396][T19583] ? __lock_acquire+0x548/0x3fb0 [ 482.132340][T19583] ? save_stack+0x45/0xd0 [ 482.136673][T19583] ? __kasan_slab_free+0x102/0x150 [ 482.141807][T19583] ? __might_fault+0x12b/0x1e0 [ 482.146592][T19583] ? __cleanup_sighand+0x60/0x60 [ 482.151541][T19583] ? lock_downgrade+0x880/0x880 [ 482.156417][T19583] _do_fork+0x257/0xfd0 [ 482.160588][T19583] ? fork_idle+0x1d0/0x1d0 [ 482.165111][T19583] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 482.170574][T19583] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 482.176044][T19583] ? do_syscall_64+0x26/0x610 [ 482.180728][T19583] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 482.186800][T19583] ? do_syscall_64+0x26/0x610 [ 482.191489][T19583] __x64_sys_clone+0xbf/0x150 [ 482.196184][T19583] do_syscall_64+0x103/0x610 [ 482.200778][T19583] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 482.206678][T19583] RIP: 0033:0x458079 [ 482.210583][T19583] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 482.230358][T19583] RSP: 002b:00007f3505834c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 482.238776][T19583] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000458079 [ 482.246752][T19583] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 482.254751][T19583] RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 [ 482.262724][T19583] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f35058356d4 [ 482.270693][T19583] R13: 00000000004be379 R14: 00000000004cea80 R15: 00000000ffffffff [ 482.314056][T19583] memory: usage 307120kB, limit 307200kB, failcnt 1158 [ 482.336124][T19583] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 482.362325][T19583] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 482.375460][T19583] Memory cgroup stats for /syz4: cache:0KB rss:265804KB rss_huge:247808KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:266008KB inactive_file:0KB active_file:0KB unevictable:0KB [ 482.403802][T19583] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=14080,uid=0 [ 482.427289][T19583] Memory cgroup out of memory: Killed process 14080 (syz-executor.4) total-vm:72448kB, anon-rss:2208kB, file-rss:34816kB, shmem-rss:0kB 14:09:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(r3, 0x9) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) io_setup(0xfffffffffffff800, &(0x7f0000000100)=0x0) io_submit(r5, 0x1, &(0x7f0000000180)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x3, 0x0, r1, &(0x7f00000002c0)="b5f961b6e188be4c0e22b9cca19ee85215a02b42de16c9270bc0c5a1a50fd889b78ae5ac24ee53a2e542021cb441694b50f7274c8c65c9d07a0d37818721c573501dbe6841d76b3a1139fc990d495b1c54edda2196f912080b5c6d3bf302a9cae9d43b3f7f67decf028c54382bf6009ed01eaa4e2a677d809f8d45aedeac6adfea0b7a5bc12c49c5c0a01b2100b5ff27ef", 0x91, 0x1, 0x0, 0x2, r2}]) r6 = socket$pppoe(0x18, 0x1, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r2, 0x4010ae74, &(0x7f0000000200)={0x0, 0x9, 0x2}) connect$pppoe(r6, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r6, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000000)) 14:09:48 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000080)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) ioctl$IMADDTIMER(r1, 0x80044940, &(0x7f0000000000)=0xf4254) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f00000001c0)) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$LOOP_GET_STATUS64(r2, 0x4c05, &(0x7f0000000440)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r2, 0xc08c5335, &(0x7f00000002c0)={0x6f8, 0x4, 0x3f, 'queue1\x00', 0x2}) 14:09:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff}) write$selinux_load(r2, &(0x7f0000000100)={0xf97cff8c, 0x8, 'SE Linux', "965a253092bb846867e82af2d1281545dc6369fefda6ac4f0bee9afd50b6e67f448815f1a29b985ba91847404d66fe543b390924a999539e918376172ec76bdc5d22ccdb7b056d573b6f78a70e895ec485d76e3beb2dbb1be393bb5ed8c5476f3afb3d4db55b39d8f083e7e07cf9647dc4083eb2c5770ff1de3e03fd5c05698aa3330ca41f89a099f66ae4f7fe217a5ede35724b20eeb4a8683274"}, 0xab) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r4, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r4, 0x80047437, &(0x7f0000000080)) splice(r2, 0x0, r3, 0x0, 0x200010005, 0x0) 14:09:48 executing program 0: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x1) r0 = request_key(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000180)='posix_acl_accessselinux\x00', 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) 14:09:48 executing program 4: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x10000, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000240)={0x1, 0x1}, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r2) r4 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r3) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x2840, 0x0) getpeername$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000140)=0x1c) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r4, &(0x7f0000000a40)=""/4096, 0x1000) 14:09:48 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) add_key(&(0x7f0000000340)='.dead\x00', &(0x7f0000000380)={'syz', 0x0}, &(0x7f00000003c0)="fdb42fa60d91", 0x6, 0xfffffffffffffff9) r1 = add_key(&(0x7f0000000400)='rxrpc_s\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000480)="037b943843c13a0738f39444fc53b1b2b1ff2b08efed16580103332ccf97f4245062ca8f7567f090875a25fe6eb78fc5d57eb4a6cbd25b08fb4a554282fcb61934aae77910163b106693bb7196cdfe674dd76828ccf101eb418669c3285f5d53ce629601b7385eb4a7", 0x69, 0x0) r2 = add_key$keyring(&(0x7f0000000300)='keyring\x00', 0x0, 0x0, 0x0, r1) keyctl$restrict_keyring(0x1d, r2, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm-control\x00', 0x80, 0x0) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, &(0x7f0000000500)) getpgrp(0xffffffffffffffff) r4 = getpid() perf_event_open(0x0, r4, 0x80000, 0xffffffffffffffff, 0x2000) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='fd/3\x00') setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f00000002c0)=[@sack_perm, @sack_perm, @sack_perm, @sack_perm, @mss={0x2, 0x6}, @sack_perm, @sack_perm], 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000080}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=@bridge_getlink={0x50, 0x12, 0x800, 0x70bd26, 0x25dfdbff, {0x7, 0x0, 0x0, r6, 0x2, 0x14}, [@IFLA_BROADCAST={0xc, 0x2, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, @IFLA_MAP={0x24, 0xe, {0x6, 0x3, 0x800, 0x3, 0x3, 0xe0c3}}]}, 0x50}, 0x1, 0x0, 0x0, 0x80}, 0x4004890) r7 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r7, 0x4040534e, 0x0) 14:09:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r1) r3 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r2) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) r5 = fcntl$getown(r0, 0x9) r6 = geteuid() r7 = getegid() r8 = getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000940)=0xe8) r10 = getgid() ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000009c0)=0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001a40)={{{@in6=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@initdev}}, &(0x7f0000000a00)=0xe8) r13 = gettid() getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000001b80)={{{@in=@multicast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xffffffffffffff28) lstat(&(0x7f0000001cc0)='./file0\x00', &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r4, &(0x7f0000001e00)=[{&(0x7f0000000100)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000000780)=[{&(0x7f0000000300)="ac8beb5bdcf2e660afec66d61ffefe1f8ff342d4aef02dcd0e047f3703674099e03262ba09b6d2ed5dba60c0b78a44daa9bebd6bcaf3fbf3a832516c198ce8c8750592ce65c0de23b61cb8e14979779c6f9ebcc8d2257ebda9f4c71af29634af1b852326a82f5b9c508557600459a6cf2bf580f50691f448055e4aa53a71fc3659940f6c01c364d2e5ae6660f5e4", 0x8e}, {&(0x7f00000001c0)}, {&(0x7f00000003c0)="034d46ee986490470715c0a78b4065d86183b8fb84b5c40f6e12d858ebd03b42c9e37a750ce36d1c89db11701213391d850746529507935a6e896b049317ab5780e9177bcf597ddb270227b85cd475ba5f48763b048fccd9cb56143bc4b7cb090389c27730ef80a1fd5580af20e7458b99254cb1bf2a988aa04dff811df5587f534ab559ae703d42f4822853791ae185e10295522f99612c2b1a228beb65b519a0d71a4d", 0xa4}, {&(0x7f0000000240)="c967510789685ecd66146f0b91a77877205c3fdb9ec63d7aac07700b8ed3d9a138dfc571dc54a2e6dfbc26fd221098d5a42fdef1e43c383b82656cc2fe77fbf4ba7f4a2ee01c086a68950c47363892dcee3c5383d83962d78c352eb207d2a17e66c77029b5bfa1d2c19f1436781609f5bb97e37c68e37258be", 0x79}, {&(0x7f0000000480)="b4fbba50d87f47e2aaa0a2c91f068ade9e0b868858dddbd9053ecd4c6a719e4365d29d50113a943ba42d57fe29449e560327f2817de8ee711afe02b04741aa58bf20e2c1d58d49b5", 0x48}, {&(0x7f0000000500)="2ba236dbfb5f89029674b0873bcd7a81d6fec917438497febbb7325722165de1edb9a2080a578155172e41343fa45dbdc5bd39fafbed3386a0374c1192d000074e5a055e0004908bc0fa3a7ad07d31e9d1913f", 0x53}, {&(0x7f0000000580)="6a3771530408ce882ab299579fedd0bb7a3ab0c137dde501d0967795cfe9f40b268fcfd80b6f77d2169ff24438385a1fb9d7bcab44c424d79fda73355c90ffef698afef67b241bf9ddcc303d4d145168248b82c7e03f0c98547b6aa4e71ed1df6ddd23e751cc9298ee079800edc3009939521a543125170d9f2197d0b0fbd3e4fd552cc2c9da1232994e394d2ed6", 0x8e}, {&(0x7f0000000640)="38fe46f5122074962afb02778a8cee67b8398992", 0x14}, {&(0x7f0000000680)="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", 0xfc}], 0x9, &(0x7f0000001d80)=[@cred={0x20, 0x1, 0x2, r5, r6, r7}, @cred={0x20, 0x1, 0x2, r8, r9, r10}, @cred={0x20, 0x1, 0x2, r11, r12}, @cred={0x20, 0x1, 0x2, r13, r14, r15}], 0x80, 0x4000}], 0x1, 0x40) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r3, &(0x7f0000000a40)=""/4096, 0x1000) 14:09:48 executing program 0: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x10000, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) syz_kvm_setup_cpu$x86(r2, r1, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text32={0x20, &(0x7f0000000080)="ea80a700002700b8f7ffff7f0f23d00f21f8350000000c0f23f866b87d008ee866ba410066b8000066efc4c1d8c2390d670fc79f9fbaf3dce4c4c17e6f6e01b9800000c00f3235000800000f30c4c139684c8600", 0x54}], 0x1, 0x50, &(0x7f00000001c0)=[@dstype3={0x7, 0xd}, @cstype3={0x5, 0x6}], 0x2) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x2000) 14:09:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") setxattr$security_smack_entry(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.SMACK64\x00', &(0x7f0000000180)='selinux\x00', 0x8, 0x2) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r1) r3 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r2) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r3, &(0x7f0000000a40)=""/4096, 0x1000) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000340)) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cachefiles\x00', 0x2242, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205648, &(0x7f0000000300)={0x0, 0x8, 0x8, [], &(0x7f0000000280)={0x990bff, 0x0, [], @p_u8=&(0x7f0000000240)=0x9}}) 14:09:49 executing program 5: syz_open_dev$mice(&(0x7f00000007c0)='/dev/input/mice\x00', 0x0, 0x305300) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dlm-control\x00', 0x8000, 0x0) syz_open_dev$vcsa(&(0x7f0000000840)='/dev/vcsa#\x00', 0x2, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x20000, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) r0 = syz_open_dev$vcsa(&(0x7f0000000940)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r2, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') recvmsg(r1, &(0x7f0000000140)={&(0x7f00000001c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000240)=""/119, 0x77}, {&(0x7f00000002c0)=""/207, 0xcf}, {&(0x7f00000003c0)=""/106, 0x6a}, {&(0x7f0000000440)=""/184, 0xb8}, {&(0x7f0000000500)=""/138, 0x8a}, {&(0x7f00000000c0)=""/22, 0x16}], 0x6, &(0x7f0000000640)=""/108, 0x6c}, 0x2000) sendmsg$IPVS_CMD_GET_DEST(r4, &(0x7f0000000780)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x24, r3, 0x400, 0x70bd29, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:49 executing program 0: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x8802, 0x0) r0 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x9, 0x63e33892b464815c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r2, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x4, 0x806, 0x1, 0x0, [0x0]}}, 0x29) 14:09:49 executing program 1: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) r0 = syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r0, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) [ 483.078105][T19623] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 [ 483.142899][T19623] CPU: 0 PID: 19623 Comm: syz-executor.4 Not tainted 5.0.0+ #23 [ 483.150587][T19623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 483.160657][T19623] Call Trace: [ 483.163950][T19623] dump_stack+0x172/0x1f0 [ 483.168281][T19623] dump_header+0x10f/0xb6c [ 483.172712][T19623] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 483.178575][T19623] ? ___ratelimit+0x60/0x595 [ 483.183191][T19623] ? do_raw_spin_unlock+0x57/0x270 [ 483.188316][T19623] oom_kill_process.cold+0x10/0x15 [ 483.193439][T19623] out_of_memory+0x79a/0x1280 [ 483.198214][T19623] ? lock_downgrade+0x880/0x880 [ 483.203086][T19623] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 483.209335][T19623] ? oom_killer_disable+0x280/0x280 [ 483.214540][T19623] ? find_held_lock+0x35/0x130 [ 483.219321][T19623] mem_cgroup_out_of_memory+0x1ca/0x230 [ 483.224878][T19623] ? memcg_event_wake+0x230/0x230 [ 483.229915][T19623] ? do_raw_spin_unlock+0x57/0x270 [ 483.235041][T19623] ? _raw_spin_unlock+0x2d/0x50 [ 483.239905][T19623] try_charge+0x102c/0x15c0 [ 483.244407][T19623] ? find_held_lock+0x35/0x130 [ 483.249182][T19623] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 483.254733][T19623] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 483.260282][T19623] ? find_held_lock+0x35/0x130 [ 483.265229][T19623] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 483.270795][T19623] __memcg_kmem_charge_memcg+0x7c/0x130 [ 483.276349][T19623] ? memcg_kmem_put_cache+0xb0/0xb0 [ 483.281555][T19623] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 483.281576][T19623] __memcg_kmem_charge+0x136/0x300 [ 483.281598][T19623] __alloc_pages_nodemask+0x437/0x7e0 [ 483.281618][T19623] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 483.281656][T19623] ? copy_page_range+0x125a/0x1f90 [ 483.303351][T19623] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 483.303373][T19623] alloc_pages_current+0x107/0x210 [ 483.303395][T19623] pte_alloc_one+0x1b/0x1a0 [ 483.303413][T19623] __pte_alloc+0x20/0x310 [ 483.303445][T19623] copy_page_range+0x1529/0x1f90 [ 483.303469][T19623] ? find_held_lock+0x35/0x130 [ 483.303507][T19623] ? pmd_alloc+0x180/0x180 [ 483.342796][T19623] ? __rb_insert_augmented+0x231/0xdf0 [ 483.348266][T19623] ? validate_mm_rb+0xa3/0xc0 [ 483.352949][T19623] ? __vma_link_rb+0x279/0x370 [ 483.357739][T19623] copy_process.part.0+0x568b/0x7980 [ 483.363111][T19623] ? __cleanup_sighand+0x60/0x60 [ 483.368088][T19623] _do_fork+0x257/0xfd0 [ 483.372270][T19623] ? fork_idle+0x1d0/0x1d0 [ 483.376706][T19623] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 483.382185][T19623] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 483.387654][T19623] ? do_syscall_64+0x26/0x610 [ 483.392348][T19623] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 483.398417][T19623] ? do_syscall_64+0x26/0x610 [ 483.403117][T19623] __x64_sys_clone+0xbf/0x150 [ 483.407811][T19623] do_syscall_64+0x103/0x610 [ 483.412409][T19623] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 483.418306][T19623] RIP: 0033:0x458079 [ 483.422206][T19623] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 483.441811][T19623] RSP: 002b:00007f3505876c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 483.450224][T19623] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000458079 [ 483.458198][T19623] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 483.466170][T19623] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 483.466179][T19623] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f35058776d4 [ 483.466189][T19623] R13: 00000000004be379 R14: 00000000004cea80 R15: 00000000ffffffff [ 483.585618][T19623] memory: usage 307196kB, limit 307200kB, failcnt 1191 [ 483.593114][T19623] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 483.600770][T19623] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 483.608253][T19623] Memory cgroup stats for /syz4: cache:0KB rss:265876KB rss_huge:247808KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:266004KB inactive_file:0KB active_file:4KB unevictable:0KB [ 483.629949][T19623] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=14108,uid=0 [ 483.645761][T19623] Memory cgroup out of memory: Killed process 14108 (syz-executor.4) total-vm:72448kB, anon-rss:2208kB, file-rss:34816kB, shmem-rss:0kB [ 483.661114][ T1042] oom_reaper: reaped process 14108 (syz-executor.4), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB 14:09:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000640)={@local, @dev={0xac, 0x14, 0x14, 0x1d}, 0x1, 0x6, [@multicast1, @multicast1, @broadcast, @empty, @broadcast, @rand_addr=0xbd78]}, 0x28) close(r4) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f00000004c0)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r2, 0xc010641d, &(0x7f0000000600)={r5, &(0x7f0000000500)=""/242}) r6 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r6, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r3, 0x80047437, &(0x7f00000006c0)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$pppoe(0x18, 0x1, 0x0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0x0) readv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/186, 0xba}, {&(0x7f0000000000)=""/27, 0x1b}, {&(0x7f0000000200)=""/21, 0x15}, {&(0x7f0000000240)=""/2, 0x2}, {&(0x7f00000002c0)=""/163, 0xa3}, {&(0x7f0000000380)=""/23, 0x17}, {&(0x7f00000003c0)=""/77, 0x4d}], 0x7) r7 = getpgrp(0xffffffffffffffff) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000680)=r2, 0x4) ptrace$pokeuser(0x6, r7, 0xa73, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:09:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff}) write$selinux_load(r2, &(0x7f0000000100)={0xf97cff8c, 0x8, 'SE Linux', "965a253092bb846867e82af2d1281545dc6369fefda6ac4f0bee9afd50b6e67f448815f1a29b985ba91847404d66fe543b390924a999539e918376172ec76bdc5d22ccdb7b056d573b6f78a70e895ec485d76e3beb2dbb1be393bb5ed8c5476f3afb3d4db55b39d8f083e7e07cf9647dc4083eb2c5770ff1de3e03fd5c05698aa3330ca41f89a099f66ae4f7fe217a5ede35724b20eeb4a8683274"}, 0xab) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r4, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r4, 0x80047437, &(0x7f0000000080)) splice(r2, 0x0, r3, 0x0, 0x200010005, 0x0) 14:09:50 executing program 1: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r1) r3 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r2) openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0xfffffffffffffffc, 0x0) keyctl$restrict_keyring(0x1d, r2, &(0x7f0000000100)='.request_key_auth\x00', &(0x7f0000000140)='keyring\x00') clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r3, &(0x7f0000000a40)=""/4096, 0x1000) 14:09:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r1) r3 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r2) prctl$PR_SET_THP_DISABLE(0x29, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r4 = fcntl$dupfd(r0, 0x406, r0) write$FUSE_POLL(r4, &(0x7f0000000080)={0x18, 0x0, 0x8}, 0x18) keyctl$read(0xb, r3, &(0x7f0000000a40)=""/4096, 0x1000) 14:09:50 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'yam0\x00', {0x2, 0x2, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:50 executing program 1: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:50 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz0\x00', 0x1ff) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'bridge_slave_0\x00', {0x2, 0x4e24, @broadcast}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, 0x0) 14:09:50 executing program 0: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:50 executing program 1: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00\x00\x00\xff', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r1) r3 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x40be, 0x141000) ioctl$VIDIOC_TRY_ENCODER_CMD(r3, 0xc028564e, &(0x7f0000000100)={0x2, 0x1, [0x1d, 0xf01, 0x7, 0x80, 0x401, 0xd3f, 0x2, 0x2]}) r4 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r2) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r4, &(0x7f0000000a40)=""/4096, 0x1000) 14:09:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r1) r3 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r2) keyctl$link(0x8, r1, r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r3, &(0x7f0000000a40)=""/4096, 0x1000) 14:09:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0x50, r4, 0x300, 0x70bd2a, 0x25dfdbfb, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x100}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x24}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x74}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000080}, 0x20000000) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) ioctl$UI_GET_SYSNAME(r2, 0x8040552c, &(0x7f0000000300)) r8 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r8, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r8, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r5, 0x0, r7, 0x0, 0x200010005, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:09:51 executing program 1: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00\x00\xff\xff', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:51 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f00000002c0)={'broute\x00'}, &(0x7f0000000340)=0x78) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0xffffffff00000001, 0x800) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000000c0), &(0x7f0000000140)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(r4, 0x116, 0x80, &(0x7f00000001c0)="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", 0xfc) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r1) r3 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r2) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r3, &(0x7f0000000a40)=""/4096, 0x1000) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f0000000100)=0xc) ioctl$SIOCAX25ADDUID(r0, 0x89e1, &(0x7f0000000140)={0x3, @null, r4}) 14:09:51 executing program 0: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz0\x00', 0x1ff) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'bridge_slave_0\x00', {0x2, 0x4e24, @broadcast}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, 0x0) 14:09:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff}) write$selinux_load(r2, &(0x7f0000000100)={0xf97cff8c, 0x8, 'SE Linux', "965a253092bb846867e82af2d1281545dc6369fefda6ac4f0bee9afd50b6e67f448815f1a29b985ba91847404d66fe543b390924a999539e918376172ec76bdc5d22ccdb7b056d573b6f78a70e895ec485d76e3beb2dbb1be393bb5ed8c5476f3afb3d4db55b39d8f083e7e07cf9647dc4083eb2c5770ff1de3e03fd5c05698aa3330ca41f89a099f66ae4f7fe217a5ede35724b20eeb4a8683274"}, 0xab) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r4, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r4, 0x80047437, &(0x7f0000000080)) splice(r2, 0x0, r3, 0x0, 0x200010005, 0x0) 14:09:51 executing program 5: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f0000000180)='vboxnet0\x00') ioctl$sock_inet_SIOCSIFADDR(r0, 0x4020940d, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:09:51 executing program 1: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xffffffffffffc, 0x20011, r0, 0x0) 14:09:51 executing program 0: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x400000000000, 0x20011, r0, 0x0) 14:09:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r1) r3 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r2) r4 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x1, 0x10000) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in6={{0xa, 0x4e20, 0xa21, @remote, 0x31e0}}, 0x3, 0x1}, &(0x7f0000000100)=0x90) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f00000003c0)={r5, @in={{0x2, 0x4e22, @rand_addr=0x2}}, 0x8001, 0xdbc}, &(0x7f0000000140)=0x90) setsockopt$RDS_CANCEL_SENT_TO(r4, 0x114, 0x1, &(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f00000001c0)) keyctl$read(0xb, r3, &(0x7f0000000a40)=""/4096, 0x1000) 14:09:51 executing program 5: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3002, 0x0, 0x20011, r2, 0x2000) 14:09:51 executing program 1: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xffffffffffffc, 0x20011, r0, 0x0) 14:09:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)={0x0, r2, 0xd, 0x1}, 0x14) close(r4) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r5, 0x2e1, 0x3, 0x0, 0x6}) open_by_handle_at(r4, &(0x7f0000000100)={0x81, 0x80000001, "140834852d1e434d1a83f5e0fe3f84994fb5f1275342e04571b8b196abc72cdd570049a85661d298f1be8f5ae7cb3643db33216696611fbf048c7a860f5de78205388f624c1e9521779d655aace3a250c5995bf9137f0a307fe4e23f64773b43774ce38d2e5ae2de1d879fb28773994b8c0463d4431b96cb03"}, 0x200800) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000240)='./file0\x00', 0x0, 0x8}, 0x10) 14:09:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r2) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r1, &(0x7f0000001a40)=""/4096, 0xdba3b49a18d186cb) r3 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) ioctl$EVIOCGBITSND(r3, 0x80404532, &(0x7f0000000100)=""/55) 14:09:52 executing program 5: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3002, 0x0, 0x20011, r2, 0x2000) 14:09:52 executing program 0: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000003c0)={0x142, @tick, 0x1, {0x3ff}, 0x6, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x9000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x400000000000, 0x20011, r0, 0x0) 14:09:52 executing program 1 (fault-call:1 fault-nth:0): perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) 14:09:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$selinux_load(r2, &(0x7f0000000100)={0xf97cff8c, 0x8, 'SE Linux', "965a253092bb846867e82af2d1281545dc6369fefda6ac4f0bee9afd50b6e67f448815f1a29b985ba91847404d66fe543b390924a999539e918376172ec76bdc5d22ccdb7b056d573b6f78a70e895ec485d76e3beb2dbb1be393bb5ed8c5476f3afb3d4db55b39d8f083e7e07cf9647dc4083eb2c5770ff1de3e03fd5c05698aa3330ca41f89a099f66ae4f7fe217a5ede35724b20eeb4a8683274"}, 0xab) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0x0) [ 485.928510][T19760] FAULT_INJECTION: forcing a failure. [ 485.928510][T19760] name failslab, interval 1, probability 0, space 0, times 0 [ 485.981244][T19764] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 [ 485.992725][T19760] CPU: 0 PID: 19760 Comm: syz-executor.1 Not tainted 5.0.0+ #23 [ 486.000977][T19760] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 486.011071][T19760] Call Trace: [ 486.014405][T19760] dump_stack+0x172/0x1f0 [ 486.018804][T19760] should_fail.cold+0xa/0x15 [ 486.023428][T19760] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 486.029614][T19760] ? ___might_sleep+0x163/0x280 [ 486.034497][T19760] __should_failslab+0x121/0x190 [ 486.039468][T19760] should_failslab+0x9/0x14 [ 486.044009][T19760] kmem_cache_alloc+0x2b2/0x6f0 [ 486.048882][T19760] ? kasan_check_write+0x14/0x20 [ 486.053839][T19760] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 486.059414][T19760] getname_flags+0xd6/0x5b0 [ 486.063959][T19760] getname+0x1a/0x20 [ 486.067890][T19760] do_sys_open+0x2c9/0x5d0 [ 486.072337][T19760] ? filp_open+0x80/0x80 [ 486.076613][T19760] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 486.082096][T19760] ? do_syscall_64+0x26/0x610 [ 486.086792][T19760] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 486.092872][T19760] ? do_syscall_64+0x26/0x610 [ 486.097585][T19760] __x64_sys_open+0x7e/0xc0 [ 486.102111][T19760] do_syscall_64+0x103/0x610 [ 486.106724][T19760] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 486.112638][T19760] RIP: 0033:0x412011 [ 486.116551][T19760] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 486.136199][T19760] RSP: 002b:00007f01b314e7a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 486.144629][T19760] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000412011 [ 486.152618][T19760] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f01b314e850 [ 486.160603][T19760] RBP: 000000000073bf00 R08: 000000000000000f R09: 0000000000000000 [ 486.168588][T19760] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f01b314f6d4 [ 486.176576][T19760] R13: 00000000004c6c6d R14: 00000000004dc2c8 R15: 0000000000000004 [ 486.184599][T19764] CPU: 1 PID: 19764 Comm: syz-executor.4 Not tainted 5.0.0+ #23 [ 486.192238][T19764] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 486.202292][T19764] Call Trace: [ 486.205591][T19764] dump_stack+0x172/0x1f0 [ 486.209930][T19764] dump_header+0x10f/0xb6c [ 486.214378][T19764] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 486.220198][T19764] ? ___ratelimit+0x60/0x595 [ 486.224802][T19764] ? do_raw_spin_unlock+0x57/0x270 [ 486.229928][T19764] oom_kill_process.cold+0x10/0x15 [ 486.235061][T19764] out_of_memory+0x79a/0x1280 [ 486.235082][T19764] ? lock_downgrade+0x880/0x880 [ 486.235099][T19764] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 486.235116][T19764] ? oom_killer_disable+0x280/0x280 [ 486.235136][T19764] ? find_held_lock+0x35/0x130 [ 486.244653][T19764] mem_cgroup_out_of_memory+0x1ca/0x230 [ 486.244668][T19764] ? memcg_event_wake+0x230/0x230 [ 486.244690][T19764] ? do_raw_spin_unlock+0x57/0x270 [ 486.244708][T19764] ? _raw_spin_unlock+0x2d/0x50 14:09:52 executing program 0 (fault-call:1 fault-nth:0): perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) 14:09:52 executing program 5: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00', 0x0, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000003c0)={0x142, @tick=0x40, 0x1, {0x3ff, 0x7e788c94}, 0x6, 0x3, 0x5}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3002, 0x0, 0x20011, r2, 0x2000) [ 486.244728][T19764] try_charge+0x102c/0x15c0 [ 486.244738][T19764] ? find_held_lock+0x35/0x130 [ 486.244756][T19764] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 486.244767][T19764] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 486.244784][T19764] ? find_held_lock+0x35/0x130 [ 486.244797][T19764] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 486.244818][T19764] __memcg_kmem_charge_memcg+0x7c/0x130 [ 486.244830][T19764] ? memcg_kmem_put_cache+0xb0/0xb0 [ 486.244845][T19764] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 486.244860][T19764] __memcg_kmem_charge+0x136/0x300 [ 486.244877][T19764] __alloc_pages_nodemask+0x437/0x7e0 [ 486.244891][T19764] ? __pud_alloc+0x1d3/0x250 [ 486.244907][T19764] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 486.244918][T19764] ? __pud_alloc+0x1d3/0x250 [ 486.244939][T19764] ? lock_downgrade+0x880/0x880 [ 486.244953][T19764] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 486.244971][T19764] alloc_pages_current+0x107/0x210 [ 486.244996][T19764] ? do_raw_spin_unlock+0x57/0x270 [ 486.245014][T19764] __pmd_alloc+0x41/0x460 [ 486.245027][T19764] ? pmd_val+0x100/0x100 [ 486.245043][T19764] pmd_alloc+0x10c/0x180 [ 486.245059][T19764] copy_page_range+0x62e/0x1f90 [ 486.245087][T19764] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 486.245098][T19764] ? vma_compute_subtree_gap+0x158/0x230 [ 486.245112][T19764] ? vma_gap_callbacks_rotate+0x62/0x80 [ 486.245125][T19764] ? pmd_alloc+0x180/0x180 [ 486.245139][T19764] ? validate_mm_rb+0xa3/0xc0 [ 486.245155][T19764] ? __vma_link_rb+0x279/0x370 [ 486.245177][T19764] copy_process.part.0+0x568b/0x7980 [ 486.245219][T19764] ? __cleanup_sighand+0x60/0x60 [ 486.245248][T19764] _do_fork+0x257/0xfd0 [ 486.245268][T19764] ? fork_idle+0x1d0/0x1d0 [ 486.245292][T19764] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 486.245306][T19764] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 486.245321][T19764] ? do_syscall_64+0x26/0x610 [ 486.245334][T19764] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 486.245347][T19764] ? do_syscall_64+0x26/0x610 [ 486.245367][T19764] __x64_sys_clone+0xbf/0x150 [ 486.245389][T19764] do_syscall_64+0x103/0x610 [ 486.278791][T19771] FAULT_INJECTION: forcing a failure. [ 486.278791][T19771] name failslab, interval 1, probability 0, space 0, times 0 [ 486.282056][T19764] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 486.282078][T19764] RIP: 0033:0x458079 [ 486.282101][T19764] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 486.282110][T19764] RSP: 002b:00007f3505876c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 14:09:52 executing program 5 (fault-call:1 fault-nth:0): openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000340)='9p\x00', 0x0, 0x0) [ 486.282127][T19764] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000458079 [ 486.282136][T19764] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 486.282145][T19764] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 486.282154][T19764] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f35058776d4 [ 486.282164][T19764] R13: 00000000004be379 R14: 00000000004cea80 R15: 00000000ffffffff [ 486.401719][T19764] memory: usage 307200kB, limit 307200kB, failcnt 1238 [ 486.603391][T19764] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 486.610863][T19764] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 486.629653][T19777] FAULT_INJECTION: forcing a failure. [ 486.629653][T19777] name failslab, interval 1, probability 0, space 0, times 0 [ 486.651950][T19764] Memory cgroup stats for /syz4: cache:0KB rss:264576KB rss_huge:245760KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:264664KB inactive_file:0KB active_file:0KB unevictable:0KB [ 486.680647][T19777] CPU: 1 PID: 19777 Comm: syz-executor.5 Not tainted 5.0.0+ #23 [ 486.688295][T19777] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 486.698357][T19777] Call Trace: [ 486.701679][T19777] dump_stack+0x172/0x1f0 [ 486.706038][T19777] should_fail.cold+0xa/0x15 [ 486.710649][T19777] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 486.718433][T19777] ? ___might_sleep+0x163/0x280 [ 486.723684][T19777] __should_failslab+0x121/0x190 [ 486.728641][T19777] should_failslab+0x9/0x14 [ 486.733162][T19777] __kmalloc_track_caller+0x2d8/0x740 [ 486.738548][T19777] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 486.744799][T19777] ? fput_many+0x12c/0x1a0 [ 486.749267][T19777] ? strndup_user+0x77/0xd0 [ 486.753795][T19777] memdup_user+0x26/0xb0 [ 486.758061][T19777] strndup_user+0x77/0xd0 [ 486.762410][T19777] ksys_mount+0x3c/0x150 [ 486.766668][T19777] __x64_sys_mount+0xbe/0x150 [ 486.771364][T19777] do_syscall_64+0x103/0x610 [ 486.775971][T19777] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 486.781890][T19777] RIP: 0033:0x458079 [ 486.785799][T19777] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 486.805408][T19777] RSP: 002b:00007f9e8ceb0c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 486.813820][T19777] RAX: ffffffffffffffda RBX: 00007f9e8ceb0c90 RCX: 0000000000458079 [ 486.821793][T19777] RDX: 0000000020000340 RSI: 0000000020000300 RDI: 0000000000000000 [ 486.830743][T19777] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 486.838720][T19777] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9e8ceb16d4 [ 486.846707][T19777] R13: 00000000004c3d9d R14: 00000000004d6fb8 R15: 0000000000000004 14:09:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$selinux_load(r2, &(0x7f0000000100)={0xf97cff8c, 0x8, 'SE Linux', "965a253092bb846867e82af2d1281545dc6369fefda6ac4f0bee9afd50b6e67f448815f1a29b985ba91847404d66fe543b390924a999539e918376172ec76bdc5d22ccdb7b056d573b6f78a70e895ec485d76e3beb2dbb1be393bb5ed8c5476f3afb3d4db55b39d8f083e7e07cf9647dc4083eb2c5770ff1de3e03fd5c05698aa3330ca41f89a099f66ae4f7fe217a5ede35724b20eeb4a8683274"}, 0xab) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0x0) [ 486.855337][T19764] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=14135,uid=0 [ 486.859855][T19771] CPU: 1 PID: 19771 Comm: syz-executor.0 Not tainted 5.0.0+ #23 [ 486.878299][T19771] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 486.888350][T19771] Call Trace: [ 486.888375][T19771] dump_stack+0x172/0x1f0 [ 486.888409][T19771] should_fail.cold+0xa/0x15 14:09:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) syz_genetlink_get_family_id$nbd(&(0x7f0000000000)='nbd\x00') r4 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r4, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r4, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r2, &(0x7f0000000100)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[], @ANYPTR64, @ANYRESDEC=r0, @ANYRESDEC=r3, @ANYRESDEC=r0], 0x4c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000002c0)={0x0, @in={{0x2, 0x4e23, @multicast1}}, 0x8, 0x9}, &(0x7f0000000380)=0x90) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x5, &(0x7f00000003c0)={r5, @in={{0x2, 0x4e23, @multicast1}}}, 0x84) splice(r1, 0x0, r3, 0x0, 0x200010005, 0x0) setsockopt$bt_BT_DEFER_SETUP(r4, 0x112, 0x7, &(0x7f0000000180), 0x4) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) [ 486.888431][T19771] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 486.906413][T19771] ? ___might_sleep+0x163/0x280 [ 486.911275][T19771] __should_failslab+0x121/0x190 [ 486.913220][T19764] Memory cgroup out of memory: Killed process 14135 (syz-executor.4) total-vm:72448kB, anon-rss:2208kB, file-rss:34816kB, shmem-rss:0kB [ 486.916223][T19771] should_failslab+0x9/0x14 [ 486.916242][T19771] kmem_cache_alloc+0x2b2/0x6f0 [ 486.916259][T19771] ? kasan_check_write+0x14/0x20 [ 486.916286][T19771] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 486.934667][T19771] getname_flags+0xd6/0x5b0 [ 486.934687][T19771] getname+0x1a/0x20 [ 486.934704][T19771] do_sys_open+0x2c9/0x5d0 [ 486.934723][T19771] ? filp_open+0x80/0x80 [ 486.934746][T19771] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 486.934767][T19771] ? do_syscall_64+0x26/0x610 [ 486.944529][T19771] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 486.944545][T19771] ? do_syscall_64+0x26/0x610 [ 486.944568][T19771] __x64_sys_open+0x7e/0xc0 [ 486.944587][T19771] do_syscall_64+0x103/0x610 [ 486.944605][T19771] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 486.944618][T19771] RIP: 0033:0x412011 [ 486.944642][T19771] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 487.021069][ T1042] oom_reaper: reaped process 14135 (syz-executor.4), now anon-rss:0kB, file-rss:34688kB, shmem-rss:0kB [ 487.026413][T19771] RSP: 002b:00007f7bb01617a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 487.026430][T19771] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000412011 14:09:53 executing program 5 (fault-call:1 fault-nth:1): openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000340)='9p\x00', 0x0, 0x0) [ 487.026440][T19771] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f7bb0161850 [ 487.026448][T19771] RBP: 000000000073bf00 R08: 000000000000000f R09: 0000000000000000 [ 487.026458][T19771] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f7bb01626d4 [ 487.026467][T19771] R13: 00000000004c6c6d R14: 00000000004dc2c8 R15: 0000000000000004 14:09:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x400000, 0x0) ioctl$BLKROTATIONAL(r2, 0x127e, &(0x7f0000000100)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00@\x00'}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) r6 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r6, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r6, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r3, 0x0, r5, 0x0, 0x200010005, 0x0) userfaultfd(0x80800) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) [ 487.210632][T19798] device lo left promiscuous mode 14:09:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000cc0)=0x0) sched_setscheduler(r1, 0x3, &(0x7f0000000d00)=0xe000000000000) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r2) add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0xffffffffffffff9b, r3) r4 = syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x1, 0x2) sendmsg(r0, &(0x7f0000000940)={&(0x7f00000007c0)=@sco={0x1f, {0x0, 0x1, 0xffff, 0x3, 0x1ff, 0x6}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000080)="6430872e22400f0cb0f336930f1880e2134de9e01fcf47c3f88c9901952c720a334729e9776870010a5bdc79", 0x2c}, {&(0x7f0000000840)="2d5003dff59a2299feb8ff7497888e470acc36dbf12934c12e508086f42110beeac3ef249951529c7ab12e01bdf099ceb5a23e44711244afa1a405ab56b72581840ea3d94eb7cbbf4e4b4da048875bab125177632e7057bb44c4c279c36218693d32cbce2f7f7d9d67dec19793b010b2fbf4939df2d16da9494bedf81dc880b99edaebc635771fb671be48d983f67a45d0f7aa39057fc0374aec3ec8cd32663f5db7459cbbf60d852058bedc48124fec0ef1231cd09f232f692400c3a10191887e928097a410b228ad40dbe26626995704db6340a7dfcf23951bdf14e317", 0xde}, {&(0x7f00000009c0)="163b0669c4dc1646eb86527b5c312c28e38fa97ce96772a8ec341a26dbac842dfe661eb343b2cac4b7bdb655e4416abd224ba10cf17e755c3b182ae48e4c19003d44577f1ec178370674262f2950b22e9c415c4a36a473e9215e438c46e267b64216f92ba3adcfb7de60db1a9303c28b21170ed52092eb05e26fed320dc2a78fd58de6b89bf52039527ea815e09ef91e7d2e684795f8681ddcca91ca7688137ba9e3dee5b2a9f00a00314ad1c61539c811ee6288fc3d18f61e46ad6f853fa1c3a5173ca9a8b5424fdb1bea6c95afc1e09424146dd6bf7ba071176ad8", 0xdc}, {&(0x7f0000000ac0)="b13c5c0a961c1ffd1a7ef4eb8166c6a0c6ed7076c208988eb2117626d214512b830f55bec15a25c2b11617edb18fa803126c96cd13e3899ffe0c2193a90e6c9be7a2", 0x42}, {&(0x7f00000004c0)="4d2717d65ebfcf7666b6f3243814b1977b8c47877902f9e995542588cf9b66d5f6517cbb31f9a5a90f86797e31c5737abf2dce282a3d083548aa32c5", 0x3c}], 0x5, &(0x7f0000000bc0)=[{0xd0, 0xff, 0x20, "ed9bfd6cff719314aed912bbd9b1887230138f010ca9f8b990a305570676c055cd74c5b07e0fec5d2471b9d972ca259f88bd0da1c7ba9a3172194cde878263453eb6b9ee55f029624a940fac8802f6489a486beb3d1954bc8c6444bf8e34ca3151f33b0946ad0064f9061254de4c84ffecf3ab635494eb7327596209aa1be80d163644da4edb03c66948087712b40120657bb1b4a6eee2be0a4cfaeafa1c4c5922222e495b3e81916faeefdee52017cf05bb570852c32068aa"}], 0xd0}, 0x20000000) r5 = shmget$private(0x0, 0x3000, 0x200, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_LOCK(r5, 0xb) clone(0x8000000000000, 0x0, 0x0, 0x0, 0x0) r6 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000500)='/dev/autofs\x00', 0x5, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r4, 0x0, 0x48f, &(0x7f0000000140)={0x6, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2, 'none\x00', 0x1c, 0x431, 0x6f}, 0x2c) setsockopt$inet6_MCAST_JOIN_GROUP(r4, 0x29, 0x2a, &(0x7f0000000d40)={0x0, {{0xa, 0x4e24, 0x20, @loopback, 0x4}}}, 0x88) ioctl$UI_SET_EVBIT(r6, 0x40045564, 0x13) keyctl$read(0xb, r3, &(0x7f0000003a40)=""/4096, 0x936d803003d3081e) sendmsg$alg(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000300)="2e2f9ff109623fa26c1bb7a22775f8f38f11fe7cf2ba8ec16d567c24419477c17fc80263396ab7080fec0082a05cfdf1af6b0bc49e0761a5aaca732b8bc587bbcd020bb83dc1cf7a8f5a21f40cdab723086696a419993b6bac97227553c3cb84618f528e7e24fbaba4037bd302a52da35ca8cce381fd5e8cdeb83955696ae2e659b8a35c4d0b805ba695f8b6b9644e9b8596b6d0dbcc76ece47fdf144f3507daad6bfc3e1347a4e90eb4", 0xaa}, {&(0x7f00000001c0)="c6719081db8e3762f6ce8b77dd64212e9ca330faf32dcf029b", 0x19}, {&(0x7f00000003c0)="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", 0xff}], 0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x108}, 0x40000) 14:09:53 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) 14:09:53 executing program 1 (fault-call:1 fault-nth:1): perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) [ 487.330834][T19804] FAULT_INJECTION: forcing a failure. [ 487.330834][T19804] name failslab, interval 1, probability 0, space 0, times 0 [ 487.402874][T19804] CPU: 1 PID: 19804 Comm: syz-executor.5 Not tainted 5.0.0+ #23 [ 487.410550][T19804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 487.420636][T19804] Call Trace: [ 487.423990][T19804] dump_stack+0x172/0x1f0 [ 487.428347][T19804] should_fail.cold+0xa/0x15 [ 487.432957][T19804] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 487.438788][T19804] ? ___might_sleep+0x163/0x280 [ 487.443654][T19804] __should_failslab+0x121/0x190 [ 487.448607][T19804] should_failslab+0x9/0x14 [ 487.453122][T19804] kmem_cache_alloc+0x2b2/0x6f0 [ 487.457997][T19804] ? __might_fault+0x12b/0x1e0 [ 487.462799][T19804] getname_flags+0xd6/0x5b0 [ 487.467311][T19804] user_path_at_empty+0x2f/0x50 [ 487.472179][T19804] do_mount+0x150/0x2c40 [ 487.476444][T19804] ? copy_mount_string+0x40/0x40 [ 487.481391][T19804] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 487.487642][T19804] ? _copy_from_user+0xdd/0x150 [ 487.492518][T19804] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 487.498768][T19804] ? copy_mount_options+0x280/0x3a0 [ 487.503975][T19804] ksys_mount+0xdb/0x150 [ 487.508241][T19804] __x64_sys_mount+0xbe/0x150 [ 487.512928][T19804] do_syscall_64+0x103/0x610 [ 487.517586][T19804] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 487.523485][T19804] RIP: 0033:0x458079 [ 487.527418][T19804] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 487.547034][T19804] RSP: 002b:00007f9e8ceb0c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 487.555451][T19804] RAX: ffffffffffffffda RBX: 00007f9e8ceb0c90 RCX: 0000000000458079 [ 487.563426][T19804] RDX: 0000000020000340 RSI: 0000000020000300 RDI: 0000000000000000 [ 487.571402][T19804] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 487.579373][T19804] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9e8ceb16d4 [ 487.583873][T19809] FAULT_INJECTION: forcing a failure. [ 487.583873][T19809] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 487.587343][T19804] R13: 00000000004c3d9d R14: 00000000004d6fb8 R15: 0000000000000004 [ 487.608530][T19809] CPU: 0 PID: 19809 Comm: syz-executor.1 Not tainted 5.0.0+ #23 [ 487.616167][T19809] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 487.626249][T19809] Call Trace: [ 487.629564][T19809] dump_stack+0x172/0x1f0 [ 487.633929][T19809] should_fail.cold+0xa/0x15 [ 487.638582][T19809] ? perf_trace_run_bpf_submit+0x131/0x190 [ 487.644416][T19809] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 487.650248][T19809] ? perf_trace_lock+0x334/0x510 [ 487.655219][T19809] should_fail_alloc_page+0x50/0x60 [ 487.660445][T19809] __alloc_pages_nodemask+0x1a1/0x7e0 [ 487.665859][T19809] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 487.671616][T19809] ? find_held_lock+0x35/0x130 [ 487.676451][T19809] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 487.682294][T19809] cache_grow_begin+0x9c/0x860 [ 487.687079][T19809] ? getname_flags+0xd6/0x5b0 [ 487.691787][T19809] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 487.698067][T19809] kmem_cache_alloc+0x62d/0x6f0 [ 487.702938][T19809] ? kasan_check_write+0x14/0x20 [ 487.707916][T19809] getname_flags+0xd6/0x5b0 [ 487.712450][T19809] getname+0x1a/0x20 [ 487.716365][T19809] do_sys_open+0x2c9/0x5d0 [ 487.721294][T19809] ? filp_open+0x80/0x80 [ 487.725586][T19809] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 487.731064][T19809] ? do_syscall_64+0x26/0x610 [ 487.735761][T19809] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 487.741847][T19809] ? do_syscall_64+0x26/0x610 [ 487.746581][T19809] __x64_sys_open+0x7e/0xc0 [ 487.751104][T19809] do_syscall_64+0x103/0x610 [ 487.755717][T19809] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 487.761616][T19809] RIP: 0033:0x412011 [ 487.765517][T19809] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 487.785138][T19809] RSP: 002b:00007f01b314e7a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 487.793569][T19809] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000412011 14:09:53 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/.ev/bus/usb/00#/00#\x00', 0x202, 0x0) 14:09:53 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='//ev/bus/usb/00#/00#\x00', 0x202, 0x0) 14:09:53 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/.us/usb/00#/00#\x00', 0x202, 0x0) 14:09:53 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev//us/usb/00#/00#\x00', 0x202, 0x0) 14:09:53 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/b.s/usb/00#/00#\x00', 0x202, 0x0) [ 487.801556][T19809] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f01b314e850 [ 487.809535][T19809] RBP: 000000000073bf00 R08: 000000000000000f R09: 0000000000000000 [ 487.817521][T19809] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f01b314f6d4 [ 487.825505][T19809] R13: 00000000004c6c6d R14: 00000000004dc2c8 R15: 0000000000000004 14:09:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$selinux_load(r2, &(0x7f0000000100)={0xf97cff8c, 0x8, 'SE Linux', "965a253092bb846867e82af2d1281545dc6369fefda6ac4f0bee9afd50b6e67f448815f1a29b985ba91847404d66fe543b390924a999539e918376172ec76bdc5d22ccdb7b056d573b6f78a70e895ec485d76e3beb2dbb1be393bb5ed8c5476f3afb3d4db55b39d8f083e7e07cf9647dc4083eb2c5770ff1de3e03fd5c05698aa3330ca41f89a099f66ae4f7fe217a5ede35724b20eeb4a8683274"}, 0xab) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0x0) 14:09:54 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/b/s/usb/00#/00#\x00', 0x202, 0x0) 14:09:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r1) r3 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r2) r4 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8, 0x2) ioctl$RTC_AIE_ON(r4, 0x7001) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r3, &(0x7f0000000a40)=""/4096, 0x1000) 14:09:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe2$9p(&(0x7f0000000000), 0x84000) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) ioctl$KVM_KVMCLOCK_CTRL(r2, 0xaead) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgid() getegid() getgid() getgid() stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)) getgroups(0x6, &(0x7f0000000540)=[0xee01, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xee00]) getgroups(0x1, &(0x7f0000000580)=[0xee01]) getgroups(0x5, &(0x7f0000000740)=[r7, r6, r6, r9, r8]) r10 = getpgrp(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r3, 0xc1105518, &(0x7f00000002c0)={{0xa, 0x4, 0x8, 0x7, 'syz0\x00', 0x3}, 0x3, 0x130, 0x0, r10, 0x1, 0x0, 'syz1\x00', &(0x7f0000000100)=['GPLwlan0vboxnet1wlan0trustednodev+ppp0ppp1]system\x00'], 0x32, [], [0x3, 0xfff, 0x3, 0xffff]}) splice(r2, 0x0, r1, 0x0, 0x200010005, 0x0) accept$ax25(r2, &(0x7f0000000600)={{0x3, @rose}, [@netrom, @netrom, @null, @bcast, @netrom, @null, @remote, @netrom]}, &(0x7f0000000680)=0x48) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:09:54 executing program 1 (fault-call:1 fault-nth:2): perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) 14:09:54 executing program 5 (fault-call:1 fault-nth:2): openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000340)='9p\x00', 0x0, 0x0) 14:09:54 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/.sb/00#/00#\x00', 0x202, 0x0) 14:09:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") prctl$PR_GET_TSC(0x19, &(0x7f0000000080)) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r1) r3 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r2) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r3, &(0x7f0000000a40)=""/4096, 0x1000) [ 488.164789][T19849] device lo entered promiscuous mode [ 488.170857][T19847] FAULT_INJECTION: forcing a failure. [ 488.170857][T19847] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 488.184078][T19847] CPU: 0 PID: 19847 Comm: syz-executor.5 Not tainted 5.0.0+ #23 [ 488.191712][T19847] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 488.201770][T19847] Call Trace: [ 488.205078][T19847] dump_stack+0x172/0x1f0 [ 488.209424][T19847] should_fail.cold+0xa/0x15 14:09:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1, &(0x7f0000000040)='p\x00\x00\x00\x00\x00\x00\x00\x00X\x00') r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r1) keyctl$invalidate(0x15, r1) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r3, 0x4010ae74, &(0x7f0000000100)={0x4, 0xffffffffffffff01}) r4 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r2) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r4, &(0x7f0000000a40)=""/4096, 0x1000) [ 488.214038][T19847] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 488.219857][T19847] ? __lock_acquire+0x548/0x3fb0 [ 488.224813][T19847] should_fail_alloc_page+0x50/0x60 [ 488.230203][T19847] __alloc_pages_nodemask+0x1a1/0x7e0 [ 488.235586][T19847] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 488.235601][T19847] ? find_held_lock+0x35/0x130 [ 488.235625][T19847] ? do_syscall_64+0x103/0x610 [ 488.235642][T19847] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 488.235670][T19847] cache_grow_begin+0x9c/0x860 [ 488.246130][T19847] ? getname_flags+0xd6/0x5b0 [ 488.246148][T19847] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 488.246168][T19847] kmem_cache_alloc+0x62d/0x6f0 [ 488.246191][T19847] getname_flags+0xd6/0x5b0 [ 488.246210][T19847] user_path_at_empty+0x2f/0x50 [ 488.246231][T19847] do_mount+0x150/0x2c40 [ 488.290795][T19847] ? copy_mount_string+0x40/0x40 [ 488.295731][T19847] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 488.301969][T19847] ? _copy_from_user+0xdd/0x150 [ 488.306833][T19847] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 488.313066][T19847] ? copy_mount_options+0x280/0x3a0 [ 488.318263][T19847] ksys_mount+0xdb/0x150 [ 488.322506][T19847] __x64_sys_mount+0xbe/0x150 [ 488.327200][T19847] do_syscall_64+0x103/0x610 [ 488.331802][T19847] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 488.337699][T19847] RIP: 0033:0x458079 [ 488.341591][T19847] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 488.361189][T19847] RSP: 002b:00007f9e8ceb0c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 488.369597][T19847] RAX: ffffffffffffffda RBX: 00007f9e8ceb0c90 RCX: 0000000000458079 [ 488.377578][T19847] RDX: 0000000020000340 RSI: 0000000020000300 RDI: 0000000000000000 [ 488.385560][T19847] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 488.393537][T19847] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9e8ceb16d4 [ 488.401501][T19847] R13: 00000000004c3d9d R14: 00000000004d6fb8 R15: 0000000000000004 [ 488.410398][T19854] FAULT_INJECTION: forcing a failure. [ 488.410398][T19854] name failslab, interval 1, probability 0, space 0, times 0 [ 488.469565][T19854] CPU: 0 PID: 19854 Comm: syz-executor.1 Not tainted 5.0.0+ #23 [ 488.477232][T19854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 488.487292][T19854] Call Trace: [ 488.490592][T19854] dump_stack+0x172/0x1f0 [ 488.494933][T19854] should_fail.cold+0xa/0x15 [ 488.499533][T19854] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 488.505346][T19854] ? ___might_sleep+0x163/0x280 [ 488.510205][T19854] __should_failslab+0x121/0x190 [ 488.515148][T19854] should_failslab+0x9/0x14 [ 488.519658][T19854] kmem_cache_alloc+0x2b2/0x6f0 [ 488.524517][T19854] ? rcu_read_lock_sched_held+0x110/0x130 [ 488.530495][T19854] ? kmem_cache_alloc+0x32e/0x6f0 [ 488.535530][T19854] security_file_alloc+0x39/0x170 [ 488.540555][T19854] __alloc_file+0xac/0x300 [ 488.544971][T19854] alloc_empty_file+0x72/0x170 [ 488.549750][T19854] path_openat+0xef/0x46e0 [ 488.554165][T19854] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 488.559969][T19854] ? kasan_slab_alloc+0xf/0x20 [ 488.564762][T19854] ? kmem_cache_alloc+0x11a/0x6f0 [ 488.569784][T19854] ? getname_flags+0xd6/0x5b0 [ 488.574457][T19854] ? getname+0x1a/0x20 [ 488.578520][T19854] ? do_sys_open+0x2c9/0x5d0 [ 488.583106][T19854] ? __x64_sys_open+0x7e/0xc0 [ 488.587784][T19854] ? do_syscall_64+0x103/0x610 [ 488.592556][T19854] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 488.598634][T19854] ? __lock_acquire+0x548/0x3fb0 [ 488.603585][T19854] ? __lock_acquire+0x548/0x3fb0 [ 488.608519][T19854] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 488.613898][T19854] ? ipmr_ioctl+0x4e0/0x830 [ 488.618400][T19854] ? __alloc_fd+0x430/0x530 [ 488.622902][T19854] do_filp_open+0x1a1/0x280 [ 488.627407][T19854] ? may_open_dev+0x100/0x100 [ 488.632083][T19854] ? lock_downgrade+0x880/0x880 [ 488.636937][T19854] ? kasan_check_read+0x11/0x20 [ 488.641785][T19854] ? do_raw_spin_unlock+0x57/0x270 [ 488.646896][T19854] ? _raw_spin_unlock+0x2d/0x50 [ 488.651744][T19854] ? __alloc_fd+0x430/0x530 [ 488.656262][T19854] do_sys_open+0x3fe/0x5d0 [ 488.660682][T19854] ? filp_open+0x80/0x80 [ 488.664930][T19854] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 488.670384][T19854] ? do_syscall_64+0x26/0x610 [ 488.675056][T19854] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 488.681152][T19854] ? do_syscall_64+0x26/0x610 [ 488.685845][T19854] __x64_sys_open+0x7e/0xc0 [ 488.690345][T19854] do_syscall_64+0x103/0x610 [ 488.694941][T19854] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 488.700830][T19854] RIP: 0033:0x412011 [ 488.704726][T19854] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 488.728395][T19854] RSP: 002b:00007f01b312d7a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 488.736803][T19854] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000412011 [ 488.744771][T19854] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f01b312d850 [ 488.752739][T19854] RBP: 000000000073bfa0 R08: 000000000000000f R09: 0000000000000000 [ 488.760708][T19854] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f01b312e6d4 14:09:54 executing program 5 (fault-call:1 fault-nth:3): openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000340)='9p\x00', 0x0, 0x0) 14:09:54 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus//sb/00#/00#\x00', 0x202, 0x0) [ 488.768674][T19854] R13: 00000000004c6c6d R14: 00000000004dc2c8 R15: 0000000000000004 14:09:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) fallocate(r0, 0x1, 0x800, 0x2) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) sysfs$2(0x2, 0x8, &(0x7f0000000100)=""/166) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) [ 488.865792][T19860] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 14:09:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$selinux_load(r2, &(0x7f0000000100)={0xf97cff8c, 0x8, 'SE Linux', "965a253092bb846867e82af2d1281545dc6369fefda6ac4f0bee9afd50b6e67f448815f1a29b985ba91847404d66fe543b390924a999539e918376172ec76bdc5d22ccdb7b056d573b6f78a70e895ec485d76e3beb2dbb1be393bb5ed8c5476f3afb3d4db55b39d8f083e7e07cf9647dc4083eb2c5770ff1de3e03fd5c05698aa3330ca41f89a099f66ae4f7fe217a5ede35724b20eeb4a8683274"}, 0xab) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$pppoe(0x18, 0x1, 0x0) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0x0) 14:09:55 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/us./00#/00#\x00', 0x202, 0x0) [ 488.906816][T19860] CPU: 0 PID: 19860 Comm: syz-executor.4 Not tainted 5.0.0+ #23 [ 488.914466][T19860] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 488.914475][T19860] Call Trace: [ 488.914505][T19860] dump_stack+0x172/0x1f0 [ 488.914532][T19860] dump_header+0x10f/0xb6c [ 488.914556][T19860] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 488.914578][T19860] ? ___ratelimit+0x60/0x595 [ 488.947026][T19860] ? do_raw_spin_unlock+0x57/0x270 [ 488.952176][T19860] oom_kill_process.cold+0x10/0x15 [ 488.952197][T19860] out_of_memory+0x79a/0x1280 [ 488.952215][T19860] ? lock_downgrade+0x880/0x880 [ 488.952239][T19860] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 488.973081][T19860] ? oom_killer_disable+0x280/0x280 [ 488.978284][T19860] ? find_held_lock+0x35/0x130 [ 488.983072][T19860] mem_cgroup_out_of_memory+0x1ca/0x230 [ 488.988632][T19860] ? memcg_event_wake+0x230/0x230 [ 488.993670][T19860] ? do_raw_spin_unlock+0x57/0x270 [ 488.998803][T19860] ? _raw_spin_unlock+0x2d/0x50 14:09:55 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/us//00#/00#\x00', 0x202, 0x0) [ 489.003667][T19860] try_charge+0x102c/0x15c0 [ 489.008175][T19860] ? find_held_lock+0x35/0x130 [ 489.012960][T19860] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 489.018530][T19860] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 489.024085][T19860] ? find_held_lock+0x35/0x130 [ 489.028850][T19860] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 489.034439][T19860] __memcg_kmem_charge_memcg+0x7c/0x130 [ 489.039992][T19860] ? memcg_kmem_put_cache+0xb0/0xb0 [ 489.045214][T19860] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 489.050758][T19860] __memcg_kmem_charge+0x136/0x300 [ 489.055872][T19860] __alloc_pages_nodemask+0x437/0x7e0 [ 489.061243][T19860] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 489.067485][T19860] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 489.073204][T19860] ? copy_process.part.0+0x1d08/0x7980 [ 489.078661][T19860] ? lockdep_hardirqs_on+0x418/0x5d0 [ 489.083946][T19860] ? trace_hardirqs_on+0x67/0x230 [ 489.088998][T19860] copy_process.part.0+0x3e0/0x7980 [ 489.094199][T19860] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 489.100437][T19860] ? debug_smp_processor_id+0x3c/0x280 [ 489.105895][T19860] ? perf_trace_lock+0xeb/0x510 [ 489.110748][T19860] ? __lockdep_free_key_range+0x120/0x120 [ 489.116481][T19860] ? __might_fault+0x12b/0x1e0 [ 489.121249][T19860] ? __cleanup_sighand+0x60/0x60 [ 489.126189][T19860] ? lock_downgrade+0x880/0x880 [ 489.131056][T19860] _do_fork+0x257/0xfd0 [ 489.135230][T19860] ? fork_idle+0x1d0/0x1d0 [ 489.139675][T19860] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 489.145141][T19860] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 489.150601][T19860] ? do_syscall_64+0x26/0x610 [ 489.155273][T19860] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 489.161336][T19860] ? do_syscall_64+0x26/0x610 [ 489.166031][T19860] __x64_sys_clone+0xbf/0x150 [ 489.170711][T19860] do_syscall_64+0x103/0x610 [ 489.175307][T19860] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 489.181193][T19860] RIP: 0033:0x458079 [ 489.185084][T19860] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 489.204680][T19860] RSP: 002b:00007f3505855c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 489.213086][T19860] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000458079 [ 489.221051][T19860] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 489.229025][T19860] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 489.237004][T19860] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f35058566d4 [ 489.244973][T19860] R13: 00000000004be379 R14: 00000000004cea80 R15: 00000000ffffffff [ 489.267676][T19860] memory: usage 307112kB, limit 307200kB, failcnt 1261 [ 489.289422][T19860] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 489.307820][T19874] FAULT_INJECTION: forcing a failure. [ 489.307820][T19874] name failslab, interval 1, probability 0, space 0, times 0 [ 489.312310][T19860] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 489.328209][T19860] Memory cgroup stats for /syz4: cache:0KB rss:263204KB rss_huge:243712KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:263352KB inactive_file:0KB active_file:4KB unevictable:0KB [ 489.350815][T19860] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=14165,uid=0 [ 489.367320][T19860] Memory cgroup out of memory: Killed process 14165 (syz-executor.4) total-vm:72448kB, anon-rss:2208kB, file-rss:34816kB, shmem-rss:0kB [ 489.380454][T19874] CPU: 0 PID: 19874 Comm: syz-executor.5 Not tainted 5.0.0+ #23 [ 489.388844][T19874] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 489.398898][T19874] Call Trace: [ 489.402208][T19874] dump_stack+0x172/0x1f0 [ 489.406565][T19874] should_fail.cold+0xa/0x15 [ 489.411164][T19874] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 489.417005][T19874] ? ___might_sleep+0x163/0x280 [ 489.421870][T19874] __should_failslab+0x121/0x190 [ 489.426815][T19874] should_failslab+0x9/0x14 [ 489.431325][T19874] kmem_cache_alloc_trace+0x2d1/0x760 [ 489.436699][T19874] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 489.442505][T19874] ? rcu_read_lock_sched_held+0x110/0x130 [ 489.448227][T19874] ? kmem_cache_alloc_trace+0x354/0x760 [ 489.453788][T19874] legacy_init_fs_context+0x48/0xe0 [ 489.459002][T19874] ? generic_parse_monolithic+0x200/0x200 [ 489.464727][T19874] alloc_fs_context+0x365/0x640 [ 489.469585][T19874] fs_context_for_mount+0x25/0x30 [ 489.474609][T19874] do_mount+0x13d7/0x2c40 [ 489.478945][T19874] ? copy_mount_string+0x40/0x40 [ 489.483896][T19874] ? _copy_from_user+0xdd/0x150 [ 489.488763][T19874] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 489.495014][T19874] ? copy_mount_options+0x280/0x3a0 [ 489.500218][T19874] ksys_mount+0xdb/0x150 [ 489.504464][T19874] __x64_sys_mount+0xbe/0x150 [ 489.509147][T19874] do_syscall_64+0x103/0x610 [ 489.513748][T19874] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 489.519634][T19874] RIP: 0033:0x458079 [ 489.523530][T19874] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 489.543130][T19874] RSP: 002b:00007f9e8ceb0c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 489.551536][T19874] RAX: ffffffffffffffda RBX: 00007f9e8ceb0c90 RCX: 0000000000458079 [ 489.559511][T19874] RDX: 0000000020000340 RSI: 0000000020000300 RDI: 0000000000000000 14:09:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f00000003c0)={0x3, 0x66, "e1b242af7013e863d088e01602553e2164835362a62d915eb85ff9e821dc24b2ade258d18117f368edcaf39fa926cf7abccc5bfd3401619caaf56a25ba43a9d1d771f09138f158c3fca69f864377a5e7fd2466d69d09748065244f36f8a57bd694d19eb1b2e9"}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) syz_open_dev$sndmidi(&(0x7f0000000080)='/dev/snd/midiC#D#\x00', 0xc000000000000000, 0x22000) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r1) r3 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r2) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r3, &(0x7f0000000a40)=""/4096, 0x1000) r4 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0xb9b, 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r4, &(0x7f0000000300)="c3c03babb6ea1554fc935e970f30c3a3c698a9b522f71b92c15ad8554bfe882e7d72ae706857abd19d6b67cbfdaf88f76d6425d2ce26874b12c1f7d580da4226c7d1025d742429624f32fa638413700647f078621fffb3b49bcf6be5536891b2a612187bffeec5060450a52948c661d94b1b3c5887d02c97f0cb9f8cbf68ee1451454c9d4aaa20e4067bc679904fd76723875266f9edcb25ad0e4cd22ce5ce9c4f8d36cc63bc6c24ba163ce3c7c6daa8b2f2c4e586d70031ad40c7935626f785", &(0x7f0000000240)=""/115}, 0x18) [ 489.567477][T19874] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 489.575445][T19874] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9e8ceb16d4 [ 489.583417][T19874] R13: 00000000004c3d9d R14: 00000000004d6fb8 R15: 0000000000000004 [ 489.593065][ T1042] oom_reaper: reaped process 14165 (syz-executor.4), now anon-rss:0kB, file-rss:34688kB, shmem-rss:0kB 14:09:55 executing program 1 (fault-call:1 fault-nth:3): perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) 14:09:55 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/.0#/00#\x00', 0x202, 0x0) 14:09:55 executing program 5 (fault-call:1 fault-nth:4): openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000340)='9p\x00', 0x0, 0x0) [ 489.769059][T19889] FAULT_INJECTION: forcing a failure. [ 489.769059][T19889] name failslab, interval 1, probability 0, space 0, times 0 [ 489.788414][T19889] CPU: 1 PID: 19889 Comm: syz-executor.5 Not tainted 5.0.0+ #23 [ 489.796058][T19889] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 489.806111][T19889] Call Trace: [ 489.809416][T19889] dump_stack+0x172/0x1f0 [ 489.813792][T19889] should_fail.cold+0xa/0x15 [ 489.815101][T19880] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 489.818401][T19889] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 489.818431][T19889] ? ___might_sleep+0x163/0x280 [ 489.841113][T19889] __should_failslab+0x121/0x190 [ 489.846062][T19889] should_failslab+0x9/0x14 [ 489.850577][T19889] kmem_cache_alloc_trace+0x2d1/0x760 [ 489.856052][T19889] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 489.861875][T19889] ? rcu_read_lock_sched_held+0x110/0x130 [ 489.867599][T19889] ? kmem_cache_alloc_trace+0x354/0x760 [ 489.873164][T19889] legacy_init_fs_context+0x48/0xe0 [ 489.878377][T19889] ? generic_parse_monolithic+0x200/0x200 [ 489.884137][T19889] alloc_fs_context+0x365/0x640 [ 489.889012][T19889] fs_context_for_mount+0x25/0x30 [ 489.894045][T19889] do_mount+0x13d7/0x2c40 [ 489.898380][T19889] ? copy_mount_string+0x40/0x40 [ 489.903341][T19889] ? _copy_from_user+0xdd/0x150 [ 489.908212][T19889] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 489.914458][T19889] ? copy_mount_options+0x280/0x3a0 [ 489.919669][T19889] ksys_mount+0xdb/0x150 [ 489.923922][T19889] __x64_sys_mount+0xbe/0x150 [ 489.928619][T19889] do_syscall_64+0x103/0x610 [ 489.933224][T19889] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 489.939121][T19889] RIP: 0033:0x458079 [ 489.943025][T19889] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 489.962628][T19889] RSP: 002b:00007f9e8ceb0c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 489.971039][T19889] RAX: ffffffffffffffda RBX: 00007f9e8ceb0c90 RCX: 0000000000458079 [ 489.979026][T19889] RDX: 0000000020000340 RSI: 0000000020000300 RDI: 0000000000000000 [ 489.987006][T19889] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 489.994995][T19889] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9e8ceb16d4 [ 490.002966][T19889] R13: 00000000004c3d9d R14: 00000000004d6fb8 R15: 0000000000000004 [ 490.011905][T19880] CPU: 0 PID: 19880 Comm: syz-executor.4 Not tainted 5.0.0+ #23 14:09:56 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb//0#/00#\x00', 0x202, 0x0) [ 490.019552][T19880] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 490.029601][T19880] Call Trace: [ 490.032902][T19880] dump_stack+0x172/0x1f0 [ 490.037236][T19880] dump_header+0x10f/0xb6c [ 490.041654][T19880] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 490.047471][T19880] ? ___ratelimit+0x60/0x595 [ 490.052065][T19880] ? do_raw_spin_unlock+0x57/0x270 [ 490.057183][T19880] oom_kill_process.cold+0x10/0x15 [ 490.061907][T19894] FAULT_INJECTION: forcing a failure. 14:09:56 executing program 5 (fault-call:1 fault-nth:5): openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000340)='9p\x00', 0x0, 0x0) [ 490.061907][T19894] name failslab, interval 1, probability 0, space 0, times 0 [ 490.062304][T19880] out_of_memory+0x79a/0x1280 [ 490.079542][T19880] ? lock_downgrade+0x880/0x880 [ 490.084394][T19880] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 490.090651][T19880] ? oom_killer_disable+0x280/0x280 [ 490.095855][T19880] ? find_held_lock+0x35/0x130 [ 490.095882][T19880] mem_cgroup_out_of_memory+0x1ca/0x230 [ 490.095900][T19880] ? memcg_event_wake+0x230/0x230 [ 490.111193][T19880] ? do_raw_spin_unlock+0x57/0x270 14:09:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$selinux_load(r2, &(0x7f0000000100)={0xf97cff8c, 0x8, 'SE Linux', "965a253092bb846867e82af2d1281545dc6369fefda6ac4f0bee9afd50b6e67f448815f1a29b985ba91847404d66fe543b390924a999539e918376172ec76bdc5d22ccdb7b056d573b6f78a70e895ec485d76e3beb2dbb1be393bb5ed8c5476f3afb3d4db55b39d8f083e7e07cf9647dc4083eb2c5770ff1de3e03fd5c05698aa3330ca41f89a099f66ae4f7fe217a5ede35724b20eeb4a8683274"}, 0xab) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$pppoe(0x18, 0x1, 0x0) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0x0) [ 490.116307][T19880] ? _raw_spin_unlock+0x2d/0x50 [ 490.121166][T19880] try_charge+0x102c/0x15c0 [ 490.126033][T19880] ? find_held_lock+0x35/0x130 [ 490.130808][T19880] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 490.130823][T19880] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 490.130839][T19880] ? find_held_lock+0x35/0x130 [ 490.130853][T19880] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 490.130878][T19880] __memcg_kmem_charge_memcg+0x7c/0x130 [ 490.157798][T19880] ? memcg_kmem_put_cache+0xb0/0xb0 [ 490.157819][T19880] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 490.157837][T19880] __memcg_kmem_charge+0x136/0x300 [ 490.157859][T19880] __alloc_pages_nodemask+0x437/0x7e0 [ 490.164132][T19898] FAULT_INJECTION: forcing a failure. [ 490.164132][T19898] name failslab, interval 1, probability 0, space 0, times 0 [ 490.168590][T19880] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 490.168624][T19880] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 490.168641][T19880] ? copy_process.part.0+0x1d08/0x7980 [ 490.168669][T19880] ? lockdep_hardirqs_on+0x418/0x5d0 [ 490.168690][T19880] ? trace_hardirqs_on+0x67/0x230 [ 490.219377][T19880] ? kasan_check_read+0x11/0x20 [ 490.224239][T19880] copy_process.part.0+0x3e0/0x7980 [ 490.229497][T19880] ? psi_memstall_leave+0x11c/0x180 [ 490.234709][T19880] ? sched_clock+0x2e/0x50 [ 490.239129][T19880] ? psi_memstall_leave+0x12e/0x180 [ 490.244327][T19880] ? find_held_lock+0x35/0x130 [ 490.249181][T19880] ? psi_memstall_leave+0x12e/0x180 [ 490.254401][T19880] ? __cleanup_sighand+0x60/0x60 [ 490.259339][T19880] ? __lock_acquire+0x548/0x3fb0 [ 490.264277][T19880] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 490.270559][T19880] _do_fork+0x257/0xfd0 [ 490.274720][T19880] ? fork_idle+0x1d0/0x1d0 [ 490.279143][T19880] ? blkcg_maybe_throttle_current+0x5e2/0xfc0 [ 490.285208][T19880] ? lock_downgrade+0x880/0x880 [ 490.290057][T19880] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 490.296299][T19880] ? blkcg_exit_queue+0x30/0x30 [ 490.301180][T19880] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 490.306653][T19880] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 490.312126][T19880] ? do_syscall_64+0x26/0x610 [ 490.316805][T19880] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 490.322870][T19880] ? do_syscall_64+0x26/0x610 [ 490.327572][T19880] __x64_sys_clone+0xbf/0x150 [ 490.332267][T19880] do_syscall_64+0x103/0x610 [ 490.336858][T19880] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 490.342753][T19880] RIP: 0033:0x45aa49 [ 490.346663][T19880] Code: ff 48 85 f6 0f 84 d7 8e fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c ae 8e fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 490.366262][T19880] RSP: 002b:00007ffe1c83f6c8 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 490.374672][T19880] RAX: ffffffffffffffda RBX: 00007f3505835700 RCX: 000000000045aa49 [ 490.382638][T19880] RDX: 00007f35058359d0 RSI: 00007f3505834db0 RDI: 00000000003d0f00 [ 490.390609][T19880] RBP: 00007ffe1c83f8d0 R08: 00007f3505835700 R09: 00007f3505835700 [ 490.398579][T19880] R10: 00007f35058359d0 R11: 0000000000000202 R12: 0000000000000000 [ 490.406545][T19880] R13: 00007ffe1c83f77f R14: 00007f35058359c0 R15: 000000000073c04c [ 490.414536][T19894] CPU: 1 PID: 19894 Comm: syz-executor.1 Not tainted 5.0.0+ #23 [ 490.422178][T19894] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 490.432231][T19894] Call Trace: [ 490.435546][T19894] dump_stack+0x172/0x1f0 [ 490.439887][T19894] should_fail.cold+0xa/0x15 [ 490.444510][T19894] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 490.450321][T19894] ? ___might_sleep+0x163/0x280 [ 490.455205][T19894] __should_failslab+0x121/0x190 [ 490.460148][T19894] should_failslab+0x9/0x14 [ 490.464656][T19894] kmem_cache_alloc_trace+0x2d1/0x760 [ 490.470041][T19894] ? kasan_check_write+0x14/0x20 [ 490.474989][T19894] ? lock_downgrade+0x880/0x880 [ 490.479854][T19894] ? usbdev_release+0x420/0x420 [ 490.484701][T19894] usbdev_open+0x51/0x810 [ 490.489047][T19894] ? kasan_check_read+0x11/0x20 [ 490.493925][T19894] ? do_raw_spin_unlock+0x57/0x270 [ 490.499047][T19894] ? usbdev_release+0x420/0x420 [ 490.503912][T19894] chrdev_open+0x247/0x6b0 [ 490.508332][T19894] ? cdev_put.part.0+0x50/0x50 [ 490.513107][T19894] ? security_file_open+0x8d/0x300 [ 490.518227][T19894] do_dentry_open+0x488/0x1160 [ 490.522996][T19894] ? kasan_check_read+0x11/0x20 [ 490.527863][T19894] ? cdev_put.part.0+0x50/0x50 [ 490.532640][T19894] ? chown_common+0x5c0/0x5c0 [ 490.537320][T19894] ? inode_permission+0xb4/0x570 [ 490.542267][T19894] vfs_open+0xa0/0xd0 [ 490.546250][T19894] path_openat+0x10e9/0x46e0 [ 490.550862][T19894] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 490.556668][T19894] ? kasan_slab_alloc+0xf/0x20 [ 490.561430][T19894] ? kmem_cache_alloc+0x11a/0x6f0 [ 490.566470][T19894] ? getname_flags+0xd6/0x5b0 [ 490.571146][T19894] ? getname+0x1a/0x20 [ 490.575214][T19894] ? do_sys_open+0x2c9/0x5d0 [ 490.579823][T19894] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 490.585207][T19894] ? __alloc_fd+0x430/0x530 [ 490.589714][T19894] do_filp_open+0x1a1/0x280 [ 490.594218][T19894] ? may_open_dev+0x100/0x100 [ 490.598926][T19894] ? kasan_check_read+0x11/0x20 [ 490.603781][T19894] ? do_raw_spin_unlock+0x57/0x270 [ 490.608909][T19894] ? _raw_spin_unlock+0x2d/0x50 [ 490.613763][T19894] ? __alloc_fd+0x430/0x530 [ 490.618283][T19894] do_sys_open+0x3fe/0x5d0 [ 490.622713][T19894] ? filp_open+0x80/0x80 [ 490.626967][T19894] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 490.632443][T19894] ? do_syscall_64+0x26/0x610 [ 490.637149][T19894] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 490.643220][T19894] ? do_syscall_64+0x26/0x610 [ 490.647902][T19894] __x64_sys_open+0x7e/0xc0 [ 490.652421][T19894] do_syscall_64+0x103/0x610 [ 490.657020][T19894] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 490.662936][T19894] RIP: 0033:0x412011 [ 490.666832][T19894] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 490.686430][T19894] RSP: 002b:00007f01b312d7a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 490.694839][T19894] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000412011 [ 490.702807][T19894] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f01b312d850 [ 490.710787][T19894] RBP: 000000000073bfa0 R08: 000000000000000f R09: 0000000000000000 [ 490.722782][T19894] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f01b312e6d4 [ 490.730754][T19894] R13: 00000000004c6c6d R14: 00000000004dc2c8 R15: 0000000000000003 [ 490.753694][T19898] CPU: 1 PID: 19898 Comm: syz-executor.5 Not tainted 5.0.0+ #23 [ 490.761344][T19898] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 490.771396][T19898] Call Trace: [ 490.774664][T19880] memory: usage 307200kB, limit 307200kB, failcnt 1298 [ 490.774684][T19880] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 490.781532][T19898] dump_stack+0x172/0x1f0 [ 490.793310][T19898] should_fail.cold+0xa/0x15 [ 490.797642][T19880] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 490.797919][T19898] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 490.809904][T19880] Memory cgroup stats for /syz4: cache:0KB rss:263248KB rss_huge:243712KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:263368KB inactive_file:0KB active_file:0KB unevictable:0KB [ 490.810552][T19898] ? ___might_sleep+0x163/0x280 [ 490.837255][T19898] __should_failslab+0x121/0x190 [ 490.841238][T19880] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=19880,uid=0 [ 490.842202][T19898] should_failslab+0x9/0x14 [ 490.861948][T19898] kmem_cache_alloc_trace+0x2d1/0x760 [ 490.867343][T19898] ? legacy_init_fs_context+0x48/0xe0 [ 490.872720][T19898] ? rcu_read_lock_sched_held+0x110/0x130 [ 490.878440][T19898] ? kmem_cache_alloc_trace+0x354/0x760 [ 490.884034][T19898] v9fs_mount+0x5e/0x920 [ 490.888288][T19898] ? v9fs_write_inode+0x70/0x70 [ 490.893144][T19898] legacy_get_tree+0xf2/0x200 [ 490.897823][T19898] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 490.904066][T19898] vfs_get_tree+0x123/0x450 [ 490.908575][T19898] do_mount+0x1436/0x2c40 [ 490.912917][T19898] ? copy_mount_string+0x40/0x40 [ 490.917866][T19898] ? _copy_from_user+0xdd/0x150 [ 490.922720][T19898] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 490.928957][T19898] ? copy_mount_options+0x280/0x3a0 [ 490.934191][T19898] ksys_mount+0xdb/0x150 [ 490.938439][T19898] __x64_sys_mount+0xbe/0x150 [ 490.943124][T19898] do_syscall_64+0x103/0x610 [ 490.947754][T19898] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 490.953678][T19898] RIP: 0033:0x458079 [ 490.957577][T19898] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 490.977178][T19898] RSP: 002b:00007f9e8ceb0c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 490.985589][T19898] RAX: ffffffffffffffda RBX: 00007f9e8ceb0c90 RCX: 0000000000458079 [ 490.993552][T19898] RDX: 0000000020000340 RSI: 0000000020000300 RDI: 0000000000000000 [ 491.001525][T19898] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 491.009500][T19898] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9e8ceb16d4 [ 491.017472][T19898] R13: 00000000004c3d9d R14: 00000000004d6fb8 R15: 0000000000000004 [ 491.041334][T19880] Memory cgroup out of memory: Killed process 19880 (syz-executor.4) total-vm:72712kB, anon-rss:2216kB, file-rss:35668kB, shmem-rss:0kB 14:09:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$selinux_load(r2, &(0x7f0000000100)={0xf97cff8c, 0x8, 'SE Linux', "965a253092bb846867e82af2d1281545dc6369fefda6ac4f0bee9afd50b6e67f448815f1a29b985ba91847404d66fe543b390924a999539e918376172ec76bdc5d22ccdb7b056d573b6f78a70e895ec485d76e3beb2dbb1be393bb5ed8c5476f3afb3d4db55b39d8f083e7e07cf9647dc4083eb2c5770ff1de3e03fd5c05698aa3330ca41f89a099f66ae4f7fe217a5ede35724b20eeb4a8683274"}, 0xab) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$pppoe(0x18, 0x1, 0x0) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0x0) [ 491.066372][ T1042] oom_reaper: reaped process 19880 (syz-executor.4), now anon-rss:0kB, file-rss:34836kB, shmem-rss:0kB 14:09:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r3, &(0x7f0000000000)={0x18, 0x0, {0x200000000000004, @link_local, 'eql\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0x0) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:09:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x0, 0x0) write$P9_RAUTH(r1, &(0x7f0000000400)={0x14, 0x67, 0x1, {0x40, 0x2, 0x1}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000340), &(0x7f0000000380)=0x4) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r3) r5 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xd0e, 0x440a81) getsockopt$inet6_udp_int(r5, 0x11, 0x65, &(0x7f0000000100), &(0x7f0000000140)=0x4) r6 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x101000, 0x0) r7 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r4) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r6, 0x84, 0x20, &(0x7f0000000240), &(0x7f0000000280)=0x4) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r7, &(0x7f0000000a40)=""/4096, 0x1000) 14:09:57 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000340)='9p\x00', 0x0, 0x0) 14:09:57 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/0.#/00#\x00', 0x202, 0x0) [ 491.268542][T19915] syz-executor.4 invoked oom-killer: gfp_mask=0x40cc0(GFP_KERNEL|__GFP_COMP), order=1, oom_score_adj=1000 [ 491.291116][T19915] CPU: 1 PID: 19915 Comm: syz-executor.4 Not tainted 5.0.0+ #23 [ 491.298761][T19915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 491.308817][T19915] Call Trace: [ 491.312118][T19915] dump_stack+0x172/0x1f0 [ 491.316456][T19915] dump_header+0x10f/0xb6c [ 491.320896][T19915] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 491.326705][T19915] ? ___ratelimit+0x60/0x595 [ 491.331296][T19915] ? do_raw_spin_unlock+0x57/0x270 [ 491.336420][T19915] oom_kill_process.cold+0x10/0x15 [ 491.341562][T19915] out_of_memory+0x79a/0x1280 [ 491.346261][T19915] ? lock_downgrade+0x880/0x880 [ 491.351126][T19915] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 491.357393][T19915] ? oom_killer_disable+0x280/0x280 [ 491.362589][T19915] ? find_held_lock+0x35/0x130 [ 491.367365][T19915] mem_cgroup_out_of_memory+0x1ca/0x230 [ 491.372909][T19915] ? memcg_event_wake+0x230/0x230 [ 491.377942][T19915] ? do_raw_spin_unlock+0x57/0x270 [ 491.383055][T19915] ? _raw_spin_unlock+0x2d/0x50 [ 491.387911][T19915] try_charge+0x102c/0x15c0 [ 491.392426][T19915] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 491.397990][T19915] ? rcu_read_lock_sched_held+0x110/0x130 [ 491.403739][T19915] ? __alloc_pages_nodemask+0x599/0x7e0 [ 491.409284][T19915] ? __lockdep_free_key_range+0x120/0x120 [ 491.415031][T19915] __memcg_kmem_charge_memcg+0x7c/0x130 [ 491.420581][T19915] ? memcg_kmem_put_cache+0xb0/0xb0 [ 491.425789][T19915] ? cache_grow_begin+0x594/0x860 [ 491.430810][T19915] ? lockdep_hardirqs_on+0x418/0x5d0 [ 491.436095][T19915] ? trace_hardirqs_on+0x67/0x230 [ 491.441166][T19915] cache_grow_begin+0x5c0/0x860 [ 491.446029][T19915] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 491.452271][T19915] ? __cpuset_node_allowed+0x136/0x540 [ 491.457734][T19915] fallback_alloc+0x1fd/0x2d0 [ 491.462420][T19915] ____cache_alloc_node+0x1be/0x1e0 [ 491.467617][T19915] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 491.473867][T19915] kmem_cache_alloc_node+0xe3/0x710 [ 491.479063][T19915] ? lockdep_hardirqs_on+0x418/0x5d0 [ 491.484349][T19915] ? trace_hardirqs_on+0x67/0x230 [ 491.489398][T19915] copy_process.part.0+0x1d08/0x7980 [ 491.494680][T19915] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 491.500922][T19915] ? debug_smp_processor_id+0x3c/0x280 [ 491.506381][T19915] ? perf_trace_lock+0xeb/0x510 [ 491.511237][T19915] ? __lockdep_free_key_range+0x120/0x120 [ 491.516964][T19915] ? __might_fault+0x12b/0x1e0 [ 491.521756][T19915] ? __cleanup_sighand+0x60/0x60 [ 491.526702][T19915] ? lock_downgrade+0x880/0x880 [ 491.531576][T19915] _do_fork+0x257/0xfd0 [ 491.535765][T19915] ? fork_idle+0x1d0/0x1d0 [ 491.540211][T19915] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 491.545668][T19915] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 491.551125][T19915] ? do_syscall_64+0x26/0x610 [ 491.555804][T19915] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 491.561870][T19915] ? do_syscall_64+0x26/0x610 [ 491.566557][T19915] __x64_sys_clone+0xbf/0x150 [ 491.571238][T19915] do_syscall_64+0x103/0x610 [ 491.575834][T19915] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 491.581747][T19915] RIP: 0033:0x458079 [ 491.585668][T19915] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 491.605376][T19915] RSP: 002b:00007f3505876c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 491.613785][T19915] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000458079 [ 491.621764][T19915] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 491.629733][T19915] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 491.637700][T19915] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f35058776d4 [ 491.645668][T19915] R13: 00000000004be379 R14: 00000000004cea80 R15: 00000000ffffffff 14:09:57 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) 14:09:57 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/0/#/00#\x00', 0x202, 0x0) [ 491.733411][T19915] memory: usage 307200kB, limit 307200kB, failcnt 1355 [ 491.756307][T19915] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 491.770132][T19915] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 14:09:57 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) mount$9p_fd(0x2, &(0x7f0000000300)='.\x00', &(0x7f0000000340)='9p\x00', 0x0, 0x0) 14:09:57 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/.0#\x00', 0x202, 0x0) [ 491.785089][T19915] Memory cgroup stats for /syz4: cache:0KB rss:263248KB rss_huge:243712KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:263380KB inactive_file:0KB active_file:0KB unevictable:0KB [ 491.816779][T19915] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=14190,uid=0 14:09:58 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/.ev/bus/usb/00#/00#\x00', 0x202, 0x0) 14:09:58 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) mount$9p_fd(0xf0, &(0x7f0000000300)='.\x00', &(0x7f0000000340)='9p\x00', 0x0, 0x0) [ 491.873962][T19915] Memory cgroup out of memory: Killed process 14190 (syz-executor.4) total-vm:72448kB, anon-rss:2208kB, file-rss:34816kB, shmem-rss:0kB [ 491.933215][T19912] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 14:09:58 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#//0#\x00', 0x202, 0x0) 14:09:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$selinux_load(r2, &(0x7f0000000100)={0xf97cff8c, 0x8, 'SE Linux', "965a253092bb846867e82af2d1281545dc6369fefda6ac4f0bee9afd50b6e67f448815f1a29b985ba91847404d66fe543b390924a999539e918376172ec76bdc5d22ccdb7b056d573b6f78a70e895ec485d76e3beb2dbb1be393bb5ed8c5476f3afb3d4db55b39d8f083e7e07cf9647dc4083eb2c5770ff1de3e03fd5c05698aa3330ca41f89a099f66ae4f7fe217a5ede35724b20eeb4a8683274"}, 0xab) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) connect$pppoe(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0x0) [ 492.039351][T19912] CPU: 0 PID: 19912 Comm: syz-executor.4 Not tainted 5.0.0+ #23 [ 492.047025][T19912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 492.057102][T19912] Call Trace: [ 492.060402][T19912] dump_stack+0x172/0x1f0 [ 492.064728][T19912] dump_header+0x10f/0xb6c [ 492.069153][T19912] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 492.074976][T19912] ? ___ratelimit+0x60/0x595 [ 492.079645][T19912] ? do_raw_spin_unlock+0x57/0x270 [ 492.084752][T19912] oom_kill_process.cold+0x10/0x15 [ 492.089859][T19912] out_of_memory+0x79a/0x1280 [ 492.094555][T19912] ? oom_killer_disable+0x280/0x280 [ 492.099767][T19912] ? find_held_lock+0x35/0x130 [ 492.104547][T19912] mem_cgroup_out_of_memory+0x1ca/0x230 [ 492.110093][T19912] ? memcg_event_wake+0x230/0x230 [ 492.115149][T19912] ? do_raw_spin_unlock+0x57/0x270 [ 492.120260][T19912] ? _raw_spin_unlock+0x2d/0x50 [ 492.125119][T19912] try_charge+0xa87/0x15c0 [ 492.129530][T19912] ? find_held_lock+0x35/0x130 [ 492.134303][T19912] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 492.139845][T19912] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 492.145400][T19912] ? find_held_lock+0x35/0x130 [ 492.150203][T19912] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 492.155764][T19912] __memcg_kmem_charge_memcg+0x7c/0x130 [ 492.161307][T19912] ? memcg_kmem_put_cache+0xb0/0xb0 [ 492.166511][T19912] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 492.172071][T19912] __memcg_kmem_charge+0x136/0x300 [ 492.177187][T19912] __alloc_pages_nodemask+0x437/0x7e0 [ 492.182561][T19912] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 492.188804][T19912] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 492.194542][T19912] ? copy_process.part.0+0x1d08/0x7980 [ 492.200012][T19912] ? lockdep_hardirqs_on+0x418/0x5d0 [ 492.205298][T19912] ? trace_hardirqs_on+0x67/0x230 [ 492.210330][T19912] copy_process.part.0+0x3e0/0x7980 [ 492.215551][T19912] ? psi_memstall_leave+0x11c/0x180 [ 492.220778][T19912] ? sched_clock+0x2e/0x50 [ 492.225196][T19912] ? psi_memstall_leave+0x12e/0x180 [ 492.230393][T19912] ? find_held_lock+0x35/0x130 [ 492.235159][T19912] ? psi_memstall_leave+0x12e/0x180 [ 492.240390][T19912] ? __cleanup_sighand+0x60/0x60 [ 492.245325][T19912] ? __lock_acquire+0x548/0x3fb0 [ 492.250268][T19912] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 492.256530][T19912] _do_fork+0x257/0xfd0 [ 492.260688][T19912] ? fork_idle+0x1d0/0x1d0 [ 492.265120][T19912] ? blkcg_maybe_throttle_current+0x5e2/0xfc0 [ 492.271183][T19912] ? lock_downgrade+0x880/0x880 [ 492.276031][T19912] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 492.282274][T19912] ? blkcg_exit_queue+0x30/0x30 [ 492.287130][T19912] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 492.292585][T19912] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 492.298066][T19912] ? do_syscall_64+0x26/0x610 [ 492.302750][T19912] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 492.308822][T19912] ? do_syscall_64+0x26/0x610 [ 492.313514][T19912] __x64_sys_clone+0xbf/0x150 [ 492.318216][T19912] do_syscall_64+0x103/0x610 [ 492.322807][T19912] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 492.328692][T19912] RIP: 0033:0x45aa49 [ 492.332587][T19912] Code: ff 48 85 f6 0f 84 d7 8e fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c ae 8e fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 492.352185][T19912] RSP: 002b:00007ffe1c83f6c8 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 492.360591][T19912] RAX: ffffffffffffffda RBX: 00007f3505856700 RCX: 000000000045aa49 [ 492.368558][T19912] RDX: 00007f35058569d0 RSI: 00007f3505855db0 RDI: 00000000003d0f00 [ 492.376526][T19912] RBP: 00007ffe1c83f8d0 R08: 00007f3505856700 R09: 00007f3505856700 [ 492.384491][T19912] R10: 00007f35058569d0 R11: 0000000000000202 R12: 0000000000000000 [ 492.392498][T19912] R13: 00007ffe1c83f77f R14: 00007f35058569c0 R15: 000000000073bfac [ 492.405582][T19912] memory: usage 305076kB, limit 307200kB, failcnt 1355 [ 492.413913][T19912] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 492.421547][T19912] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 492.429180][T19912] Memory cgroup stats for /syz4: cache:0KB rss:261128KB rss_huge:241664KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:261236KB inactive_file:0KB active_file:0KB unevictable:0KB [ 492.467415][T19912] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=14214,uid=0 14:09:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) [ 492.483487][T19912] Memory cgroup out of memory: Killed process 14214 (syz-executor.4) total-vm:72448kB, anon-rss:2208kB, file-rss:34816kB, shmem-rss:0kB [ 492.499220][ T1042] oom_reaper: reaped process 14214 (syz-executor.4), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB 14:09:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r1) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x200, 0x0) ioctl$DRM_IOCTL_RM_MAP(r3, 0x4028641b, &(0x7f0000000100)={&(0x7f0000ffc000/0x1000)=nil, 0x8000, 0x5, 0x4e, &(0x7f0000ffc000/0x2000)=nil, 0x21}) r4 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r2) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000140)={0x2, 0x0, [{0x99e, 0x0, 0x1f}, {0x0, 0x0, 0x1}]}) clone(0x10808000, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r4, &(0x7f0000000a40)=""/4096, 0x1000) 14:09:58 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) mount$9p_fd(0x1020, &(0x7f0000000300)='.\x00', &(0x7f0000000340)='9p\x00', 0x0, 0x0) 14:09:58 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='//ev/bus/usb/00#/00#\x00', 0x202, 0x0) 14:09:58 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/0.#\x00', 0x202, 0x0) 14:09:58 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) mount$9p_fd(0x2000, &(0x7f0000000300)='.\x00', &(0x7f0000000340)='9p\x00', 0x0, 0x0) 14:09:58 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/.us/usb/00#/00#\x00', 0x202, 0x0) 14:09:58 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) mount$9p_fd(0x2010, &(0x7f0000000300)='.\x00', &(0x7f0000000340)='9p\x00', 0x0, 0x0) 14:09:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000240), &(0x7f0000000280)=0xc) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r1) r3 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r2) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$UI_SET_KEYBIT(r4, 0x40045565, 0xa9) clone(0x0, 0x0, 0x0, 0x0, 0x0) bind$vsock_dgram(r0, &(0x7f0000000080)={0x28, 0x0, 0xffffffff, @host}, 0x10) keyctl$read(0xb, r3, &(0x7f0000000a40)=""/4096, 0x1000) flistxattr(r0, &(0x7f0000000100)=""/121, 0x79) 14:09:58 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev//us/usb/00#/00#\x00', 0x202, 0x0) 14:09:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$selinux_load(r2, &(0x7f0000000100)={0xf97cff8c, 0x8, 'SE Linux', "965a253092bb846867e82af2d1281545dc6369fefda6ac4f0bee9afd50b6e67f448815f1a29b985ba91847404d66fe543b390924a999539e918376172ec76bdc5d22ccdb7b056d573b6f78a70e895ec485d76e3beb2dbb1be393bb5ed8c5476f3afb3d4db55b39d8f083e7e07cf9647dc4083eb2c5770ff1de3e03fd5c05698aa3330ca41f89a099f66ae4f7fe217a5ede35724b20eeb4a8683274"}, 0xab) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) connect$pppoe(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0x0) 14:09:59 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) mount$9p_fd(0xedc0, &(0x7f0000000300)='.\x00', &(0x7f0000000340)='9p\x00', 0x0, 0x0) 14:09:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) setsockopt$inet6_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000140)={0x100000000}, 0x4) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0x0) linkat(r3, &(0x7f0000000000)='./file0\x00', r3, &(0x7f0000000100)='./file0\x00', 0x1000) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:09:59 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/0/#\x00', 0x202, 0x0) 14:09:59 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/b.s/usb/00#/00#\x00', 0x202, 0x0) 14:09:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, r1) r3 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r3, 0x3) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) keyctl$revoke(0x3, r2) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/4096, 0x1000) 14:09:59 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) mount$9p_fd(0xf000, &(0x7f0000000300)='.\x00', &(0x7f0000000340)='9p\x00', 0x0, 0x0) [ 493.526507][T20003] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 14:09:59 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x02', 0x202, 0x0) 14:09:59 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) mount$9p_fd(0xf0ffff, &(0x7f0000000300)='.\x00', &(0x7f0000000340)='9p\x00', 0x0, 0x0) 14:09:59 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/b/s/usb/00#/00#\x00', 0x202, 0x0) 14:09:59 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x03', 0x202, 0x0) 14:09:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000040)='./control\x00', 0x0) r1 = open(&(0x7f0000000000)='./control\x00', 0xc40beb2474dfd22a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0x6611, &(0x7f0000000480)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/4096, 0x1000) 14:09:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$selinux_load(r2, &(0x7f0000000100)={0xf97cff8c, 0x8, 'SE Linux', "965a253092bb846867e82af2d1281545dc6369fefda6ac4f0bee9afd50b6e67f448815f1a29b985ba91847404d66fe543b390924a999539e918376172ec76bdc5d22ccdb7b056d573b6f78a70e895ec485d76e3beb2dbb1be393bb5ed8c5476f3afb3d4db55b39d8f083e7e07cf9647dc4083eb2c5770ff1de3e03fd5c05698aa3330ca41f89a099f66ae4f7fe217a5ede35724b20eeb4a8683274"}, 0xab) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) connect$pppoe(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0x0) 14:09:59 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) mount$9p_fd(0x1000000, &(0x7f0000000300)='.\x00', &(0x7f0000000340)='9p\x00', 0x0, 0x0) 14:10:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r6 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f00000002c0)="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", 0xfb, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000001480)={'syz', 0x1}, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f00000014c0)={'hwsim0\x00', {0x2, 0x4e20, @multicast2}}) keyctl$instantiate_iov(0x14, r6, &(0x7f0000000200)=[{&(0x7f00000003c0)="0b8c54c33c2fab50fbf4fdee00c54ce4d49a8164d3c5a342166f4ca043959cf0984adae35ca35c7588ea62a6741ef78ce5ec3efeb05512629b7464655e831df9b01d61f4572a7599385a58e050a384f42669cb72e0f25b402c0cc9d2e97acab358ea132d695c9df2bb233ca9f47819ec1283be652339c4fe363ba5c9f893b075468fad429eddd9a512c2f6c8437b4201c4f06e35c007dc8751524f24e4a119565b7e6e5bf9666e03e9731512b21273d108f56d8cb0adc2", 0xb7}, {&(0x7f0000000140)="d0d4b526014962021da28490f77a6834e3d5c502144b0805b867daa1529de457dc500cb6f80287fcdbc0b586777ecd5977eae6a734d439f4b85d8219b53394d0f71e91ba3f5b4dad0fc871a11e9ca5641801c3", 0x53}, {&(0x7f0000000480)="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", 0x1000}], 0x3, r7) splice(r2, 0x0, r4, 0x0, 0x200010005, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:10:00 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/.sb/00#/00#\x00', 0x202, 0x0) 14:10:00 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) mount$9p_fd(0x2000000, &(0x7f0000000300)='.\x00', &(0x7f0000000340)='9p\x00', 0x0, 0x0) 14:10:00 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x04', 0x202, 0x0) 14:10:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r1) r3 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r2) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000080)={0x0, 0x8b0e}, 0x8) keyctl$read(0xb, r3, &(0x7f0000000a40)=""/4096, 0x1000) 14:10:00 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) mount$9p_fd(0x20000000, &(0x7f0000000300)='.\x00', &(0x7f0000000340)='9p\x00', 0x0, 0x0) 14:10:00 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\a', 0x202, 0x0) 14:10:00 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus//sb/00#/00#\x00', 0x202, 0x0) [ 494.440247][T20042] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 [ 494.500704][T20042] CPU: 1 PID: 20042 Comm: syz-executor.4 Not tainted 5.0.0+ #23 [ 494.508362][T20042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 494.518418][T20042] Call Trace: [ 494.521714][T20042] dump_stack+0x172/0x1f0 [ 494.526056][T20042] dump_header+0x10f/0xb6c [ 494.530508][T20042] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 494.536312][T20042] ? ___ratelimit+0x60/0x595 [ 494.540929][T20042] ? do_raw_spin_unlock+0x57/0x270 [ 494.546049][T20042] oom_kill_process.cold+0x10/0x15 [ 494.551162][T20042] out_of_memory+0x79a/0x1280 [ 494.555843][T20042] ? lock_downgrade+0x880/0x880 [ 494.560696][T20042] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 494.566940][T20042] ? oom_killer_disable+0x280/0x280 [ 494.572170][T20042] ? find_held_lock+0x35/0x130 [ 494.576951][T20042] mem_cgroup_out_of_memory+0x1ca/0x230 [ 494.582520][T20042] ? memcg_event_wake+0x230/0x230 [ 494.587558][T20042] ? do_raw_spin_unlock+0x57/0x270 [ 494.592673][T20042] ? _raw_spin_unlock+0x2d/0x50 [ 494.597532][T20042] try_charge+0x102c/0x15c0 [ 494.602031][T20042] ? find_held_lock+0x35/0x130 [ 494.606816][T20042] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 494.612361][T20042] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 494.617905][T20042] ? find_held_lock+0x35/0x130 [ 494.622669][T20042] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 494.628230][T20042] __memcg_kmem_charge_memcg+0x7c/0x130 [ 494.633790][T20042] ? memcg_kmem_put_cache+0xb0/0xb0 [ 494.638999][T20042] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 494.644560][T20042] __memcg_kmem_charge+0x136/0x300 [ 494.649678][T20042] __alloc_pages_nodemask+0x437/0x7e0 [ 494.655061][T20042] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 494.660793][T20042] ? copy_page_range+0x125a/0x1f90 [ 494.665933][T20042] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 494.672177][T20042] alloc_pages_current+0x107/0x210 [ 494.677296][T20042] pte_alloc_one+0x1b/0x1a0 [ 494.681804][T20042] __pte_alloc+0x20/0x310 [ 494.686141][T20042] copy_page_range+0x1529/0x1f90 [ 494.691075][T20042] ? find_held_lock+0x35/0x130 [ 494.695874][T20042] ? pmd_alloc+0x180/0x180 [ 494.700291][T20042] ? __rb_insert_augmented+0x231/0xdf0 [ 494.705752][T20042] ? validate_mm_rb+0xa3/0xc0 [ 494.710432][T20042] ? __vma_link_rb+0x279/0x370 [ 494.717610][T20042] copy_process.part.0+0x568b/0x7980 [ 494.723701][T20042] ? __cleanup_sighand+0x60/0x60 [ 494.728669][T20042] _do_fork+0x257/0xfd0 [ 494.732834][T20042] ? fork_idle+0x1d0/0x1d0 [ 494.737265][T20042] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 494.742723][T20042] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 494.748184][T20042] ? do_syscall_64+0x26/0x610 [ 494.752859][T20042] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 494.758924][T20042] ? do_syscall_64+0x26/0x610 [ 494.763606][T20042] __x64_sys_clone+0xbf/0x150 [ 494.768292][T20042] do_syscall_64+0x103/0x610 [ 494.772886][T20042] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 494.778830][T20042] RIP: 0033:0x458079 [ 494.782753][T20042] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 494.802374][T20042] RSP: 002b:00007f3505876c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 494.810812][T20042] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000458079 [ 494.818792][T20042] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 494.826764][T20042] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 494.835225][T20042] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f35058776d4 [ 494.843198][T20042] R13: 00000000004be379 R14: 00000000004cea80 R15: 00000000ffffffff [ 494.879269][T20042] memory: usage 307200kB, limit 307200kB, failcnt 1383 [ 494.887373][T20042] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 494.907730][T20042] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 14:10:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$selinux_load(r2, &(0x7f0000000100)={0xf97cff8c, 0x8, 'SE Linux', "965a253092bb846867e82af2d1281545dc6369fefda6ac4f0bee9afd50b6e67f448815f1a29b985ba91847404d66fe543b390924a999539e918376172ec76bdc5d22ccdb7b056d573b6f78a70e895ec485d76e3beb2dbb1be393bb5ed8c5476f3afb3d4db55b39d8f083e7e07cf9647dc4083eb2c5770ff1de3e03fd5c05698aa3330ca41f89a099f66ae4f7fe217a5ede35724b20eeb4a8683274"}, 0xab) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0x0) 14:10:01 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) mount$9p_fd(0x20100000, &(0x7f0000000300)='.\x00', &(0x7f0000000340)='9p\x00', 0x0, 0x0) [ 494.919910][T20042] Memory cgroup stats for /syz4: cache:0KB rss:261916KB rss_huge:241664KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:261940KB inactive_file:4KB active_file:0KB unevictable:0KB [ 494.988652][T20042] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=19966,uid=0 [ 495.026764][T20042] Memory cgroup out of memory: Killed process 19966 (syz-executor.4) total-vm:72580kB, anon-rss:2216kB, file-rss:34816kB, shmem-rss:0kB 14:10:01 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) mount$9p_fd(0x8cffffff, &(0x7f0000000300)='.\x00', &(0x7f0000000340)='9p\x00', 0x0, 0x0) [ 495.063432][ T1042] oom_reaper: reaped process 19966 (syz-executor.4), now anon-rss:0kB, file-rss:34688kB, shmem-rss:0kB 14:10:01 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\xe0', 0x202, 0x0) [ 495.153328][T20042] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 [ 495.224535][T20042] CPU: 0 PID: 20042 Comm: syz-executor.4 Not tainted 5.0.0+ #23 [ 495.232239][T20042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 495.242475][T20042] Call Trace: [ 495.245797][T20042] dump_stack+0x172/0x1f0 [ 495.250141][T20042] dump_header+0x10f/0xb6c [ 495.254572][T20042] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 495.260407][T20042] ? ___ratelimit+0x60/0x595 [ 495.265053][T20042] ? do_raw_spin_unlock+0x57/0x270 [ 495.270191][T20042] oom_kill_process.cold+0x10/0x15 [ 495.275327][T20042] out_of_memory+0x79a/0x1280 [ 495.280065][T20042] ? lock_downgrade+0x880/0x880 [ 495.284940][T20042] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 495.291201][T20042] ? oom_killer_disable+0x280/0x280 [ 495.296422][T20042] ? find_held_lock+0x35/0x130 [ 495.301225][T20042] mem_cgroup_out_of_memory+0x1ca/0x230 [ 495.306793][T20042] ? memcg_event_wake+0x230/0x230 [ 495.311851][T20042] ? do_raw_spin_unlock+0x57/0x270 [ 495.317033][T20042] ? _raw_spin_unlock+0x2d/0x50 [ 495.321917][T20042] try_charge+0x102c/0x15c0 [ 495.326441][T20042] ? find_held_lock+0x35/0x130 [ 495.331389][T20042] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 495.336957][T20042] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 495.342572][T20042] ? find_held_lock+0x35/0x130 [ 495.347362][T20042] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 495.352943][T20042] __memcg_kmem_charge_memcg+0x7c/0x130 [ 495.358554][T20042] ? memcg_kmem_put_cache+0xb0/0xb0 [ 495.363779][T20042] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 495.369352][T20042] __memcg_kmem_charge+0x136/0x300 [ 495.374496][T20042] __alloc_pages_nodemask+0x437/0x7e0 [ 495.379896][T20042] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 495.385686][T20042] ? copy_page_range+0x125a/0x1f90 [ 495.390820][T20042] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 495.397096][T20042] alloc_pages_current+0x107/0x210 [ 495.402376][T20042] pte_alloc_one+0x1b/0x1a0 [ 495.406906][T20042] __pte_alloc+0x20/0x310 [ 495.411351][T20042] copy_page_range+0x1529/0x1f90 [ 495.416314][T20042] ? find_held_lock+0x35/0x130 [ 495.421127][T20042] ? pmd_alloc+0x180/0x180 [ 495.425573][T20042] ? __rb_insert_augmented+0x231/0xdf0 [ 495.431062][T20042] ? validate_mm_rb+0xa3/0xc0 [ 495.435767][T20042] ? __vma_link_rb+0x279/0x370 [ 495.440566][T20042] copy_process.part.0+0x568b/0x7980 [ 495.445946][T20042] ? __cleanup_sighand+0x60/0x60 [ 495.450959][T20042] _do_fork+0x257/0xfd0 [ 495.455191][T20042] ? fork_idle+0x1d0/0x1d0 [ 495.459736][T20042] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 495.465219][T20042] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 495.470696][T20042] ? do_syscall_64+0x26/0x610 [ 495.475396][T20042] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 495.481500][T20042] ? do_syscall_64+0x26/0x610 [ 495.486209][T20042] __x64_sys_clone+0xbf/0x150 [ 495.490912][T20042] do_syscall_64+0x103/0x610 [ 495.495531][T20042] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 495.501445][T20042] RIP: 0033:0x458079 [ 495.505362][T20042] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 495.525021][T20042] RSP: 002b:00007f3505876c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 495.533455][T20042] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000458079 [ 495.541445][T20042] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 495.549434][T20042] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 495.557453][T20042] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f35058776d4 [ 495.565442][T20042] R13: 00000000004be379 R14: 00000000004cea80 R15: 00000000ffffffff 14:10:01 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r2 = socket$inet_tcp(0x2, 0x1, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$UI_SET_KEYBIT(r3, 0x40045565, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet_udp(0x2, 0x2, 0x0) close(r6) r7 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r7, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r7, 0x80047437, &(0x7f0000000140)) ustat(0xeabf, &(0x7f0000000000)) write$binfmt_misc(r5, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r4, 0x0, r6, 0x0, 0x200010005, 0x0) write$P9_RREADDIR(r4, &(0x7f00000002c0)={0x103, 0x29, 0x2, {0x1, [{{0x8, 0x0, 0x8}, 0x8, 0x800, 0x7, './file0'}, {{0x4, 0x2, 0x2}, 0x9, 0x2, 0x7, './file0'}, {{0x10, 0x2, 0x3}, 0x9, 0x80000000, 0x7, './file0'}, {{0x4, 0x2, 0x8}, 0x0, 0x4, 0x7, './file0'}, {{0x10, 0x0, 0x3}, 0x0, 0x55, 0x7, './file0'}, {{0xd2, 0x3, 0x2}, 0xb2, 0x3, 0x7, './file0'}, {{0x11, 0x3, 0x5}, 0xfffffffffffff622, 0x3ff, 0x7, './file0'}, {{0x80, 0x1, 0x5}, 0xffffffff80000001, 0x664, 0x7, './file0'}]}}, 0x103) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, 0x0) 14:10:01 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/us./00#/00#\x00', 0x202, 0x0) 14:10:01 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) mount$9p_fd(0xc0ed0000, &(0x7f0000000300)='.\x00', &(0x7f0000000340)='9p\x00', 0x0, 0x0) 14:10:01 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) [ 495.600306][T20042] memory: usage 306940kB, limit 307200kB, failcnt 1404 [ 495.607601][T20042] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 495.615390][T20042] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 495.622811][T20042] Memory cgroup stats for /syz4: cache:0KB rss:261916KB rss_huge:241664KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:261840KB inactive_file:0KB active_file:0KB unevictable:0KB [ 495.741535][T20042] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=14244,uid=0 [ 495.775421][T20042] Memory cgroup out of memory: Killed process 14244 (syz-executor.4) total-vm:72448kB, anon-rss:2208kB, file-rss:34816kB, shmem-rss:0kB [ 495.803729][ T1042] oom_reaper: reaped process 14244 (syz-executor.4), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB 14:10:02 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/us//00#/00#\x00', 0x202, 0x0) 14:10:02 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) mount$9p_fd(0xf6ffffff, &(0x7f0000000300)='.\x00', &(0x7f0000000340)='9p\x00', 0x0, 0x0) 14:10:02 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) 14:10:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) accept4$x25(r1, 0x0, &(0x7f0000000300), 0x800) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r2) r4 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r3) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r4, &(0x7f0000000a40)=""/4096, 0x1000) r5 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x5, 0x10000) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r5, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x100000001, @initdev={0xac, 0x1e, 0x1, 0x0}}], 0x20) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000240)={0x0, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @multicast1}, 0x100, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffffffffffff7fff, 0x100000000, 0x8001}) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x10, 0x4) 14:10:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$selinux_load(r2, &(0x7f0000000100)={0xf97cff8c, 0x8, 'SE Linux', "965a253092bb846867e82af2d1281545dc6369fefda6ac4f0bee9afd50b6e67f448815f1a29b985ba91847404d66fe543b390924a999539e918376172ec76bdc5d22ccdb7b056d573b6f78a70e895ec485d76e3beb2dbb1be393bb5ed8c5476f3afb3d4db55b39d8f083e7e07cf9647dc4083eb2c5770ff1de3e03fd5c05698aa3330ca41f89a099f66ae4f7fe217a5ede35724b20eeb4a8683274"}, 0xab) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0x0) 14:10:02 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) mount$9p_fd(0xfffff000, &(0x7f0000000300)='.\x00', &(0x7f0000000340)='9p\x00', 0x0, 0x0) 14:10:02 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/.0#/00#\x00', 0x202, 0x0) 14:10:02 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) [ 496.183532][T20108] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 [ 496.222034][T20108] CPU: 1 PID: 20108 Comm: syz-executor.4 Not tainted 5.0.0+ #23 [ 496.229709][T20108] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 496.239784][T20108] Call Trace: [ 496.243109][T20108] dump_stack+0x172/0x1f0 [ 496.247644][T20108] dump_header+0x10f/0xb6c [ 496.252092][T20108] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 496.257923][T20108] ? ___ratelimit+0x60/0x595 [ 496.262540][T20108] ? do_raw_spin_unlock+0x57/0x270 [ 496.267703][T20108] oom_kill_process.cold+0x10/0x15 [ 496.272853][T20108] out_of_memory+0x79a/0x1280 [ 496.277562][T20108] ? lock_downgrade+0x880/0x880 [ 496.282437][T20108] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 496.288704][T20108] ? oom_killer_disable+0x280/0x280 [ 496.293922][T20108] ? find_held_lock+0x35/0x130 [ 496.298720][T20108] mem_cgroup_out_of_memory+0x1ca/0x230 [ 496.304290][T20108] ? memcg_event_wake+0x230/0x230 [ 496.309347][T20108] ? do_raw_spin_unlock+0x57/0x270 [ 496.314492][T20108] ? _raw_spin_unlock+0x2d/0x50 [ 496.319383][T20108] try_charge+0x102c/0x15c0 [ 496.323912][T20108] ? find_held_lock+0x35/0x130 [ 496.328709][T20108] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 496.334276][T20108] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 496.339848][T20108] ? find_held_lock+0x35/0x130 [ 496.344636][T20108] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 496.350216][T20108] __memcg_kmem_charge_memcg+0x7c/0x130 [ 496.355785][T20108] ? memcg_kmem_put_cache+0xb0/0xb0 [ 496.361049][T20108] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 496.366621][T20108] __memcg_kmem_charge+0x136/0x300 [ 496.371763][T20108] __alloc_pages_nodemask+0x437/0x7e0 [ 496.377165][T20108] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 496.382921][T20108] ? copy_page_range+0x125a/0x1f90 [ 496.388287][T20108] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 496.394571][T20108] alloc_pages_current+0x107/0x210 [ 496.399716][T20108] pte_alloc_one+0x1b/0x1a0 [ 496.404249][T20108] __pte_alloc+0x20/0x310 [ 496.408607][T20108] copy_page_range+0x1529/0x1f90 [ 496.413565][T20108] ? find_held_lock+0x35/0x130 [ 496.418380][T20108] ? pmd_alloc+0x180/0x180 [ 496.422827][T20108] ? __rb_insert_augmented+0x231/0xdf0 [ 496.428307][T20108] ? validate_mm_rb+0xa3/0xc0 [ 496.433046][T20108] ? __vma_link_rb+0x279/0x370 [ 496.437845][T20108] copy_process.part.0+0x568b/0x7980 [ 496.443183][T20108] ? __cleanup_sighand+0x60/0x60 [ 496.448355][T20108] _do_fork+0x257/0xfd0 [ 496.452545][T20108] ? fork_idle+0x1d0/0x1d0 [ 496.457041][T20108] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 496.462536][T20108] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 496.468086][T20108] ? do_syscall_64+0x26/0x610 [ 496.472786][T20108] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 496.478874][T20108] ? do_syscall_64+0x26/0x610 [ 496.483580][T20108] __x64_sys_clone+0xbf/0x150 [ 496.488284][T20108] do_syscall_64+0x103/0x610 [ 496.492903][T20108] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 496.498816][T20108] RIP: 0033:0x458079 [ 496.502733][T20108] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 496.522449][T20108] RSP: 002b:00007f3505876c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 496.531026][T20108] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000458079 [ 496.539042][T20108] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 496.547062][T20108] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 496.555059][T20108] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f35058776d4 [ 496.563056][T20108] R13: 00000000004be379 R14: 00000000004cea80 R15: 00000000ffffffff 14:10:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000180)=ANY=[], 0x6) splice(r2, 0x0, r4, 0x0, 0x200010005, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:10:02 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) mount$9p_fd(0xffffff8c, &(0x7f0000000300)='.\x00', &(0x7f0000000340)='9p\x00', 0x0, 0x0) 14:10:02 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb//0#/00#\x00', 0x202, 0x0) 14:10:02 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) [ 496.585907][T20108] memory: usage 307200kB, limit 307200kB, failcnt 1425 [ 496.597160][T20108] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 496.605096][T20108] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 496.612117][T20108] Memory cgroup stats for /syz4: cache:0KB rss:261768KB rss_huge:241664KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:261940KB inactive_file:4KB active_file:0KB unevictable:0KB 14:10:02 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) mount$9p_fd(0xfffffff6, &(0x7f0000000300)='.\x00', &(0x7f0000000340)='9p\x00', 0x0, 0x0) 14:10:02 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/0.#/00#\x00', 0x202, 0x0) [ 496.699738][T20108] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=20107,uid=0 [ 496.729837][T20108] Memory cgroup out of memory: Killed process 20107 (syz-executor.4) total-vm:72580kB, anon-rss:2208kB, file-rss:35612kB, shmem-rss:0kB 14:10:02 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) 14:10:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r1) r3 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r2) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r3, &(0x7f0000000a40)=""/4096, 0x1000) r4 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x82, 0x40000) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r4, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000300)={0xa0, r5, 0x4, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x44, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x8}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x23}}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x30, 0x32}}]}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x00'}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x44004}, 0x4004080) 14:10:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$selinux_load(r2, &(0x7f0000000100)={0xf97cff8c, 0x8, 'SE Linux', "965a253092bb846867e82af2d1281545dc6369fefda6ac4f0bee9afd50b6e67f448815f1a29b985ba91847404d66fe543b390924a999539e918376172ec76bdc5d22ccdb7b056d573b6f78a70e895ec485d76e3beb2dbb1be393bb5ed8c5476f3afb3d4db55b39d8f083e7e07cf9647dc4083eb2c5770ff1de3e03fd5c05698aa3330ca41f89a099f66ae4f7fe217a5ede35724b20eeb4a8683274"}, 0xab) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0x0) 14:10:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r0, r0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f00000001c0)={0x18, 0x0, {0x4, @remote, 'lo\x00'}}, 0x27) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:10:03 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) mount$9p_fd(0xedc000000000, &(0x7f0000000300)='.\x00', &(0x7f0000000340)='9p\x00', 0x0, 0x0) 14:10:03 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/0/#/00#\x00', 0x202, 0x0) 14:10:03 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) 14:10:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x4001) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000100), &(0x7f0000000140)=0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) r6 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r6, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r6, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r3, 0x0, r5, 0x0, 0x200010005, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) [ 497.075201][T20150] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 [ 497.097347][T20150] CPU: 0 PID: 20150 Comm: syz-executor.4 Not tainted 5.0.0+ #23 [ 497.105172][T20150] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 497.115365][T20150] Call Trace: [ 497.118683][T20150] dump_stack+0x172/0x1f0 [ 497.123063][T20150] dump_header+0x10f/0xb6c [ 497.127507][T20150] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 497.133341][T20150] ? ___ratelimit+0x60/0x595 [ 497.137959][T20150] ? do_raw_spin_unlock+0x57/0x270 [ 497.143220][T20150] oom_kill_process.cold+0x10/0x15 [ 497.148355][T20150] out_of_memory+0x79a/0x1280 [ 497.153072][T20150] ? lock_downgrade+0x880/0x880 [ 497.157944][T20150] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 497.164238][T20150] ? oom_killer_disable+0x280/0x280 [ 497.169610][T20150] ? find_held_lock+0x35/0x130 [ 497.174410][T20150] mem_cgroup_out_of_memory+0x1ca/0x230 [ 497.179970][T20150] ? memcg_event_wake+0x230/0x230 [ 497.185166][T20150] ? do_raw_spin_unlock+0x57/0x270 [ 497.190301][T20150] ? _raw_spin_unlock+0x2d/0x50 [ 497.195177][T20150] try_charge+0x102c/0x15c0 [ 497.199693][T20150] ? find_held_lock+0x35/0x130 [ 497.204489][T20150] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 497.210054][T20150] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 497.215617][T20150] ? find_held_lock+0x35/0x130 [ 497.220488][T20150] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 497.226076][T20150] __memcg_kmem_charge_memcg+0x7c/0x130 [ 497.231728][T20150] ? memcg_kmem_put_cache+0xb0/0xb0 [ 497.236949][T20150] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 497.242860][T20150] __memcg_kmem_charge+0x136/0x300 [ 497.248026][T20150] __alloc_pages_nodemask+0x437/0x7e0 [ 497.253425][T20150] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 497.259175][T20150] ? copy_page_range+0x125a/0x1f90 [ 497.264312][T20150] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 497.270583][T20150] alloc_pages_current+0x107/0x210 [ 497.275718][T20150] pte_alloc_one+0x1b/0x1a0 [ 497.280241][T20150] __pte_alloc+0x20/0x310 [ 497.284595][T20150] copy_page_range+0x1529/0x1f90 [ 497.289561][T20150] ? find_held_lock+0x35/0x130 [ 497.294389][T20150] ? pmd_alloc+0x180/0x180 [ 497.298831][T20150] ? __rb_insert_augmented+0x231/0xdf0 [ 497.304413][T20150] ? validate_mm_rb+0xa3/0xc0 [ 497.309110][T20150] ? __vma_link_rb+0x279/0x370 [ 497.313904][T20150] copy_process.part.0+0x568b/0x7980 [ 497.319247][T20150] ? __cleanup_sighand+0x60/0x60 [ 497.324230][T20150] _do_fork+0x257/0xfd0 [ 497.328414][T20150] ? fork_idle+0x1d0/0x1d0 [ 497.332865][T20150] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 497.338430][T20150] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 497.343906][T20150] ? do_syscall_64+0x26/0x610 [ 497.348598][T20150] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 497.354688][T20150] ? do_syscall_64+0x26/0x610 [ 497.359389][T20150] __x64_sys_clone+0xbf/0x150 [ 497.364089][T20150] do_syscall_64+0x103/0x610 [ 497.368702][T20150] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 497.374605][T20150] RIP: 0033:0x458079 [ 497.378514][T20150] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 497.398227][T20150] RSP: 002b:00007f3505876c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 497.406652][T20150] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000458079 [ 497.414639][T20150] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 14:10:03 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) mount$9p_fd(0xf0ffffffffffff, &(0x7f0000000300)='.\x00', &(0x7f0000000340)='9p\x00', 0x0, 0x0) [ 497.422622][T20150] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 497.430605][T20150] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f35058776d4 [ 497.438697][T20150] R13: 00000000004be379 R14: 00000000004cea80 R15: 00000000ffffffff 14:10:03 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) mount$9p_fd(0x100000000000000, &(0x7f0000000300)='.\x00', &(0x7f0000000340)='9p\x00', 0x0, 0x0) 14:10:03 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/.0#\x00', 0x202, 0x0) 14:10:03 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) [ 497.583142][T20150] memory: usage 307200kB, limit 307200kB, failcnt 1473 [ 497.601836][T20150] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 14:10:03 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) mount$9p_fd(0x200000000000000, &(0x7f0000000300)='.\x00', &(0x7f0000000340)='9p\x00', 0x0, 0x0) [ 497.644964][T20150] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 497.664697][T20150] Memory cgroup stats for /syz4: cache:0KB rss:261768KB rss_huge:241664KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:261940KB inactive_file:0KB active_file:0KB unevictable:0KB [ 497.872287][T20150] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=14259,uid=0 [ 497.889719][T20150] Memory cgroup out of memory: Killed process 14259 (syz-executor.4) total-vm:72448kB, anon-rss:2208kB, file-rss:34816kB, shmem-rss:0kB 14:10:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = add_key(&(0x7f0000000300)='.dead\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000001a40)="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", 0x1000, 0xfffffffffffffff8) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz'}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r2) r4 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r3) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r4, &(0x7f0000000a40)=""/4096, 0x1000) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r5, 0xc0205649, &(0x7f00000001c0)={0xf9c0000, 0x6ab, 0x5, [], &(0x7f0000000140)={0x990a6f, 0x8, [], @p_u32=&(0x7f0000000100)=0x4}}) 14:10:04 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#//0#\x00', 0x202, 0x0) 14:10:04 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) mount$9p_fd(0x2000000000000000, &(0x7f0000000300)='.\x00', &(0x7f0000000340)='9p\x00', 0x0, 0x0) 14:10:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$selinux_load(r2, &(0x7f0000000100)={0xf97cff8c, 0x8, 'SE Linux', "965a253092bb846867e82af2d1281545dc6369fefda6ac4f0bee9afd50b6e67f448815f1a29b985ba91847404d66fe543b390924a999539e918376172ec76bdc5d22ccdb7b056d573b6f78a70e895ec485d76e3beb2dbb1be393bb5ed8c5476f3afb3d4db55b39d8f083e7e07cf9647dc4083eb2c5770ff1de3e03fd5c05698aa3330ca41f89a099f66ae4f7fe217a5ede35724b20eeb4a8683274"}, 0xab) close(0xffffffffffffffff) r4 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r4, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r4, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x200010005, 0x0) 14:10:04 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) 14:10:04 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/0.#\x00', 0x202, 0x0) 14:10:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'caif0\x00', 0x0}) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f0000000100)=r6) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:10:04 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) 14:10:04 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/0/#\x00', 0x202, 0x0) 14:10:04 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) mount$9p_fd(0x2010000000000000, &(0x7f0000000300)='.\x00', &(0x7f0000000340)='9p\x00', 0x0, 0x0) 14:10:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r1) add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r2) sync_file_range(r0, 0xd, 0x1, 0x4) getpeername$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) clone(0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) getsockopt$packet_buf(r3, 0x107, 0x6, &(0x7f0000001a40)=""/4096, &(0x7f00000001c0)=0x1000) 14:10:04 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x80', 0x202, 0x0) 14:10:04 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) mount$9p_fd(0x8cffffff00000000, &(0x7f0000000300)='.\x00', &(0x7f0000000340)='9p\x00', 0x0, 0x0) 14:10:04 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x02', 0x202, 0x0) 14:10:04 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) 14:10:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$selinux_load(r2, &(0x7f0000000100)={0xf97cff8c, 0x8, 'SE Linux', "965a253092bb846867e82af2d1281545dc6369fefda6ac4f0bee9afd50b6e67f448815f1a29b985ba91847404d66fe543b390924a999539e918376172ec76bdc5d22ccdb7b056d573b6f78a70e895ec485d76e3beb2dbb1be393bb5ed8c5476f3afb3d4db55b39d8f083e7e07cf9647dc4083eb2c5770ff1de3e03fd5c05698aa3330ca41f89a099f66ae4f7fe217a5ede35724b20eeb4a8683274"}, 0xab) close(0xffffffffffffffff) r4 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r4, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r4, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x200010005, 0x0) 14:10:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="049717e5e061da1722933e5e17458f5261b7923f89dbbbb8364635b5f19b29") r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r1) r3 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r2) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r3, &(0x7f0000000a40)=""/4096, 0x1000) 14:10:04 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x03', 0x202, 0x0) 14:10:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x4b5, &(0x7f0000000000)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:10:05 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) mount$9p_fd(0xf6ffffff00000000, &(0x7f0000000300)='.\x00', &(0x7f0000000340)='9p\x00', 0x0, 0x0) 14:10:05 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\v', 0x202, 0x0) 14:10:05 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x04', 0x202, 0x0) 14:10:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$rxrpc(0x21, 0x2, 0xa) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r1, 0x110, 0x4, &(0x7f0000000080), 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r2) r4 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r3) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r4, &(0x7f0000000a40)=""/4096, 0x1000) 14:10:05 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\a', 0x202, 0x0) 14:10:05 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) 14:10:05 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) mount$9p_fd(0xfffffffffffff000, &(0x7f0000000300)='.\x00', &(0x7f0000000340)='9p\x00', 0x0, 0x0) 14:10:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, r1) r3 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r2) clone(0x0, 0x0, 0x0, 0x0, 0x0) r4 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x8, 0x40) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f0000000100)) keyctl$read(0xb, r3, &(0x7f0000000a40)=""/4096, 0x1000) setsockopt$inet_dccp_buf(r4, 0x21, 0xcf, &(0x7f0000000240)="094a2bdd63e9c2ddf9a0f7669a940743b32f4fc131415de8f9ee3e606b836745ecf7da87302052c160120758c331cc163d2427f0707fc0e93465c02638897584adc360335fab50374ac682b0a2d0", 0x4e) 14:10:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$selinux_load(r2, &(0x7f0000000100)={0xf97cff8c, 0x8, 'SE Linux', "965a253092bb846867e82af2d1281545dc6369fefda6ac4f0bee9afd50b6e67f448815f1a29b985ba91847404d66fe543b390924a999539e918376172ec76bdc5d22ccdb7b056d573b6f78a70e895ec485d76e3beb2dbb1be393bb5ed8c5476f3afb3d4db55b39d8f083e7e07cf9647dc4083eb2c5770ff1de3e03fd5c05698aa3330ca41f89a099f66ae4f7fe217a5ede35724b20eeb4a8683274"}, 0xab) close(0xffffffffffffffff) r4 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r4, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r4, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x200010005, 0x0) 14:10:05 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\xff', 0x202, 0x0) 14:10:05 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\xe0', 0x202, 0x0) 14:10:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000080)) ioctl$PIO_SCRNMAP(r3, 0x4b41, &(0x7f0000000100)="6a872203b318ca4a928ac9d8a6857ba2b2ac0ac8124defc45ef75bc6c071a6d69bb84ec005fbf3e9ff6caa4eada1a6649529b3450fdf15fa3f934f037ece2730ba79a4b91d8cf95f7f37e9c563fedc4af6be4dcff514612d3c865ad1fcd6991cb1d50f5f9b2c0cc1f65755f22291c8293fc143df72c5f625a8f002a18e0cff8c6f640005910a4f0bcb7b3e5caaaf630bb2ba6fd1fe906d78fc355fa791742b8a28b3cb89fa3f46d2e9b37b8e044d3449016f48a26523") write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$TCGETS(r3, 0x5401, &(0x7f0000000000)) 14:10:06 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000340)='9p\x02', 0x0, 0x0) 14:10:06 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c010000000000fb00000700000000000000000000000000000100000000001030b4338dcb6cb7"], 0x48) 14:10:06 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\xff', 0x202, 0x0) 14:10:06 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) 14:10:06 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x7f', 0x202, 0x0) [ 500.257190][T20300] kasan: CONFIG_KASAN_INLINE enabled [ 500.302139][T20300] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 500.319915][T20300] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 500.326872][T20300] CPU: 1 PID: 20300 Comm: syz-executor.4 Not tainted 5.0.0+ #23 [ 500.334509][T20300] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 500.344595][T20300] RIP: 0010:ebitmap_destroy+0x32/0xf0 14:10:06 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) 14:10:06 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000340)='9p\xf0', 0x0, 0x0) [ 500.349970][T20300] Code: 49 89 fd 41 54 53 e8 1d f4 7f fe 4d 85 ed 0f 84 99 00 00 00 e8 0f f4 7f fe 4c 89 ea 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 98 00 00 00 49 be 00 00 00 00 00 fc ff df 4d 8b [ 500.369579][T20300] RSP: 0018:ffff8880500778c8 EFLAGS: 00010202 [ 500.375650][T20300] RAX: dffffc0000000000 RBX: ffff88808f1c86a8 RCX: ffffc9000e6a3000 [ 500.383627][T20300] RDX: 0000000000000002 RSI: ffffffff82f07021 RDI: 0000000000000010 [ 500.391611][T20300] RBP: ffff8880500778e8 R08: ffff888099b1e100 R09: ffff888099b1e9f0 [ 500.399588][T20300] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000002 [ 500.407563][T20300] R13: 0000000000000010 R14: ffffed1011e3910a R15: 0000000000010000 [ 500.415575][T20300] FS: 00007f3505877700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 500.424515][T20300] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 500.431111][T20300] CR2: 00005576bcae6a98 CR3: 00000000a80d0000 CR4: 00000000001426e0 [ 500.439097][T20300] Call Trace: [ 500.442396][T20300] policydb_destroy+0x62c/0x7f0 [ 500.447255][T20300] policydb_read+0xe27/0x52c0 [ 500.451950][T20300] ? perm_read.isra.0+0x2d0/0x2d0 [ 500.456980][T20300] ? string_to_av_perm+0xa0/0xa0 [ 500.461932][T20300] ? security_load_policy+0x185/0x1170 [ 500.467400][T20300] ? rcu_read_lock_sched_held+0x110/0x130 [ 500.473129][T20300] ? kmem_cache_alloc_trace+0x354/0x760 [ 500.478677][T20300] ? find_first_zero_bit+0x9a/0xc0 [ 500.483807][T20300] ? kasan_check_read+0x11/0x20 [ 500.488662][T20300] security_load_policy+0x36d/0x1170 [ 500.493955][T20300] ? security_change_sid+0x150/0x150 [ 500.499237][T20300] ? find_held_lock+0x35/0x130 [ 500.503997][T20300] ? __might_fault+0x12b/0x1e0 [ 500.508767][T20300] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 500.515000][T20300] ? _copy_from_user+0xdd/0x150 [ 500.519849][T20300] sel_write_load+0x25a/0x470 [ 500.524524][T20300] __vfs_write+0x8d/0x110 [ 500.528848][T20300] ? sel_make_policy_nodes+0x1540/0x1540 [ 500.534474][T20300] vfs_write+0x20c/0x580 [ 500.538745][T20300] ksys_write+0xea/0x1f0 [ 500.542981][T20300] ? __ia32_sys_read+0xb0/0xb0 [ 500.547741][T20300] ? do_syscall_64+0x26/0x610 [ 500.552413][T20300] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 500.558472][T20300] ? do_syscall_64+0x26/0x610 [ 500.563176][T20300] __x64_sys_write+0x73/0xb0 [ 500.567758][T20300] do_syscall_64+0x103/0x610 [ 500.572340][T20300] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 500.578220][T20300] RIP: 0033:0x458079 [ 500.582111][T20300] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 500.601697][T20300] RSP: 002b:00007f3505876c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 500.610108][T20300] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458079 [ 500.618073][T20300] RDX: 0000000000000048 RSI: 0000000020000200 RDI: 0000000000000003 [ 500.626036][T20300] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 500.634001][T20300] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f35058776d4 [ 500.641963][T20300] R13: 00000000004c7521 R14: 00000000004dd120 R15: 00000000ffffffff [ 500.649929][T20300] Modules linked in: 14:10:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0x0) [ 500.654282][ T3874] kobject: 'loop1' (000000004e476524): kobject_uevent_env [ 500.675418][ T3874] kobject: 'loop1' (000000004e476524): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 500.692752][T20300] ---[ end trace ac93e24bcf4ec90f ]--- 14:10:06 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000340)='9p ', 0x0, 0x0) [ 500.703301][T20300] RIP: 0010:ebitmap_destroy+0x32/0xf0 [ 500.712670][T20300] Code: 49 89 fd 41 54 53 e8 1d f4 7f fe 4d 85 ed 0f 84 99 00 00 00 e8 0f f4 7f fe 4c 89 ea 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 98 00 00 00 49 be 00 00 00 00 00 fc ff df 4d 8b [ 500.737596][ T3874] kobject: 'loop5' (000000004a53fe5f): kobject_uevent_env [ 500.744804][ T3874] kobject: 'loop5' (000000004a53fe5f): fill_kobj_path: path = '/devices/virtual/block/loop5' 14:10:06 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\xf3', 0x202, 0x0) 14:10:06 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) [ 500.772832][ T3874] kobject: 'loop2' (00000000a0ad0c30): kobject_uevent_env [ 500.779978][ T3874] kobject: 'loop2' (00000000a0ad0c30): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 500.856794][ T3874] kobject: 'loop5' (000000004a53fe5f): kobject_uevent_env [ 500.885332][ T3874] kobject: 'loop5' (000000004a53fe5f): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 500.952936][T20300] RSP: 0018:ffff8880500778c8 EFLAGS: 00010202 [ 501.022213][T20300] RAX: dffffc0000000000 RBX: ffff88808f1c86a8 RCX: ffffc9000e6a3000 [ 501.030563][ T3874] kobject: 'loop1' (000000004e476524): kobject_uevent_env [ 501.045534][ T3874] kobject: 'loop1' (000000004e476524): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 501.065475][T20300] RDX: 0000000000000002 RSI: ffffffff82f07021 RDI: 0000000000000010 [ 501.075514][ T3874] kobject: 'loop5' (000000004a53fe5f): kobject_uevent_env [ 501.084490][T20300] RBP: ffff8880500778e8 R08: ffff888099b1e100 R09: ffff888099b1e9f0 [ 501.088303][ T3874] kobject: 'loop5' (000000004a53fe5f): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 501.102804][T20300] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000002 [ 501.113010][T20300] R13: 0000000000000010 R14: ffffed1011e3910a R15: 0000000000010000 14:10:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x10100, 0x0) close(r4) r6 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r6, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r6, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x200010005, 0x0) ioctl$TUNSETSNDBUF(r5, 0x400454d4, &(0x7f0000000100)=0x5) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 14:10:07 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) [ 501.121145][T20300] FS: 00007f3505877700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 501.131536][T20300] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 501.142147][T20300] CR2: 00007f94d03a2db8 CR3: 00000000a80d0000 CR4: 00000000001426e0 [ 501.154610][ T3874] kobject: 'loop3' (000000005f563934): kobject_uevent_env [ 501.162685][T20300] Kernel panic - not syncing: Fatal exception [ 501.169508][T20300] Kernel Offset: disabled [ 501.173832][T20300] Rebooting in 86400 seconds..