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", 0x1000}, {&(0x7f0000002ac0)="1a700327bea53c0e82bb7bf09286c48abdef7a491429832f", 0x18}, {&(0x7f0000002b00)="dd1c0da3eecaf9c867d4596bb201c54d", 0x10}, {&(0x7f0000002b40)="4739a9ed0e87d3db605e717373", 0xd}], 0x7, 0x0, 0x0, 0x4000}], 0x3, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f0000000000)) ptrace(0x10, r3) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000002cc0)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000002d80)={&(0x7f0000001a80)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000002d40)={&(0x7f0000002d00)={0xfffffffffffffee7, r4, 0x500, 0x70bd2d, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x6}}}, 0x24}, 0x1, 0x0, 0x0, 0x10004}, 0x8000) wait4(0x0, 0x0, 0x0, &(0x7f0000000100)) 11:42:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xf00}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:42:29 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}], [], 0x7a00}) 11:42:29 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x44000) 11:42:29 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0xc7, 0x0) 11:42:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x4800000000000000, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18}}], 0x1, 0x0) 11:42:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:42:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x4c00000000000000, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18}}], 0x1, 0x0) [ 354.052312][T20785] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:42:29 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0xc8, 0x0) 11:42:29 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}], [], 0xedc0}) [ 354.107130][T20795] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:42:29 executing program 2: socket$inet6(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x44000) 11:42:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x5d00}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) [ 354.291903][T20815] overlayfs: unrecognized mount option "i\dex=off" or missing value [ 354.886004][T20826] syz-executor.3 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 354.898121][T20826] CPU: 1 PID: 20826 Comm: syz-executor.3 Not tainted 5.3.0-rc6-next-20190830 #75 [ 354.907207][T20826] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 354.917250][T20826] Call Trace: [ 354.920538][T20826] dump_stack+0x172/0x1f0 [ 354.924862][T20826] dump_header+0x177/0x1152 [ 354.929352][T20826] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 354.935133][T20826] ? ___ratelimit+0x2c8/0x595 [ 354.939800][T20826] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 354.945596][T20826] ? lockdep_hardirqs_on+0x418/0x5d0 [ 354.950857][T20826] ? trace_hardirqs_on+0x67/0x240 [ 354.955860][T20826] ? pagefault_out_of_memory+0x11c/0x11c [ 354.961478][T20826] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 354.967269][T20826] ? ___ratelimit+0x60/0x595 [ 354.971837][T20826] ? do_raw_spin_unlock+0x57/0x270 [ 354.976926][T20826] oom_kill_process.cold+0x10/0x15 [ 354.982032][T20826] out_of_memory+0x334/0x1340 [ 354.986705][T20826] ? lock_downgrade+0x920/0x920 [ 354.991557][T20826] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 354.997341][T20826] ? oom_killer_disable+0x280/0x280 [ 355.002543][T20826] mem_cgroup_out_of_memory+0x1d8/0x240 [ 355.008721][T20826] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 355.014345][T20826] ? do_raw_spin_unlock+0x57/0x270 [ 355.019451][T20826] ? _raw_spin_unlock+0x2d/0x50 [ 355.024302][T20826] try_charge+0xf4b/0x1440 [ 355.028725][T20826] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 355.034257][T20826] ? find_held_lock+0x35/0x130 [ 355.039008][T20826] ? get_mem_cgroup_from_mm+0x139/0x320 [ 355.044546][T20826] ? lock_downgrade+0x920/0x920 [ 355.049372][T20826] ? percpu_ref_tryget_live+0x111/0x290 [ 355.054896][T20826] __memcg_kmem_charge_memcg+0x71/0xf0 [ 355.060343][T20826] ? memcg_kmem_put_cache+0x50/0x50 [ 355.065531][T20826] ? get_mem_cgroup_from_mm+0x156/0x320 [ 355.071061][T20826] __memcg_kmem_charge+0x13a/0x3a0 [ 355.076151][T20826] __alloc_pages_nodemask+0x4f7/0x900 [ 355.081510][T20826] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 355.087042][T20826] ? __alloc_pages_slowpath+0x2540/0x2540 [ 355.092740][T20826] ? percpu_ref_put_many+0xb6/0x190 [ 355.097919][T20826] ? lockdep_hardirqs_on+0x418/0x5d0 [ 355.103198][T20826] ? trace_hardirqs_on+0x67/0x240 [ 355.108239][T20826] copy_process+0x3f8/0x6830 [ 355.112813][T20826] ? __kasan_check_read+0x11/0x20 [ 355.117817][T20826] ? __lock_acquire+0x16f2/0x4a00 [ 355.122835][T20826] ? __cleanup_sighand+0x60/0x60 [ 355.127760][T20826] ? __might_fault+0x12b/0x1e0 [ 355.132504][T20826] ? __might_fault+0x12b/0x1e0 [ 355.137265][T20826] _do_fork+0x146/0xfa0 [ 355.141418][T20826] ? copy_init_mm+0x20/0x20 [ 355.145913][T20826] ? __kasan_check_read+0x11/0x20 [ 355.150916][T20826] ? _copy_to_user+0x118/0x160 [ 355.155665][T20826] __x64_sys_clone+0x1ab/0x270 [ 355.160422][T20826] ? __ia32_sys_vfork+0xd0/0xd0 [ 355.165272][T20826] ? do_syscall_64+0x26/0x760 [ 355.169936][T20826] ? lockdep_hardirqs_on+0x418/0x5d0 [ 355.175197][T20826] ? trace_hardirqs_on+0x67/0x240 [ 355.180213][T20826] do_syscall_64+0xfa/0x760 [ 355.184724][T20826] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 355.190601][T20826] RIP: 0033:0x459879 [ 355.194480][T20826] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 355.214158][T20826] RSP: 002b:00007fbbf4911c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 355.222556][T20826] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000459879 [ 355.230518][T20826] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 00000000000041fc [ 355.238468][T20826] RBP: 000000000075c070 R08: ffffffffffffffff R09: 0000000000000000 [ 355.246418][T20826] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbbf49126d4 [ 355.254368][T20826] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 00000000ffffffff [ 355.268866][T20826] memory: usage 307200kB, limit 307200kB, failcnt 157 [ 355.275639][T20826] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 355.282593][T20826] Memory cgroup stats for /syz3: [ 355.282913][T20826] anon 278163456 [ 355.282913][T20826] file 32768 [ 355.282913][T20826] kernel_stack 6553600 [ 355.282913][T20826] slab 10182656 [ 355.282913][T20826] sock 0 [ 355.282913][T20826] shmem 0 [ 355.282913][T20826] file_mapped 0 [ 355.282913][T20826] file_dirty 0 [ 355.282913][T20826] file_writeback 0 [ 355.282913][T20826] anon_thp 262144000 [ 355.282913][T20826] inactive_anon 0 [ 355.282913][T20826] active_anon 278163456 [ 355.282913][T20826] inactive_file 135168 [ 355.282913][T20826] active_file 0 [ 355.282913][T20826] unevictable 0 [ 355.282913][T20826] slab_reclaimable 2027520 [ 355.282913][T20826] slab_unreclaimable 8155136 [ 355.282913][T20826] pgfault 28446 [ 355.282913][T20826] pgmajfault 0 [ 355.282913][T20826] workingset_refault 0 [ 355.282913][T20826] workingset_activate 0 [ 355.282913][T20826] workingset_nodereclaim 0 [ 355.282913][T20826] pgrefill 179 [ 355.282913][T20826] pgscan 193 [ 355.282913][T20826] pgsteal 124 [ 355.282913][T20826] pgactivate 66 [ 355.379067][T20826] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=20477,uid=0 [ 355.395405][T20826] Memory cgroup out of memory: Killed process 20477 (syz-executor.3) total-vm:72972kB, anon-rss:2224kB, file-rss:35796kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 355.419434][T20792] syz-executor.3 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 355.434584][T20792] CPU: 0 PID: 20792 Comm: syz-executor.3 Not tainted 5.3.0-rc6-next-20190830 #75 [ 355.443688][T20792] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 355.453718][T20792] Call Trace: [ 355.457033][T20792] dump_stack+0x172/0x1f0 [ 355.461345][T20792] dump_header+0x177/0x1152 [ 355.465823][T20792] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 355.471602][T20792] ? ___ratelimit+0x2c8/0x595 [ 355.476250][T20792] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 355.482030][T20792] ? lockdep_hardirqs_on+0x418/0x5d0 [ 355.487288][T20792] ? trace_hardirqs_on+0x67/0x240 [ 355.492286][T20792] ? pagefault_out_of_memory+0x11c/0x11c [ 355.497893][T20792] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 355.503672][T20792] ? ___ratelimit+0x60/0x595 [ 355.508233][T20792] ? do_raw_spin_unlock+0x57/0x270 [ 355.513319][T20792] oom_kill_process.cold+0x10/0x15 [ 355.518443][T20792] out_of_memory+0x334/0x1340 [ 355.523095][T20792] ? lock_downgrade+0x920/0x920 [ 355.527937][T20792] ? oom_killer_disable+0x280/0x280 [ 355.533116][T20792] mem_cgroup_out_of_memory+0x1d8/0x240 [ 355.538634][T20792] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 355.544244][T20792] ? do_raw_spin_unlock+0x57/0x270 [ 355.549332][T20792] ? _raw_spin_unlock+0x2d/0x50 [ 355.554156][T20792] try_charge+0xa2d/0x1440 [ 355.558548][T20792] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 355.564067][T20792] ? find_held_lock+0x35/0x130 [ 355.568806][T20792] ? get_mem_cgroup_from_mm+0x139/0x320 [ 355.574326][T20792] ? lock_downgrade+0x920/0x920 [ 355.579149][T20792] ? percpu_ref_tryget_live+0x111/0x290 [ 355.584671][T20792] __memcg_kmem_charge_memcg+0x71/0xf0 [ 355.590103][T20792] ? memcg_kmem_put_cache+0x50/0x50 [ 355.595276][T20792] ? get_mem_cgroup_from_mm+0x156/0x320 [ 355.600797][T20792] __memcg_kmem_charge+0x13a/0x3a0 [ 355.605883][T20792] __alloc_pages_nodemask+0x4f7/0x900 [ 355.611230][T20792] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 355.616749][T20792] ? __alloc_pages_slowpath+0x2540/0x2540 [ 355.622440][T20792] ? percpu_ref_put_many+0xb6/0x190 [ 355.627612][T20792] ? lockdep_hardirqs_on+0x418/0x5d0 [ 355.632872][T20792] ? trace_hardirqs_on+0x67/0x240 [ 355.637873][T20792] copy_process+0x3f8/0x6830 [ 355.642456][T20792] ? psi_memstall_leave+0x12e/0x180 [ 355.647638][T20792] ? __cleanup_sighand+0x60/0x60 [ 355.652555][T20792] ? __kasan_check_read+0x11/0x20 [ 355.657553][T20792] ? __lock_acquire+0x8a0/0x4a00 [ 355.662471][T20792] ? _raw_spin_unlock_irq+0x5e/0x90 [ 355.667646][T20792] _do_fork+0x146/0xfa0 [ 355.671777][T20792] ? copy_init_mm+0x20/0x20 [ 355.676256][T20792] ? lock_downgrade+0x920/0x920 [ 355.681086][T20792] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 355.687302][T20792] __x64_sys_clone+0x1ab/0x270 [ 355.692041][T20792] ? __ia32_sys_vfork+0xd0/0xd0 [ 355.696864][T20792] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 355.703083][T20792] ? do_syscall_64+0x26/0x760 [ 355.707733][T20792] ? lockdep_hardirqs_on+0x418/0x5d0 [ 355.712990][T20792] ? trace_hardirqs_on+0x67/0x240 [ 355.717990][T20792] do_syscall_64+0xfa/0x760 [ 355.722471][T20792] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 355.728336][T20792] RIP: 0033:0x45c249 [ 355.732207][T20792] Code: ff 48 85 f6 0f 84 27 8e fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c fe 8d fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 355.752130][T20792] RSP: 002b:00007ffc54f1a778 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 355.760513][T20792] RAX: ffffffffffffffda RBX: 00007fbbf48f1700 RCX: 000000000045c249 [ 355.768456][T20792] RDX: 00007fbbf48f19d0 RSI: 00007fbbf48f0db0 RDI: 00000000003d0f00 [ 355.776402][T20792] RBP: 00007ffc54f1a990 R08: 00007fbbf48f1700 R09: 00007fbbf48f1700 [ 355.784358][T20792] R10: 00007fbbf48f19d0 R11: 0000000000000202 R12: 0000000000000000 [ 355.792335][T20792] R13: 00007ffc54f1a82f R14: 00007fbbf48f19c0 R15: 000000000075c124 [ 355.801815][T20792] memory: usage 304852kB, limit 307200kB, failcnt 157 [ 355.808611][T20792] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 355.816312][T20792] Memory cgroup stats for /syz3: [ 355.816379][T20792] anon 276078592 [ 355.816379][T20792] file 32768 [ 355.816379][T20792] kernel_stack 6553600 [ 355.816379][T20792] slab 10182656 [ 355.816379][T20792] sock 0 [ 355.816379][T20792] shmem 0 [ 355.816379][T20792] file_mapped 0 [ 355.816379][T20792] file_dirty 0 [ 355.816379][T20792] file_writeback 0 [ 355.816379][T20792] anon_thp 260046848 [ 355.816379][T20792] inactive_anon 0 [ 355.816379][T20792] active_anon 276078592 [ 355.816379][T20792] inactive_file 135168 [ 355.816379][T20792] active_file 0 [ 355.816379][T20792] unevictable 0 [ 355.816379][T20792] slab_reclaimable 2027520 [ 355.816379][T20792] slab_unreclaimable 8155136 [ 355.816379][T20792] pgfault 28446 [ 355.816379][T20792] pgmajfault 0 [ 355.816379][T20792] workingset_refault 0 [ 355.816379][T20792] workingset_activate 0 [ 355.816379][T20792] workingset_nodereclaim 0 [ 355.816379][T20792] pgrefill 179 [ 355.816379][T20792] pgscan 193 [ 355.816379][T20792] pgsteal 124 [ 355.816379][T20792] pgactivate 66 [ 355.912489][T20792] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=19352,uid=0 11:42:31 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0xfc, 0x20000) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x4000, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ubi_ctrl\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='L\x00@\x00', @ANYRES16=r3, @ANYBLOB="000127bd7000fcdbdf250b000000380007000c00040000100000000000000800020000000000080001000100008008000200030000000800020000000000080002000e0f0000"], 0x4c}, 0x1, 0x0, 0x0, 0x4000}, 0x10) r4 = perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x70, 0x9, 0x6, 0xffffffffffffffff, 0xb6f, 0x0, 0x401, 0x1400, 0x1, 0x1, 0x5, 0x1, 0xfad4, 0x9, 0x53, 0x1, 0x9, 0x715a, 0x0, 0x37fc, 0x7ff, 0x0, 0x2, 0x3, 0x10000, 0x100010000, 0x7, 0x3, 0x2, 0x0, 0xc, 0xa000000000000, 0x34, 0x3, 0x6, 0x1, 0x3f, 0x0, 0x7, 0x0, @perf_config_ext={0x747c, 0x401}, 0x4000, 0x0, 0x3f, 0x6, 0xf1ad, 0x1, 0x3913}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x8) clone(0x20000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = getpid() rt_tgsigqueueinfo(r5, r5, 0x16, &(0x7f0000000000)) ioctl$RTC_UIE_ON(r1, 0x7003) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000ac0)=0xe8) syz_mount_image$gfs2(&(0x7f0000000200)='gfs2\x00', &(0x7f0000000440)='./file0\x00', 0x4, 0x7, &(0x7f0000000900)=[{&(0x7f00000004c0)="c0911d154117eceaf5f4c81ae3f84305b2c03ef9c58761858d0fbfa239eb05002035fa591ea7f7de4708790d252941a739bc1c5dee98b1876785d66257752b02393a3be38fd38597f19a3e8facb3f2b7c1b54c57e1ca906e82854801ed24e81c2d0a6fd2607944cbd7db2266289f94273bb4e135886fb03e38c8ba03ef30b8f9171b2b4481f8d4399a88f04247feb4f104382a3ce7e543a487b4f57bc1c3f35f681cfff03bdea56c065ba90221b8c7907306315e334f0a3632ac2c0bb25d9737459cddddbaa0c27b809d8195cb79dff5ffe85a0f", 0xd4, 0x9}, {&(0x7f00000005c0)="0735e370329fa25a35738e92538fba7e443f28b4d7dccb0b4371e1eaa2ca6252b3945bf8e3ed1acc2d838d9d8103ca943960c0c1a597be07d1ff99ae1a81ded5b48d6b5bfbd25e97e894a53aca7316736daf16089515031817ea6e5c6a98278c227dd358867782ac89335f918efa51873262f91ffab7adf1835463495a990d6e4c665067516d1fc826b133ae1895e268326c5de9354416dc95e5ad440dbb1231c6b985a692ae3bd3fc8f7f7a7cbd8b41982b7b19d134f3b88cd9acfde31316cb9c697e0e020c880f0013335f790d49f522", 0xd1}, {&(0x7f00000006c0)="9113e1c56316d4e4ed9be5a1c9b7f2fd789863de23bb7b07400530a555fb4dcb0e3ee8c3fcf033bb3e87d9cc9592becf96395ae96439711f4b9baeba8ae46fdcb6f167f879dcb72421d28365df14401b8d78a60a3f694b575c5614bc611cd35b9cf4016c6620470ad27ba42419acf8cffd1ac8784f0cc77e1c0062a3680438f9", 0x80}, {&(0x7f0000000740)="90a3006d5fd3d30abc4e9a733bc47a8376a166e04e9eaa78fed882c1ec53d212d613cedf", 0x24, 0x4}, {&(0x7f0000000780)="3e4e61285244a9561911ab188eae13b83b285585a11d725e0a6b3e70fa3cdd8c8b16342057effa2cdf4eca98c2944107e20194ee980e577d530b6fd748605e43ef7d51a5784f5c35cfb758e0f0", 0x4d, 0x7}, {&(0x7f0000000800)="e24635c108c23c03acc3c45cebbde8c93e747914d79a83ff3f62adb7d12b9926aaabc03a1c4bd19a7c469f48d870b33f38326f308b12f7d17aa3123ac00edfdffa3413ab03caba7a1f4e81", 0x4b, 0xffffffff80000001}, {&(0x7f0000000880)="8a973d479026c4ab53374a1ca9ee949cb19a3ed7741e18749feefbebc0eac77b8c7e29f19cb87b15514a5742aaef4fa004fd9e77c78c576d1264a8a54c447bdc396b1745ec", 0x45, 0x80}], 0x808008, &(0x7f0000000b00)={[{@hostdata={'hostdata', 0x3d, 'cpuset\'}eth0]'}}, {@noquota='noquota'}, {@acl='acl'}], [{@func={'func', 0x3d, 'BPRM_CHECK'}}, {@fowner_lt={'fowner<', r6}}, {@appraise='appraise'}, {@dont_measure='dont_measure'}]}) ptrace(0x4208, r5) wait4(0x0, 0x0, 0x0, &(0x7f0000000100)) 11:42:31 executing program 2: socket$inet6(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x44000) 11:42:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x6000000000000000, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18}}], 0x1, 0x0) 11:42:31 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}], [], 0xff00}) 11:42:31 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0xc9, 0x0) 11:42:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) [ 355.928066][T20792] Memory cgroup out of memory: Killed process 19352 (syz-executor.3) total-vm:72972kB, anon-rss:2224kB, file-rss:35796kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 355.948956][ T1065] oom_reaper: reaped process 19352 (syz-executor.3), now anon-rss:0kB, file-rss:34836kB, shmem-rss:0kB 11:42:31 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0xca, 0x0) [ 356.045494][T20835] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:42:31 executing program 2: socket$inet6(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x44000) 11:42:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x6300000000000000, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18}}], 0x1, 0x0) [ 356.089977][T20842] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:42:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) [ 356.193663][T20844] gfs2: Unknown parameter 'func' 11:42:31 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}], [], 0x1000000}) 11:42:31 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x0, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x44000) [ 356.366163][T20867] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:42:31 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000000)) ptrace(0x10, r1) r2 = dup(r0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r2, 0x8008ae9d, &(0x7f00000000c0)=""/16) wait4(0x0, 0x0, 0x0, &(0x7f0000000100)) 11:42:31 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0xcb, 0x0) 11:42:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x6800000000000000, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18}}], 0x1, 0x0) 11:42:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:42:31 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x0, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x44000) [ 356.497941][T20877] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:42:31 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x0, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x44000) 11:42:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x6c00000000000000, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18}}], 0x1, 0x0) 11:42:31 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}], [], 0x2000000}) 11:42:31 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0xcc, 0x0) 11:42:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:42:31 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000000)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4, 0x80010, r0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, &(0x7f0000000100)) 11:42:31 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x44000) 11:42:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x7400000000000000, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18}}], 0x1, 0x0) 11:42:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) [ 356.897442][T20915] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:42:32 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0xcd, 0x0) 11:42:32 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x44000) 11:42:32 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}], [], 0x3000000}) 11:42:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x7a00000000000000, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18}}], 0x1, 0x0) [ 356.975793][T20918] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:42:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x5d000000}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:42:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffeedf}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:42:32 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x44000) 11:42:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0xb80b000000000000, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18}}], 0x1, 0x0) [ 357.284084][T20948] overlayfs: unrecognized mount option "i\dex=off" or missing value [ 357.360782][T20955] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:42:32 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000000)) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, &(0x7f0000000100)) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x400, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r2, 0xc1105511, &(0x7f0000000280)={{0x6, 0x0, 0x1, 0x0, '\x00', 0x4}, 0x2, 0x2, 0x4, r1, 0xa, 0x124acbec, 'syz0\x00', &(0x7f00000001c0)=['-\x00', '\x18mime_typelo\'#\x00', '$procvboxnet0\x00', '*mime_typecpuset/\x00', 'security:bdevvmnet1:eth0vboxnet0*&-(bdevppp0trusted*^J%vboxnet1proc@\x00', 'cgroup&nodev@cpuset]!\x00', 'user#.\xc2$ppp1em1\\}eth0&*\x00', '}(systemkeyring]\\*nodev\x00', '-\x00', '[\x00'], 0xc0, [], [0x6, 0x2, 0xfffffffffffffff9, 0x1]}) 11:42:32 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0xce, 0x0) 11:42:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffeeee}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:42:32 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x44000) 11:42:32 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}], [], 0x4000000}) 11:42:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0xe803000000000000, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18}}], 0x1, 0x0) [ 357.647927][T20961] ptrace attach of "/root/syz-executor.3"[20907] was attempted by "/root/syz-executor.3"[20961] 11:42:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0xeffdffff00000000, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18}}], 0x1, 0x0) 11:42:32 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x44000) 11:42:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xdfeeff7f}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) [ 357.740680][T20966] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 11:42:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0xf401000000000000, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18}}], 0x1, 0x0) [ 357.835221][T20966] CPU: 0 PID: 20966 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 357.844366][T20966] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 357.854427][T20966] Call Trace: [ 357.857724][T20966] dump_stack+0x172/0x1f0 [ 357.862060][T20966] dump_header+0x177/0x1152 [ 357.866569][T20966] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 357.872375][T20966] ? ___ratelimit+0x2c8/0x595 [ 357.877048][T20966] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 357.882847][T20966] ? lockdep_hardirqs_on+0x418/0x5d0 [ 357.882862][T20966] ? trace_hardirqs_on+0x67/0x240 [ 357.882878][T20966] ? pagefault_out_of_memory+0x11c/0x11c [ 357.882891][T20966] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 357.882906][T20966] ? ___ratelimit+0x60/0x595 [ 357.909158][T20966] ? do_raw_spin_unlock+0x57/0x270 [ 357.914284][T20966] oom_kill_process.cold+0x10/0x15 [ 357.919405][T20966] out_of_memory+0x334/0x1340 [ 357.924091][T20966] ? lock_downgrade+0x920/0x920 [ 357.928957][T20966] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 11:42:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0xfeffffff00000000, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18}}], 0x1, 0x0) [ 357.934775][T20966] ? oom_killer_disable+0x280/0x280 [ 357.939995][T20966] mem_cgroup_out_of_memory+0x1d8/0x240 [ 357.945547][T20966] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 357.951199][T20966] ? do_raw_spin_unlock+0x57/0x270 [ 357.956315][T20966] ? _raw_spin_unlock+0x2d/0x50 [ 357.961175][T20966] try_charge+0xf4b/0x1440 [ 357.965598][T20966] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 357.971128][T20966] ? percpu_ref_tryget_live+0x111/0x290 [ 357.971145][T20966] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 357.971161][T20966] ? __kasan_check_read+0x11/0x20 [ 357.971185][T20966] ? get_mem_cgroup_from_mm+0x156/0x320 [ 357.993463][T20966] mem_cgroup_try_charge+0x136/0x590 [ 357.998753][T20966] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 358.005003][T20966] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 358.010646][T20966] wp_page_copy+0x41e/0x1590 [ 358.015240][T20966] ? find_held_lock+0x35/0x130 [ 358.020017][T20966] ? pmd_pfn+0x1d0/0x1d0 [ 358.024271][T20966] ? lock_downgrade+0x920/0x920 [ 358.029134][T20966] ? swp_swapcount+0x540/0x540 11:42:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0xff00000000000000, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18}}], 0x1, 0x0) [ 358.033897][T20966] ? __kasan_check_read+0x11/0x20 [ 358.038928][T20966] ? do_raw_spin_unlock+0x57/0x270 [ 358.044052][T20966] do_wp_page+0x499/0x14d0 [ 358.048470][T20966] ? finish_mkwrite_fault+0x570/0x570 [ 358.053835][T20966] __handle_mm_fault+0x22f1/0x3f20 [ 358.053855][T20966] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 358.053882][T20966] ? __kasan_check_read+0x11/0x20 [ 358.069513][T20966] handle_mm_fault+0x1b5/0x6c0 [ 358.074291][T20966] __do_page_fault+0x536/0xdd0 [ 358.079064][T20966] do_page_fault+0x38/0x590 [ 358.083574][T20966] page_fault+0x39/0x40 [ 358.087730][T20966] RIP: 0033:0x430956 [ 358.091627][T20966] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 56 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 0c 46 64 00 85 c0 0f 84 [ 358.111230][T20966] RSP: 002b:00007fff9ff76cd0 EFLAGS: 00010206 [ 358.117305][T20966] RAX: 00000000000205b1 RBX: 0000000000715640 RCX: 0000000000000121 [ 358.125280][T20966] RDX: 00005555557ca930 RSI: 00005555557caa50 RDI: 0000000000000000 [ 358.133243][T20966] RBP: 0000000000000121 R08: ffffffffffffffff R09: 0000000000000000 [ 358.133257][T20966] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000715698 [ 358.133265][T20966] R13: 0000000000715698 R14: 0000000000000000 R15: 0000000000002710 [ 358.150350][T20966] memory: usage 307200kB, limit 307200kB, failcnt 918 [ 358.199365][T20966] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 358.206260][T20966] Memory cgroup stats for /syz5: [ 358.206364][T20966] anon 273457152 [ 358.206364][T20966] file 0 [ 358.206364][T20966] kernel_stack 5570560 [ 358.206364][T20966] slab 10891264 [ 358.206364][T20966] sock 0 [ 358.206364][T20966] shmem 45056 [ 358.206364][T20966] file_mapped 135168 [ 358.206364][T20966] file_dirty 0 [ 358.206364][T20966] file_writeback 0 [ 358.206364][T20966] anon_thp 253755392 [ 358.206364][T20966] inactive_anon 135168 [ 358.206364][T20966] active_anon 273387520 [ 358.206364][T20966] inactive_file 0 [ 358.206364][T20966] active_file 57344 [ 358.206364][T20966] unevictable 0 [ 358.206364][T20966] slab_reclaimable 2297856 [ 358.206364][T20966] slab_unreclaimable 8593408 [ 358.206364][T20966] pgfault 43560 [ 358.206364][T20966] pgmajfault 0 [ 358.206364][T20966] workingset_refault 66 [ 358.206364][T20966] workingset_activate 0 [ 358.206364][T20966] workingset_nodereclaim 0 [ 358.206364][T20966] pgrefill 972 [ 358.206364][T20966] pgscan 920 [ 358.206364][T20966] pgsteal 186 [ 358.228244][T20966] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=20637,uid=0 [ 358.335864][T20966] Memory cgroup out of memory: Killed process 20637 (syz-executor.5) total-vm:72708kB, anon-rss:2208kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 358.375374][T20999] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:42:33 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0xfbcce1cca317cbf6) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x10000004001fd) clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000000)) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, &(0x7f0000000100)) 11:42:33 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0xcf, 0x0) 11:42:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xeeeeff7f}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:42:33 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x44000) 11:42:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0xffff000000000000, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18}}], 0x1, 0x0) 11:42:33 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}], [], 0x5000000}) [ 358.598049][T21013] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:42:33 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0b") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x44000) 11:42:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0xffffffff00000000, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18}}], 0x1, 0x0) [ 358.641433][T21018] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:42:33 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0xd0, 0x0) 11:42:33 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}], [], 0x6000000}) 11:42:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffffff000}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:42:33 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0b") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x44000) [ 358.879872][T21040] overlayfs: unrecognized mount option "i\dex=off" or missing value [ 358.937513][T21047] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:42:34 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0xe0a, 0x4800) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$UI_DEV_CREATE(r1, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000000)) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000200)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="4aa17e57b28f00a91488363c4689abf3270d2778cc68372a85221cce91244d107fa7dc04e6c2f4da569f41c911ed58236e48dd24a404dc6f6a0053732d897ab3e1587f959796e849e4970aa125458625ff55b07d7ec8a0b91e613a0b8f67c4d9968bcb749402345566e33adfafe441b831dd3ac2e3c4fdd5154dc0dfccd69ec2d14560dae999a1c3ff03a176ecd9eff9db222d89f0b4ac22610d5967424506252c5f34501b8090f9e008940d23eac105983cda3705738bc5162107793ebd73fb45f5002648e3e79ce82f16eaaebb86a4dac64b716755564999bf41a35679619b5828e9ae9406b491f373b0", @ANYRES16=r3, @ANYBLOB="000429bd7000fedbdf2503000000"], 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x4010) ptrace(0x10, r2) wait4(0x0, 0x0, 0x0, &(0x7f0000000100)) 11:42:34 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0xd1, 0x0) 11:42:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:42:34 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0b") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x44000) 11:42:34 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}], [], 0x7000000}) 11:42:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x2, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18}}], 0x1, 0x0) 11:42:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffff7f0000}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:42:34 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47b") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x44000) 11:42:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x8, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18}}], 0x1, 0x0) [ 359.559772][T21065] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:42:34 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0xd2, 0x0) [ 359.624831][T21073] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:42:34 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}], [], 0x8000000}) 11:42:34 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47b") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x44000) 11:42:34 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000000)) ptrace(0x10, r1) r2 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x1, 0x20000) ioctl$TIOCSSERIAL(r2, 0x541f, &(0x7f0000000280)={0x7, 0xffffffffffff8b21, 0x200, 0xbe, 0x8, 0x0, 0x5, 0xfffffffeffffffff, 0x7, 0x1, 0x5, 0x9, 0x7, 0x5, &(0x7f00000001c0)=""/169, 0xfff, 0x5, 0x3}) wait4(0x0, 0x0, 0x0, &(0x7f0000000100)) 11:42:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:42:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x9, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18}}], 0x1, 0x0) 11:42:34 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0xd3, 0x0) [ 359.865492][T21091] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:42:35 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}], [], 0xa000000}) 11:42:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0xc, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18}}], 0x1, 0x0) 11:42:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:42:35 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47b") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x44000) [ 360.031471][T21098] syz-executor.3 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 11:42:35 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0xd4, 0x0) [ 360.137823][T21098] CPU: 0 PID: 21098 Comm: syz-executor.3 Not tainted 5.3.0-rc6-next-20190830 #75 [ 360.143092][T21119] overlayfs: unrecognized mount option "i\dex=off" or missing value [ 360.146954][T21098] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 360.146960][T21098] Call Trace: [ 360.146981][T21098] dump_stack+0x172/0x1f0 [ 360.147004][T21098] dump_header+0x177/0x1152 [ 360.177400][T21098] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 360.183200][T21098] ? ___ratelimit+0x2c8/0x595 11:42:35 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}], [], 0x10000000}) [ 360.187880][T21098] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 360.193689][T21098] ? lockdep_hardirqs_on+0x418/0x5d0 [ 360.198968][T21098] ? trace_hardirqs_on+0x67/0x240 [ 360.198985][T21098] ? pagefault_out_of_memory+0x11c/0x11c [ 360.199004][T21098] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 360.209608][T21098] ? ___ratelimit+0x60/0x595 [ 360.209621][T21098] ? do_raw_spin_unlock+0x57/0x270 [ 360.209638][T21098] oom_kill_process.cold+0x10/0x15 [ 360.209652][T21098] out_of_memory+0x334/0x1340 [ 360.209670][T21098] ? lock_downgrade+0x920/0x920 [ 360.239859][T21098] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 360.245673][T21098] ? oom_killer_disable+0x280/0x280 [ 360.250878][T21098] mem_cgroup_out_of_memory+0x1d8/0x240 [ 360.256414][T21098] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 360.262031][T21098] ? do_raw_spin_unlock+0x57/0x270 [ 360.267126][T21098] ? _raw_spin_unlock+0x2d/0x50 [ 360.271959][T21098] try_charge+0xf4b/0x1440 [ 360.276363][T21098] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 360.281887][T21098] ? find_held_lock+0x35/0x130 [ 360.286632][T21098] ? get_mem_cgroup_from_mm+0x139/0x320 [ 360.292160][T21098] ? lock_downgrade+0x920/0x920 [ 360.296987][T21098] ? percpu_ref_tryget_live+0x111/0x290 [ 360.302513][T21098] __memcg_kmem_charge_memcg+0x71/0xf0 [ 360.307963][T21098] ? memcg_kmem_put_cache+0x50/0x50 [ 360.313145][T21098] ? get_mem_cgroup_from_mm+0x156/0x320 [ 360.318672][T21098] __memcg_kmem_charge+0x13a/0x3a0 [ 360.323771][T21098] __alloc_pages_nodemask+0x4f7/0x900 [ 360.329128][T21098] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 360.334656][T21098] ? __alloc_pages_slowpath+0x2540/0x2540 [ 360.340352][T21098] ? percpu_ref_put_many+0xb6/0x190 [ 360.345544][T21098] ? lockdep_hardirqs_on+0x418/0x5d0 [ 360.350806][T21098] ? trace_hardirqs_on+0x67/0x240 [ 360.355805][T21098] ? __kasan_check_read+0x11/0x20 [ 360.360815][T21098] copy_process+0x3f8/0x6830 [ 360.365382][T21098] ? psi_memstall_leave+0x12e/0x180 [ 360.370568][T21098] ? __cleanup_sighand+0x60/0x60 [ 360.375488][T21098] ? __kasan_check_read+0x11/0x20 [ 360.380492][T21098] ? __lock_acquire+0x8a0/0x4a00 [ 360.385407][T21098] ? _raw_spin_unlock_irq+0x5e/0x90 [ 360.390586][T21098] _do_fork+0x146/0xfa0 [ 360.394725][T21098] ? copy_init_mm+0x20/0x20 [ 360.399224][T21098] ? lock_downgrade+0x920/0x920 [ 360.404064][T21098] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 360.410298][T21098] __x64_sys_clone+0x1ab/0x270 [ 360.415043][T21098] ? __ia32_sys_vfork+0xd0/0xd0 [ 360.419871][T21098] ? __blkcg_punt_bio_submit+0x1e0/0x1e0 [ 360.425483][T21098] ? mem_cgroup_handle_over_high+0x21b/0x2a0 [ 360.431445][T21098] ? do_syscall_64+0x26/0x760 [ 360.436102][T21098] ? lockdep_hardirqs_on+0x418/0x5d0 [ 360.441370][T21098] ? trace_hardirqs_on+0x67/0x240 [ 360.446373][T21098] do_syscall_64+0xfa/0x760 [ 360.450857][T21098] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 360.456738][T21098] RIP: 0033:0x45c249 [ 360.460614][T21098] Code: ff 48 85 f6 0f 84 27 8e fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c fe 8d fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 360.480195][T21098] RSP: 002b:00007ffc54f1a778 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 11:42:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x10, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18}}], 0x1, 0x0) 11:42:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xf00000000000000}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) [ 360.488595][T21098] RAX: ffffffffffffffda RBX: 00007fbbf4933700 RCX: 000000000045c249 [ 360.496544][T21098] RDX: 00007fbbf49339d0 RSI: 00007fbbf4932db0 RDI: 00000000003d0f00 [ 360.504493][T21098] RBP: 00007ffc54f1a990 R08: 00007fbbf4933700 R09: 00007fbbf4933700 [ 360.512439][T21098] R10: 00007fbbf49339d0 R11: 0000000000000202 R12: 0000000000000000 [ 360.520390][T21098] R13: 00007ffc54f1a82f R14: 00007fbbf49339c0 R15: 000000000075bfd4 [ 360.603914][T21098] memory: usage 307172kB, limit 307200kB, failcnt 200 [ 360.620386][T21098] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 360.641279][T21098] Memory cgroup stats for /syz3: [ 360.641402][T21098] anon 276738048 [ 360.641402][T21098] file 32768 [ 360.641402][T21098] kernel_stack 6750208 [ 360.641402][T21098] slab 10452992 [ 360.641402][T21098] sock 0 [ 360.641402][T21098] shmem 0 [ 360.641402][T21098] file_mapped 0 [ 360.641402][T21098] file_dirty 0 [ 360.641402][T21098] file_writeback 0 [ 360.641402][T21098] anon_thp 260046848 [ 360.641402][T21098] inactive_anon 0 [ 360.641402][T21098] active_anon 276738048 [ 360.641402][T21098] inactive_file 135168 [ 360.641402][T21098] active_file 0 [ 360.641402][T21098] unevictable 0 [ 360.641402][T21098] slab_reclaimable 2027520 [ 360.641402][T21098] slab_unreclaimable 8425472 [ 360.641402][T21098] pgfault 29007 [ 360.641402][T21098] pgmajfault 0 [ 360.641402][T21098] workingset_refault 0 [ 360.641402][T21098] workingset_activate 0 [ 360.641402][T21098] workingset_nodereclaim 0 [ 360.641402][T21098] pgrefill 212 [ 360.641402][T21098] pgscan 193 [ 360.641402][T21098] pgsteal 124 [ 360.641402][T21098] pgactivate 66 [ 360.775772][T21098] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=18826,uid=0 [ 360.798863][T21098] Memory cgroup out of memory: Killed process 18826 (syz-executor.3) total-vm:72972kB, anon-rss:2224kB, file-rss:35796kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 11:42:35 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x4) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000000)) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000200)={0x0, 0x0, 0x8, [0x9, 0xffffffff80000000, 0x7ec, 0x4, 0x8, 0x1f, 0x176, 0x20]}, &(0x7f0000000240)=0x18) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000280)={0xd5b, 0x4000000000000, 0x4, 0x1, 0x564b9556, 0x4, 0x3239, 0x2, r3}, &(0x7f00000002c0)=0x20) ptrace(0x11, r1) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f00000001c0)={0x800000000000000, 0xa9f9ac2aa0e6503a, 0x200040000000000, 0x8, 0xe}) wait4(0x0, 0x0, 0x0, &(0x7f0000000100)) 11:42:35 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0xd5, 0x0) 11:42:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:42:35 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf0") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x44000) 11:42:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x3, 0xfffffffffffffeff}]}}}], 0x18}}], 0x1, 0x0) [ 360.835716][T21132] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:42:36 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}], [], 0x20000000}) 11:42:36 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf0") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x44000) [ 360.896465][T21133] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:42:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x5d00000000000000}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:42:36 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0xd6, 0x0) 11:42:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x8, 0xfffffffffffffeff}]}}}], 0x18}}], 0x1, 0x0) 11:42:36 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000000)) ptrace(0x10, r1) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x220000, 0x2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@multicast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000300)={@dev={0xfe, 0x80, [], 0x29}, 0x57, r3}) wait4(0x0, 0x0, 0x0, &(0x7f0000000100)) 11:42:36 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf0") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x44000) 11:42:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x9, 0xfffffffffffffeff}]}}}], 0x18}}], 0x1, 0x0) [ 361.211532][ T8647] syz-executor.3 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=0 [ 361.244338][T21174] overlayfs: unrecognized mount option "i\dex=off" or missing value [ 361.281882][ T8647] CPU: 1 PID: 8647 Comm: syz-executor.3 Not tainted 5.3.0-rc6-next-20190830 #75 [ 361.290933][ T8647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 361.300987][ T8647] Call Trace: [ 361.304287][ T8647] dump_stack+0x172/0x1f0 [ 361.308623][ T8647] dump_header+0x177/0x1152 [ 361.313128][ T8647] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 361.318933][ T8647] ? ___ratelimit+0x2c8/0x595 [ 361.323609][ T8647] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 361.329416][ T8647] ? lockdep_hardirqs_on+0x418/0x5d0 [ 361.334715][ T8647] ? trace_hardirqs_on+0x67/0x240 [ 361.339740][ T8647] ? pagefault_out_of_memory+0x11c/0x11c [ 361.345380][ T8647] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 361.351187][ T8647] ? ___ratelimit+0x60/0x595 [ 361.355775][ T8647] ? do_raw_spin_unlock+0x57/0x270 [ 361.360894][ T8647] oom_kill_process.cold+0x10/0x15 [ 361.368009][ T8647] out_of_memory+0x334/0x1340 [ 361.372684][ T8647] ? lock_downgrade+0x920/0x920 11:42:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xdfeeff7f00000000}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:42:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xeeeeff7f00000000}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) [ 361.377533][ T8647] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 361.383346][ T8647] ? oom_killer_disable+0x280/0x280 [ 361.388557][ T8647] mem_cgroup_out_of_memory+0x1d8/0x240 [ 361.394100][ T8647] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 361.399737][ T8647] ? do_raw_spin_unlock+0x57/0x270 [ 361.404854][ T8647] ? _raw_spin_unlock+0x2d/0x50 [ 361.409705][ T8647] try_charge+0xf4b/0x1440 [ 361.414130][ T8647] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 361.419674][ T8647] ? find_held_lock+0x35/0x130 [ 361.424440][ T8647] ? get_mem_cgroup_from_mm+0x139/0x320 11:42:36 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}], [], 0x20100000}) [ 361.429993][ T8647] ? lock_downgrade+0x920/0x920 [ 361.434849][ T8647] ? percpu_ref_tryget_live+0x111/0x290 [ 361.440401][ T8647] __memcg_kmem_charge_memcg+0x71/0xf0 [ 361.445858][ T8647] ? memcg_kmem_put_cache+0x50/0x50 [ 361.451058][ T8647] ? get_mem_cgroup_from_mm+0x156/0x320 [ 361.456611][ T8647] __memcg_kmem_charge+0x13a/0x3a0 [ 361.461723][ T8647] __alloc_pages_nodemask+0x4f7/0x900 [ 361.467091][ T8647] ? stack_trace_consume_entry+0x190/0x190 [ 361.472887][ T8647] ? __alloc_pages_slowpath+0x2540/0x2540 [ 361.472899][ T8647] ? copy_page_range+0xef4/0x1ed0 [ 361.472917][ T8647] ? copy_page_range+0xef4/0x1ed0 [ 361.472937][ T8647] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 361.472955][ T8647] alloc_pages_current+0x107/0x210 [ 361.472973][ T8647] pte_alloc_one+0x1b/0x1a0 [ 361.472988][ T8647] __pte_alloc+0x20/0x310 [ 361.473002][ T8647] copy_page_range+0x14da/0x1ed0 [ 361.473037][ T8647] ? pmd_alloc+0x180/0x180 [ 361.518134][ T8647] ? __rb_insert_augmented+0x20c/0xd90 [ 361.523592][ T8647] ? validate_mm_rb+0xa3/0xc0 [ 361.528277][ T8647] ? __vma_link_rb+0x5ad/0x770 [ 361.531472][T21188] overlayfs: unrecognized mount option "i\dex=off" or missing value [ 361.533044][ T8647] dup_mm+0xa67/0x1430 [ 361.533080][ T8647] ? vm_area_dup+0x170/0x170 [ 361.549670][ T8647] ? debug_mutex_init+0x2d/0x60 [ 361.551923][T21190] overlayfs: unrecognized mount option "i\dex=off" or missing value [ 361.554529][ T8647] copy_process+0x2671/0x6830 [ 361.554549][ T8647] ? __kasan_check_read+0x11/0x20 [ 361.554575][ T8647] ? __cleanup_sighand+0x60/0x60 [ 361.577109][ T8647] ? __might_fault+0x12b/0x1e0 11:42:36 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}], [], 0x3f000000}) 11:42:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) [ 361.581883][ T8647] ? __might_fault+0x12b/0x1e0 [ 361.586659][ T8647] _do_fork+0x146/0xfa0 [ 361.590819][ T8647] ? copy_init_mm+0x20/0x20 [ 361.595329][ T8647] ? __kasan_check_read+0x11/0x20 [ 361.600352][ T8647] ? _copy_to_user+0x118/0x160 [ 361.605117][ T8647] __x64_sys_clone+0x1ab/0x270 [ 361.609875][ T8647] ? __ia32_sys_vfork+0xd0/0xd0 [ 361.614732][ T8647] ? do_syscall_64+0x26/0x760 [ 361.619408][ T8647] ? lockdep_hardirqs_on+0x418/0x5d0 [ 361.624691][ T8647] ? trace_hardirqs_on+0x67/0x240 [ 361.629717][ T8647] do_syscall_64+0xfa/0x760 [ 361.634224][ T8647] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 361.640114][ T8647] RIP: 0033:0x457e4a [ 361.644011][ T8647] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 361.647375][T21195] overlayfs: unrecognized mount option "i\dex=off" or missing value [ 361.663608][ T8647] RSP: 002b:00007ffc54f1aa10 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 361.663622][ T8647] RAX: ffffffffffffffda RBX: 00007ffc54f1aa10 RCX: 0000000000457e4a [ 361.663629][ T8647] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 361.663636][ T8647] RBP: 00007ffc54f1aa50 R08: 0000000000000001 R09: 00005555555ba940 [ 361.663643][ T8647] R10: 00005555555bac10 R11: 0000000000000246 R12: 0000000000000001 [ 361.663650][ T8647] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffc54f1aaa0 [ 361.675637][ T8647] memory: usage 307200kB, limit 307200kB, failcnt 226 [ 361.688473][ T8647] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 11:42:36 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0xd7, 0x0) 11:42:36 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(0x0, 0x0, 0x44000) 11:42:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x10, 0xfffffffffffffeff}]}}}], 0x18}}], 0x1, 0x0) [ 361.734328][ T8647] Memory cgroup stats for /syz3: [ 361.734517][ T8647] anon 276713472 [ 361.734517][ T8647] file 32768 [ 361.734517][ T8647] kernel_stack 6750208 [ 361.734517][ T8647] slab 10452992 [ 361.734517][ T8647] sock 0 [ 361.734517][ T8647] shmem 0 [ 361.734517][ T8647] file_mapped 0 [ 361.734517][ T8647] file_dirty 0 [ 361.734517][ T8647] file_writeback 0 [ 361.734517][ T8647] anon_thp 260046848 [ 361.734517][ T8647] inactive_anon 0 [ 361.734517][ T8647] active_anon 276713472 [ 361.734517][ T8647] inactive_file 135168 [ 361.734517][ T8647] active_file 0 [ 361.734517][ T8647] unevictable 0 [ 361.734517][ T8647] slab_reclaimable 2027520 [ 361.734517][ T8647] slab_unreclaimable 8425472 [ 361.734517][ T8647] pgfault 29106 [ 361.734517][ T8647] pgmajfault 0 [ 361.734517][ T8647] workingset_refault 0 [ 361.734517][ T8647] workingset_activate 0 [ 361.734517][ T8647] workingset_nodereclaim 0 [ 361.734517][ T8647] pgrefill 245 [ 361.734517][ T8647] pgscan 226 [ 361.734517][ T8647] pgsteal 124 [ 361.734517][ T8647] pgactivate 66 11:42:37 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}], [], 0x40000000}) [ 361.901749][ T8647] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=18189,uid=0 [ 361.921293][ T8647] Memory cgroup out of memory: Killed process 18189 (syz-executor.3) total-vm:72972kB, anon-rss:2224kB, file-rss:35796kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 362.047209][T21215] overlayfs: unrecognized mount option "i\dex=off" or missing value [ 362.099843][T21219] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:42:37 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000000)) ptrace(0x10, r1) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x40000, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f00000001c0)={@initdev, @remote, 0x0}, &(0x7f0000000200)=0xc) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0106426, &(0x7f0000000300)={0xa, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_NEW_CTX(r2, 0x40086425, &(0x7f0000000340)={r4, 0x1}) ioctl$BLKGETSIZE(r2, 0x1260, &(0x7f0000000380)) bind$bt_hci(r2, &(0x7f0000000240)={0x1f, r3}, 0xc) wait4(0x0, 0x0, 0x0, &(0x7f0000000100)) 11:42:37 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(0x0, 0x0, 0x44000) 11:42:37 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:42:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x8}}], 0x1, 0x0) 11:42:37 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}], [], 0x48000000}) 11:42:37 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0xd8, 0x0) [ 362.821800][T21233] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 362.842293][T21233] CPU: 0 PID: 21233 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 362.851428][T21233] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 362.861471][T21233] Call Trace: [ 362.861492][T21233] dump_stack+0x172/0x1f0 [ 362.861511][T21233] dump_header+0x177/0x1152 [ 362.861527][T21233] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 362.861537][T21233] ? ___ratelimit+0x2c8/0x595 [ 362.861549][T21233] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 362.861568][T21233] ? lockdep_hardirqs_on+0x418/0x5d0 [ 362.895125][T21233] ? trace_hardirqs_on+0x67/0x240 [ 362.900161][T21233] ? pagefault_out_of_memory+0x11c/0x11c [ 362.905799][T21233] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 362.911605][T21233] ? ___ratelimit+0x60/0x595 [ 362.916190][T21233] ? do_raw_spin_unlock+0x57/0x270 [ 362.921299][T21233] oom_kill_process.cold+0x10/0x15 [ 362.926404][T21233] out_of_memory+0x334/0x1340 [ 362.931077][T21233] ? lock_downgrade+0x920/0x920 [ 362.935925][T21233] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 362.941739][T21233] ? oom_killer_disable+0x280/0x280 [ 362.946942][T21233] mem_cgroup_out_of_memory+0x1d8/0x240 [ 362.952476][T21233] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 362.952494][T21233] ? do_raw_spin_unlock+0x57/0x270 [ 362.952512][T21233] ? _raw_spin_unlock+0x2d/0x50 [ 362.952528][T21233] try_charge+0xf4b/0x1440 [ 362.952550][T21233] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 362.952564][T21233] ? percpu_ref_tryget_live+0x111/0x290 [ 362.952581][T21233] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 362.952598][T21233] ? __kasan_check_read+0x11/0x20 [ 362.994832][T21233] ? get_mem_cgroup_from_mm+0x156/0x320 [ 363.000385][T21233] mem_cgroup_try_charge+0x136/0x590 [ 363.007175][T21233] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 363.013421][T21233] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 363.019058][T21233] wp_page_copy+0x41e/0x1590 [ 363.023645][T21233] ? find_held_lock+0x35/0x130 [ 363.028411][T21233] ? pmd_pfn+0x1d0/0x1d0 [ 363.032650][T21233] ? lock_downgrade+0x920/0x920 [ 363.037501][T21233] ? swp_swapcount+0x540/0x540 [ 363.042269][T21233] ? __kasan_check_read+0x11/0x20 [ 363.047293][T21233] ? do_raw_spin_unlock+0x57/0x270 [ 363.052409][T21233] do_wp_page+0x499/0x14d0 [ 363.056833][T21233] ? finish_mkwrite_fault+0x570/0x570 [ 363.062219][T21233] __handle_mm_fault+0x22f1/0x3f20 [ 363.067336][T21233] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 363.072899][T21233] ? __kasan_check_read+0x11/0x20 [ 363.077932][T21233] handle_mm_fault+0x1b5/0x6c0 [ 363.082702][T21233] __do_page_fault+0x536/0xdd0 [ 363.087480][T21233] do_page_fault+0x38/0x590 [ 363.091982][T21233] page_fault+0x39/0x40 [ 363.096128][T21233] RIP: 0033:0x40fa06 [ 363.100015][T21233] Code: 0a 66 00 49 8b 89 c8 02 00 00 49 8b 91 c0 02 00 00 48 89 4a 08 49 8b 89 c8 02 00 00 48 89 11 48 c7 05 aa 0a 66 00 00 00 00 00 <48> c7 05 87 54 30 00 90 4e 71 00 31 d2 48 c7 05 72 54 30 00 90 4e 11:42:38 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(0x0, 0x0, 0x44000) 11:42:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:42:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:42:38 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:42:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:42:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) [ 363.119619][T21233] RSP: 002b:00007fff9ff77038 EFLAGS: 00010246 [ 363.125692][T21233] RAX: 00005555557c9c00 RBX: 00007fff9ff77040 RCX: 0000000000a704a0 [ 363.133755][T21233] RDX: 0000000000a704a0 RSI: 0000000000714e90 RDI: 00005555557c9c20 [ 363.141729][T21233] RBP: 00007fff9ff77080 R08: 0000000000000001 R09: 00005555557c9940 [ 363.149701][T21233] R10: 00005555557c9c10 R11: 0000000000000202 R12: 0000000000000001 [ 363.157673][T21233] R13: 0000000000000000 R14: 0000000000000000 R15: 00007fff9ff770d0 [ 363.184773][T21233] memory: usage 307200kB, limit 307200kB, failcnt 954 [ 363.192843][T21233] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 363.199896][T21233] Memory cgroup stats for /syz5: [ 363.200005][T21233] anon 271974400 [ 363.200005][T21233] file 0 [ 363.200005][T21233] kernel_stack 5767168 [ 363.200005][T21233] slab 11296768 [ 363.200005][T21233] sock 0 [ 363.200005][T21233] shmem 45056 [ 363.200005][T21233] file_mapped 135168 [ 363.200005][T21233] file_dirty 0 [ 363.200005][T21233] file_writeback 0 [ 363.200005][T21233] anon_thp 251658240 [ 363.200005][T21233] inactive_anon 135168 [ 363.200005][T21233] active_anon 271974400 [ 363.200005][T21233] inactive_file 0 [ 363.200005][T21233] active_file 57344 [ 363.200005][T21233] unevictable 0 [ 363.200005][T21233] slab_reclaimable 2297856 [ 363.200005][T21233] slab_unreclaimable 8998912 [ 363.200005][T21233] pgfault 44253 [ 363.200005][T21233] pgmajfault 0 [ 363.200005][T21233] workingset_refault 66 [ 363.200005][T21233] workingset_activate 0 [ 363.200005][T21233] workingset_nodereclaim 0 [ 363.200005][T21233] pgrefill 972 [ 363.200005][T21233] pgscan 986 [ 363.200005][T21233] pgsteal 186 [ 363.293902][T21233] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=16475,uid=0 [ 363.309447][T21233] Memory cgroup out of memory: Killed process 16475 (syz-executor.5) total-vm:72708kB, anon-rss:2208kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 363.328987][ T1065] oom_reaper: reaped process 16475 (syz-executor.5), now anon-rss:0kB, file-rss:34832kB, shmem-rss:0kB [ 363.335954][ T8647] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 363.347309][T21257] overlayfs: unrecognized mount option "i\dex=off" or missing value [ 363.362601][ T8647] CPU: 1 PID: 8647 Comm: syz-executor.3 Not tainted 5.3.0-rc6-next-20190830 #75 [ 363.362667][T21259] overlayfs: unrecognized mount option "i\dex=off" or missing value [ 363.371632][ T8647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 363.371638][ T8647] Call Trace: [ 363.371657][ T8647] dump_stack+0x172/0x1f0 [ 363.371678][ T8647] dump_header+0x177/0x1152 [ 363.371694][ T8647] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 363.371704][ T8647] ? ___ratelimit+0x2c8/0x595 [ 363.371717][ T8647] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 363.371740][ T8647] ? lockdep_hardirqs_on+0x418/0x5d0 [ 363.412234][ T8647] ? trace_hardirqs_on+0x67/0x240 [ 363.412252][ T8647] ? pagefault_out_of_memory+0x11c/0x11c [ 363.412269][ T8647] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 363.412282][ T8647] ? ___ratelimit+0x60/0x595 [ 363.412294][ T8647] ? do_raw_spin_unlock+0x57/0x270 [ 363.412310][ T8647] oom_kill_process.cold+0x10/0x15 [ 363.423354][ T8647] out_of_memory+0x334/0x1340 [ 363.423368][ T8647] ? lock_downgrade+0x920/0x920 [ 363.423387][ T8647] ? oom_killer_disable+0x280/0x280 [ 363.423411][ T8647] mem_cgroup_out_of_memory+0x1d8/0x240 [ 363.423425][ T8647] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 363.423446][ T8647] ? do_raw_spin_unlock+0x57/0x270 [ 363.423464][ T8647] ? _raw_spin_unlock+0x2d/0x50 [ 363.423480][ T8647] try_charge+0xf4b/0x1440 [ 363.423500][ T8647] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 363.423513][ T8647] ? percpu_ref_tryget_live+0x111/0x290 [ 363.423532][ T8647] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 363.423548][ T8647] ? __kasan_check_read+0x11/0x20 [ 363.423568][ T8647] ? get_mem_cgroup_from_mm+0x156/0x320 [ 363.423584][ T8647] mem_cgroup_try_charge+0x136/0x590 [ 363.423598][ T8647] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 363.423616][ T8647] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 363.423634][ T8647] wp_page_copy+0x41e/0x1590 [ 363.423648][ T8647] ? find_held_lock+0x35/0x130 [ 363.423667][ T8647] ? pmd_pfn+0x1d0/0x1d0 [ 363.423680][ T8647] ? lock_downgrade+0x920/0x920 [ 363.423699][ T8647] ? swp_swapcount+0x540/0x540 [ 363.562728][ T8647] ? __kasan_check_read+0x11/0x20 [ 363.567728][ T8647] ? do_raw_spin_unlock+0x57/0x270 [ 363.572818][ T8647] do_wp_page+0x499/0x14d0 [ 363.577211][ T8647] ? finish_mkwrite_fault+0x570/0x570 [ 363.582563][ T8647] __handle_mm_fault+0x22f1/0x3f20 [ 363.587651][ T8647] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 363.593181][ T8647] ? __kasan_check_read+0x11/0x20 [ 363.598183][ T8647] handle_mm_fault+0x1b5/0x6c0 [ 363.602933][ T8647] __do_page_fault+0x536/0xdd0 [ 363.607676][ T8647] do_page_fault+0x38/0x590 [ 363.612157][ T8647] page_fault+0x39/0x40 [ 363.616288][ T8647] RIP: 0033:0x457f6e [ 363.620158][ T8647] Code: 5c 41 5d 41 5e 5d c3 48 c7 c2 d4 ff ff ff f7 d8 41 bd ff ff ff ff 64 89 02 64 8b 04 25 d0 02 00 00 41 39 c4 0f 85 2f 01 00 00 <64> 44 89 04 25 d4 02 00 00 45 85 f6 0f 85 7f 00 00 00 48 85 db 74 [ 363.639736][ T8647] RSP: 002b:00007ffc54f1aa10 EFLAGS: 00010246 [ 363.645775][ T8647] RAX: 0000000000000001 RBX: 00007ffc54f1aa10 RCX: 0000000000457e4a [ 363.653719][ T8647] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 363.661756][ T8647] RBP: 00007ffc54f1aa50 R08: 0000000000000001 R09: 00005555555ba940 [ 363.669706][ T8647] R10: 00005555555bac10 R11: 0000000000000246 R12: 0000000000000001 [ 363.677830][ T8647] R13: 000000000000057b R14: 0000000000000000 R15: 00007ffc54f1aaa0 [ 363.687235][ T8647] memory: usage 307200kB, limit 307200kB, failcnt 258 [ 363.694075][ T8647] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 363.701664][ T8647] Memory cgroup stats for /syz3: [ 363.701780][ T8647] anon 276766720 [ 363.701780][ T8647] file 32768 [ 363.701780][ T8647] kernel_stack 6684672 [ 363.701780][ T8647] slab 10452992 [ 363.701780][ T8647] sock 0 [ 363.701780][ T8647] shmem 0 [ 363.701780][ T8647] file_mapped 0 [ 363.701780][ T8647] file_dirty 0 [ 363.701780][ T8647] file_writeback 0 [ 363.701780][ T8647] anon_thp 260046848 [ 363.701780][ T8647] inactive_anon 0 [ 363.701780][ T8647] active_anon 276766720 [ 363.701780][ T8647] inactive_file 135168 [ 363.701780][ T8647] active_file 0 [ 363.701780][ T8647] unevictable 0 [ 363.701780][ T8647] slab_reclaimable 2027520 [ 363.701780][ T8647] slab_unreclaimable 8425472 [ 363.701780][ T8647] pgfault 29172 [ 363.701780][ T8647] pgmajfault 0 [ 363.701780][ T8647] workingset_refault 0 [ 363.701780][ T8647] workingset_activate 0 [ 363.701780][ T8647] workingset_nodereclaim 0 [ 363.701780][ T8647] pgrefill 245 [ 363.701780][ T8647] pgscan 226 [ 363.701780][ T8647] pgsteal 124 [ 363.701780][ T8647] pgactivate 99 [ 363.800221][ T8647] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=21224,uid=0 [ 363.815752][ T8647] Memory cgroup out of memory: Killed process 21224 (syz-executor.3) total-vm:72840kB, anon-rss:2216kB, file-rss:35800kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 363.836682][ T1065] oom_reaper: reaped process 21224 (syz-executor.3), now anon-rss:0kB, file-rss:34840kB, shmem-rss:0kB [ 363.836916][T21236] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 363.858298][T21236] CPU: 1 PID: 21236 Comm: syz-executor.3 Not tainted 5.3.0-rc6-next-20190830 #75 [ 363.867411][T21236] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 363.877451][T21236] Call Trace: [ 363.880726][T21236] dump_stack+0x172/0x1f0 [ 363.885036][T21236] dump_header+0x177/0x1152 [ 363.889526][T21236] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 363.895314][T21236] ? ___ratelimit+0x2c8/0x595 [ 363.899970][T21236] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 363.905769][T21236] ? lockdep_hardirqs_on+0x418/0x5d0 [ 363.911039][T21236] ? trace_hardirqs_on+0x67/0x240 [ 363.916046][T21236] ? pagefault_out_of_memory+0x11c/0x11c [ 363.921682][T21236] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 363.927461][T21236] ? ___ratelimit+0x60/0x595 [ 363.932033][T21236] ? do_raw_spin_unlock+0x57/0x270 [ 363.937130][T21236] oom_kill_process.cold+0x10/0x15 [ 363.942219][T21236] out_of_memory+0x334/0x1340 [ 363.946871][T21236] ? lock_downgrade+0x920/0x920 [ 363.951712][T21236] ? oom_killer_disable+0x280/0x280 [ 363.956901][T21236] mem_cgroup_out_of_memory+0x1d8/0x240 [ 363.962426][T21236] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 363.968038][T21236] ? do_raw_spin_unlock+0x57/0x270 [ 363.973133][T21236] ? _raw_spin_unlock+0x2d/0x50 [ 363.977974][T21236] try_charge+0xa2d/0x1440 [ 363.982377][T21236] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 363.987899][T21236] ? percpu_ref_tryget_live+0x111/0x290 [ 363.993430][T21236] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 363.999657][T21236] ? __kasan_check_read+0x11/0x20 [ 364.004661][T21236] ? get_mem_cgroup_from_mm+0x156/0x320 [ 364.010191][T21236] mem_cgroup_try_charge+0x136/0x590 [ 364.015460][T21236] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 364.021676][T21236] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 364.027293][T21236] wp_page_copy+0x41e/0x1590 [ 364.031880][T21236] ? find_held_lock+0x35/0x130 [ 364.036632][T21236] ? pmd_pfn+0x1d0/0x1d0 [ 364.040871][T21236] ? lock_downgrade+0x920/0x920 [ 364.045698][T21236] ? swp_swapcount+0x540/0x540 [ 364.050447][T21236] ? __kasan_check_read+0x11/0x20 [ 364.055456][T21236] ? do_raw_spin_unlock+0x57/0x270 [ 364.060545][T21236] do_wp_page+0x499/0x14d0 [ 364.064939][T21236] ? finish_mkwrite_fault+0x570/0x570 [ 364.070309][T21236] __handle_mm_fault+0x22f1/0x3f20 [ 364.075411][T21236] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 364.081026][T21236] ? __kasan_check_read+0x11/0x20 [ 364.086048][T21236] handle_mm_fault+0x1b5/0x6c0 [ 364.090809][T21236] __do_page_fault+0x536/0xdd0 [ 364.095578][T21236] do_page_fault+0x38/0x590 [ 364.100058][T21236] page_fault+0x39/0x40 [ 364.104195][T21236] RIP: 0010:__put_user_4+0x1c/0x30 [ 364.109287][T21236] Code: 1f 00 c3 90 66 2e 0f 1f 84 00 00 00 00 00 65 48 8b 1c 25 40 fe 01 00 48 8b 9b 58 14 00 00 48 83 eb 03 48 39 d9 73 3f 0f 1f 00 <89> 01 31 c0 0f 1f 00 c3 66 90 66 2e 0f 1f 84 00 00 00 00 00 65 48 [ 364.128882][T21236] RSP: 0018:ffff888097987f30 EFLAGS: 00010293 [ 364.134934][T21236] RAX: 000000000000057b RBX: 00007fffffffeffd RCX: 00005555555bac10 [ 364.142882][T21236] RDX: dffffc0000000000 RSI: 1ffff1100bba4d7c RDI: ffff88805dd268f0 [ 364.150840][T21236] RBP: ffff888097987f48 R08: 0000000000000001 R09: ffff88805dd26bd8 [ 364.158799][T21236] R10: fffffbfff138aef8 R11: ffffffff89c577c7 R12: 0000000000000000 [ 364.166760][T21236] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 364.174745][T21236] ? schedule_tail+0xd8/0x130 [ 364.179410][T21236] ret_from_fork+0x8/0x30 [ 364.183710][T21236] RIP: 0033:0x457e4a [ 364.187590][T21236] Code: Bad RIP value. [ 364.191633][T21236] RSP: 002b:00007ffc54f1aa10 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 364.200029][T21236] RAX: 0000000000000000 RBX: 00007ffc54f1aa10 RCX: 0000000000457e4a [ 364.207974][T21236] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 364.215926][T21236] RBP: 00007ffc54f1aa50 R08: 0000000000000001 R09: 00005555555ba940 [ 364.223962][T21236] R10: 00005555555bac10 R11: 0000000000000246 R12: 0000000000000001 [ 364.233307][T21236] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffc54f1aaa0 [ 364.243224][T21236] memory: usage 304964kB, limit 307200kB, failcnt 258 [ 364.250311][T21236] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 364.257177][T21236] Memory cgroup stats for /syz3: [ 364.257277][T21236] anon 274591744 [ 364.257277][T21236] file 32768 [ 364.257277][T21236] kernel_stack 6684672 [ 364.257277][T21236] slab 10452992 [ 364.257277][T21236] sock 0 [ 364.257277][T21236] shmem 0 [ 364.257277][T21236] file_mapped 0 [ 364.257277][T21236] file_dirty 0 [ 364.257277][T21236] file_writeback 0 [ 364.257277][T21236] anon_thp 257949696 [ 364.257277][T21236] inactive_anon 0 [ 364.257277][T21236] active_anon 274591744 [ 364.257277][T21236] inactive_file 135168 [ 364.257277][T21236] active_file 0 [ 364.257277][T21236] unevictable 0 [ 364.257277][T21236] slab_reclaimable 2027520 [ 364.257277][T21236] slab_unreclaimable 8425472 [ 364.257277][T21236] pgfault 29172 [ 364.257277][T21236] pgmajfault 0 [ 364.257277][T21236] workingset_refault 0 [ 364.257277][T21236] workingset_activate 0 [ 364.257277][T21236] workingset_nodereclaim 0 [ 364.257277][T21236] pgrefill 245 [ 364.257277][T21236] pgscan 226 [ 364.257277][T21236] pgsteal 124 [ 364.257277][T21236] pgactivate 99 [ 364.354381][T21236] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=19855,uid=0 [ 364.369942][T21236] Memory cgroup out of memory: Killed process 19855 (syz-executor.3) total-vm:72972kB, anon-rss:2224kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 364.391263][ T1065] oom_reaper: reaped process 19855 (syz-executor.3), now anon-rss:0kB, file-rss:34832kB, shmem-rss:0kB 11:42:40 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000000)) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, &(0x7f0000000100)) 11:42:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0xf}}], 0x1, 0x0) 11:42:40 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0xd9, 0x0) 11:42:40 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x3, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 11:42:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d00}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:42:40 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}], [], 0x4c000000}) 11:42:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r2 = dup(r1) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000100)) 11:42:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x16}}], 0x1, 0x0) [ 365.272283][T21276] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:42:40 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}], [], 0x60000000}) 11:42:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:42:40 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0xda, 0x0) 11:42:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) [ 365.506412][ T8652] syz-executor.5 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=0 [ 365.614649][ T8652] CPU: 1 PID: 8652 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 365.623699][ T8652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 365.633761][ T8652] Call Trace: [ 365.637057][ T8652] dump_stack+0x172/0x1f0 [ 365.641400][ T8652] dump_header+0x177/0x1152 [ 365.645913][ T8652] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 365.651723][ T8652] ? ___ratelimit+0x2c8/0x595 [ 365.656421][ T8652] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 365.662235][ T8652] ? lockdep_hardirqs_on+0x418/0x5d0 [ 365.667521][ T8652] ? trace_hardirqs_on+0x67/0x240 [ 365.672543][ T8652] ? pagefault_out_of_memory+0x11c/0x11c [ 365.678177][ T8652] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 365.683985][ T8652] ? ___ratelimit+0x60/0x595 [ 365.688565][ T8652] ? do_raw_spin_unlock+0x57/0x270 [ 365.693659][ T8652] oom_kill_process.cold+0x10/0x15 [ 365.698746][ T8652] out_of_memory+0x334/0x1340 [ 365.703398][ T8652] ? lock_downgrade+0x920/0x920 [ 365.708227][ T8652] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 365.714022][ T8652] ? oom_killer_disable+0x280/0x280 [ 365.719208][ T8652] mem_cgroup_out_of_memory+0x1d8/0x240 [ 365.724732][ T8652] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 365.730358][ T8652] ? do_raw_spin_unlock+0x57/0x270 [ 365.735465][ T8652] ? _raw_spin_unlock+0x2d/0x50 [ 365.740295][ T8652] try_charge+0xf4b/0x1440 [ 365.744732][ T8652] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 365.750298][ T8652] ? find_held_lock+0x35/0x130 [ 365.755038][ T8652] ? get_mem_cgroup_from_mm+0x139/0x320 [ 365.760559][ T8652] ? lock_downgrade+0x920/0x920 [ 365.765382][ T8652] ? percpu_ref_tryget_live+0x111/0x290 [ 365.770906][ T8652] __memcg_kmem_charge_memcg+0x71/0xf0 [ 365.776339][ T8652] ? memcg_kmem_put_cache+0x50/0x50 [ 365.781555][ T8652] ? get_mem_cgroup_from_mm+0x156/0x320 [ 365.787078][ T8652] __memcg_kmem_charge+0x13a/0x3a0 [ 365.792168][ T8652] __alloc_pages_nodemask+0x4f7/0x900 [ 365.797515][ T8652] ? stack_trace_consume_entry+0x190/0x190 [ 365.803300][ T8652] ? __alloc_pages_slowpath+0x2540/0x2540 [ 365.808993][ T8652] ? copy_page_range+0xef4/0x1ed0 [ 365.813991][ T8652] ? copy_page_range+0xef4/0x1ed0 [ 365.819011][ T8652] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 365.825227][ T8652] alloc_pages_current+0x107/0x210 [ 365.830316][ T8652] pte_alloc_one+0x1b/0x1a0 [ 365.834809][ T8652] __pte_alloc+0x20/0x310 [ 365.839114][ T8652] copy_page_range+0x14da/0x1ed0 [ 365.844039][ T8652] ? pmd_alloc+0x180/0x180 [ 365.848428][ T8652] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 365.854122][ T8652] ? vma_compute_subtree_gap+0x158/0x230 [ 365.859738][ T8652] ? validate_mm_rb+0xa3/0xc0 [ 365.864396][ T8652] ? __vma_link_rb+0x5ad/0x770 [ 365.869140][ T8652] dup_mm+0xa67/0x1430 [ 365.873193][ T8652] ? vm_area_dup+0x170/0x170 [ 365.877760][ T8652] ? debug_mutex_init+0x2d/0x60 [ 365.882591][ T8652] copy_process+0x2671/0x6830 [ 365.887243][ T8652] ? __kasan_check_read+0x11/0x20 [ 365.892250][ T8652] ? __cleanup_sighand+0x60/0x60 [ 365.897159][ T8652] ? __might_fault+0x12b/0x1e0 [ 365.901898][ T8652] ? __might_fault+0x12b/0x1e0 [ 365.906653][ T8652] _do_fork+0x146/0xfa0 [ 365.910785][ T8652] ? copy_init_mm+0x20/0x20 [ 365.915265][ T8652] ? __kasan_check_read+0x11/0x20 [ 365.920267][ T8652] ? _copy_to_user+0x118/0x160 [ 365.925010][ T8652] __x64_sys_clone+0x1ab/0x270 [ 365.929750][ T8652] ? __ia32_sys_vfork+0xd0/0xd0 [ 365.934578][ T8652] ? do_syscall_64+0x26/0x760 [ 365.939229][ T8652] ? lockdep_hardirqs_on+0x418/0x5d0 [ 365.944487][ T8652] ? trace_hardirqs_on+0x67/0x240 [ 365.949508][ T8652] do_syscall_64+0xfa/0x760 [ 365.954022][ T8652] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 365.959896][ T8652] RIP: 0033:0x457e4a [ 365.963945][ T8652] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 365.983535][ T8652] RSP: 002b:00007fff9ff77040 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 365.991922][ T8652] RAX: ffffffffffffffda RBX: 00007fff9ff77040 RCX: 0000000000457e4a [ 365.999870][ T8652] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 366.007833][ T8652] RBP: 00007fff9ff77080 R08: 0000000000000001 R09: 00005555557c9940 [ 366.015786][ T8652] R10: 00005555557c9c10 R11: 0000000000000246 R12: 0000000000000001 [ 366.023734][ T8652] R13: 0000000000000000 R14: 0000000000000000 R15: 00007fff9ff770d0 [ 366.033658][ T8652] memory: usage 307200kB, limit 307200kB, failcnt 968 [ 366.040563][ T8652] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 366.047473][ T8652] Memory cgroup stats for /syz5: [ 366.047595][ T8652] anon 272039936 [ 366.047595][ T8652] file 0 [ 366.047595][ T8652] kernel_stack 5701632 [ 366.047595][ T8652] slab 11296768 [ 366.047595][ T8652] sock 0 [ 366.047595][ T8652] shmem 45056 [ 366.047595][ T8652] file_mapped 135168 [ 366.047595][ T8652] file_dirty 0 [ 366.047595][ T8652] file_writeback 0 [ 366.047595][ T8652] anon_thp 251658240 [ 366.047595][ T8652] inactive_anon 135168 [ 366.047595][ T8652] active_anon 272039936 [ 366.047595][ T8652] inactive_file 0 [ 366.047595][ T8652] active_file 57344 [ 366.047595][ T8652] unevictable 0 [ 366.047595][ T8652] slab_reclaimable 2297856 [ 366.047595][ T8652] slab_unreclaimable 8998912 [ 366.047595][ T8652] pgfault 44385 11:42:41 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000000)) r2 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x4, 0x8000) ioctl$KVM_GET_REG_LIST(r2, 0xc008aeb0, &(0x7f00000001c0)=ANY=[@ANYBLOB="08000000000000000200000000000000ff0f000000000000080000000000000004000000000000000900000000000000810000000000001004000000000000004500000000000000"]) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, &(0x7f0000000100)) 11:42:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x24}}], 0x1, 0x0) 11:42:41 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:42:41 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0xdb, 0x0) 11:42:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) [ 366.047595][ T8652] pgmajfault 0 [ 366.047595][ T8652] workingset_refault 66 [ 366.047595][ T8652] workingset_activate 0 [ 366.047595][ T8652] workingset_nodereclaim 0 [ 366.047595][ T8652] pgrefill 1005 [ 366.047595][ T8652] pgscan 986 [ 366.047595][ T8652] pgsteal 186 11:42:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x28}}], 0x1, 0x0) [ 366.156545][ T8652] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=21282,uid=0 11:42:41 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0xdc, 0x0) 11:42:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) [ 366.239338][ T8652] Memory cgroup out of memory: Killed process 21282 (syz-executor.5) total-vm:72708kB, anon-rss:2208kB, file-rss:35796kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 366.314359][ T8647] syz-executor.3 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=0 [ 366.346409][ T8647] CPU: 1 PID: 8647 Comm: syz-executor.3 Not tainted 5.3.0-rc6-next-20190830 #75 [ 366.355455][ T8647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 366.365492][ T8647] Call Trace: [ 366.365512][ T8647] dump_stack+0x172/0x1f0 [ 366.365530][ T8647] dump_header+0x177/0x1152 [ 366.365545][ T8647] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 366.365555][ T8647] ? ___ratelimit+0x2c8/0x595 [ 366.365572][ T8647] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 366.394855][ T8647] ? lockdep_hardirqs_on+0x418/0x5d0 [ 366.400145][ T8647] ? trace_hardirqs_on+0x67/0x240 [ 366.405282][ T8647] ? pagefault_out_of_memory+0x11c/0x11c [ 366.410922][ T8647] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 366.416729][ T8647] ? ___ratelimit+0x60/0x595 [ 366.421316][ T8647] ? do_raw_spin_unlock+0x57/0x270 [ 366.426438][ T8647] oom_kill_process.cold+0x10/0x15 [ 366.431553][ T8647] out_of_memory+0x334/0x1340 [ 366.436224][ T8647] ? lock_downgrade+0x920/0x920 [ 366.441077][ T8647] ? oom_killer_disable+0x280/0x280 [ 366.441102][ T8647] mem_cgroup_out_of_memory+0x1d8/0x240 [ 366.441122][ T8647] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 366.457441][ T8647] ? do_raw_spin_unlock+0x57/0x270 [ 366.462645][ T8647] ? _raw_spin_unlock+0x2d/0x50 [ 366.467500][ T8647] try_charge+0xf4b/0x1440 [ 366.471930][ T8647] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 366.477472][ T8647] ? find_held_lock+0x35/0x130 [ 366.482220][ T8647] ? get_mem_cgroup_from_mm+0x139/0x320 [ 366.487753][ T8647] ? lock_downgrade+0x920/0x920 [ 366.492581][ T8647] ? percpu_ref_tryget_live+0x111/0x290 [ 366.498118][ T8647] __memcg_kmem_charge_memcg+0x71/0xf0 [ 366.503556][ T8647] ? memcg_kmem_put_cache+0x50/0x50 [ 366.508738][ T8647] ? get_mem_cgroup_from_mm+0x156/0x320 [ 366.514269][ T8647] __memcg_kmem_charge+0x13a/0x3a0 [ 366.519360][ T8647] __alloc_pages_nodemask+0x4f7/0x900 [ 366.524713][ T8647] ? __alloc_pages_slowpath+0x2540/0x2540 [ 366.530415][ T8647] ? mmu_notifier_invalidate_range_start+0x95/0x110 [ 366.536995][ T8647] ? mmu_notifier_invalidate_range_start+0x95/0x110 [ 366.543563][ T8647] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 366.549785][ T8647] alloc_pages_current+0x107/0x210 [ 366.554879][ T8647] __pmd_alloc+0x41/0x460 [ 366.559182][ T8647] ? __pmd+0x60/0x60 [ 366.563058][ T8647] pmd_alloc+0x10c/0x180 [ 366.567284][ T8647] copy_page_range+0x610/0x1ed0 [ 366.572126][ T8647] ? lock_downgrade+0x920/0x920 [ 366.576969][ T8647] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 366.582664][ T8647] ? pmd_alloc+0x180/0x180 [ 366.587061][ T8647] ? validate_mm_rb+0xa3/0xc0 [ 366.591718][ T8647] ? __vma_link_rb+0x5ad/0x770 [ 366.596459][ T8647] ? anon_vma_fork+0xd4/0x4a0 [ 366.601120][ T8647] dup_mm+0xa67/0x1430 [ 366.605179][ T8647] ? vm_area_dup+0x170/0x170 [ 366.609749][ T8647] ? debug_mutex_init+0x2d/0x60 [ 366.614585][ T8647] copy_process+0x2671/0x6830 [ 366.619246][ T8647] ? __kasan_check_read+0x11/0x20 [ 366.624260][ T8647] ? __cleanup_sighand+0x60/0x60 [ 366.629175][ T8647] ? __might_fault+0x12b/0x1e0 [ 366.633921][ T8647] ? __might_fault+0x12b/0x1e0 [ 366.638686][ T8647] _do_fork+0x146/0xfa0 [ 366.642829][ T8647] ? copy_init_mm+0x20/0x20 [ 366.647318][ T8647] ? __kasan_check_read+0x11/0x20 [ 366.652320][ T8647] ? _copy_to_user+0x118/0x160 [ 366.657154][ T8647] __x64_sys_clone+0x1ab/0x270 [ 366.661901][ T8647] ? __ia32_sys_vfork+0xd0/0xd0 [ 366.666737][ T8647] ? do_syscall_64+0x26/0x760 [ 366.671406][ T8647] ? lockdep_hardirqs_on+0x418/0x5d0 [ 366.676669][ T8647] ? trace_hardirqs_on+0x67/0x240 [ 366.681675][ T8647] do_syscall_64+0xfa/0x760 [ 366.686165][ T8647] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 366.692048][ T8647] RIP: 0033:0x457e4a [ 366.695926][ T8647] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 366.715509][ T8647] RSP: 002b:00007ffc54f1aa10 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 366.723900][ T8647] RAX: ffffffffffffffda RBX: 00007ffc54f1aa10 RCX: 0000000000457e4a [ 366.731863][ T8647] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 366.739813][ T8647] RBP: 00007ffc54f1aa50 R08: 0000000000000001 R09: 00005555555ba940 [ 366.747770][ T8647] R10: 00005555555bac10 R11: 0000000000000246 R12: 0000000000000001 [ 366.755719][ T8647] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffc54f1aaa0 [ 366.771257][ T8647] memory: usage 307176kB, limit 307200kB, failcnt 275 [ 366.778259][ T8647] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 366.783472][T21339] overlayfs: unrecognized mount option "i\dex=off" or missing value [ 366.786591][ T8647] Memory cgroup stats for /syz3: [ 366.786826][ T8647] anon 276754432 [ 366.786826][ T8647] file 32768 [ 366.786826][ T8647] kernel_stack 6684672 [ 366.786826][ T8647] slab 10452992 [ 366.786826][ T8647] sock 0 [ 366.786826][ T8647] shmem 0 [ 366.786826][ T8647] file_mapped 0 11:42:41 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}], [], 0x68000000}) 11:42:41 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:42:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x2f}}], 0x1, 0x0) 11:42:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) [ 366.786826][ T8647] file_dirty 0 [ 366.786826][ T8647] file_writeback 0 [ 366.786826][ T8647] anon_thp 260046848 [ 366.786826][ T8647] inactive_anon 0 [ 366.786826][ T8647] active_anon 276754432 [ 366.786826][ T8647] inactive_file 135168 [ 366.786826][ T8647] active_file 0 [ 366.786826][ T8647] unevictable 0 [ 366.786826][ T8647] slab_reclaimable 2027520 [ 366.786826][ T8647] slab_unreclaimable 8425472 [ 366.786826][ T8647] pgfault 29304 [ 366.786826][ T8647] pgmajfault 0 [ 366.786826][ T8647] workingset_refault 0 [ 366.786826][ T8647] workingset_activate 0 [ 366.786826][ T8647] workingset_nodereclaim 0 [ 366.786826][ T8647] pgrefill 245 [ 366.786826][ T8647] pgscan 226 [ 366.786826][ T8647] pgsteal 124 [ 366.786826][ T8647] pgactivate 99 [ 366.953930][ T8647] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=19702,uid=0 [ 366.972958][T21351] overlayfs: unrecognized mount option "i\dex=off" or missing value [ 366.988916][ T8647] Memory cgroup out of memory: Killed process 19702 (syz-executor.3) total-vm:72840kB, anon-rss:2216kB, file-rss:35800kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 367.011618][ T1065] oom_reaper: reaped process 19702 (syz-executor.3), now anon-rss:0kB, file-rss:34840kB, shmem-rss:0kB [ 367.024812][T21355] syz-executor.3 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 367.039711][T21355] CPU: 1 PID: 21355 Comm: syz-executor.3 Not tainted 5.3.0-rc6-next-20190830 #75 [ 367.048832][T21355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 367.058879][T21355] Call Trace: [ 367.062158][T21355] dump_stack+0x172/0x1f0 [ 367.066486][T21355] dump_header+0x177/0x1152 [ 367.070975][T21355] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 367.076760][T21355] ? ___ratelimit+0x2c8/0x595 [ 367.081425][T21355] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 367.087216][T21355] ? lockdep_hardirqs_on+0x418/0x5d0 [ 367.092484][T21355] ? trace_hardirqs_on+0x67/0x240 [ 367.097503][T21355] ? pagefault_out_of_memory+0x11c/0x11c [ 367.103115][T21355] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 367.108912][T21355] ? ___ratelimit+0x60/0x595 [ 367.113479][T21355] ? do_raw_spin_unlock+0x57/0x270 [ 367.118573][T21355] oom_kill_process.cold+0x10/0x15 [ 367.123672][T21355] out_of_memory+0x334/0x1340 [ 367.128330][T21355] ? lock_downgrade+0x920/0x920 [ 367.133171][T21355] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 367.138958][T21355] ? oom_killer_disable+0x280/0x280 [ 367.144142][T21355] mem_cgroup_out_of_memory+0x1d8/0x240 [ 367.149665][T21355] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 367.155278][T21355] ? do_raw_spin_unlock+0x57/0x270 [ 367.160373][T21355] ? _raw_spin_unlock+0x2d/0x50 [ 367.165218][T21355] try_charge+0xf4b/0x1440 [ 367.169624][T21355] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 367.175148][T21355] ? find_held_lock+0x35/0x130 [ 367.179892][T21355] ? get_mem_cgroup_from_mm+0x139/0x320 [ 367.185420][T21355] ? lock_downgrade+0x920/0x920 [ 367.190261][T21355] ? percpu_ref_tryget_live+0x111/0x290 [ 367.195801][T21355] __memcg_kmem_charge_memcg+0x71/0xf0 [ 367.201237][T21355] ? memcg_kmem_put_cache+0x50/0x50 [ 367.206416][T21355] ? get_mem_cgroup_from_mm+0x156/0x320 [ 367.211942][T21355] __memcg_kmem_charge+0x13a/0x3a0 [ 367.217037][T21355] __alloc_pages_nodemask+0x4f7/0x900 [ 367.222391][T21355] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 367.227914][T21355] ? __alloc_pages_slowpath+0x2540/0x2540 [ 367.233613][T21355] ? percpu_ref_put_many+0xb6/0x190 [ 367.238966][T21355] ? lockdep_hardirqs_on+0x418/0x5d0 [ 367.244229][T21355] ? trace_hardirqs_on+0x67/0x240 [ 367.249242][T21355] ? __kasan_check_read+0x11/0x20 [ 367.254251][T21355] copy_process+0x3f8/0x6830 [ 367.258824][T21355] ? psi_memstall_leave+0x12e/0x180 [ 367.264005][T21355] ? __kasan_check_read+0x11/0x20 [ 367.269007][T21355] ? __lock_acquire+0x16f2/0x4a00 [ 367.274016][T21355] ? __cleanup_sighand+0x60/0x60 [ 367.278930][T21355] ? __might_fault+0x12b/0x1e0 [ 367.283675][T21355] ? __might_fault+0x12b/0x1e0 [ 367.288425][T21355] _do_fork+0x146/0xfa0 [ 367.292561][T21355] ? copy_init_mm+0x20/0x20 [ 367.297048][T21355] ? __kasan_check_read+0x11/0x20 [ 367.302050][T21355] ? _copy_to_user+0x118/0x160 [ 367.306799][T21355] __x64_sys_clone+0x1ab/0x270 [ 367.311553][T21355] ? __ia32_sys_vfork+0xd0/0xd0 [ 367.316391][T21355] ? do_syscall_64+0x26/0x760 [ 367.321056][T21355] ? lockdep_hardirqs_on+0x418/0x5d0 [ 367.326319][T21355] ? trace_hardirqs_on+0x67/0x240 [ 367.331327][T21355] do_syscall_64+0xfa/0x760 [ 367.335817][T21355] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 367.341685][T21355] RIP: 0033:0x459879 [ 367.345562][T21355] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 367.365144][T21355] RSP: 002b:00007fbbf4953c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 367.373550][T21355] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000459879 [ 367.381510][T21355] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 00000000000041fc [ 367.389462][T21355] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 367.397411][T21355] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbbf49546d4 [ 367.405359][T21355] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 00000000ffffffff [ 367.421882][T21353] overlayfs: unrecognized mount option "i\dex=off" or missing value [ 367.461418][T21355] memory: usage 307200kB, limit 307200kB, failcnt 301 [ 367.475012][T21355] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 367.482386][T21355] Memory cgroup stats for /syz3: [ 367.482499][T21355] anon 276803584 [ 367.482499][T21355] file 32768 [ 367.482499][T21355] kernel_stack 6750208 [ 367.482499][T21355] slab 10452992 [ 367.482499][T21355] sock 0 [ 367.482499][T21355] shmem 0 [ 367.482499][T21355] file_mapped 0 [ 367.482499][T21355] file_dirty 0 [ 367.482499][T21355] file_writeback 0 [ 367.482499][T21355] anon_thp 260046848 [ 367.482499][T21355] inactive_anon 0 [ 367.482499][T21355] active_anon 276803584 [ 367.482499][T21355] inactive_file 135168 [ 367.482499][T21355] active_file 0 [ 367.482499][T21355] unevictable 0 [ 367.482499][T21355] slab_reclaimable 2027520 [ 367.482499][T21355] slab_unreclaimable 8425472 [ 367.482499][T21355] pgfault 29403 [ 367.482499][T21355] pgmajfault 0 [ 367.482499][T21355] workingset_refault 0 [ 367.482499][T21355] workingset_activate 0 [ 367.482499][T21355] workingset_nodereclaim 0 [ 367.482499][T21355] pgrefill 278 [ 367.482499][T21355] pgscan 292 [ 367.482499][T21355] pgsteal 124 [ 367.482499][T21355] pgactivate 99 [ 367.586560][T21355] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=18369,uid=0 [ 367.604533][T21355] Memory cgroup out of memory: Killed process 18369 (syz-executor.3) total-vm:72972kB, anon-rss:2224kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 367.627459][T21354] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 367.637972][T21354] CPU: 0 PID: 21354 Comm: syz-executor.3 Not tainted 5.3.0-rc6-next-20190830 #75 [ 367.647074][T21354] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 367.657109][T21354] Call Trace: [ 367.660393][T21354] dump_stack+0x172/0x1f0 [ 367.664726][T21354] dump_header+0x177/0x1152 [ 367.669229][T21354] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 367.675019][T21354] ? ___ratelimit+0x2c8/0x595 [ 367.679685][T21354] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 367.685525][T21354] ? lockdep_hardirqs_on+0x418/0x5d0 [ 367.690804][T21354] ? trace_hardirqs_on+0x67/0x240 [ 367.695820][T21354] ? pagefault_out_of_memory+0x11c/0x11c [ 367.701431][T21354] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 367.707215][T21354] ? ___ratelimit+0x60/0x595 [ 367.711790][T21354] ? do_raw_spin_unlock+0x57/0x270 [ 367.716899][T21354] oom_kill_process.cold+0x10/0x15 [ 367.721993][T21354] out_of_memory+0x334/0x1340 [ 367.726662][T21354] ? lock_downgrade+0x920/0x920 [ 367.731516][T21354] ? oom_killer_disable+0x280/0x280 [ 367.736705][T21354] mem_cgroup_out_of_memory+0x1d8/0x240 [ 367.742232][T21354] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 367.747846][T21354] ? do_raw_spin_unlock+0x57/0x270 [ 367.752936][T21354] ? _raw_spin_unlock+0x2d/0x50 [ 367.757766][T21354] try_charge+0xa2d/0x1440 [ 367.762179][T21354] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 367.767713][T21354] ? percpu_ref_tryget_live+0x111/0x290 [ 367.773252][T21354] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 367.779479][T21354] ? __kasan_check_read+0x11/0x20 [ 367.784493][T21354] ? get_mem_cgroup_from_mm+0x156/0x320 [ 367.790033][T21354] mem_cgroup_try_charge+0x136/0x590 [ 367.795309][T21354] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 367.801530][T21354] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 367.807141][T21354] wp_page_copy+0x41e/0x1590 [ 367.811721][T21354] ? find_held_lock+0x35/0x130 [ 367.816476][T21354] ? pmd_pfn+0x1d0/0x1d0 [ 367.820707][T21354] ? lock_downgrade+0x920/0x920 [ 367.825548][T21354] ? swp_swapcount+0x540/0x540 [ 367.830310][T21354] ? __kasan_check_read+0x11/0x20 [ 367.835323][T21354] ? do_raw_spin_unlock+0x57/0x270 [ 367.840427][T21354] do_wp_page+0x499/0x14d0 [ 367.844879][T21354] ? finish_mkwrite_fault+0x570/0x570 [ 367.850252][T21354] __handle_mm_fault+0x22f1/0x3f20 [ 367.855357][T21354] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 367.860894][T21354] ? __kasan_check_read+0x11/0x20 [ 367.865901][T21354] handle_mm_fault+0x1b5/0x6c0 [ 367.870658][T21354] __do_page_fault+0x536/0xdd0 [ 367.875422][T21354] do_page_fault+0x38/0x590 [ 367.879919][T21354] page_fault+0x39/0x40 [ 367.884070][T21354] RIP: 0033:0x40cb60 [ 367.887952][T21354] Code: 50 80 60 20 01 48 89 48 10 48 8b 4c 24 60 48 89 48 18 8b 4c 24 68 89 48 24 8b 4c 24 30 89 48 28 31 c0 48 8b 8c 04 20 01 00 00 <48> 89 8c 02 50 bf 75 00 48 83 c0 08 48 83 f8 48 75 e6 49 63 c6 0f [ 367.907537][T21354] RSP: 002b:00007ffc54f1a8b0 EFLAGS: 00010287 [ 367.913604][T21354] RAX: 0000000000000008 RBX: 0000000000000000 RCX: 0000000000000000 [ 367.921561][T21354] RDX: 00000000000000a8 RSI: 00007fbbf4932db0 RDI: 000000000075bfd0 [ 367.929517][T21354] RBP: 000000000075bfd4 R08: 0000000000000000 R09: 00007fbbf4933700 [ 367.937486][T21354] R10: 00007fbbf49339d0 R11: 0000000000000202 R12: 000000000075bfc8 [ 367.945461][T21354] R13: 0000000000000000 R14: 0000000000000001 R15: 000000000075bfd4 [ 367.953983][T21354] memory: usage 304680kB, limit 307200kB, failcnt 301 [ 367.960882][T21354] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 367.967714][T21354] Memory cgroup stats for /syz3: [ 367.967794][T21354] anon 274591744 [ 367.967794][T21354] file 32768 [ 367.967794][T21354] kernel_stack 6684672 [ 367.967794][T21354] slab 10452992 [ 367.967794][T21354] sock 0 [ 367.967794][T21354] shmem 0 [ 367.967794][T21354] file_mapped 0 [ 367.967794][T21354] file_dirty 0 [ 367.967794][T21354] file_writeback 0 [ 367.967794][T21354] anon_thp 257949696 [ 367.967794][T21354] inactive_anon 0 [ 367.967794][T21354] active_anon 274591744 [ 367.967794][T21354] inactive_file 135168 [ 367.967794][T21354] active_file 0 [ 367.967794][T21354] unevictable 0 [ 367.967794][T21354] slab_reclaimable 2027520 [ 367.967794][T21354] slab_unreclaimable 8425472 [ 367.967794][T21354] pgfault 29403 [ 367.967794][T21354] pgmajfault 0 [ 367.967794][T21354] workingset_refault 0 [ 367.967794][T21354] workingset_activate 0 [ 367.967794][T21354] workingset_nodereclaim 0 [ 367.967794][T21354] pgrefill 278 [ 367.967794][T21354] pgscan 292 [ 367.967794][T21354] pgsteal 124 [ 367.967794][T21354] pgactivate 99 11:42:43 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000004a40)=[{{&(0x7f0000000240)=@nl=@proc, 0x80, &(0x7f0000000580)=[{&(0x7f00000002c0)=""/70, 0x46}, {&(0x7f0000000340)=""/58, 0x3a}, {&(0x7f0000000380)=""/94, 0x5e}, {&(0x7f0000000400)=""/187, 0xbb}, {&(0x7f00000004c0)=""/92, 0x5c}, {&(0x7f0000000540)=""/28, 0x1c}], 0x6, &(0x7f0000000600)=""/4096, 0x1000}, 0x1}, {{&(0x7f0000001600)=@nfc, 0x80, &(0x7f0000002a80)=[{&(0x7f0000001680)=""/150, 0x96}, {&(0x7f0000001740)=""/109, 0x6d}, {&(0x7f00000017c0)=""/109, 0x6d}, {&(0x7f0000001840)=""/171, 0xab}, {&(0x7f0000001900)=""/4096, 0x1000}, {&(0x7f0000002900)=""/33, 0x21}, {&(0x7f0000002940)=""/165, 0xa5}, {&(0x7f0000002a00)=""/90, 0x5a}], 0x8, &(0x7f0000002b00)=""/178, 0xb2}, 0x857}, {{&(0x7f0000002bc0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000002e00)=[{&(0x7f0000002c40)=""/122, 0x7a}, {&(0x7f0000002cc0)=""/31, 0x1f}, {&(0x7f0000002d00)=""/55, 0x37}, {&(0x7f0000002d40)=""/160, 0xa0}], 0x4, &(0x7f0000002e40)=""/199, 0xc7}, 0x8}, {{&(0x7f0000002f40)=@nl=@proc, 0x80, &(0x7f00000031c0)=[{&(0x7f0000002fc0)=""/33, 0x21}, {&(0x7f0000003000)=""/128, 0x80}, {&(0x7f0000003080)=""/126, 0x7e}, {&(0x7f0000003100)=""/3, 0x3}, {&(0x7f0000003140)=""/86, 0x56}], 0x5}, 0x9}, {{&(0x7f0000003240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000003480)=[{&(0x7f00000032c0)=""/106, 0x6a}, {&(0x7f0000003340)=""/6, 0x6}, {&(0x7f0000003380)=""/7, 0x7}, {&(0x7f00000033c0)=""/61, 0x3d}, {&(0x7f0000003400)=""/78, 0x4e}], 0x5, &(0x7f0000003500)=""/163, 0xa3}, 0x3}, {{&(0x7f00000035c0)=@nfc_llcp, 0x80, &(0x7f0000004980)=[{&(0x7f0000003640)=""/4096, 0x1000}, {&(0x7f0000004640)=""/161, 0xa1}, {&(0x7f0000004700)=""/135, 0x87}, {&(0x7f00000047c0)=""/153, 0x99}, {&(0x7f0000004880)=""/228, 0xe4}], 0x5, &(0x7f0000004a00)=""/58, 0x3a}, 0x10001}], 0x6, 0x2000, 0x0) lstat(&(0x7f0000004bc0)='./file0\x00', &(0x7f0000004c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@ipv4={[], [], @broadcast}, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e24, 0x8, 0x4e20, 0x0, 0x2, 0x80, 0xa0, 0x29, r4, r5}, {0x1, 0x7f, 0x3, 0xffffffffffffff80, 0x4, 0x1000, 0x1, 0x9}, {0x1, 0x1f, 0x100000001, 0x1}, 0x9, 0x6e6bbf, 0x2, 0x1, 0x1, 0x1}, {{@in6=@loopback, 0x4d4, 0xb95a54d38fd462e8}, 0xa, @in6=@loopback, 0x3507, 0x3, 0x0, 0x0, 0x800, 0x100, 0x1}}, 0xe8) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000000)) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) write$apparmor_current(r6, &(0x7f00000001c0)=ANY=[@ANYBLOB='changehat 00000^loposix_acl_accessa%cgroup\\\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00P\x00\x00\x00'], 0x39) ioctl$DRM_IOCTL_AGP_ACQUIRE(r2, 0x6430) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000004e00)={&(0x7f0000ff9000/0x4000)=nil, 0x4000}, &(0x7f0000004e40)=0x10) ptrace(0x10, r1) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000004d80)={0x2, 0x0, 0x10000, 0x40}) ioctl$DRM_IOCTL_SG_FREE(r2, 0x40106439, &(0x7f0000004dc0)={0x5, r7}) wait4(0x0, 0x0, 0x0, &(0x7f0000000100)) 11:42:43 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0xdd, 0x0) 11:42:43 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:42:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d000000}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:42:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x20000398}}], 0x1, 0x0) 11:42:43 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}], [], 0x6c000000}) [ 368.064142][T21354] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=18097,uid=0 [ 368.079703][T21354] Memory cgroup out of memory: Killed process 18097 (syz-executor.3) total-vm:72972kB, anon-rss:2224kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 368.161561][T21369] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:42:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x2}}], 0x1, 0x0) 11:42:43 executing program 2: socket$inet6(0xa, 0x2, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:42:43 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}], [], 0x74000000}) 11:42:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffeedf}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:42:43 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0xde, 0x0) [ 368.258981][T21378] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:42:43 executing program 2: socket$inet6(0xa, 0x2, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 368.428365][ T8652] syz-executor.5 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=0 [ 368.501142][ T8652] CPU: 0 PID: 8652 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 368.510198][ T8652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 368.520255][ T8652] Call Trace: [ 368.523556][ T8652] dump_stack+0x172/0x1f0 [ 368.527899][ T8652] dump_header+0x177/0x1152 [ 368.532420][ T8652] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 368.538231][ T8652] ? ___ratelimit+0x2c8/0x595 [ 368.542910][ T8652] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 368.548715][ T8652] ? lockdep_hardirqs_on+0x418/0x5d0 [ 368.554007][ T8652] ? trace_hardirqs_on+0x67/0x240 [ 368.559037][ T8652] ? pagefault_out_of_memory+0x11c/0x11c [ 368.564680][ T8652] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 368.570499][ T8652] ? ___ratelimit+0x60/0x595 [ 368.575098][ T8652] ? do_raw_spin_unlock+0x57/0x270 [ 368.580222][ T8652] oom_kill_process.cold+0x10/0x15 [ 368.585349][ T8652] out_of_memory+0x334/0x1340 [ 368.590030][ T8652] ? lock_downgrade+0x920/0x920 [ 368.594887][ T8652] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 368.600695][ T8652] ? oom_killer_disable+0x280/0x280 [ 368.605906][ T8652] mem_cgroup_out_of_memory+0x1d8/0x240 [ 368.611450][ T8652] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 368.617083][ T8652] ? do_raw_spin_unlock+0x57/0x270 [ 368.622187][ T8652] ? _raw_spin_unlock+0x2d/0x50 [ 368.622206][ T8652] try_charge+0xf4b/0x1440 [ 368.622228][ T8652] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 368.622241][ T8652] ? find_held_lock+0x35/0x130 [ 368.622255][ T8652] ? get_mem_cgroup_from_mm+0x139/0x320 [ 368.622274][ T8652] ? lock_downgrade+0x920/0x920 [ 368.622286][ T8652] ? percpu_ref_tryget_live+0x111/0x290 [ 368.622306][ T8652] __memcg_kmem_charge_memcg+0x71/0xf0 [ 368.622321][ T8652] ? memcg_kmem_put_cache+0x50/0x50 [ 368.622339][ T8652] ? get_mem_cgroup_from_mm+0x156/0x320 [ 368.622356][ T8652] __memcg_kmem_charge+0x13a/0x3a0 [ 368.622372][ T8652] __alloc_pages_nodemask+0x4f7/0x900 [ 368.622387][ T8652] ? stack_trace_consume_entry+0x190/0x190 [ 368.622404][ T8652] ? __alloc_pages_slowpath+0x2540/0x2540 [ 368.674063][ T8652] ? copy_page_range+0xef4/0x1ed0 [ 368.674086][ T8652] ? copy_page_range+0xef4/0x1ed0 [ 368.690328][ T8652] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 368.690346][ T8652] alloc_pages_current+0x107/0x210 [ 368.690363][ T8652] pte_alloc_one+0x1b/0x1a0 [ 368.690379][ T8652] __pte_alloc+0x20/0x310 [ 368.690395][ T8652] copy_page_range+0x14da/0x1ed0 [ 368.690431][ T8652] ? pmd_alloc+0x180/0x180 [ 368.735555][ T8652] ? __rb_insert_augmented+0x20c/0xd90 [ 368.741028][ T8652] ? validate_mm_rb+0xa3/0xc0 [ 368.745722][ T8652] ? __vma_link_rb+0x5ad/0x770 [ 368.750503][ T8652] dup_mm+0xa67/0x1430 [ 368.754593][ T8652] ? vm_area_dup+0x170/0x170 [ 368.759197][ T8652] ? debug_mutex_init+0x2d/0x60 [ 368.764061][ T8652] copy_process+0x2671/0x6830 [ 368.768742][ T8652] ? __kasan_check_read+0x11/0x20 [ 368.773778][ T8652] ? __cleanup_sighand+0x60/0x60 [ 368.778721][ T8652] ? __might_fault+0x12b/0x1e0 [ 368.783483][ T8652] ? __might_fault+0x12b/0x1e0 [ 368.788256][ T8652] _do_fork+0x146/0xfa0 [ 368.792412][ T8652] ? copy_init_mm+0x20/0x20 [ 368.796910][ T8652] ? __kasan_check_read+0x11/0x20 [ 368.801916][ T8652] ? _copy_to_user+0x118/0x160 [ 368.806665][ T8652] __x64_sys_clone+0x1ab/0x270 [ 368.811426][ T8652] ? __ia32_sys_vfork+0xd0/0xd0 [ 368.816272][ T8652] ? do_syscall_64+0x26/0x760 [ 368.820928][ T8652] ? lockdep_hardirqs_on+0x418/0x5d0 [ 368.826193][ T8652] ? trace_hardirqs_on+0x67/0x240 [ 368.831211][ T8652] do_syscall_64+0xfa/0x760 [ 368.835714][ T8652] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 368.841594][ T8652] RIP: 0033:0x457e4a [ 368.845473][ T8652] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 368.865060][ T8652] RSP: 002b:00007fff9ff77040 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 368.873465][ T8652] RAX: ffffffffffffffda RBX: 00007fff9ff77040 RCX: 0000000000457e4a [ 368.881428][ T8652] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 368.889388][ T8652] RBP: 00007fff9ff77080 R08: 0000000000000001 R09: 00005555557c9940 [ 368.897348][ T8652] R10: 00005555557c9c10 R11: 0000000000000246 R12: 0000000000000001 [ 368.905301][ T8652] R13: 0000000000000000 R14: 0000000000000000 R15: 00007fff9ff770d0 [ 368.914933][ T8652] memory: usage 307200kB, limit 307200kB, failcnt 1006 [ 368.921875][ T8652] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 368.928768][ T8652] Memory cgroup stats for /syz5: [ 368.928871][ T8652] anon 272130048 [ 368.928871][ T8652] file 0 [ 368.928871][ T8652] kernel_stack 5701632 [ 368.928871][ T8652] slab 11431936 [ 368.928871][ T8652] sock 0 [ 368.928871][ T8652] shmem 45056 [ 368.928871][ T8652] file_mapped 135168 [ 368.928871][ T8652] file_dirty 0 [ 368.928871][ T8652] file_writeback 0 [ 368.928871][ T8652] anon_thp 251658240 [ 368.928871][ T8652] inactive_anon 135168 [ 368.928871][ T8652] active_anon 272060416 [ 368.928871][ T8652] inactive_file 0 [ 368.928871][ T8652] active_file 57344 [ 368.928871][ T8652] unevictable 0 [ 368.928871][ T8652] slab_reclaimable 2433024 [ 368.928871][ T8652] slab_unreclaimable 8998912 [ 368.928871][ T8652] pgfault 44583 [ 368.928871][ T8652] pgmajfault 0 [ 368.928871][ T8652] workingset_refault 66 [ 368.928871][ T8652] workingset_activate 0 [ 368.928871][ T8652] workingset_nodereclaim 0 [ 368.928871][ T8652] pgrefill 1038 [ 368.928871][ T8652] pgscan 986 [ 368.928871][ T8652] pgsteal 186 [ 369.019654][T21403] ptrace attach of "/root/syz-executor.3"[21376] was attempted by "/root/syz-executor.3"[21403] [ 369.024107][ T8652] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=21371,uid=0 11:42:44 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000000)) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, &(0x7f0000000100)) sched_setscheduler(r1, 0x1, &(0x7f00000000c0)=0x63) 11:42:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x3}}], 0x1, 0x0) 11:42:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffeeee}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:42:44 executing program 2: socket$inet6(0xa, 0x2, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:42:44 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0xdf, 0x0) [ 369.050102][ T8652] Memory cgroup out of memory: Killed process 21371 (syz-executor.5) total-vm:72708kB, anon-rss:2208kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 369.069650][ T1065] oom_reaper: reaped process 21371 (syz-executor.5), now anon-rss:0kB, file-rss:34832kB, shmem-rss:0kB [ 369.105571][T21407] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:42:44 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}], [], 0x7a000000}) 11:42:44 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:42:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x4}}], 0x1, 0x0) 11:42:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdfeeff7f}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:42:44 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0xe0, 0x0) 11:42:44 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}], [], 0x8cffffff}) [ 369.340705][T21432] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:42:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x5}}], 0x1, 0x0) [ 369.537215][T21449] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:42:45 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000000)) ptrace(0x10, r1) r2 = syz_open_procfs(r1, &(0x7f0000000280)='-o\b\x00') getsockopt$inet_mreqsrc(r2, 0x0, 0xa7534721c811203a, &(0x7f00000001c0)={@empty, @remote, @dev}, &(0x7f0000000200)=0xc) wait4(0x0, 0x0, 0x0, &(0x7f0000000100)) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r2, &(0x7f00000000c0)={0x80000004}) 11:42:45 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:42:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xeeeeff7f}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:42:45 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0xe1, 0x0) 11:42:45 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}], [], 0xc0ed0000}) 11:42:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x6}}], 0x1, 0x0) [ 370.004048][T21462] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:42:45 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}], [], 0xf6ffffff}) 11:42:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x7}}], 0x1, 0x0) 11:42:45 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:42:45 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0xe2, 0x0) 11:42:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffffff000}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:42:45 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}], [], 0xff000000}) [ 370.132431][T21474] overlayfs: unrecognized mount option "i\dex=off" or missing value [ 370.355307][T21494] overlayfs: unrecognized mount option "i\dex=off" or missing value [ 370.389863][T21497] overlayfs: unrecognized mount option "i\dex=off" or missing value [ 370.856419][T21469] syz-executor.3 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 370.868566][T21469] CPU: 1 PID: 21469 Comm: syz-executor.3 Not tainted 5.3.0-rc6-next-20190830 #75 [ 370.877704][T21469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 370.887743][T21469] Call Trace: [ 370.891021][T21469] dump_stack+0x172/0x1f0 [ 370.895333][T21469] dump_header+0x177/0x1152 [ 370.899829][T21469] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 370.905619][T21469] ? ___ratelimit+0x2c8/0x595 [ 370.910271][T21469] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 370.916055][T21469] ? lockdep_hardirqs_on+0x418/0x5d0 [ 370.921327][T21469] ? trace_hardirqs_on+0x67/0x240 [ 370.926338][T21469] ? pagefault_out_of_memory+0x11c/0x11c [ 370.931949][T21469] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 370.937733][T21469] ? ___ratelimit+0x60/0x595 [ 370.942308][T21469] ? do_raw_spin_unlock+0x57/0x270 [ 370.947410][T21469] oom_kill_process.cold+0x10/0x15 [ 370.952500][T21469] out_of_memory+0x334/0x1340 [ 370.957152][T21469] ? lock_downgrade+0x920/0x920 [ 370.962001][T21469] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 370.967797][T21469] ? oom_killer_disable+0x280/0x280 [ 370.972979][T21469] mem_cgroup_out_of_memory+0x1d8/0x240 [ 370.978503][T21469] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 370.984128][T21469] ? do_raw_spin_unlock+0x57/0x270 [ 370.989234][T21469] ? _raw_spin_unlock+0x2d/0x50 [ 370.994075][T21469] try_charge+0xf4b/0x1440 [ 370.998493][T21469] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 371.004714][T21469] ? find_held_lock+0x35/0x130 [ 371.009477][T21469] ? get_mem_cgroup_from_mm+0x139/0x320 [ 371.015068][T21469] ? lock_downgrade+0x920/0x920 [ 371.019918][T21469] ? percpu_ref_tryget_live+0x111/0x290 [ 371.025457][T21469] __memcg_kmem_charge_memcg+0x71/0xf0 [ 371.030915][T21469] ? memcg_kmem_put_cache+0x50/0x50 [ 371.036091][T21469] ? get_mem_cgroup_from_mm+0x156/0x320 [ 371.041638][T21469] __memcg_kmem_charge+0x13a/0x3a0 [ 371.046730][T21469] __alloc_pages_nodemask+0x4f7/0x900 [ 371.052090][T21469] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 371.057624][T21469] ? __alloc_pages_slowpath+0x2540/0x2540 [ 371.063331][T21469] ? percpu_ref_put_many+0xb6/0x190 [ 371.068525][T21469] ? lockdep_hardirqs_on+0x418/0x5d0 [ 371.073790][T21469] ? trace_hardirqs_on+0x67/0x240 [ 371.078795][T21469] copy_process+0x3f8/0x6830 [ 371.083376][T21469] ? psi_memstall_leave+0x12e/0x180 [ 371.088588][T21469] ? __cleanup_sighand+0x60/0x60 [ 371.093503][T21469] ? __kasan_check_read+0x11/0x20 [ 371.098506][T21469] ? __lock_acquire+0x8a0/0x4a00 [ 371.103430][T21469] ? _raw_spin_unlock_irq+0x5e/0x90 [ 371.108629][T21469] _do_fork+0x146/0xfa0 [ 371.112771][T21469] ? copy_init_mm+0x20/0x20 [ 371.117255][T21469] ? lock_downgrade+0x920/0x920 [ 371.122099][T21469] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 371.128345][T21469] __x64_sys_clone+0x1ab/0x270 [ 371.133097][T21469] ? __ia32_sys_vfork+0xd0/0xd0 [ 371.137923][T21469] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 371.144158][T21469] ? do_syscall_64+0x26/0x760 [ 371.148826][T21469] ? lockdep_hardirqs_on+0x418/0x5d0 [ 371.154110][T21469] ? trace_hardirqs_on+0x67/0x240 [ 371.159135][T21469] do_syscall_64+0xfa/0x760 [ 371.163640][T21469] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 371.169544][T21469] RIP: 0033:0x45c249 [ 371.173442][T21469] Code: ff 48 85 f6 0f 84 27 8e fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c fe 8d fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 371.193215][T21469] RSP: 002b:00007ffc54f1a778 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 371.201625][T21469] RAX: ffffffffffffffda RBX: 00007fbbf4912700 RCX: 000000000045c249 [ 371.209594][T21469] RDX: 00007fbbf49129d0 RSI: 00007fbbf4911db0 RDI: 00000000003d0f00 [ 371.217542][T21469] RBP: 00007ffc54f1a990 R08: 00007fbbf4912700 R09: 00007fbbf4912700 [ 371.225513][T21469] R10: 00007fbbf49129d0 R11: 0000000000000202 R12: 0000000000000000 [ 371.233477][T21469] R13: 00007ffc54f1a82f R14: 00007fbbf49129c0 R15: 000000000075c07c [ 371.242574][T21469] memory: usage 307200kB, limit 307200kB, failcnt 322 [ 371.249416][T21469] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 371.256245][T21469] Memory cgroup stats for /syz3: [ 371.256319][T21469] anon 276692992 [ 371.256319][T21469] file 32768 [ 371.256319][T21469] kernel_stack 6750208 [ 371.256319][T21469] slab 10452992 [ 371.256319][T21469] sock 0 [ 371.256319][T21469] shmem 0 [ 371.256319][T21469] file_mapped 0 [ 371.256319][T21469] file_dirty 0 [ 371.256319][T21469] file_writeback 0 [ 371.256319][T21469] anon_thp 260046848 [ 371.256319][T21469] inactive_anon 0 [ 371.256319][T21469] active_anon 276692992 [ 371.256319][T21469] inactive_file 135168 [ 371.256319][T21469] active_file 0 [ 371.256319][T21469] unevictable 0 [ 371.256319][T21469] slab_reclaimable 2027520 [ 371.256319][T21469] slab_unreclaimable 8425472 [ 371.256319][T21469] pgfault 29601 [ 371.256319][T21469] pgmajfault 0 [ 371.256319][T21469] workingset_refault 0 [ 371.256319][T21469] workingset_activate 0 [ 371.256319][T21469] workingset_nodereclaim 0 [ 371.256319][T21469] pgrefill 278 [ 371.256319][T21469] pgscan 292 [ 371.256319][T21469] pgsteal 124 [ 371.256319][T21469] pgactivate 99 [ 371.352499][T21469] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=21403,uid=0 [ 371.368028][T21469] Memory cgroup out of memory: Killed process 21403 (syz-executor.3) total-vm:73104kB, anon-rss:2232kB, file-rss:35804kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 371.388123][ T1065] oom_reaper: reaped process 21403 (syz-executor.3), now anon-rss:0kB, file-rss:34844kB, shmem-rss:0kB 11:42:46 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000000)={0x1, 0xfffffffffffffffe}) wait4(r2, &(0x7f00000001c0), 0x1, &(0x7f0000000200)) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000000c0)=r2) ptrace(0x10, r2) wait4(0x0, 0x0, 0x0, &(0x7f0000000100)) 11:42:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x8}}], 0x1, 0x0) 11:42:46 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:42:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:42:46 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0xe3, 0x0) 11:42:46 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}], [], 0xffffff7f}) [ 371.517251][T21515] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:42:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x9}}], 0x1, 0x0) 11:42:46 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:42:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffff7f0000}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) [ 371.566225][T21523] overlayfs: unrecognized mount option "i\dex=off" or missing value [ 371.601998][T21522] syz-executor.3 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 11:42:46 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}], [], 0xffffff8c}) [ 371.673198][T21522] CPU: 1 PID: 21522 Comm: syz-executor.3 Not tainted 5.3.0-rc6-next-20190830 #75 [ 371.682333][T21522] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 371.692393][T21522] Call Trace: [ 371.695697][T21522] dump_stack+0x172/0x1f0 [ 371.700042][T21522] dump_header+0x177/0x1152 [ 371.704557][T21522] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 371.710347][T21522] ? ___ratelimit+0x2c8/0x595 [ 371.710360][T21522] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 371.710376][T21522] ? lockdep_hardirqs_on+0x418/0x5d0 [ 371.710391][T21522] ? trace_hardirqs_on+0x67/0x240 [ 371.710413][T21522] ? pagefault_out_of_memory+0x11c/0x11c [ 371.736764][T21522] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 371.742587][T21522] ? ___ratelimit+0x60/0x595 [ 371.747188][T21522] ? do_raw_spin_unlock+0x57/0x270 [ 371.752313][T21522] oom_kill_process.cold+0x10/0x15 [ 371.757438][T21522] out_of_memory+0x334/0x1340 [ 371.762134][T21522] ? lock_downgrade+0x920/0x920 [ 371.767006][T21522] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 371.772822][T21522] ? oom_killer_disable+0x280/0x280 [ 371.778040][T21522] mem_cgroup_out_of_memory+0x1d8/0x240 [ 371.783596][T21522] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 371.789240][T21522] ? do_raw_spin_unlock+0x57/0x270 [ 371.794363][T21522] ? _raw_spin_unlock+0x2d/0x50 [ 371.799224][T21522] try_charge+0xf4b/0x1440 [ 371.803660][T21522] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 371.809207][T21522] ? find_held_lock+0x35/0x130 [ 371.813970][T21522] ? get_mem_cgroup_from_mm+0x139/0x320 [ 371.819525][T21522] ? lock_downgrade+0x920/0x920 [ 371.824381][T21522] ? percpu_ref_tryget_live+0x111/0x290 [ 371.829939][T21522] __memcg_kmem_charge_memcg+0x71/0xf0 [ 371.835405][T21522] ? memcg_kmem_put_cache+0x50/0x50 [ 371.840606][T21522] ? get_mem_cgroup_from_mm+0x156/0x320 [ 371.846151][T21522] __memcg_kmem_charge+0x13a/0x3a0 [ 371.851274][T21522] __alloc_pages_nodemask+0x4f7/0x900 [ 371.856644][T21522] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 371.862191][T21522] ? __alloc_pages_slowpath+0x2540/0x2540 [ 371.867915][T21522] ? percpu_ref_put_many+0xb6/0x190 [ 371.873129][T21522] ? lockdep_hardirqs_on+0x418/0x5d0 [ 371.878414][T21522] ? trace_hardirqs_on+0x67/0x240 [ 371.883447][T21522] copy_process+0x3f8/0x6830 [ 371.888052][T21522] ? __kasan_check_read+0x11/0x20 [ 371.893081][T21522] ? __lock_acquire+0x16f2/0x4a00 [ 371.898126][T21522] ? __cleanup_sighand+0x60/0x60 [ 371.903071][T21522] ? __might_fault+0x12b/0x1e0 [ 371.907839][T21522] ? __might_fault+0x12b/0x1e0 [ 371.912630][T21522] _do_fork+0x146/0xfa0 [ 371.916791][T21522] ? copy_init_mm+0x20/0x20 11:42:46 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0xe4, 0x0) 11:42:46 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 371.921307][T21522] ? __kasan_check_read+0x11/0x20 [ 371.926335][T21522] ? _copy_to_user+0x118/0x160 [ 371.931107][T21522] __x64_sys_clone+0x1ab/0x270 [ 371.935883][T21522] ? __ia32_sys_vfork+0xd0/0xd0 [ 371.940753][T21522] ? do_syscall_64+0x26/0x760 [ 371.945426][T21522] ? lockdep_hardirqs_on+0x418/0x5d0 [ 371.950716][T21522] ? trace_hardirqs_on+0x67/0x240 [ 371.955753][T21522] do_syscall_64+0xfa/0x760 [ 371.960271][T21522] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 371.966166][T21522] RIP: 0033:0x459879 [ 371.970057][T21522] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 371.989647][T21522] RSP: 002b:00007fbbf4953c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 371.998040][T21522] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000459879 [ 372.005991][T21522] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 00000000000041fc [ 372.013944][T21522] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 372.021897][T21522] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbbf49546d4 [ 372.029851][T21522] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 00000000ffffffff [ 372.040033][T21522] memory: usage 307184kB, limit 307200kB, failcnt 354 [ 372.046805][T21522] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 372.070624][T21522] Memory cgroup stats for /syz3: [ 372.070736][T21522] anon 276766720 [ 372.070736][T21522] file 32768 [ 372.070736][T21522] kernel_stack 6684672 [ 372.070736][T21522] slab 10588160 [ 372.070736][T21522] sock 0 [ 372.070736][T21522] shmem 0 [ 372.070736][T21522] file_mapped 0 [ 372.070736][T21522] file_dirty 0 [ 372.070736][T21522] file_writeback 0 [ 372.070736][T21522] anon_thp 260046848 [ 372.070736][T21522] inactive_anon 0 [ 372.070736][T21522] active_anon 276766720 [ 372.070736][T21522] inactive_file 135168 [ 372.070736][T21522] active_file 0 [ 372.070736][T21522] unevictable 0 [ 372.070736][T21522] slab_reclaimable 2027520 [ 372.070736][T21522] slab_unreclaimable 8560640 [ 372.070736][T21522] pgfault 29667 [ 372.070736][T21522] pgmajfault 0 [ 372.070736][T21522] workingset_refault 0 [ 372.070736][T21522] workingset_activate 0 [ 372.070736][T21522] workingset_nodereclaim 0 [ 372.070736][T21522] pgrefill 278 [ 372.070736][T21522] pgscan 292 [ 372.070736][T21522] pgsteal 124 [ 372.070736][T21522] pgactivate 99 [ 372.214226][T21548] overlayfs: unrecognized mount option "i\dex=off" or missing value [ 372.221567][T21522] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=21503,uid=0 [ 372.246985][T21552] overlayfs: unrecognized mount option "i\dex=off" or missing value [ 372.281947][T21522] Memory cgroup out of memory: Killed process 21503 (syz-executor.3) total-vm:72840kB, anon-rss:2216kB, file-rss:35808kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 372.303052][ T1065] oom_reaper: reaped process 21503 (syz-executor.3), now anon-rss:0kB, file-rss:34848kB, shmem-rss:0kB [ 372.303813][T21520] syz-executor.3 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 372.334632][T21520] CPU: 0 PID: 21520 Comm: syz-executor.3 Not tainted 5.3.0-rc6-next-20190830 #75 [ 372.343764][T21520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 372.353818][T21520] Call Trace: [ 372.357156][T21520] dump_stack+0x172/0x1f0 [ 372.361483][T21520] dump_header+0x177/0x1152 [ 372.365977][T21520] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 372.371769][T21520] ? ___ratelimit+0x2c8/0x595 [ 372.376428][T21520] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 372.382231][T21520] ? lockdep_hardirqs_on+0x418/0x5d0 [ 372.387504][T21520] ? trace_hardirqs_on+0x67/0x240 [ 372.392511][T21520] ? pagefault_out_of_memory+0x11c/0x11c [ 372.398171][T21520] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 372.403956][T21520] ? ___ratelimit+0x60/0x595 [ 372.408524][T21520] ? do_raw_spin_unlock+0x57/0x270 [ 372.413631][T21520] oom_kill_process.cold+0x10/0x15 [ 372.418734][T21520] out_of_memory+0x334/0x1340 [ 372.423404][T21520] ? lock_downgrade+0x920/0x920 [ 372.428236][T21520] ? oom_killer_disable+0x280/0x280 [ 372.433423][T21520] mem_cgroup_out_of_memory+0x1d8/0x240 [ 372.438961][T21520] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 372.444591][T21520] ? do_raw_spin_unlock+0x57/0x270 [ 372.449779][T21520] ? _raw_spin_unlock+0x2d/0x50 [ 372.454619][T21520] try_charge+0xa2d/0x1440 [ 372.459040][T21520] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 372.464572][T21520] ? find_held_lock+0x35/0x130 [ 372.469323][T21520] ? get_mem_cgroup_from_mm+0x139/0x320 [ 372.474859][T21520] ? lock_downgrade+0x920/0x920 [ 372.479698][T21520] ? percpu_ref_tryget_live+0x111/0x290 [ 372.485247][T21520] __memcg_kmem_charge_memcg+0x71/0xf0 [ 372.490700][T21520] ? memcg_kmem_put_cache+0x50/0x50 [ 372.495875][T21520] ? get_mem_cgroup_from_mm+0x156/0x320 [ 372.501415][T21520] __memcg_kmem_charge+0x13a/0x3a0 [ 372.506515][T21520] __alloc_pages_nodemask+0x4f7/0x900 [ 372.511864][T21520] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 372.517394][T21520] ? __alloc_pages_slowpath+0x2540/0x2540 [ 372.523093][T21520] ? percpu_ref_put_many+0xb6/0x190 [ 372.528270][T21520] ? lockdep_hardirqs_on+0x418/0x5d0 [ 372.533538][T21520] ? trace_hardirqs_on+0x67/0x240 [ 372.538545][T21520] copy_process+0x3f8/0x6830 [ 372.543127][T21520] ? psi_memstall_leave+0x12e/0x180 [ 372.548318][T21520] ? __cleanup_sighand+0x60/0x60 [ 372.553235][T21520] ? __kasan_check_read+0x11/0x20 [ 372.558241][T21520] ? __lock_acquire+0x8a0/0x4a00 [ 372.563160][T21520] ? _raw_spin_unlock_irq+0x5e/0x90 [ 372.568340][T21520] _do_fork+0x146/0xfa0 [ 372.572483][T21520] ? copy_init_mm+0x20/0x20 [ 372.576967][T21520] ? lock_downgrade+0x920/0x920 [ 372.581811][T21520] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 372.588046][T21520] __x64_sys_clone+0x1ab/0x270 [ 372.592793][T21520] ? __ia32_sys_vfork+0xd0/0xd0 [ 372.597629][T21520] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 372.603858][T21520] ? do_syscall_64+0x26/0x760 [ 372.608535][T21520] ? lockdep_hardirqs_on+0x418/0x5d0 [ 372.613798][T21520] ? trace_hardirqs_on+0x67/0x240 [ 372.618820][T21520] do_syscall_64+0xfa/0x760 [ 372.623337][T21520] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 372.629226][T21520] RIP: 0033:0x45c249 [ 372.633107][T21520] Code: ff 48 85 f6 0f 84 27 8e fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c fe 8d fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 372.652692][T21520] RSP: 002b:00007ffc54f1a778 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 372.661096][T21520] RAX: ffffffffffffffda RBX: 00007fbbf4933700 RCX: 000000000045c249 [ 372.669068][T21520] RDX: 00007fbbf49339d0 RSI: 00007fbbf4932db0 RDI: 00000000003d0f00 [ 372.677038][T21520] RBP: 00007ffc54f1a990 R08: 00007fbbf4933700 R09: 00007fbbf4933700 [ 372.684991][T21520] R10: 00007fbbf49339d0 R11: 0000000000000202 R12: 0000000000000000 [ 372.692952][T21520] R13: 00007ffc54f1a82f R14: 00007fbbf49339c0 R15: 000000000075bfd4 [ 372.703809][T21520] memory: usage 304848kB, limit 307200kB, failcnt 354 [ 372.710916][T21520] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 372.717747][T21520] Memory cgroup stats for /syz3: [ 372.717823][T21520] anon 274644992 [ 372.717823][T21520] file 32768 [ 372.717823][T21520] kernel_stack 6619136 [ 372.717823][T21520] slab 10588160 [ 372.717823][T21520] sock 0 [ 372.717823][T21520] shmem 0 [ 372.717823][T21520] file_mapped 0 [ 372.717823][T21520] file_dirty 0 [ 372.717823][T21520] file_writeback 0 [ 372.717823][T21520] anon_thp 257949696 [ 372.717823][T21520] inactive_anon 0 [ 372.717823][T21520] active_anon 274644992 [ 372.717823][T21520] inactive_file 135168 [ 372.717823][T21520] active_file 0 [ 372.717823][T21520] unevictable 0 [ 372.717823][T21520] slab_reclaimable 2027520 [ 372.717823][T21520] slab_unreclaimable 8560640 [ 372.717823][T21520] pgfault 29667 [ 372.717823][T21520] pgmajfault 0 [ 372.717823][T21520] workingset_refault 0 [ 372.717823][T21520] workingset_activate 0 [ 372.717823][T21520] workingset_nodereclaim 0 [ 372.717823][T21520] pgrefill 278 [ 372.717823][T21520] pgscan 292 [ 372.717823][T21520] pgsteal 124 [ 372.717823][T21520] pgactivate 99 [ 372.814182][T21520] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=18056,uid=0 11:42:48 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0xe5, 0x0) 11:42:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0xa}}], 0x1, 0x0) 11:42:48 executing program 2: socket$inet6(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:42:48 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}], [], 0xfffffff6}) 11:42:48 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000000)) clock_gettime(0x0, &(0x7f0000004600)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000004400)=[{{&(0x7f00000001c0)=@ax25={{0x3, @null}, [@remote, @default, @remote, @null, @default, @remote, @bcast]}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000240)=""/177, 0xb1}, {&(0x7f00000000c0)=""/10, 0xa}, {&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f0000000340)=""/11, 0xb}, {&(0x7f0000000380)=""/254, 0xfe}], 0x5, &(0x7f0000000500)=""/126, 0x7e}, 0xffff}, {{&(0x7f0000000580)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000001740)=[{&(0x7f0000000600)=""/114, 0x72}, {&(0x7f0000000680)=""/170, 0xaa}, {&(0x7f0000000740)=""/4096, 0x1000}], 0x3, &(0x7f0000001780)=""/52, 0x34}, 0x100000001}, {{&(0x7f00000017c0)=@sco, 0x80, &(0x7f0000001900)=[{&(0x7f0000001840)=""/150, 0x96}], 0x1}, 0x6}, {{&(0x7f0000001940)=@ethernet={0x0, @random}, 0x80, &(0x7f0000001d40)=[{&(0x7f00000019c0)=""/81, 0x51}, {&(0x7f0000001a40)=""/101, 0x65}, {&(0x7f0000001ac0)=""/133, 0x85}, {&(0x7f0000001b80)=""/67, 0x43}, {&(0x7f0000001c00)=""/27, 0x1b}, {&(0x7f0000001c40)=""/227, 0xe3}], 0x6, &(0x7f0000001dc0)=""/95, 0x5f}, 0xfffffffffffffacb}, {{&(0x7f0000001e40)=@nl=@unspec, 0x80, &(0x7f0000002400)=[{&(0x7f0000001ec0)}, {&(0x7f0000001f00)=""/126, 0x7e}, {&(0x7f0000001f80)=""/216, 0xd8}, {&(0x7f0000002080)=""/246, 0xf6}, {&(0x7f0000002180)=""/51, 0x33}, {&(0x7f00000021c0)=""/101, 0x65}, {&(0x7f0000002240)=""/154, 0x9a}, {&(0x7f0000002300)=""/163, 0xa3}, {&(0x7f00000023c0)=""/61, 0x3d}], 0x9, &(0x7f00000024c0)=""/226, 0xe2}, 0xe40}, {{0x0, 0x0, &(0x7f0000002600)=[{&(0x7f00000025c0)=""/18, 0x12}], 0x1, &(0x7f0000002640)=""/189, 0xbd}}, {{&(0x7f0000002700)=@generic, 0x80, &(0x7f0000002dc0)=[{&(0x7f0000002780)=""/209, 0xd1}, {&(0x7f0000002880)=""/210, 0xd2}, {&(0x7f0000002980)=""/7, 0x7}, {&(0x7f00000029c0)=""/92, 0x5c}, {&(0x7f0000002a40)=""/157, 0x9d}, {&(0x7f0000002b00)=""/165, 0xa5}, {&(0x7f0000002bc0)=""/75, 0x4b}, {&(0x7f0000002c40)=""/173, 0xad}, {&(0x7f0000002d00)=""/177, 0xb1}], 0x9, &(0x7f0000002e80)=""/188, 0xbc}, 0x1}, {{&(0x7f0000002f40)=@rc, 0x80, &(0x7f0000004300)=[{&(0x7f0000002fc0)=""/199, 0xc7}, {&(0x7f00000030c0)=""/225, 0xe1}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/228, 0xe4}, {&(0x7f00000042c0)=""/31, 0x1f}], 0x5, &(0x7f0000004380)=""/96, 0x60}, 0x30d}], 0x8, 0x10000, &(0x7f0000004640)={r3, r4+30000000}) r6 = syz_genetlink_get_family_id$tipc(&(0x7f00000046c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r5, &(0x7f00000047c0)={&(0x7f0000004680)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000004780)={&(0x7f0000004700)={0x68, r6, 0x200, 0x70bd26, 0x25dfdbfd, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x7, @link='syz0\x00'}}}, ["", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x44}, 0x10) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000004900)=[@in6={0xa, 0x4e20, 0x5, @remote, 0x7}, @in6={0xa, 0x4e20, 0x9, @mcast2, 0x7}, @in6={0xa, 0x4e23, 0x6, @mcast1, 0x7fff}, @in6={0xa, 0x4e20, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xfbca}, @in={0x2, 0x4e20, @broadcast}, @in6={0xa, 0x4e21, 0xea4a, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3}], 0x9c) r7 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000001ec0)='/proc/capi/capi20\x00', 0x400, 0x0) ioctl$LOOP_CTL_GET_FREE(r7, 0x4c82) ptrace(0x10, r2) wait4(0x0, 0x0, 0x0, &(0x7f0000000100)) 11:42:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) [ 372.829712][T21520] Memory cgroup out of memory: Killed process 18056 (syz-executor.3) total-vm:72972kB, anon-rss:2224kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 372.849140][ T1065] oom_reaper: reaped process 18056 (syz-executor.3), now anon-rss:0kB, file-rss:34832kB, shmem-rss:0kB [ 372.856674][T21555] ptrace attach of "/root/syz-executor.3"[21520] was attempted by "/root/syz-executor.3"[21555] 11:42:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0xe}}], 0x1, 0x0) [ 372.986025][T21567] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 373.000648][T21567] CPU: 1 PID: 21567 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 373.010537][T21567] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 373.020582][T21567] Call Trace: [ 373.020603][T21567] dump_stack+0x172/0x1f0 [ 373.020623][T21567] dump_header+0x177/0x1152 11:42:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:42:48 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0xe6, 0x0) [ 373.020639][T21567] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 373.020650][T21567] ? ___ratelimit+0x2c8/0x595 [ 373.020661][T21567] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 373.020680][T21567] ? lockdep_hardirqs_on+0x418/0x5d0 [ 373.054334][T21567] ? trace_hardirqs_on+0x67/0x240 [ 373.059369][T21567] ? pagefault_out_of_memory+0x11c/0x11c [ 373.065011][T21567] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 373.070825][T21567] ? ___ratelimit+0x60/0x595 [ 373.075411][T21567] ? do_raw_spin_unlock+0x57/0x270 [ 373.080515][T21567] oom_kill_process.cold+0x10/0x15 [ 373.080531][T21567] out_of_memory+0x334/0x1340 [ 373.080546][T21567] ? lock_downgrade+0x920/0x920 [ 373.080562][T21567] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 373.080578][T21567] ? oom_killer_disable+0x280/0x280 [ 373.106150][T21567] mem_cgroup_out_of_memory+0x1d8/0x240 [ 373.111703][T21567] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 373.117346][T21567] ? do_raw_spin_unlock+0x57/0x270 [ 373.122467][T21567] ? _raw_spin_unlock+0x2d/0x50 [ 373.127330][T21567] try_charge+0xf4b/0x1440 [ 373.131762][T21567] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 373.137324][T21567] ? percpu_ref_tryget_live+0x111/0x290 [ 373.142883][T21567] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 373.149134][T21567] ? __kasan_check_read+0x11/0x20 [ 373.154187][T21567] ? get_mem_cgroup_from_mm+0x156/0x320 [ 373.159741][T21567] mem_cgroup_try_charge+0x136/0x590 [ 373.165049][T21567] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 373.171310][T21567] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 373.176960][T21567] wp_page_copy+0x41e/0x1590 [ 373.181566][T21567] ? find_held_lock+0x35/0x130 11:42:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00000000000000}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:42:48 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0xe7, 0x0) [ 373.186345][T21567] ? pmd_pfn+0x1d0/0x1d0 [ 373.190592][T21567] ? lock_downgrade+0x920/0x920 [ 373.195446][T21567] ? swp_swapcount+0x540/0x540 [ 373.200218][T21567] ? __kasan_check_read+0x11/0x20 [ 373.205246][T21567] ? do_raw_spin_unlock+0x57/0x270 [ 373.210371][T21567] do_wp_page+0x499/0x14d0 [ 373.214805][T21567] ? finish_mkwrite_fault+0x570/0x570 [ 373.220199][T21567] __handle_mm_fault+0x22f1/0x3f20 [ 373.225329][T21567] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 373.230890][T21567] ? __kasan_check_read+0x11/0x20 [ 373.230914][T21567] handle_mm_fault+0x1b5/0x6c0 [ 373.240675][T21567] __do_page_fault+0x536/0xdd0 [ 373.245444][T21567] do_page_fault+0x38/0x590 [ 373.245462][T21567] page_fault+0x39/0x40 [ 373.245474][T21567] RIP: 0033:0x40c9cb [ 373.245488][T21567] Code: 74 28 41 8b 07 85 c0 0f 85 f0 00 00 00 41 83 c6 01 48 81 c5 a8 00 00 00 41 83 fe 10 75 d7 bf bd ef 4b 00 31 c0 e8 75 52 ff ff 45 f8 01 44 89 75 f4 48 89 ef c6 45 15 00 c7 45 fc 00 00 00 00 [ 373.245499][T21567] RSP: 002b:00007fff9ff76ee0 EFLAGS: 00010246 11:42:48 executing program 2: socket$inet6(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 373.283647][T21567] RAX: 0000000000000001 RBX: 0000000000000000 RCX: 00007fff9ff76f98 [ 373.291630][T21567] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000000 [ 373.299604][T21567] RBP: 000000000075bf2c R08: 00007fff9ff76fa0 R09: 0000000000760070 [ 373.307581][T21567] R10: 00000000004392d0 R11: 0000000000000012 R12: 000000000075bf20 [ 373.315559][T21567] R13: 0000000000000002 R14: 0000000000000000 R15: 000000000075bf2c 11:42:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x11}}], 0x1, 0x0) 11:42:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:42:48 executing program 2: socket$inet6(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 373.457146][T21567] memory: usage 307200kB, limit 307200kB, failcnt 1048 [ 373.485089][T21567] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 373.509033][T21567] Memory cgroup stats for /syz5: [ 373.509139][T21567] anon 270680064 [ 373.509139][T21567] file 0 [ 373.509139][T21567] kernel_stack 5898240 [ 373.509139][T21567] slab 11841536 [ 373.509139][T21567] sock 0 [ 373.509139][T21567] shmem 45056 [ 373.509139][T21567] file_mapped 135168 [ 373.509139][T21567] file_dirty 0 [ 373.509139][T21567] file_writeback 0 [ 373.509139][T21567] anon_thp 249561088 [ 373.509139][T21567] inactive_anon 135168 [ 373.509139][T21567] active_anon 270680064 [ 373.509139][T21567] inactive_file 135168 [ 373.509139][T21567] active_file 0 [ 373.509139][T21567] unevictable 0 [ 373.509139][T21567] slab_reclaimable 2568192 [ 373.509139][T21567] slab_unreclaimable 9273344 [ 373.509139][T21567] pgfault 45111 [ 373.509139][T21567] pgmajfault 0 [ 373.509139][T21567] workingset_refault 66 [ 373.509139][T21567] workingset_activate 0 [ 373.509139][T21567] workingset_nodereclaim 0 [ 373.509139][T21567] pgrefill 1071 [ 373.509139][T21567] pgscan 1052 [ 373.509139][T21567] pgsteal 186 [ 373.638078][T21567] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=16440,uid=0 [ 373.662359][T21567] Memory cgroup out of memory: Killed process 16440 (syz-executor.5) total-vm:72708kB, anon-rss:2208kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 11:42:48 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}], [], 0xedc000000000}) [ 373.741630][T21607] overlayfs: unrecognized mount option "i\dex=off" or missing value [ 373.798454][T21614] overlayfs: unrecognized mount option "i\dex=off" or missing value [ 373.817802][T21616] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:42:49 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) epoll_create1(0x80000) clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000000)) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000001580)='/dev/mixer\x00', 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001640)={{{@in6=@ipv4={[], [], @dev}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001740)=0xe8) recvfrom$packet(r2, &(0x7f00000015c0)=""/94, 0x5e, 0x6e9701e7587c04d0, &(0x7f0000001780)={0x11, 0xf5, r3, 0x1, 0x1, 0x6, @dev={[], 0x26}}, 0x14) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, &(0x7f0000000100)) 11:42:49 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0xe8, 0x0) 11:42:49 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x0, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:42:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x18}}], 0x1, 0x0) 11:42:49 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d00000000000000}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:42:49 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}], [], 0x100000000000000}) 11:42:49 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}], [], 0x200000000000000}) [ 374.238302][T21630] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:42:49 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x0, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 374.308110][T21637] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 374.334307][T21637] CPU: 0 PID: 21637 Comm: syz-executor.3 Not tainted 5.3.0-rc6-next-20190830 #75 [ 374.343454][T21637] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 374.353504][T21637] Call Trace: [ 374.353525][T21637] dump_stack+0x172/0x1f0 [ 374.353544][T21637] dump_header+0x177/0x1152 [ 374.353559][T21637] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 374.353575][T21637] ? ___ratelimit+0x2c8/0x595 [ 374.371445][T21637] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 374.371468][T21637] ? lockdep_hardirqs_on+0x418/0x5d0 [ 374.387180][T21637] ? trace_hardirqs_on+0x67/0x240 [ 374.392210][T21637] ? pagefault_out_of_memory+0x11c/0x11c [ 374.392231][T21637] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 374.403631][T21637] ? ___ratelimit+0x60/0x595 11:42:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x24}}], 0x1, 0x0) [ 374.408224][T21637] ? do_raw_spin_unlock+0x57/0x270 [ 374.413338][T21637] oom_kill_process.cold+0x10/0x15 [ 374.418457][T21637] out_of_memory+0x334/0x1340 [ 374.423138][T21637] ? lock_downgrade+0x920/0x920 [ 374.427995][T21637] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 374.433806][T21637] ? oom_killer_disable+0x280/0x280 [ 374.439017][T21637] mem_cgroup_out_of_memory+0x1d8/0x240 [ 374.444564][T21637] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 374.450196][T21637] ? do_raw_spin_unlock+0x57/0x270 11:42:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x48}}], 0x1, 0x0) [ 374.450214][T21637] ? _raw_spin_unlock+0x2d/0x50 [ 374.450230][T21637] try_charge+0xf4b/0x1440 [ 374.450254][T21637] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 374.450270][T21637] ? percpu_ref_tryget_live+0x111/0x290 [ 374.450290][T21637] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 374.481886][T21637] ? __kasan_check_read+0x11/0x20 [ 374.486926][T21637] ? get_mem_cgroup_from_mm+0x156/0x320 [ 374.492482][T21637] mem_cgroup_try_charge+0x136/0x590 [ 374.497859][T21637] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 374.504110][T21637] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 374.509758][T21637] wp_page_copy+0x41e/0x1590 [ 374.514357][T21637] ? find_held_lock+0x35/0x130 [ 374.519149][T21637] ? pmd_pfn+0x1d0/0x1d0 [ 374.523406][T21637] ? lock_downgrade+0x920/0x920 [ 374.528283][T21637] ? vm_normal_page+0x15d/0x3c0 [ 374.533136][T21637] ? __pte_alloc_kernel+0x210/0x210 [ 374.538338][T21637] ? __kasan_check_read+0x11/0x20 [ 374.543359][T21637] ? do_raw_spin_unlock+0x57/0x270 [ 374.543378][T21637] do_wp_page+0x499/0x14d0 [ 374.543392][T21637] ? do_raw_spin_lock+0x12a/0x2e0 11:42:49 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x0, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 374.552885][T21637] ? rwlock_bug.part.0+0x90/0x90 [ 374.552906][T21637] ? finish_mkwrite_fault+0x570/0x570 [ 374.568192][T21637] ? add_mm_counter_fast.part.0+0x40/0x40 [ 374.573940][T21637] __handle_mm_fault+0x22f1/0x3f20 [ 374.579061][T21637] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 374.584629][T21637] ? __kasan_check_read+0x11/0x20 [ 374.589669][T21637] handle_mm_fault+0x1b5/0x6c0 [ 374.594447][T21637] __do_page_fault+0x536/0xdd0 [ 374.599228][T21637] do_page_fault+0x38/0x590 [ 374.603747][T21637] page_fault+0x39/0x40 11:42:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x4c}}], 0x1, 0x0) [ 374.607902][T21637] RIP: 0033:0x40ea18 [ 374.611797][T21637] Code: 8b 34 c6 4a 8d 04 2e 48 3d ff ff ff 7e 0f 86 77 ff ff ff bf 95 ee 4b 00 31 c0 e8 13 33 ff ff 31 ff e8 5c 2f ff ff 0f 1f 40 00 <89> 3c b5 00 00 73 00 eb b6 31 ed 0f 1f 44 00 00 80 3d 4e 1a 66 00 [ 374.631404][T21637] RSP: 002b:00007ffc54f1a7e0 EFLAGS: 00010246 [ 374.637473][T21637] RAX: 000000009dfdb825 RBX: 00000000c9b9c3ba RCX: 0000001b31220000 [ 374.645447][T21637] RDX: 0000000000000000 RSI: 0000000000001825 RDI: ffffffff9dfdb825 [ 374.653422][T21637] RBP: 0000000000000002 R08: 000000009dfdb825 R09: 000000009dfdb829 [ 374.661405][T21637] R10: 00007ffc54f1a980 R11: 0000000000000246 R12: 000000000075bfa8 [ 374.669381][T21637] R13: 0000000080000000 R14: 00007fbbf6955008 R15: 0000000000000002 [ 374.708602][T21651] overlayfs: unrecognized mount option "i\dex=off" or missing value [ 374.787491][T21637] memory: usage 307200kB, limit 307200kB, failcnt 366 [ 374.794834][T21637] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 374.812936][T21637] Memory cgroup stats for /syz3: [ 374.813045][T21637] anon 276672512 [ 374.813045][T21637] file 32768 [ 374.813045][T21637] kernel_stack 6684672 [ 374.813045][T21637] slab 10723328 [ 374.813045][T21637] sock 0 [ 374.813045][T21637] shmem 0 [ 374.813045][T21637] file_mapped 0 [ 374.813045][T21637] file_dirty 0 [ 374.813045][T21637] file_writeback 0 [ 374.813045][T21637] anon_thp 260046848 [ 374.813045][T21637] inactive_anon 0 [ 374.813045][T21637] active_anon 276672512 [ 374.813045][T21637] inactive_file 135168 [ 374.813045][T21637] active_file 0 [ 374.813045][T21637] unevictable 0 [ 374.813045][T21637] slab_reclaimable 2027520 [ 374.813045][T21637] slab_unreclaimable 8695808 [ 374.813045][T21637] pgfault 29799 [ 374.813045][T21637] pgmajfault 0 [ 374.813045][T21637] workingset_refault 0 [ 374.813045][T21637] workingset_activate 0 [ 374.813045][T21637] workingset_nodereclaim 0 [ 374.813045][T21637] pgrefill 278 [ 374.813045][T21637] pgscan 292 [ 374.813045][T21637] pgsteal 124 [ 374.813045][T21637] pgactivate 132 [ 374.920108][T21637] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=21620,uid=0 [ 374.936116][T21637] Memory cgroup out of memory: Killed process 21620 (syz-executor.3) total-vm:73236kB, anon-rss:2240kB, file-rss:35804kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 11:42:50 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000000)) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, &(0x7f0000000100)) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x100, 0x0) getsockopt$inet6_tcp_buf(r2, 0x6, 0x21, &(0x7f00000001c0)=""/82, &(0x7f0000000240)=0x52) 11:42:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdfeeff7f00000000}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:42:50 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0xe9, 0x0) 11:42:50 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:42:50 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}], [], 0x300000000000000}) 11:42:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x60}}], 0x1, 0x0) 11:42:50 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:42:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x63}}], 0x1, 0x0) [ 375.254626][T21687] overlayfs: unrecognized mount option "i\dex=off" or missing value [ 375.263858][T21682] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:42:50 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0xea, 0x0) 11:42:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xeeeeff7f00000000}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:42:50 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}], [], 0x400000000000000}) 11:42:50 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 375.488092][T21707] overlayfs: unrecognized mount option "i\dex=off" or missing value [ 375.525008][T21710] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:42:51 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x1, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/176, 0xb0, 0x40010120, &(0x7f0000000280)={0xa, 0x4e21, 0x88, @mcast2, 0x1f}, 0x1c) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000000)) ptrace(0x10, r2) wait4(0x0, 0x0, 0x0, &(0x7f0000000100)) 11:42:51 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0xeb, 0x0) 11:42:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x68}}], 0x1, 0x0) 11:42:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:42:51 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}], [], 0x500000000000000}) 11:42:51 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:42:51 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 376.122417][T21729] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:42:51 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}], [], 0x600000000000000}) 11:42:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x6c}}], 0x1, 0x0) 11:42:51 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0xec, 0x0) 11:42:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:42:51 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x200, 0x0) bind$x25(r1, &(0x7f00000001c0)={0x9, @remote={[], 0x1}}, 0x12) clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000000)) ptrace(0x10, r2) wait4(0x0, 0x0, 0x0, &(0x7f0000000100)) 11:42:51 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:42:51 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0xed, 0x0) 11:42:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x74}}], 0x1, 0x0) 11:42:51 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}], [], 0x700000000000000}) [ 376.456930][T21758] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:42:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:42:51 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0b") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:42:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x7a}}], 0x1, 0x0) [ 376.670775][T21775] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:42:51 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0xee, 0x0) 11:42:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:42:51 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}], [], 0x800000000000000}) [ 376.717721][T21782] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:42:51 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0b") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 376.906042][T21798] overlayfs: unrecognized mount option "i\dex=off" or missing value [ 376.934655][T21802] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:42:52 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndpcmp(&(0x7f0000000240)='/dev/snd/pcmC#D#p\x00', 0x0, 0x604000) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000280)={0x800, 0x0, 0x1, 0x7fff}) ioctl$DRM_IOCTL_AGP_UNBIND(r1, 0x40106437, &(0x7f00000002c0)={r2, 0x9a2}) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f00000000c0)) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f0000000000)) ptrace(0x4219, r3) fsetxattr$security_smack_entry(r0, &(0x7f00000001c0)='security.SMACK64EXEC\x00', &(0x7f0000000200)='\x00', 0x1, 0x3) wait4(0x0, 0x0, 0x0, &(0x7f0000000100)) 11:42:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x1f4}}], 0x1, 0x0) 11:42:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:42:52 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}], [], 0xa00000000000000}) 11:42:52 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0b") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:42:52 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0xef, 0x0) [ 377.206976][ T8652] syz-executor.5 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=0 [ 377.232533][ T8652] CPU: 0 PID: 8652 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 377.241575][ T8652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 377.251631][ T8652] Call Trace: 11:42:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x300}}], 0x1, 0x0) 11:42:52 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f00000001c0), &(0x7f00000000c0)=0x68) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000240), &(0x7f0000000280)=0x40) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000000)) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, &(0x7f0000000100)) [ 377.254918][ T8652] dump_stack+0x172/0x1f0 [ 377.259246][ T8652] dump_header+0x177/0x1152 [ 377.263752][ T8652] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 377.269556][ T8652] ? ___ratelimit+0x2c8/0x595 [ 377.274237][ T8652] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 377.280050][ T8652] ? lockdep_hardirqs_on+0x418/0x5d0 [ 377.285341][ T8652] ? trace_hardirqs_on+0x67/0x240 [ 377.290368][ T8652] ? pagefault_out_of_memory+0x11c/0x11c [ 377.296008][ T8652] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 377.301820][ T8652] ? ___ratelimit+0x60/0x595 [ 377.306409][ T8652] ? do_raw_spin_unlock+0x57/0x270 [ 377.311516][ T8652] oom_kill_process.cold+0x10/0x15 [ 377.311533][ T8652] out_of_memory+0x334/0x1340 [ 377.311547][ T8652] ? lock_downgrade+0x920/0x920 [ 377.311570][ T8652] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 377.331942][ T8652] ? oom_killer_disable+0x280/0x280 [ 377.337169][ T8652] mem_cgroup_out_of_memory+0x1d8/0x240 [ 377.342721][ T8652] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 377.348364][ T8652] ? do_raw_spin_unlock+0x57/0x270 [ 377.353486][ T8652] ? _raw_spin_unlock+0x2d/0x50 [ 377.358350][ T8652] try_charge+0xf4b/0x1440 [ 377.362793][ T8652] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 377.368351][ T8652] ? find_held_lock+0x35/0x130 [ 377.373129][ T8652] ? get_mem_cgroup_from_mm+0x139/0x320 [ 377.378688][ T8652] ? lock_downgrade+0x920/0x920 [ 377.383551][ T8652] ? percpu_ref_tryget_live+0x111/0x290 [ 377.389118][ T8652] __memcg_kmem_charge_memcg+0x71/0xf0 [ 377.394591][ T8652] ? memcg_kmem_put_cache+0x50/0x50 [ 377.399798][ T8652] ? get_mem_cgroup_from_mm+0x156/0x320 11:42:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x3e8}}], 0x1, 0x0) [ 377.405354][ T8652] __memcg_kmem_charge+0x13a/0x3a0 [ 377.410480][ T8652] __alloc_pages_nodemask+0x4f7/0x900 [ 377.415857][ T8652] ? stack_trace_consume_entry+0x190/0x190 [ 377.421668][ T8652] ? __alloc_pages_slowpath+0x2540/0x2540 [ 377.427380][ T8652] ? copy_page_range+0xef4/0x1ed0 [ 377.427398][ T8652] ? copy_page_range+0xef4/0x1ed0 [ 377.437414][ T8652] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 377.437436][ T8652] alloc_pages_current+0x107/0x210 [ 377.437456][ T8652] pte_alloc_one+0x1b/0x1a0 [ 377.453271][ T8652] __pte_alloc+0x20/0x310 [ 377.457711][ T8652] copy_page_range+0x14da/0x1ed0 [ 377.462684][ T8652] ? pmd_alloc+0x180/0x180 [ 377.467118][ T8652] ? __rb_insert_augmented+0x20c/0xd90 [ 377.472583][ T8652] ? validate_mm_rb+0xa3/0xc0 [ 377.477278][ T8652] ? __vma_link_rb+0x5ad/0x770 [ 377.482061][ T8652] dup_mm+0xa67/0x1430 [ 377.486158][ T8652] ? vm_area_dup+0x170/0x170 [ 377.490763][ T8652] ? debug_mutex_init+0x2d/0x60 [ 377.495628][ T8652] copy_process+0x2671/0x6830 [ 377.500315][ T8652] ? __kasan_check_read+0x11/0x20 11:42:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x500}}], 0x1, 0x0) [ 377.505360][ T8652] ? __cleanup_sighand+0x60/0x60 [ 377.510305][ T8652] ? __might_fault+0x12b/0x1e0 [ 377.515075][ T8652] ? __might_fault+0x12b/0x1e0 [ 377.519848][ T8652] _do_fork+0x146/0xfa0 [ 377.524007][ T8652] ? copy_init_mm+0x20/0x20 [ 377.528521][ T8652] ? __kasan_check_read+0x11/0x20 [ 377.533534][ T8652] ? _copy_to_user+0x118/0x160 [ 377.538297][ T8652] __x64_sys_clone+0x1ab/0x270 [ 377.543063][ T8652] ? __ia32_sys_vfork+0xd0/0xd0 [ 377.547930][ T8652] ? do_syscall_64+0x26/0x760 [ 377.552599][ T8652] ? lockdep_hardirqs_on+0x418/0x5d0 [ 377.557874][ T8652] ? trace_hardirqs_on+0x67/0x240 [ 377.562900][ T8652] do_syscall_64+0xfa/0x760 [ 377.567414][ T8652] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 377.573304][ T8652] RIP: 0033:0x457e4a [ 377.577208][ T8652] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 377.596816][ T8652] RSP: 002b:00007fff9ff77040 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 11:42:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x600}}], 0x1, 0x0) [ 377.605231][ T8652] RAX: ffffffffffffffda RBX: 00007fff9ff77040 RCX: 0000000000457e4a [ 377.613202][ T8652] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 377.621168][ T8652] RBP: 00007fff9ff77080 R08: 0000000000000001 R09: 00005555557c9940 [ 377.629136][ T8652] R10: 00005555557c9c10 R11: 0000000000000246 R12: 0000000000000001 [ 377.629143][ T8652] R13: 0000000000000000 R14: 0000000000000000 R15: 00007fff9ff770d0 11:42:52 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47b") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:42:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) [ 377.654183][ T8652] memory: usage 307200kB, limit 307200kB, failcnt 1097 [ 377.671807][ T8652] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 377.693956][ T8652] Memory cgroup stats for /syz5: [ 377.694077][ T8652] anon 269234176 [ 377.694077][ T8652] file 0 [ 377.694077][ T8652] kernel_stack 6160384 [ 377.694077][ T8652] slab 12120064 [ 377.694077][ T8652] sock 0 [ 377.694077][ T8652] shmem 45056 [ 377.694077][ T8652] file_mapped 135168 [ 377.694077][ T8652] file_dirty 0 [ 377.694077][ T8652] file_writeback 0 [ 377.694077][ T8652] anon_thp 247463936 [ 377.694077][ T8652] inactive_anon 135168 [ 377.694077][ T8652] active_anon 269242368 [ 377.694077][ T8652] inactive_file 0 [ 377.694077][ T8652] active_file 0 [ 377.694077][ T8652] unevictable 0 [ 377.694077][ T8652] slab_reclaimable 2568192 [ 377.694077][ T8652] slab_unreclaimable 9551872 11:42:52 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0xf0, 0x0) 11:42:52 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47b") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 377.694077][ T8652] pgfault 45771 [ 377.694077][ T8652] pgmajfault 0 [ 377.694077][ T8652] workingset_refault 66 [ 377.694077][ T8652] workingset_activate 0 [ 377.694077][ T8652] workingset_nodereclaim 0 [ 377.694077][ T8652] pgrefill 1104 [ 377.694077][ T8652] pgscan 1052 [ 377.694077][ T8652] pgsteal 219 [ 377.787980][ T8652] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=16434,uid=0 [ 377.829001][ T8652] Memory cgroup out of memory: Killed process 16434 (syz-executor.5) total-vm:72708kB, anon-rss:2208kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 11:42:53 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}], [], 0x1000000000000000}) 11:42:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x700}}], 0x1, 0x0) 11:42:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:42:53 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47b") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 378.008817][T21854] overlayfs: unrecognized mount option "i\dex=off" or missing value [ 378.028409][T21857] overlayfs: unrecognized mount option "i\dex=off" or missing value [ 378.129910][ T8652] syz-executor.5 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=0 [ 378.218896][ T8652] CPU: 1 PID: 8652 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 378.227952][ T8652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 378.238009][ T8652] Call Trace: [ 378.241304][ T8652] dump_stack+0x172/0x1f0 [ 378.245644][ T8652] dump_header+0x177/0x1152 [ 378.250155][ T8652] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 378.255955][ T8652] ? ___ratelimit+0x2c8/0x595 [ 378.260625][ T8652] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 11:42:53 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000000)) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, &(0x7f0000000340)) 11:42:53 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0xf1, 0x0) 11:42:53 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf0") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:42:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x900}}], 0x1, 0x0) 11:42:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:42:53 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf0") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:42:53 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf0") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 378.266436][ T8652] ? lockdep_hardirqs_on+0x418/0x5d0 [ 378.271722][ T8652] ? trace_hardirqs_on+0x67/0x240 [ 378.276760][ T8652] ? pagefault_out_of_memory+0x11c/0x11c [ 378.282395][ T8652] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 378.288225][ T8652] ? ___ratelimit+0x60/0x595 [ 378.292817][ T8652] ? do_raw_spin_unlock+0x57/0x270 [ 378.297943][ T8652] oom_kill_process.cold+0x10/0x15 [ 378.303064][ T8652] out_of_memory+0x334/0x1340 [ 378.307744][ T8652] ? lock_downgrade+0x920/0x920 [ 378.312603][ T8652] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 378.318417][ T8652] ? oom_killer_disable+0x280/0x280 [ 378.323630][ T8652] mem_cgroup_out_of_memory+0x1d8/0x240 [ 378.329184][ T8652] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 378.334827][ T8652] ? do_raw_spin_unlock+0x57/0x270 [ 378.339947][ T8652] ? _raw_spin_unlock+0x2d/0x50 [ 378.344810][ T8652] try_charge+0xf4b/0x1440 [ 378.349243][ T8652] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 378.354789][ T8652] ? find_held_lock+0x35/0x130 [ 378.359555][ T8652] ? get_mem_cgroup_from_mm+0x139/0x320 11:42:53 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(0x0, 0x0, 0x0) [ 378.365110][ T8652] ? lock_downgrade+0x920/0x920 [ 378.369957][ T8652] ? percpu_ref_tryget_live+0x111/0x290 [ 378.375513][ T8652] __memcg_kmem_charge_memcg+0x71/0xf0 [ 378.380977][ T8652] ? memcg_kmem_put_cache+0x50/0x50 [ 378.386185][ T8652] ? get_mem_cgroup_from_mm+0x156/0x320 [ 378.391741][ T8652] __memcg_kmem_charge+0x13a/0x3a0 [ 378.396861][ T8652] __alloc_pages_nodemask+0x4f7/0x900 [ 378.402239][ T8652] ? stack_trace_consume_entry+0x190/0x190 [ 378.408041][ T8652] ? __alloc_pages_slowpath+0x2540/0x2540 [ 378.413751][ T8652] ? copy_page_range+0xef4/0x1ed0 [ 378.413769][ T8652] ? copy_page_range+0xef4/0x1ed0 [ 378.413788][ T8652] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 378.413805][ T8652] alloc_pages_current+0x107/0x210 [ 378.413822][ T8652] pte_alloc_one+0x1b/0x1a0 [ 378.413836][ T8652] __pte_alloc+0x20/0x310 [ 378.413852][ T8652] copy_page_range+0x14da/0x1ed0 [ 378.413887][ T8652] ? pmd_alloc+0x180/0x180 [ 378.453322][ T8652] ? __rb_insert_augmented+0x20c/0xd90 [ 378.458787][ T8652] ? validate_mm_rb+0xa3/0xc0 [ 378.463472][ T8652] ? __vma_link_rb+0x5ad/0x770 [ 378.468246][ T8652] dup_mm+0xa67/0x1430 [ 378.472329][ T8652] ? vm_area_dup+0x170/0x170 [ 378.476927][ T8652] ? debug_mutex_init+0x2d/0x60 [ 378.481787][ T8652] copy_process+0x2671/0x6830 [ 378.486462][ T8652] ? rwlock_bug.part.0+0x90/0x90 [ 378.491418][ T8652] ? __cleanup_sighand+0x60/0x60 [ 378.496357][ T8652] ? __free_pages+0x85/0xb0 [ 378.500868][ T8652] ? lockdep_hardirqs_on+0x418/0x5d0 [ 378.506160][ T8652] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 378.512407][ T8652] _do_fork+0x146/0xfa0 [ 378.516563][ T8652] ? copy_init_mm+0x20/0x20 [ 378.521075][ T8652] ? refcount_dec_and_test_checked+0x1b/0x20 [ 378.527057][ T8652] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 378.533289][ T8652] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 378.533304][ T8652] ? debug_smp_processor_id+0x3c/0x214 [ 378.533324][ T8652] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 378.533343][ T8652] __x64_sys_clone+0x1ab/0x270 [ 378.533356][ T8652] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 378.533368][ T8652] ? __ia32_sys_vfork+0xd0/0xd0 [ 378.533381][ T8652] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 378.533401][ T8652] ? do_syscall_64+0x26/0x760 [ 378.533416][ T8652] ? lockdep_hardirqs_on+0x418/0x5d0 [ 378.533429][ T8652] ? trace_hardirqs_on+0x67/0x240 [ 378.533445][ T8652] do_syscall_64+0xfa/0x760 [ 378.533464][ T8652] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 378.533474][ T8652] RIP: 0033:0x457e4a [ 378.533487][ T8652] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 378.533494][ T8652] RSP: 002b:00007fff9ff77040 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 378.533506][ T8652] RAX: ffffffffffffffda RBX: 00007fff9ff77040 RCX: 0000000000457e4a [ 378.533512][ T8652] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 378.533525][ T8652] RBP: 00007fff9ff77080 R08: 0000000000000001 R09: 00005555557c9940 [ 378.533532][ T8652] R10: 00005555557c9c10 R11: 0000000000000246 R12: 0000000000000001 [ 378.533544][ T8652] R13: 0000000000000000 R14: 0000000000000000 R15: 00007fff9ff770d0 [ 378.591790][ T8652] memory: usage 307200kB, limit 307200kB, failcnt 1112 [ 378.669314][ T8652] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 378.685830][ T8652] Memory cgroup stats for /syz5: [ 378.685938][ T8652] anon 269312000 [ 378.685938][ T8652] file 0 [ 378.685938][ T8652] kernel_stack 6094848 [ 378.685938][ T8652] slab 12120064 [ 378.685938][ T8652] sock 0 [ 378.685938][ T8652] shmem 45056 [ 378.685938][ T8652] file_mapped 135168 [ 378.685938][ T8652] file_dirty 0 [ 378.685938][ T8652] file_writeback 0 [ 378.685938][ T8652] anon_thp 247463936 [ 378.685938][ T8652] inactive_anon 135168 [ 378.685938][ T8652] active_anon 269312000 [ 378.685938][ T8652] inactive_file 0 [ 378.685938][ T8652] active_file 0 [ 378.685938][ T8652] unevictable 0 [ 378.685938][ T8652] slab_reclaimable 2568192 [ 378.685938][ T8652] slab_unreclaimable 9551872 [ 378.685938][ T8652] pgfault 45837 [ 378.685938][ T8652] pgmajfault 0 [ 378.685938][ T8652] workingset_refault 66 [ 378.685938][ T8652] workingset_activate 0 [ 378.685938][ T8652] workingset_nodereclaim 0 [ 378.685938][ T8652] pgrefill 1104 [ 378.685938][ T8652] pgscan 1052 [ 378.685938][ T8652] pgsteal 219 [ 378.782540][ T8652] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=21856,uid=0 [ 378.799380][ T8652] Memory cgroup out of memory: Killed process 21856 (syz-executor.5) total-vm:72708kB, anon-rss:2208kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 378.818141][ T1065] oom_reaper: reaped process 21856 (syz-executor.5), now anon-rss:0kB, file-rss:34832kB, shmem-rss:0kB 11:42:54 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0xf2, 0x0) 11:42:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0xa00}}], 0x1, 0x0) 11:42:54 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}], [], 0x2000000000000000}) 11:42:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) [ 378.864922][T21899] overlayfs: unrecognized mount option "i\dex=off" or missing value [ 378.877969][T21901] overlayfs: unrecognized mount option "i\dex=off" or missing value [ 379.004399][T21914] overlayfs: unrecognized mount option "i\dex=off" or missing value [ 379.033629][T21917] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:42:54 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000000)) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, &(0x7f0000000100)) 11:42:54 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(0x0, 0x0, 0x0) 11:42:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0xbb8}}], 0x1, 0x0) 11:42:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:42:54 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0xf3, 0x0) 11:42:54 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}], [], 0x2010000000000000}) [ 379.505277][T21930] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:42:54 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}], [], 0x3f00000000000000}) 11:42:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0xe00}}], 0x1, 0x0) 11:42:54 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(0x0, 0x0, 0x0) 11:42:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:42:54 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0xf4, 0x0) 11:42:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x1100}}], 0x1, 0x0) [ 379.748259][T21953] overlayfs: unrecognized mount option "i\dex=off" or missing value [ 379.763232][T21956] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:42:55 executing program 3: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}], [], 0x20000000}) 11:42:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:42:55 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000000)) r2 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x4, 0x8000) ioctl$KVM_GET_REG_LIST(r2, 0xc008aeb0, &(0x7f00000001c0)=ANY=[@ANYBLOB="08000000000000000200000000000000ff0f000000000000080000000000000004000000000000000900000000000000810000000000001004000000000000004500000000000000"]) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, &(0x7f0000000100)) 11:42:55 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0xf5, 0x0) 11:42:55 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}], [], 0x4000000000000000}) 11:42:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x1800}}], 0x1, 0x0) 11:42:55 executing program 2: clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) setitimer(0x0, &(0x7f00000001c0)={{}, {r0, r1/1000+10000}}, &(0x7f0000000200)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f0000000000)) ptrace(0x10, r3) wait4(0x0, 0x0, 0x0, &(0x7f0000000100)) 11:42:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x2000}}], 0x1, 0x0) 11:42:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) [ 380.487096][T21981] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:42:55 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0xf6, 0x0) 11:42:55 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}], [], 0x4800000000000000}) [ 380.641204][T21990] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:42:55 executing program 3 (fault-call:2 fault-nth:0): r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:42:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x2400}}], 0x1, 0x0) [ 380.708644][T22003] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:42:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:42:55 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}], [], 0x4c00000000000000}) [ 380.827976][ T8647] syz-executor.3 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=0 11:42:56 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0xf7, 0x0) [ 380.884321][ T8647] CPU: 1 PID: 8647 Comm: syz-executor.3 Not tainted 5.3.0-rc6-next-20190830 #75 [ 380.893366][ T8647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 380.893372][ T8647] Call Trace: [ 380.893398][ T8647] dump_stack+0x172/0x1f0 [ 380.893418][ T8647] dump_header+0x177/0x1152 [ 380.915559][ T8647] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 380.921384][ T8647] ? ___ratelimit+0x2c8/0x595 [ 380.926071][ T8647] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 380.931873][ T8647] ? lockdep_hardirqs_on+0x418/0x5d0 [ 380.931889][ T8647] ? trace_hardirqs_on+0x67/0x240 [ 380.931906][ T8647] ? pagefault_out_of_memory+0x11c/0x11c [ 380.931921][ T8647] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 380.931934][ T8647] ? ___ratelimit+0x60/0x595 [ 380.931945][ T8647] ? do_raw_spin_unlock+0x57/0x270 [ 380.931962][ T8647] oom_kill_process.cold+0x10/0x15 [ 380.968398][ T8647] out_of_memory+0x334/0x1340 [ 380.973078][ T8647] ? lock_downgrade+0x920/0x920 [ 380.978034][ T8647] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 11:42:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:42:56 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0xf8, 0x0) [ 380.983849][ T8647] ? oom_killer_disable+0x280/0x280 [ 380.989065][ T8647] mem_cgroup_out_of_memory+0x1d8/0x240 [ 380.994617][ T8647] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 381.000258][ T8647] ? do_raw_spin_unlock+0x57/0x270 [ 381.006036][ T8647] ? _raw_spin_unlock+0x2d/0x50 [ 381.010902][ T8647] try_charge+0xf4b/0x1440 [ 381.015330][ T8647] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 381.020873][ T8647] ? find_held_lock+0x35/0x130 [ 381.025647][ T8647] ? get_mem_cgroup_from_mm+0x139/0x320 [ 381.031202][ T8647] ? lock_downgrade+0x920/0x920 [ 381.036052][ T8647] ? percpu_ref_tryget_live+0x111/0x290 [ 381.041599][ T8647] __memcg_kmem_charge_memcg+0x71/0xf0 [ 381.047047][ T8647] ? memcg_kmem_put_cache+0x50/0x50 [ 381.052242][ T8647] ? get_mem_cgroup_from_mm+0x156/0x320 [ 381.057787][ T8647] __memcg_kmem_charge+0x13a/0x3a0 [ 381.062904][ T8647] __alloc_pages_nodemask+0x4f7/0x900 [ 381.068278][ T8647] ? stack_trace_consume_entry+0x190/0x190 [ 381.074088][ T8647] ? __alloc_pages_slowpath+0x2540/0x2540 [ 381.079808][ T8647] ? copy_page_range+0xef4/0x1ed0 [ 381.084834][ T8647] ? copy_page_range+0xef4/0x1ed0 [ 381.089864][ T8647] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 381.096123][ T8647] alloc_pages_current+0x107/0x210 [ 381.101242][ T8647] pte_alloc_one+0x1b/0x1a0 [ 381.105750][ T8647] __pte_alloc+0x20/0x310 [ 381.110088][ T8647] copy_page_range+0x14da/0x1ed0 [ 381.115051][ T8647] ? pmd_alloc+0x180/0x180 [ 381.119471][ T8647] ? __rb_insert_augmented+0x20c/0xd90 [ 381.124929][ T8647] ? validate_mm_rb+0xa3/0xc0 [ 381.129610][ T8647] ? __vma_link_rb+0x5ad/0x770 [ 381.134384][ T8647] dup_mm+0xa67/0x1430 [ 381.138482][ T8647] ? vm_area_dup+0x170/0x170 [ 381.143074][ T8647] ? debug_mutex_init+0x2d/0x60 [ 381.147930][ T8647] copy_process+0x2671/0x6830 [ 381.152610][ T8647] ? __kasan_check_read+0x11/0x20 [ 381.157644][ T8647] ? __cleanup_sighand+0x60/0x60 [ 381.162569][ T8647] ? __might_fault+0x12b/0x1e0 [ 381.162586][ T8647] ? __might_fault+0x12b/0x1e0 [ 381.162607][ T8647] _do_fork+0x146/0xfa0 [ 381.162625][ T8647] ? copy_init_mm+0x20/0x20 [ 381.180746][ T8647] ? __kasan_check_read+0x11/0x20 [ 381.185771][ T8647] ? _copy_to_user+0x118/0x160 [ 381.190550][ T8647] __x64_sys_clone+0x1ab/0x270 [ 381.195314][ T8647] ? __ia32_sys_vfork+0xd0/0xd0 [ 381.200178][ T8647] ? do_syscall_64+0x26/0x760 [ 381.204858][ T8647] ? lockdep_hardirqs_on+0x418/0x5d0 [ 381.210149][ T8647] ? trace_hardirqs_on+0x67/0x240 [ 381.215183][ T8647] do_syscall_64+0xfa/0x760 [ 381.219693][ T8647] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 381.225584][ T8647] RIP: 0033:0x457e4a [ 381.229494][ T8647] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 381.249092][ T8647] RSP: 002b:00007ffc54f1aa10 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 381.257487][ T8647] RAX: ffffffffffffffda RBX: 00007ffc54f1aa10 RCX: 0000000000457e4a [ 381.265452][ T8647] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 381.273922][ T8647] RBP: 00007ffc54f1aa50 R08: 0000000000000001 R09: 00005555555ba940 [ 381.281878][ T8647] R10: 00005555555bac10 R11: 0000000000000246 R12: 0000000000000001 [ 381.289844][ T8647] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffc54f1aaa0 [ 381.301642][ T8647] memory: usage 307200kB, limit 307200kB, failcnt 389 [ 381.308418][ T8647] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 381.315478][ T8647] Memory cgroup stats for /syz3: [ 381.315587][ T8647] anon 275185664 [ 381.315587][ T8647] file 32768 [ 381.315587][ T8647] kernel_stack 7012352 [ 381.315587][ T8647] slab 11128832 [ 381.315587][ T8647] sock 0 [ 381.315587][ T8647] shmem 0 [ 381.315587][ T8647] file_mapped 0 [ 381.315587][ T8647] file_dirty 0 [ 381.315587][ T8647] file_writeback 0 [ 381.315587][ T8647] anon_thp 257949696 [ 381.315587][ T8647] inactive_anon 0 [ 381.315587][ T8647] active_anon 275185664 [ 381.315587][ T8647] inactive_file 135168 [ 381.315587][ T8647] active_file 0 [ 381.315587][ T8647] unevictable 0 [ 381.315587][ T8647] slab_reclaimable 2162688 [ 381.315587][ T8647] slab_unreclaimable 8966144 [ 381.315587][ T8647] pgfault 30393 [ 381.315587][ T8647] pgmajfault 0 [ 381.315587][ T8647] workingset_refault 33 [ 381.315587][ T8647] workingset_activate 0 [ 381.315587][ T8647] workingset_nodereclaim 0 [ 381.315587][ T8647] pgrefill 344 [ 381.315587][ T8647] pgscan 325 [ 381.315587][ T8647] pgsteal 157 [ 381.315587][ T8647] pgactivate 165 [ 381.320569][ T8647] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=21670,uid=0 11:42:56 executing program 2 (fault-call:2 fault-nth:0): r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:42:56 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0xf9, 0x0) 11:42:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:42:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x3f00}}], 0x1, 0x0) [ 381.320690][ T8647] Memory cgroup out of memory: Killed process 21670 (syz-executor.3) total-vm:72972kB, anon-rss:2224kB, file-rss:35804kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 381.322895][ T1065] oom_reaper: reaped process 21670 (syz-executor.3), now anon-rss:0kB, file-rss:34844kB, shmem-rss:0kB [ 381.422028][T22033] overlayfs: unrecognized mount option "i\dex=off" or missing value [ 381.447222][T22036] FAULT_INJECTION: forcing a failure. [ 381.447222][T22036] name failslab, interval 1, probability 0, space 0, times 0 [ 381.461035][T22034] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:42:56 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}], [], 0x6000000000000000}) [ 381.471135][T22036] CPU: 1 PID: 22036 Comm: syz-executor.3 Not tainted 5.3.0-rc6-next-20190830 #75 [ 381.494193][T22036] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 381.504256][T22036] Call Trace: [ 381.507563][T22036] dump_stack+0x172/0x1f0 [ 381.511913][T22036] should_fail.cold+0xa/0x15 [ 381.516519][T22036] ? fault_create_debugfs_attr+0x180/0x180 [ 381.522335][T22036] ? ___might_sleep+0x163/0x280 [ 381.527200][T22036] __should_failslab+0x121/0x190 [ 381.532145][T22036] should_failslab+0x9/0x14 [ 381.536654][T22036] kmem_cache_alloc+0x2aa/0x710 [ 381.541518][T22036] ? __kasan_check_write+0x14/0x20 [ 381.541893][T22044] FAULT_INJECTION: forcing a failure. [ 381.541893][T22044] name failslab, interval 1, probability 0, space 0, times 0 [ 381.546629][T22036] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 381.546648][T22036] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 381.546667][T22036] getname_flags+0xd6/0x5b0 [ 381.546686][T22036] getname+0x1a/0x20 [ 381.578407][T22036] do_sys_open+0x2c9/0x5d0 [ 381.582833][T22036] ? filp_open+0x80/0x80 [ 381.587086][T22036] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 381.592553][T22036] ? do_syscall_64+0x26/0x760 [ 381.597240][T22036] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 381.603319][T22036] ? do_syscall_64+0x26/0x760 [ 381.608021][T22036] __x64_sys_open+0x7e/0xc0 [ 381.612791][T22036] do_syscall_64+0xfa/0x760 [ 381.615511][T22047] overlayfs: unrecognized mount option "i\dex=off" or missing value [ 381.617298][T22036] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 381.617311][T22036] RIP: 0033:0x413761 [ 381.617327][T22036] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 381.617339][T22036] RSP: 002b:00007fbbf49537a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 381.648188][T22049] overlayfs: unrecognized mount option "i\dex=off" or missing value [ 381.654631][T22036] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000413761 [ 381.654641][T22036] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007fbbf4953850 [ 381.654650][T22036] RBP: 000000000075bf20 R08: 000000000000000f R09: 0000000000000000 [ 381.654659][T22036] R10: 0000000000000064 R11: 0000000000000293 R12: 00007fbbf49546d4 [ 381.654668][T22036] R13: 00000000004c8e36 R14: 00000000004dfe20 R15: 0000000000000004 [ 381.706008][T22044] CPU: 0 PID: 22044 Comm: syz-executor.2 Not tainted 5.3.0-rc6-next-20190830 #75 [ 381.720720][T22044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 381.730789][T22044] Call Trace: [ 381.734172][T22044] dump_stack+0x172/0x1f0 [ 381.738495][T22044] should_fail.cold+0xa/0x15 [ 381.743082][T22044] ? fault_create_debugfs_attr+0x180/0x180 [ 381.748875][T22044] ? ___might_sleep+0x163/0x280 [ 381.748893][T22044] __should_failslab+0x121/0x190 [ 381.748909][T22044] should_failslab+0x9/0x14 [ 381.748921][T22044] kmem_cache_alloc+0x2aa/0x710 [ 381.748932][T22044] ? __kasan_check_write+0x14/0x20 [ 381.748951][T22044] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 381.778649][T22044] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 381.783941][T22044] getname_flags+0xd6/0x5b0 [ 381.788446][T22044] getname+0x1a/0x20 [ 381.788463][T22044] do_sys_open+0x2c9/0x5d0 [ 381.788482][T22044] ? filp_open+0x80/0x80 [ 381.796754][T22044] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 381.796770][T22044] ? do_syscall_64+0x26/0x760 [ 381.796785][T22044] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 381.796802][T22044] ? do_syscall_64+0x26/0x760 [ 381.821834][T22044] __x64_sys_open+0x7e/0xc0 [ 381.826344][T22044] do_syscall_64+0xfa/0x760 [ 381.830857][T22044] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 381.836737][T22044] RIP: 0033:0x413761 [ 381.840632][T22044] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 381.860239][T22044] RSP: 002b:00007f3fcc4c47a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 381.868658][T22044] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000413761 [ 381.876637][T22044] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f3fcc4c4850 [ 381.884620][T22044] RBP: 000000000075bf20 R08: 000000000000000f R09: 0000000000000000 [ 381.892684][T22044] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f3fcc4c56d4 [ 381.900654][T22044] R13: 00000000004c8e36 R14: 00000000004dfe20 R15: 0000000000000004 11:42:57 executing program 3 (fault-call:2 fault-nth:1): r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:42:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x4000}}], 0x1, 0x0) 11:42:57 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}], [], 0x6800000000000000}) 11:42:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:42:57 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0xfa, 0x0) 11:42:57 executing program 2 (fault-call:2 fault-nth:1): r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 382.005802][ T8652] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 382.043986][ T8652] CPU: 0 PID: 8652 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 382.053034][ T8652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 382.063090][ T8652] Call Trace: [ 382.066387][ T8652] dump_stack+0x172/0x1f0 [ 382.070759][ T8652] dump_header+0x177/0x1152 [ 382.075265][ T8652] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 382.081074][ T8652] ? ___ratelimit+0x2c8/0x595 [ 382.085755][ T8652] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 382.091563][ T8652] ? lockdep_hardirqs_on+0x418/0x5d0 [ 382.095759][T22066] FAULT_INJECTION: forcing a failure. [ 382.095759][T22066] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 382.096848][ T8652] ? trace_hardirqs_on+0x67/0x240 [ 382.115034][ T8652] ? pagefault_out_of_memory+0x11c/0x11c [ 382.120657][ T8652] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 382.126473][ T8652] ? ___ratelimit+0x60/0x595 [ 382.131055][ T8652] ? do_raw_spin_unlock+0x57/0x270 [ 382.136161][ T8652] oom_kill_process.cold+0x10/0x15 [ 382.141263][ T8652] out_of_memory+0x334/0x1340 [ 382.145926][ T8652] ? lock_downgrade+0x920/0x920 [ 382.150788][ T8652] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 382.156584][ T8652] ? oom_killer_disable+0x280/0x280 [ 382.161779][ T8652] mem_cgroup_out_of_memory+0x1d8/0x240 [ 382.167317][ T8652] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 382.173643][ T8652] ? do_raw_spin_unlock+0x57/0x270 [ 382.178748][ T8652] ? _raw_spin_unlock+0x2d/0x50 [ 382.183595][ T8652] try_charge+0xf4b/0x1440 [ 382.188012][ T8652] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 382.193546][ T8652] ? percpu_ref_tryget_live+0x111/0x290 [ 382.199083][ T8652] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 382.205310][ T8652] ? __kasan_check_read+0x11/0x20 [ 382.210340][ T8652] ? get_mem_cgroup_from_mm+0x156/0x320 [ 382.215894][ T8652] mem_cgroup_try_charge+0x136/0x590 [ 382.221166][ T8652] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 382.227408][ T8652] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 382.233029][ T8652] wp_page_copy+0x41e/0x1590 [ 382.237607][ T8652] ? find_held_lock+0x35/0x130 [ 382.242361][ T8652] ? pmd_pfn+0x1d0/0x1d0 [ 382.246596][ T8652] ? lock_downgrade+0x920/0x920 [ 382.251436][ T8652] ? swp_swapcount+0x540/0x540 [ 382.256365][ T8652] ? __kasan_check_read+0x11/0x20 [ 382.261389][ T8652] ? do_raw_spin_unlock+0x57/0x270 [ 382.266493][ T8652] do_wp_page+0x499/0x14d0 [ 382.270900][ T8652] ? finish_mkwrite_fault+0x570/0x570 [ 382.276269][ T8652] __handle_mm_fault+0x22f1/0x3f20 [ 382.281391][ T8652] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 382.286937][ T8652] ? __kasan_check_read+0x11/0x20 [ 382.291958][ T8652] handle_mm_fault+0x1b5/0x6c0 [ 382.296716][ T8652] __do_page_fault+0x536/0xdd0 [ 382.301473][ T8652] do_page_fault+0x38/0x590 [ 382.305971][ T8652] page_fault+0x39/0x40 [ 382.310110][ T8652] RIP: 0033:0x40d6a1 [ 382.313993][ T8652] Code: 3d f3 a9 34 00 00 0f 85 3b 08 00 00 e8 e8 a6 04 00 85 c0 89 c5 0f 88 73 05 00 00 0f 84 f0 04 00 00 89 c6 bf 31 f1 4b 00 31 c0 7a 46 ff ff c7 44 24 30 00 00 00 00 e8 0d 4e ff ff 49 89 c6 48 [ 382.333582][ T8652] RSP: 002b:00007fff9ff77090 EFLAGS: 00010246 [ 382.339631][ T8652] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000457e4a [ 382.347588][ T8652] RDX: 0000000000000000 RSI: 0000000000000925 RDI: 00000000004bf131 [ 382.355552][ T8652] RBP: 0000000000000925 R08: 0000000000000001 R09: 00005555557c9940 [ 382.363524][ T8652] R10: 00005555557c9c10 R11: 0000000000000246 R12: 0000000000000001 [ 382.371479][ T8652] R13: 00007fff9ff770c0 R14: 0000000000000000 R15: 00007fff9ff770d0 [ 382.379633][T22066] CPU: 1 PID: 22066 Comm: syz-executor.3 Not tainted 5.3.0-rc6-next-20190830 #75 [ 382.388744][T22066] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 382.398804][T22066] Call Trace: [ 382.402107][T22066] dump_stack+0x172/0x1f0 [ 382.406453][T22066] should_fail.cold+0xa/0x15 [ 382.411057][T22066] ? fault_create_debugfs_attr+0x180/0x180 [ 382.416880][T22066] ? __kasan_check_read+0x11/0x20 [ 382.421555][T22071] FAULT_INJECTION: forcing a failure. [ 382.421555][T22071] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 382.421913][T22066] ? __lock_acquire+0x16f2/0x4a00 [ 382.440109][T22066] should_fail_alloc_page+0x50/0x60 [ 382.445302][T22066] __alloc_pages_nodemask+0x1a1/0x900 [ 382.450662][T22066] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 382.456288][T22066] ? __alloc_pages_slowpath+0x2540/0x2540 [ 382.461998][T22066] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 382.467631][T22066] ? fault_create_debugfs_attr+0x180/0x180 [ 382.473689][T22066] cache_grow_begin+0x90/0xd20 [ 382.478466][T22066] ? getname_flags+0xd6/0x5b0 [ 382.483149][T22066] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 382.489380][T22066] kmem_cache_alloc+0x64e/0x710 [ 382.494227][T22066] ? __kasan_check_write+0x14/0x20 [ 382.499348][T22066] getname_flags+0xd6/0x5b0 [ 382.503844][T22066] getname+0x1a/0x20 [ 382.507731][T22066] do_sys_open+0x2c9/0x5d0 [ 382.512138][T22066] ? filp_open+0x80/0x80 [ 382.516375][T22066] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 382.521822][T22066] ? do_syscall_64+0x26/0x760 [ 382.526492][T22066] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 382.532543][T22066] ? do_syscall_64+0x26/0x760 [ 382.537213][T22066] __x64_sys_open+0x7e/0xc0 [ 382.541711][T22066] do_syscall_64+0xfa/0x760 [ 382.546206][T22066] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 382.552084][T22066] RIP: 0033:0x413761 [ 382.555973][T22066] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 382.575649][T22066] RSP: 002b:00007fbbf49537a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 382.584047][T22066] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000413761 [ 382.592026][T22066] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007fbbf4953850 [ 382.599996][T22066] RBP: 000000000075bf20 R08: 000000000000000f R09: 0000000000000000 [ 382.607954][T22066] R10: 0000000000000064 R11: 0000000000000293 R12: 00007fbbf49546d4 [ 382.615914][T22066] R13: 00000000004c8e36 R14: 00000000004dfe20 R15: 0000000000000004 [ 382.623896][T22071] CPU: 0 PID: 22071 Comm: syz-executor.2 Not tainted 5.3.0-rc6-next-20190830 #75 [ 382.633008][T22071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 382.643068][T22071] Call Trace: [ 382.646365][T22071] dump_stack+0x172/0x1f0 [ 382.650709][T22071] should_fail.cold+0xa/0x15 [ 382.655311][T22071] ? fault_create_debugfs_attr+0x180/0x180 [ 382.661139][T22071] ? __kasan_check_read+0x11/0x20 [ 382.666179][T22071] ? __lock_acquire+0x16f2/0x4a00 [ 382.671220][T22071] should_fail_alloc_page+0x50/0x60 [ 382.676425][T22071] __alloc_pages_nodemask+0x1a1/0x900 [ 382.681802][T22071] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 382.681819][T22071] ? __alloc_pages_slowpath+0x2540/0x2540 [ 382.681833][T22071] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 382.681855][T22071] ? fault_create_debugfs_attr+0x180/0x180 11:42:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x4800}}], 0x1, 0x0) [ 382.681874][T22071] cache_grow_begin+0x90/0xd20 [ 382.681889][T22071] ? getname_flags+0xd6/0x5b0 [ 382.681912][T22071] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 382.693219][T22071] kmem_cache_alloc+0x64e/0x710 [ 382.693232][T22071] ? __kasan_check_write+0x14/0x20 [ 382.693253][T22071] getname_flags+0xd6/0x5b0 [ 382.734700][T22071] getname+0x1a/0x20 [ 382.738607][T22071] do_sys_open+0x2c9/0x5d0 [ 382.743030][T22071] ? filp_open+0x80/0x80 [ 382.747287][T22071] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 382.752758][T22071] ? do_syscall_64+0x26/0x760 [ 382.757466][T22071] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 382.757988][ T8652] memory: usage 307200kB, limit 307200kB, failcnt 1150 [ 382.763559][T22071] ? do_syscall_64+0x26/0x760 [ 382.763581][T22071] __x64_sys_open+0x7e/0xc0 [ 382.763596][T22071] do_syscall_64+0xfa/0x760 [ 382.763616][T22071] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 382.763627][T22071] RIP: 0033:0x413761 11:42:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:42:57 executing program 3 (fault-call:2 fault-nth:2): r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 382.763642][T22071] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 382.763649][T22071] RSP: 002b:00007f3fcc4c47a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 382.763664][T22071] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000413761 [ 382.763672][T22071] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f3fcc4c4850 [ 382.763680][T22071] RBP: 000000000075bf20 R08: 000000000000000f R09: 0000000000000000 [ 382.763687][T22071] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f3fcc4c56d4 [ 382.763695][T22071] R13: 00000000004c8e36 R14: 00000000004dfe20 R15: 0000000000000004 11:42:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x4c00}}], 0x1, 0x0) [ 382.890998][T22078] FAULT_INJECTION: forcing a failure. [ 382.890998][T22078] name failslab, interval 1, probability 0, space 0, times 0 [ 382.935027][T22078] CPU: 0 PID: 22078 Comm: syz-executor.3 Not tainted 5.3.0-rc6-next-20190830 #75 [ 382.944957][T22078] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 382.955017][T22078] Call Trace: [ 382.958321][T22078] dump_stack+0x172/0x1f0 [ 382.962665][T22078] should_fail.cold+0xa/0x15 [ 382.967270][T22078] ? fault_create_debugfs_attr+0x180/0x180 [ 382.973091][T22078] ? ___might_sleep+0x163/0x280 [ 382.977955][T22078] __should_failslab+0x121/0x190 11:42:58 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0xfb, 0x0) 11:42:58 executing program 2 (fault-call:2 fault-nth:2): r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 382.982902][T22078] should_failslab+0x9/0x14 [ 382.987412][T22078] kmem_cache_alloc+0x2aa/0x710 [ 382.992269][T22078] ? stack_trace_save+0xac/0xe0 [ 382.997127][T22078] ? stack_trace_consume_entry+0x190/0x190 [ 383.002938][T22078] __alloc_file+0x27/0x340 [ 383.008838][T22078] alloc_empty_file+0x72/0x170 [ 383.013613][T22078] path_openat+0xef/0x46d0 [ 383.018031][T22078] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 383.023839][T22078] ? kasan_slab_alloc+0xf/0x20 [ 383.028609][T22078] ? kmem_cache_alloc+0x121/0x710 [ 383.033636][T22078] ? getname_flags+0xd6/0x5b0 [ 383.038316][T22078] ? getname+0x1a/0x20 [ 383.042391][T22078] ? do_sys_open+0x2c9/0x5d0 [ 383.046989][T22078] ? __x64_sys_open+0x7e/0xc0 [ 383.051677][T22078] ? __kasan_check_read+0x11/0x20 [ 383.056705][T22078] ? mark_lock+0xc2/0x1220 [ 383.061124][T22078] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 383.066686][T22078] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 383.072073][T22078] ? __alloc_fd+0x487/0x620 [ 383.076585][T22078] do_filp_open+0x1a1/0x280 [ 383.081087][T22078] ? may_open_dev+0x100/0x100 [ 383.081921][T22086] FAULT_INJECTION: forcing a failure. [ 383.081921][T22086] name failslab, interval 1, probability 0, space 0, times 0 [ 383.085768][T22078] ? lock_downgrade+0x920/0x920 [ 383.085786][T22078] ? rwlock_bug.part.0+0x90/0x90 [ 383.108103][T22078] ? __kasan_check_read+0x11/0x20 [ 383.113136][T22078] ? do_raw_spin_unlock+0x57/0x270 [ 383.118257][T22078] ? _raw_spin_unlock+0x2d/0x50 [ 383.123109][T22078] ? __alloc_fd+0x487/0x620 [ 383.123137][T22078] do_sys_open+0x3fe/0x5d0 [ 383.123156][T22078] ? filp_open+0x80/0x80 [ 383.132042][T22078] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 383.132055][T22078] ? do_syscall_64+0x26/0x760 [ 383.132072][T22078] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 383.132084][T22078] ? do_syscall_64+0x26/0x760 [ 383.132101][T22078] __x64_sys_open+0x7e/0xc0 [ 383.132116][T22078] do_syscall_64+0xfa/0x760 [ 383.132136][T22078] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 383.172064][T22078] RIP: 0033:0x413761 [ 383.175955][T22078] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 383.184471][ T8652] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 383.195635][T22078] RSP: 002b:00007fbbf49537a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 383.195651][T22078] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000413761 [ 383.195658][T22078] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007fbbf4953850 [ 383.195665][T22078] RBP: 000000000075bf20 R08: 000000000000000f R09: 0000000000000000 11:42:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x6000}}], 0x1, 0x0) 11:42:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) [ 383.195671][T22078] R10: 0000000000000064 R11: 0000000000000293 R12: 00007fbbf49546d4 [ 383.195679][T22078] R13: 00000000004c8e36 R14: 00000000004dfe20 R15: 0000000000000004 [ 383.243122][T22086] CPU: 0 PID: 22086 Comm: syz-executor.2 Not tainted 5.3.0-rc6-next-20190830 #75 [ 383.260295][T22086] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 383.260303][T22086] Call Trace: [ 383.260326][T22086] dump_stack+0x172/0x1f0 [ 383.260349][T22086] should_fail.cold+0xa/0x15 [ 383.260369][T22086] ? fault_create_debugfs_attr+0x180/0x180 [ 383.288368][T22086] ? ___might_sleep+0x163/0x280 [ 383.288396][T22086] __should_failslab+0x121/0x190 [ 383.298153][T22086] should_failslab+0x9/0x14 [ 383.302667][T22086] kmem_cache_alloc+0x2aa/0x710 [ 383.307536][T22086] ? stack_trace_save+0xac/0xe0 [ 383.312403][T22086] ? stack_trace_consume_entry+0x190/0x190 [ 383.318224][T22086] __alloc_file+0x27/0x340 [ 383.322660][T22086] alloc_empty_file+0x72/0x170 [ 383.327437][T22086] path_openat+0xef/0x46d0 [ 383.331865][T22086] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 383.337695][T22086] ? kasan_slab_alloc+0xf/0x20 [ 383.342466][T22086] ? kmem_cache_alloc+0x121/0x710 [ 383.347496][T22086] ? getname_flags+0xd6/0x5b0 [ 383.351814][ T8652] Memory cgroup stats for /syz5: [ 383.351919][ T8652] anon 267882496 [ 383.351919][ T8652] file 0 [ 383.351919][ T8652] kernel_stack 6356992 [ 383.351919][ T8652] slab 12525568 [ 383.351919][ T8652] sock 0 [ 383.351919][ T8652] shmem 45056 [ 383.351919][ T8652] file_mapped 135168 [ 383.351919][ T8652] file_dirty 0 [ 383.351919][ T8652] file_writeback 0 [ 383.351919][ T8652] anon_thp 245366784 [ 383.351919][ T8652] inactive_anon 135168 [ 383.351919][ T8652] active_anon 267882496 [ 383.351919][ T8652] inactive_file 0 [ 383.351919][ T8652] active_file 0 [ 383.351919][ T8652] unevictable 0 [ 383.351919][ T8652] slab_reclaimable 2703360 [ 383.351919][ T8652] slab_unreclaimable 9822208 [ 383.351919][ T8652] pgfault 46365 [ 383.351919][ T8652] pgmajfault 0 [ 383.351919][ T8652] workingset_refault 66 [ 383.351919][ T8652] workingset_activate 0 [ 383.351919][ T8652] workingset_nodereclaim 0 [ 383.351919][ T8652] pgrefill 1137 [ 383.351919][ T8652] pgscan 1118 [ 383.351919][ T8652] pgsteal 219 [ 383.352176][T22086] ? getname+0x1a/0x20 [ 383.445521][T22086] ? do_sys_open+0x2c9/0x5d0 [ 383.445536][T22086] ? __x64_sys_open+0x7e/0xc0 [ 383.445551][T22086] ? __kasan_check_read+0x11/0x20 [ 383.445564][T22086] ? mark_lock+0xc2/0x1220 [ 383.445577][T22086] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 383.445597][T22086] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 383.445615][T22086] ? __alloc_fd+0x487/0x620 [ 383.445633][T22086] do_filp_open+0x1a1/0x280 [ 383.445648][T22086] ? may_open_dev+0x100/0x100 [ 383.445661][T22086] ? lock_downgrade+0x920/0x920 [ 383.445680][T22086] ? rwlock_bug.part.0+0x90/0x90 [ 383.451319][ T8652] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=16389,uid=0 [ 383.454318][T22086] ? __kasan_check_read+0x11/0x20 [ 383.454334][T22086] ? do_raw_spin_unlock+0x57/0x270 [ 383.454350][T22086] ? _raw_spin_unlock+0x2d/0x50 [ 383.454366][T22086] ? __alloc_fd+0x487/0x620 [ 383.468235][ T8652] Memory cgroup out of memory: Killed process 16389 (syz-executor.5) total-vm:72708kB, anon-rss:2208kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 383.468445][T22086] do_sys_open+0x3fe/0x5d0 [ 383.505983][T22062] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 383.518302][T22086] ? filp_open+0x80/0x80 [ 383.518324][T22086] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 383.518336][T22086] ? do_syscall_64+0x26/0x760 [ 383.518352][T22086] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 383.518364][T22086] ? do_syscall_64+0x26/0x760 [ 383.518385][T22086] __x64_sys_open+0x7e/0xc0 [ 383.569994][T22086] do_syscall_64+0xfa/0x760 [ 383.570019][T22086] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 383.570030][T22086] RIP: 0033:0x413761 [ 383.570045][T22086] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 383.570053][T22086] RSP: 002b:00007f3fcc4c47a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 383.570066][T22086] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000413761 [ 383.570073][T22086] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f3fcc4c4850 [ 383.570079][T22086] RBP: 000000000075bf20 R08: 000000000000000f R09: 0000000000000000 [ 383.570086][T22086] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f3fcc4c56d4 [ 383.570093][T22086] R13: 00000000004c8e36 R14: 00000000004dfe20 R15: 0000000000000004 [ 383.585412][T22062] CPU: 0 PID: 22062 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 383.690880][T22062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 383.690886][T22062] Call Trace: [ 383.690906][T22062] dump_stack+0x172/0x1f0 [ 383.690925][T22062] dump_header+0x177/0x1152 [ 383.690941][T22062] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 383.690957][T22062] ? ___ratelimit+0x2c8/0x595 [ 383.723523][T22062] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 383.729334][T22062] ? lockdep_hardirqs_on+0x418/0x5d0 [ 383.729348][T22062] ? trace_hardirqs_on+0x67/0x240 [ 383.729364][T22062] ? pagefault_out_of_memory+0x11c/0x11c [ 383.729380][T22062] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 383.729392][T22062] ? ___ratelimit+0x60/0x595 [ 383.729402][T22062] ? do_raw_spin_unlock+0x57/0x270 [ 383.729418][T22062] oom_kill_process.cold+0x10/0x15 [ 383.729433][T22062] out_of_memory+0x334/0x1340 [ 383.770626][T22062] ? lock_downgrade+0x920/0x920 [ 383.775488][T22062] ? oom_killer_disable+0x280/0x280 [ 383.780785][T22062] mem_cgroup_out_of_memory+0x1d8/0x240 [ 383.786330][T22062] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 383.791952][T22062] ? do_raw_spin_unlock+0x57/0x270 [ 383.791969][T22062] ? _raw_spin_unlock+0x2d/0x50 [ 383.791986][T22062] try_charge+0xa2d/0x1440 [ 383.792009][T22062] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 383.792019][T22062] ? percpu_ref_tryget_live+0x111/0x290 [ 383.792039][T22062] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 383.823833][T22062] ? __kasan_check_read+0x11/0x20 [ 383.828874][T22062] ? get_mem_cgroup_from_mm+0x156/0x320 [ 383.834421][T22062] mem_cgroup_try_charge+0x136/0x590 [ 383.839711][T22062] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 383.845944][T22062] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 383.851558][T22062] wp_page_copy+0x41e/0x1590 [ 383.856132][T22062] ? find_held_lock+0x35/0x130 [ 383.860879][T22062] ? pmd_pfn+0x1d0/0x1d0 [ 383.865121][T22062] ? lock_downgrade+0x920/0x920 [ 383.869954][T22062] ? swp_swapcount+0x540/0x540 [ 383.875219][T22062] ? __kasan_check_read+0x11/0x20 [ 383.880230][T22062] ? do_raw_spin_unlock+0x57/0x270 [ 383.885331][T22062] do_wp_page+0x499/0x14d0 [ 383.889771][T22062] ? finish_mkwrite_fault+0x570/0x570 [ 383.895127][T22062] __handle_mm_fault+0x22f1/0x3f20 [ 383.900232][T22062] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 383.905774][T22062] ? __kasan_check_read+0x11/0x20 [ 383.910815][T22062] handle_mm_fault+0x1b5/0x6c0 [ 383.915575][T22062] __do_page_fault+0x536/0xdd0 [ 383.920325][T22062] do_page_fault+0x38/0x590 [ 383.924805][T22062] page_fault+0x39/0x40 [ 383.928937][T22062] RIP: 0033:0x457eba [ 383.932811][T22062] Code: 00 00 0f 31 48 c1 e2 20 89 c0 48 09 c2 64 48 89 14 25 20 06 00 00 b8 40 43 41 00 48 89 15 fe e8 61 00 48 85 c0 74 08 4c 89 cf 81 c4 fb ff 45 85 f6 0f 85 58 01 00 00 48 85 db 48 c7 05 ba e0 [ 383.952397][T22062] RSP: 002b:00007fff9ff77040 EFLAGS: 00010202 [ 383.958450][T22062] RAX: 0000000000414340 RBX: 00007fff9ff77040 RCX: 0000000000457e4a [ 383.966401][T22062] RDX: 000000ce25c1e893 RSI: 0000000000000000 RDI: 00005555557c9940 [ 383.974352][T22062] RBP: 00007fff9ff77080 R08: 0000000000000001 R09: 00005555557c9940 [ 383.982304][T22062] R10: 00005555557c9c10 R11: 0000000000000246 R12: 0000000000000001 [ 383.990255][T22062] R13: 0000000000000000 R14: 0000000000000000 R15: 00007fff9ff770d0 [ 384.004334][T22062] memory: usage 304852kB, limit 307200kB, failcnt 1150 [ 384.013057][T22062] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 384.021575][T22062] Memory cgroup stats for /syz5: [ 384.021679][T22062] anon 265822208 [ 384.021679][T22062] file 0 [ 384.021679][T22062] kernel_stack 6356992 [ 384.021679][T22062] slab 12525568 [ 384.021679][T22062] sock 0 [ 384.021679][T22062] shmem 45056 [ 384.021679][T22062] file_mapped 135168 [ 384.021679][T22062] file_dirty 0 [ 384.021679][T22062] file_writeback 0 [ 384.021679][T22062] anon_thp 243269632 [ 384.021679][T22062] inactive_anon 135168 [ 384.021679][T22062] active_anon 265822208 [ 384.021679][T22062] inactive_file 0 [ 384.021679][T22062] active_file 0 [ 384.021679][T22062] unevictable 0 [ 384.021679][T22062] slab_reclaimable 2703360 [ 384.021679][T22062] slab_unreclaimable 9822208 [ 384.021679][T22062] pgfault 46365 [ 384.021679][T22062] pgmajfault 0 [ 384.021679][T22062] workingset_refault 66 [ 384.021679][T22062] workingset_activate 0 [ 384.021679][T22062] workingset_nodereclaim 0 [ 384.021679][T22062] pgrefill 1137 [ 384.021679][T22062] pgscan 1118 [ 384.021679][T22062] pgsteal 219 [ 384.115817][T22062] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=16316,uid=0 11:42:59 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}], [], 0x6c00000000000000}) 11:42:59 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0xfc, 0x0) 11:42:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x6300}}], 0x1, 0x0) 11:42:59 executing program 2 (fault-call:2 fault-nth:3): r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:42:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:42:59 executing program 3 (fault-call:2 fault-nth:3): r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 384.132217][T22062] Memory cgroup out of memory: Killed process 16316 (syz-executor.5) total-vm:72708kB, anon-rss:2208kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 384.160096][ T1065] oom_reaper: reaped process 16316 (syz-executor.5), now anon-rss:0kB, file-rss:34832kB, shmem-rss:0kB [ 384.160236][T22100] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:42:59 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0xfd, 0x0) 11:42:59 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}], [], 0x7400000000000000}) [ 384.276155][T22110] FAULT_INJECTION: forcing a failure. [ 384.276155][T22110] name failslab, interval 1, probability 0, space 0, times 0 [ 384.284721][T22117] overlayfs: unrecognized mount option "i\dex=off" or missing value [ 384.306185][T22119] overlayfs: unrecognized mount option "i\dex=off" or missing value [ 384.335162][T22110] CPU: 0 PID: 22110 Comm: syz-executor.3 Not tainted 5.3.0-rc6-next-20190830 #75 [ 384.344303][T22110] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 384.354354][T22110] Call Trace: [ 384.357641][T22110] dump_stack+0x172/0x1f0 [ 384.362072][T22110] should_fail.cold+0xa/0x15 [ 384.366686][T22110] ? fault_create_debugfs_attr+0x180/0x180 [ 384.372509][T22110] ? ___might_sleep+0x163/0x280 [ 384.377370][T22110] __should_failslab+0x121/0x190 [ 384.382310][T22110] should_failslab+0x9/0x14 [ 384.386800][T22110] __kmalloc+0x2e0/0x770 [ 384.391050][T22110] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 384.397208][T22110] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 384.402937][T22110] tomoyo_realpath_from_path+0xcd/0x7b0 [ 384.408487][T22110] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 384.414738][T22110] tomoyo_check_open_permission+0x2a8/0x3f0 [ 384.420636][T22110] ? __check_heap_object+0x64/0xb3 [ 384.425751][T22110] ? tomoyo_path_number_perm+0x520/0x520 11:42:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:42:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x6800}}], 0x1, 0x0) [ 384.431391][T22110] ? __kasan_check_read+0x11/0x20 [ 384.436414][T22110] ? mark_lock+0xc2/0x1220 [ 384.440843][T22110] ? lock_downgrade+0x920/0x920 [ 384.445686][T22110] ? rwlock_bug.part.0+0x90/0x90 [ 384.450718][T22110] tomoyo_file_open+0xa9/0xd0 [ 384.455399][T22110] security_file_open+0x71/0x300 [ 384.460341][T22110] do_dentry_open+0x373/0x1250 [ 384.465110][T22110] ? __kasan_check_read+0x11/0x20 [ 384.470150][T22110] ? chown_common+0x5c0/0x5c0 [ 384.474830][T22110] ? inode_permission+0xb4/0x560 [ 384.479779][T22110] vfs_open+0xa0/0xd0 11:42:59 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0xfe, 0x0) [ 384.483760][T22110] path_openat+0x10e9/0x46d0 [ 384.488354][T22110] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 384.494164][T22110] ? kasan_slab_alloc+0xf/0x20 [ 384.494993][ T8652] syz-executor.5 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 384.498917][T22110] ? kmem_cache_alloc+0x121/0x710 [ 384.498930][T22110] ? getname_flags+0xd6/0x5b0 [ 384.498942][T22110] ? getname+0x1a/0x20 [ 384.498957][T22110] ? do_sys_open+0x2c9/0x5d0 [ 384.498986][T22110] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 384.499008][T22110] ? __alloc_fd+0x487/0x620 [ 384.499034][T22110] do_filp_open+0x1a1/0x280 [ 384.543445][T22110] ? may_open_dev+0x100/0x100 [ 384.548141][T22110] ? __kasan_check_read+0x11/0x20 [ 384.553167][T22110] ? do_raw_spin_unlock+0x57/0x270 [ 384.558297][T22110] ? _raw_spin_unlock+0x2d/0x50 [ 384.563155][T22110] ? __alloc_fd+0x487/0x620 [ 384.567679][T22110] do_sys_open+0x3fe/0x5d0 [ 384.572110][T22110] ? filp_open+0x80/0x80 [ 384.576359][T22110] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 384.581821][T22110] ? do_syscall_64+0x26/0x760 [ 384.586504][T22110] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 384.592574][T22110] ? do_syscall_64+0x26/0x760 [ 384.597264][T22110] __x64_sys_open+0x7e/0xc0 [ 384.601774][T22110] do_syscall_64+0xfa/0x760 [ 384.606291][T22110] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 384.612184][T22110] RIP: 0033:0x413761 [ 384.616081][T22110] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 11:42:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x6c00}}], 0x1, 0x0) [ 384.635691][T22110] RSP: 002b:00007fbbf49537a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 384.644105][T22110] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000413761 [ 384.652076][T22110] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007fbbf4953850 [ 384.660048][T22110] RBP: 000000000075bf20 R08: 000000000000000f R09: 0000000000000000 [ 384.668027][T22110] R10: 0000000000000064 R11: 0000000000000293 R12: 00007fbbf49546d4 [ 384.675998][T22110] R13: 00000000004c8e36 R14: 00000000004dfe20 R15: 0000000000000004 [ 384.686780][ T8652] CPU: 1 PID: 8652 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 384.695799][ T8652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 384.695805][ T8652] Call Trace: [ 384.695825][ T8652] dump_stack+0x172/0x1f0 [ 384.695845][ T8652] dump_header+0x177/0x1152 [ 384.695860][ T8652] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 384.695871][ T8652] ? ___ratelimit+0x2c8/0x595 [ 384.695884][ T8652] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 384.695900][ T8652] ? lockdep_hardirqs_on+0x418/0x5d0 [ 384.695913][ T8652] ? trace_hardirqs_on+0x67/0x240 [ 384.695930][ T8652] ? pagefault_out_of_memory+0x11c/0x11c [ 384.713954][T22136] FAULT_INJECTION: forcing a failure. [ 384.713954][T22136] name failslab, interval 1, probability 0, space 0, times 0 [ 384.718050][ T8652] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 384.728820][ T8652] ? ___ratelimit+0x60/0x595 [ 384.728833][ T8652] ? do_raw_spin_unlock+0x57/0x270 [ 384.728852][ T8652] oom_kill_process.cold+0x10/0x15 [ 384.728871][ T8652] out_of_memory+0x334/0x1340 [ 384.788463][ T8652] ? lock_downgrade+0x920/0x920 [ 384.793313][ T8652] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 384.799114][ T8652] ? oom_killer_disable+0x280/0x280 [ 384.804404][ T8652] mem_cgroup_out_of_memory+0x1d8/0x240 [ 384.809940][ T8652] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 384.815564][ T8652] ? do_raw_spin_unlock+0x57/0x270 [ 384.820669][ T8652] ? _raw_spin_unlock+0x2d/0x50 [ 384.825512][ T8652] try_charge+0xf4b/0x1440 [ 384.829924][ T8652] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 384.835456][ T8652] ? find_held_lock+0x35/0x130 [ 384.840210][ T8652] ? get_mem_cgroup_from_mm+0x139/0x320 [ 384.845756][ T8652] ? lock_downgrade+0x920/0x920 [ 384.850597][ T8652] ? percpu_ref_tryget_live+0x111/0x290 [ 384.856136][ T8652] __memcg_kmem_charge_memcg+0x71/0xf0 [ 384.861595][ T8652] ? memcg_kmem_put_cache+0x50/0x50 [ 384.866785][ T8652] ? get_mem_cgroup_from_mm+0x156/0x320 [ 384.872330][ T8652] __memcg_kmem_charge+0x13a/0x3a0 [ 384.877441][ T8652] __alloc_pages_nodemask+0x4f7/0x900 [ 384.882805][ T8652] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 384.888345][ T8652] ? __alloc_pages_slowpath+0x2540/0x2540 [ 384.894053][ T8652] ? percpu_ref_put_many+0xb6/0x190 [ 384.899243][ T8652] ? lockdep_hardirqs_on+0x418/0x5d0 [ 384.904517][ T8652] ? trace_hardirqs_on+0x67/0x240 [ 384.909533][ T8652] ? __kasan_check_read+0x11/0x20 [ 384.914554][ T8652] copy_process+0x3f8/0x6830 [ 384.919140][ T8652] ? __kasan_check_read+0x11/0x20 [ 384.924158][ T8652] ? __kasan_check_read+0x11/0x20 [ 384.929170][ T8652] ? __lock_acquire+0x16f2/0x4a00 [ 384.934188][ T8652] ? __cleanup_sighand+0x60/0x60 [ 384.939114][ T8652] ? __might_fault+0x12b/0x1e0 [ 384.943877][ T8652] ? __might_fault+0x12b/0x1e0 [ 384.948639][ T8652] _do_fork+0x146/0xfa0 [ 384.952788][ T8652] ? copy_init_mm+0x20/0x20 [ 384.957286][ T8652] ? __kasan_check_read+0x11/0x20 [ 384.962300][ T8652] ? _copy_to_user+0x118/0x160 [ 384.967064][ T8652] __x64_sys_clone+0x1ab/0x270 [ 384.971818][ T8652] ? __ia32_sys_vfork+0xd0/0xd0 [ 384.976666][ T8652] ? do_syscall_64+0x26/0x760 [ 384.981334][ T8652] ? lockdep_hardirqs_on+0x418/0x5d0 [ 384.986783][ T8652] ? trace_hardirqs_on+0x67/0x240 [ 384.991800][ T8652] do_syscall_64+0xfa/0x760 [ 384.996301][ T8652] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 385.002179][ T8652] RIP: 0033:0x457e4a [ 385.006843][ T8652] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 385.026435][ T8652] RSP: 002b:00007fff9ff77040 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 385.034838][ T8652] RAX: ffffffffffffffda RBX: 00007fff9ff77040 RCX: 0000000000457e4a [ 385.042799][ T8652] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 385.050757][ T8652] RBP: 00007fff9ff77080 R08: 0000000000000001 R09: 00005555557c9940 [ 385.058715][ T8652] R10: 00005555557c9c10 R11: 0000000000000246 R12: 0000000000000001 [ 385.066677][ T8652] R13: 0000000000000000 R14: 0000000000000000 R15: 00007fff9ff770d0 [ 385.074671][T22136] CPU: 0 PID: 22136 Comm: syz-executor.2 Not tainted 5.3.0-rc6-next-20190830 #75 11:43:00 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x102, 0x0) [ 385.083784][T22136] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 385.093840][T22136] Call Trace: [ 385.097139][T22136] dump_stack+0x172/0x1f0 [ 385.101483][T22136] should_fail.cold+0xa/0x15 [ 385.106090][T22136] ? fault_create_debugfs_attr+0x180/0x180 [ 385.111912][T22136] ? ___might_sleep+0x163/0x280 [ 385.116773][T22136] __should_failslab+0x121/0x190 [ 385.121719][T22136] should_failslab+0x9/0x14 [ 385.126399][T22136] kmem_cache_alloc+0x2aa/0x710 [ 385.131255][T22136] ? kmem_cache_alloc+0x364/0x710 11:43:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) [ 385.136295][T22136] security_file_alloc+0x39/0x170 [ 385.141326][T22136] __alloc_file+0xde/0x340 [ 385.145750][T22136] alloc_empty_file+0x72/0x170 [ 385.150521][T22136] path_openat+0xef/0x46d0 [ 385.154941][T22136] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 385.160747][T22136] ? kasan_slab_alloc+0xf/0x20 [ 385.165518][T22136] ? kmem_cache_alloc+0x121/0x710 [ 385.170548][T22136] ? getname_flags+0xd6/0x5b0 [ 385.175235][T22136] ? getname+0x1a/0x20 [ 385.179317][T22136] ? do_sys_open+0x2c9/0x5d0 [ 385.183910][T22136] ? __x64_sys_open+0x7e/0xc0 [ 385.188592][T22136] ? __kasan_check_read+0x11/0x20 [ 385.193630][T22136] ? mark_lock+0xc2/0x1220 [ 385.198050][T22136] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 385.203609][T22136] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 385.208986][T22136] ? __alloc_fd+0x487/0x620 [ 385.209006][T22136] do_filp_open+0x1a1/0x280 [ 385.209021][T22136] ? may_open_dev+0x100/0x100 [ 385.209036][T22136] ? lock_downgrade+0x920/0x920 [ 385.209048][T22136] ? rwlock_bug.part.0+0x90/0x90 [ 385.209067][T22136] ? __kasan_check_read+0x11/0x20 11:43:00 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x103, 0x0) [ 385.209078][T22136] ? do_raw_spin_unlock+0x57/0x270 [ 385.209095][T22136] ? _raw_spin_unlock+0x2d/0x50 [ 385.209110][T22136] ? __alloc_fd+0x487/0x620 [ 385.214901][T22110] ERROR: Out of memory at tomoyo_realpath_from_path. [ 385.218102][T22136] do_sys_open+0x3fe/0x5d0 [ 385.218122][T22136] ? filp_open+0x80/0x80 [ 385.232553][T22136] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 385.267245][T22136] ? do_syscall_64+0x26/0x760 [ 385.267264][T22136] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 385.267276][T22136] ? do_syscall_64+0x26/0x760 [ 385.267297][T22136] __x64_sys_open+0x7e/0xc0 [ 385.292587][T22136] do_syscall_64+0xfa/0x760 [ 385.297106][T22136] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 385.302998][T22136] RIP: 0033:0x413761 [ 385.306888][T22136] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 385.306898][T22136] RSP: 002b:00007f3fcc4c47a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 385.306912][T22136] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000413761 [ 385.306921][T22136] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f3fcc4c4850 [ 385.306929][T22136] RBP: 000000000075bf20 R08: 000000000000000f R09: 0000000000000000 [ 385.306944][T22136] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f3fcc4c56d4 [ 385.366742][T22136] R13: 00000000004c8e36 R14: 00000000004dfe20 R15: 0000000000000004 [ 385.378990][ T8652] memory: usage 307060kB, limit 307200kB, failcnt 1164 [ 385.385876][ T8652] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 385.441409][ T8652] Memory cgroup stats for /syz5: [ 385.441522][ T8652] anon 267984896 [ 385.441522][ T8652] file 0 [ 385.441522][ T8652] kernel_stack 6356992 [ 385.441522][ T8652] slab 12525568 [ 385.441522][ T8652] sock 0 [ 385.441522][ T8652] shmem 45056 [ 385.441522][ T8652] file_mapped 135168 [ 385.441522][ T8652] file_dirty 0 [ 385.441522][ T8652] file_writeback 0 [ 385.441522][ T8652] anon_thp 245366784 [ 385.441522][ T8652] inactive_anon 135168 [ 385.441522][ T8652] active_anon 267984896 [ 385.441522][ T8652] inactive_file 0 11:43:00 executing program 2 (fault-call:2 fault-nth:4): r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:00 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x7400}}], 0x1, 0x0) [ 385.441522][ T8652] active_file 0 [ 385.441522][ T8652] unevictable 0 [ 385.441522][ T8652] slab_reclaimable 2703360 [ 385.441522][ T8652] slab_unreclaimable 9822208 [ 385.441522][ T8652] pgfault 46530 [ 385.441522][ T8652] pgmajfault 0 [ 385.441522][ T8652] workingset_refault 66 [ 385.441522][ T8652] workingset_activate 0 [ 385.441522][ T8652] workingset_nodereclaim 0 [ 385.441522][ T8652] pgrefill 1170 [ 385.441522][ T8652] pgscan 1118 [ 385.441522][ T8652] pgsteal 219 11:43:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) [ 385.643527][ T8652] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=22101,uid=0 [ 385.697424][ T8652] Memory cgroup out of memory: Killed process 22101 (syz-executor.5) total-vm:72708kB, anon-rss:2208kB, file-rss:35796kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 385.724657][ T1065] oom_reaper: reaped process 22101 (syz-executor.5), now anon-rss:0kB, file-rss:34836kB, shmem-rss:0kB [ 385.727195][T22163] FAULT_INJECTION: forcing a failure. [ 385.727195][T22163] name failslab, interval 1, probability 0, space 0, times 0 [ 385.748752][T22163] CPU: 0 PID: 22163 Comm: syz-executor.2 Not tainted 5.3.0-rc6-next-20190830 #75 [ 385.757870][T22163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 385.767917][T22163] Call Trace: [ 385.767940][T22163] dump_stack+0x172/0x1f0 [ 385.767960][T22163] should_fail.cold+0xa/0x15 [ 385.767978][T22163] ? fault_create_debugfs_attr+0x180/0x180 [ 385.767997][T22163] ? ___might_sleep+0x163/0x280 [ 385.768015][T22163] __should_failslab+0x121/0x190 [ 385.768030][T22163] should_failslab+0x9/0x14 [ 385.768046][T22163] __kmalloc+0x2e0/0x770 [ 385.795937][T22163] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 385.795956][T22163] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 385.795974][T22163] tomoyo_realpath_from_path+0xcd/0x7b0 [ 385.810825][T22163] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 385.810851][T22163] tomoyo_check_open_permission+0x2a8/0x3f0 [ 385.810865][T22163] ? __check_heap_object+0x64/0xb3 [ 385.810879][T22163] ? tomoyo_path_number_perm+0x520/0x520 [ 385.810901][T22163] ? __kasan_check_read+0x11/0x20 [ 385.810914][T22163] ? mark_lock+0xc2/0x1220 [ 385.810946][T22163] ? lock_downgrade+0x920/0x920 [ 385.810958][T22163] ? rwlock_bug.part.0+0x90/0x90 [ 385.810979][T22163] tomoyo_file_open+0xa9/0xd0 [ 385.834098][T22164] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 385.834301][T22163] security_file_open+0x71/0x300 [ 385.834321][T22163] do_dentry_open+0x373/0x1250 [ 385.889055][T22163] ? __kasan_check_read+0x11/0x20 [ 385.894093][T22163] ? chown_common+0x5c0/0x5c0 [ 385.898777][T22163] ? inode_permission+0xb4/0x560 [ 385.903723][T22163] vfs_open+0xa0/0xd0 [ 385.907708][T22163] path_openat+0x10e9/0x46d0 [ 385.912302][T22163] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 385.918109][T22163] ? kasan_slab_alloc+0xf/0x20 [ 385.922871][T22163] ? kmem_cache_alloc+0x121/0x710 [ 385.929202][T22163] ? getname_flags+0xd6/0x5b0 [ 385.933885][T22163] ? getname+0x1a/0x20 [ 385.937960][T22163] ? do_sys_open+0x2c9/0x5d0 [ 385.942570][T22163] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 385.947954][T22163] ? __alloc_fd+0x487/0x620 [ 385.952468][T22163] do_filp_open+0x1a1/0x280 [ 385.956980][T22163] ? may_open_dev+0x100/0x100 [ 385.961673][T22163] ? __kasan_check_read+0x11/0x20 [ 385.966704][T22163] ? do_raw_spin_unlock+0x57/0x270 [ 385.971816][T22163] ? _raw_spin_unlock+0x2d/0x50 [ 385.976659][T22163] ? __alloc_fd+0x487/0x620 [ 385.981175][T22163] do_sys_open+0x3fe/0x5d0 [ 385.985605][T22163] ? filp_open+0x80/0x80 [ 385.989846][T22163] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 385.995305][T22163] ? do_syscall_64+0x26/0x760 [ 385.999983][T22163] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 386.006046][T22163] ? do_syscall_64+0x26/0x760 [ 386.010727][T22163] __x64_sys_open+0x7e/0xc0 [ 386.015227][T22163] do_syscall_64+0xfa/0x760 [ 386.019734][T22163] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 386.025629][T22163] RIP: 0033:0x413761 [ 386.029519][T22163] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 386.049123][T22163] RSP: 002b:00007f3fcc4c47a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 386.057531][T22163] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000413761 [ 386.065504][T22163] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f3fcc4c4850 [ 386.073477][T22163] RBP: 000000000075bf20 R08: 000000000000000f R09: 0000000000000000 [ 386.081455][T22163] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f3fcc4c56d4 [ 386.089440][T22163] R13: 00000000004c8e36 R14: 00000000004dfe20 R15: 0000000000000004 [ 386.098772][T22164] CPU: 0 PID: 22164 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 386.107889][T22164] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 386.108120][T22163] ERROR: Out of memory at tomoyo_realpath_from_path. [ 386.117932][T22164] Call Trace: [ 386.117956][T22164] dump_stack+0x172/0x1f0 [ 386.117976][T22164] dump_header+0x177/0x1152 [ 386.117992][T22164] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 386.118002][T22164] ? ___ratelimit+0x2c8/0x595 [ 386.118014][T22164] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 386.118030][T22164] ? lockdep_hardirqs_on+0x418/0x5d0 [ 386.118044][T22164] ? trace_hardirqs_on+0x67/0x240 [ 386.118062][T22164] ? pagefault_out_of_memory+0x11c/0x11c [ 386.168953][T22164] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 386.175510][T22164] ? ___ratelimit+0x60/0x595 [ 386.180090][T22164] ? do_raw_spin_unlock+0x57/0x270 [ 386.180108][T22164] oom_kill_process.cold+0x10/0x15 [ 386.180122][T22164] out_of_memory+0x334/0x1340 [ 386.180134][T22164] ? lock_downgrade+0x920/0x920 [ 386.180150][T22164] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 386.180164][T22164] ? oom_killer_disable+0x280/0x280 [ 386.180185][T22164] mem_cgroup_out_of_memory+0x1d8/0x240 [ 386.180199][T22164] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 386.180217][T22164] ? do_raw_spin_unlock+0x57/0x270 [ 386.180233][T22164] ? _raw_spin_unlock+0x2d/0x50 [ 386.180251][T22164] try_charge+0xf4b/0x1440 [ 386.236388][T22164] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 386.241943][T22164] ? percpu_ref_tryget_live+0x111/0x290 [ 386.247500][T22164] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 386.253743][T22164] ? __kasan_check_read+0x11/0x20 [ 386.258770][T22164] ? get_mem_cgroup_from_mm+0x156/0x320 [ 386.264317][T22164] mem_cgroup_try_charge+0x136/0x590 [ 386.269593][T22164] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 386.275815][T22164] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 386.281444][T22164] wp_page_copy+0x41e/0x1590 [ 386.286027][T22164] ? find_held_lock+0x35/0x130 [ 386.290785][T22164] ? pmd_pfn+0x1d0/0x1d0 [ 386.295011][T22164] ? lock_downgrade+0x920/0x920 [ 386.299854][T22164] ? vm_normal_page+0x15d/0x3c0 [ 386.304700][T22164] ? __pte_alloc_kernel+0x210/0x210 [ 386.309886][T22164] ? __kasan_check_read+0x11/0x20 [ 386.314891][T22164] ? do_raw_spin_unlock+0x57/0x270 [ 386.319995][T22164] do_wp_page+0x499/0x14d0 [ 386.324695][T22164] ? do_raw_spin_lock+0x12a/0x2e0 [ 386.329696][T22164] ? rwlock_bug.part.0+0x90/0x90 [ 386.334615][T22164] ? finish_mkwrite_fault+0x570/0x570 [ 386.339973][T22164] ? add_mm_counter_fast.part.0+0x40/0x40 [ 386.345690][T22164] __handle_mm_fault+0x22f1/0x3f20 [ 386.350794][T22164] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 386.356326][T22164] ? __kasan_check_read+0x11/0x20 [ 386.361353][T22164] handle_mm_fault+0x1b5/0x6c0 [ 386.366112][T22164] __do_page_fault+0x536/0xdd0 [ 386.370861][T22164] do_page_fault+0x38/0x590 [ 386.375342][T22164] page_fault+0x39/0x40 [ 386.379588][T22164] RIP: 0033:0x40ea18 [ 386.383479][T22164] Code: 8b 34 c6 4a 8d 04 2e 48 3d ff ff ff 7e 0f 86 77 ff ff ff bf 95 ee 4b 00 31 c0 e8 13 33 ff ff 31 ff e8 5c 2f ff ff 0f 1f 40 00 <89> 3c b5 00 00 73 00 eb b6 31 ed 0f 1f 44 00 00 80 3d 4e 1a 66 00 [ 386.403168][T22164] RSP: 002b:00007fff9ff76e10 EFLAGS: 00010246 [ 386.409227][T22164] RAX: 00000000363446af RBX: 000000001c8a6fec RCX: 0000001b31720000 [ 386.417177][T22164] RDX: 0000000000000000 RSI: 00000000000006af RDI: ffffffff363446af [ 386.425134][T22164] RBP: 0000000000000001 R08: 00000000363446af R09: 00000000363446b3 [ 386.433114][T22164] R10: 00007fff9ff76fb0 R11: 0000000000000246 R12: 000000000075bfa8 [ 386.441078][T22164] R13: 0000000080000000 R14: 00007fd522519008 R15: 0000000000000001 [ 386.449688][T22164] memory: usage 307036kB, limit 307200kB, failcnt 1172 [ 386.456534][T22164] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 386.463678][T22164] Memory cgroup stats for /syz5: [ 386.463788][T22164] anon 267943936 [ 386.463788][T22164] file 0 [ 386.463788][T22164] kernel_stack 6356992 [ 386.463788][T22164] slab 12525568 [ 386.463788][T22164] sock 0 [ 386.463788][T22164] shmem 45056 [ 386.463788][T22164] file_mapped 135168 [ 386.463788][T22164] file_dirty 0 [ 386.463788][T22164] file_writeback 0 [ 386.463788][T22164] anon_thp 245366784 [ 386.463788][T22164] inactive_anon 135168 [ 386.463788][T22164] active_anon 267943936 [ 386.463788][T22164] inactive_file 0 [ 386.463788][T22164] active_file 0 [ 386.463788][T22164] unevictable 0 [ 386.463788][T22164] slab_reclaimable 2703360 [ 386.463788][T22164] slab_unreclaimable 9822208 [ 386.463788][T22164] pgfault 46563 [ 386.463788][T22164] pgmajfault 0 [ 386.463788][T22164] workingset_refault 66 [ 386.463788][T22164] workingset_activate 0 [ 386.463788][T22164] workingset_nodereclaim 0 [ 386.463788][T22164] pgrefill 1170 [ 386.463788][T22164] pgscan 1118 [ 386.463788][T22164] pgsteal 219 [ 386.557629][T22164] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=22118,uid=0 [ 386.573170][T22164] Memory cgroup out of memory: Killed process 22118 (syz-executor.5) total-vm:72708kB, anon-rss:2208kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 11:43:01 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}], [], 0x7a00000000000000}) 11:43:01 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x104, 0x0) 11:43:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x7a00}}], 0x1, 0x0) 11:43:01 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='Kdev/usbmon#\x00', 0x0, 0x0) 11:43:01 executing program 2 (fault-call:2 fault-nth:5): r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 386.592593][ T1065] oom_reaper: reaped process 22118 (syz-executor.5), now anon-rss:0kB, file-rss:34832kB, shmem-rss:0kB [ 386.594668][T22165] overlayfs: unrecognized mount option "i\dex=off" or missing value [ 386.616163][T22170] overlayfs: unrecognized mount option "i\dex=off" or missing value [ 386.701260][T22180] FAULT_INJECTION: forcing a failure. [ 386.701260][T22180] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 386.714494][T22180] CPU: 1 PID: 22180 Comm: syz-executor.2 Not tainted 5.3.0-rc6-next-20190830 #75 [ 386.723609][T22180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 386.731894][T22186] overlayfs: unrecognized mount option "i\dex=off" or missing value [ 386.733665][T22180] Call Trace: [ 386.733691][T22180] dump_stack+0x172/0x1f0 [ 386.733715][T22180] should_fail.cold+0xa/0x15 [ 386.753860][T22180] ? fault_create_debugfs_attr+0x180/0x180 [ 386.758002][T22189] overlayfs: unrecognized mount option "i\dex=off" or missing value [ 386.759697][T22180] ? is_bpf_text_address+0xac/0x170 [ 386.759715][T22180] ? find_held_lock+0x35/0x130 [ 386.759739][T22180] should_fail_alloc_page+0x50/0x60 [ 386.759753][T22180] __alloc_pages_nodemask+0x1a1/0x900 [ 386.759771][T22180] ? lock_downgrade+0x920/0x920 [ 386.793074][T22180] ? __alloc_pages_slowpath+0x2540/0x2540 [ 386.798809][T22180] ? __kasan_check_read+0x11/0x20 [ 386.803844][T22180] ? fault_create_debugfs_attr+0x180/0x180 [ 386.809658][T22180] cache_grow_begin+0x90/0xd20 [ 386.814435][T22180] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 386.820157][T22180] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 386.826399][T22180] __kmalloc+0x6b2/0x770 [ 386.830654][T22180] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 386.836369][T22180] tomoyo_realpath_from_path+0xcd/0x7b0 [ 386.841920][T22180] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 386.848177][T22180] tomoyo_check_open_permission+0x2a8/0x3f0 [ 386.854077][T22180] ? __check_heap_object+0x64/0xb3 [ 386.859225][T22180] ? tomoyo_path_number_perm+0x520/0x520 [ 386.864874][T22180] ? __kasan_check_read+0x11/0x20 [ 386.869905][T22180] ? mark_lock+0xc2/0x1220 [ 386.874339][T22180] ? lock_downgrade+0x920/0x920 [ 386.879200][T22180] ? rwlock_bug.part.0+0x90/0x90 [ 386.884153][T22180] tomoyo_file_open+0xa9/0xd0 [ 386.888847][T22180] security_file_open+0x71/0x300 [ 386.893798][T22180] do_dentry_open+0x373/0x1250 [ 386.898576][T22180] ? __kasan_check_read+0x11/0x20 [ 386.903618][T22180] ? chown_common+0x5c0/0x5c0 [ 386.908306][T22180] ? inode_permission+0xb4/0x560 [ 386.913263][T22180] vfs_open+0xa0/0xd0 [ 386.917247][T22180] path_openat+0x10e9/0x46d0 [ 386.921837][T22180] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 386.921848][T22180] ? kasan_slab_alloc+0xf/0x20 [ 386.921858][T22180] ? kmem_cache_alloc+0x121/0x710 [ 386.921871][T22180] ? getname_flags+0xd6/0x5b0 [ 386.921887][T22180] ? getname+0x1a/0x20 [ 386.946149][T22180] ? do_sys_open+0x2c9/0x5d0 [ 386.950769][T22180] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 386.956160][T22180] ? __alloc_fd+0x487/0x620 [ 386.960708][T22180] do_filp_open+0x1a1/0x280 [ 386.965228][T22180] ? may_open_dev+0x100/0x100 [ 386.969923][T22180] ? __kasan_check_read+0x11/0x20 [ 386.974953][T22180] ? do_raw_spin_unlock+0x57/0x270 [ 386.980073][T22180] ? _raw_spin_unlock+0x2d/0x50 [ 386.984934][T22180] ? __alloc_fd+0x487/0x620 [ 386.989458][T22180] do_sys_open+0x3fe/0x5d0 [ 386.993892][T22180] ? filp_open+0x80/0x80 [ 386.998142][T22180] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 387.004307][T22180] ? do_syscall_64+0x26/0x760 [ 387.008981][T22180] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 387.015063][T22180] ? do_syscall_64+0x26/0x760 [ 387.019753][T22180] __x64_sys_open+0x7e/0xc0 [ 387.024245][T22180] do_syscall_64+0xfa/0x760 [ 387.028735][T22180] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 387.034604][T22180] RIP: 0033:0x413761 [ 387.038480][T22180] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 387.058061][T22180] RSP: 002b:00007f3fcc4c47a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 387.066454][T22180] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000413761 [ 387.074416][T22180] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f3fcc4c4850 [ 387.082368][T22180] RBP: 000000000075bf20 R08: 000000000000000f R09: 0000000000000000 [ 387.090317][T22180] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f3fcc4c56d4 11:43:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0xb80b}}], 0x1, 0x0) 11:43:02 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='\\dev/usbmon#\x00', 0x0, 0x0) 11:43:02 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x105, 0x0) 11:43:02 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}], [], 0x8cffffff00000000}) [ 387.098268][T22180] R13: 00000000004c8e36 R14: 00000000004dfe20 R15: 0000000000000004 11:43:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0xe803}}], 0x1, 0x0) 11:43:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:02 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/.ev/usbmon#\x00', 0x0, 0x0) 11:43:02 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x106, 0x0) 11:43:02 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}], [], 0xf6ffffff00000000}) [ 387.147430][T22203] overlayfs: unrecognized mount option "i\dex=off" or missing value [ 387.183083][T22206] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:02 executing program 2 (fault-call:2 fault-nth:6): r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 387.324839][ T8652] syz-executor.5 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=0 [ 387.378919][ T8652] CPU: 0 PID: 8652 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 387.387968][ T8652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 387.398023][ T8652] Call Trace: [ 387.401317][ T8652] dump_stack+0x172/0x1f0 [ 387.405653][ T8652] dump_header+0x177/0x1152 [ 387.410158][ T8652] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 387.415964][ T8652] ? ___ratelimit+0x2c8/0x595 [ 387.416790][T22225] FAULT_INJECTION: forcing a failure. [ 387.416790][T22225] name failslab, interval 1, probability 0, space 0, times 0 [ 387.420637][ T8652] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 387.420656][ T8652] ? lockdep_hardirqs_on+0x418/0x5d0 [ 387.420672][ T8652] ? trace_hardirqs_on+0x67/0x240 [ 387.420688][ T8652] ? pagefault_out_of_memory+0x11c/0x11c [ 387.420703][ T8652] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 387.420715][ T8652] ? ___ratelimit+0x60/0x595 [ 387.420727][ T8652] ? do_raw_spin_unlock+0x57/0x270 [ 387.420744][ T8652] oom_kill_process.cold+0x10/0x15 [ 387.420760][ T8652] out_of_memory+0x334/0x1340 [ 387.420773][ T8652] ? lock_downgrade+0x920/0x920 [ 387.420794][ T8652] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 387.490845][ T8652] ? oom_killer_disable+0x280/0x280 [ 387.496051][ T8652] mem_cgroup_out_of_memory+0x1d8/0x240 [ 387.501603][ T8652] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 387.507244][ T8652] ? do_raw_spin_unlock+0x57/0x270 [ 387.512357][ T8652] ? _raw_spin_unlock+0x2d/0x50 [ 387.517215][ T8652] try_charge+0xf4b/0x1440 [ 387.521642][ T8652] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 387.527190][ T8652] ? find_held_lock+0x35/0x130 [ 387.531954][ T8652] ? get_mem_cgroup_from_mm+0x139/0x320 [ 387.537509][ T8652] ? lock_downgrade+0x920/0x920 [ 387.542531][ T8652] ? percpu_ref_tryget_live+0x111/0x290 [ 387.548081][ T8652] __memcg_kmem_charge_memcg+0x71/0xf0 [ 387.553542][ T8652] ? memcg_kmem_put_cache+0x50/0x50 [ 387.558743][ T8652] ? get_mem_cgroup_from_mm+0x156/0x320 [ 387.564291][ T8652] __memcg_kmem_charge+0x13a/0x3a0 [ 387.569408][ T8652] __alloc_pages_nodemask+0x4f7/0x900 11:43:02 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x107, 0x0) 11:43:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0xf401}}], 0x1, 0x0) [ 387.574775][ T8652] ? stack_trace_consume_entry+0x190/0x190 [ 387.580578][ T8652] ? __alloc_pages_slowpath+0x2540/0x2540 [ 387.586295][ T8652] ? copy_page_range+0xef4/0x1ed0 [ 387.591320][ T8652] ? copy_page_range+0xef4/0x1ed0 [ 387.596350][ T8652] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 387.602594][ T8652] alloc_pages_current+0x107/0x210 [ 387.607706][ T8652] pte_alloc_one+0x1b/0x1a0 [ 387.612211][ T8652] __pte_alloc+0x20/0x310 [ 387.616540][ T8652] copy_page_range+0x14da/0x1ed0 [ 387.621508][ T8652] ? pmd_alloc+0x180/0x180 11:43:02 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x108, 0x0) [ 387.625926][ T8652] ? __rb_insert_augmented+0x20c/0xd90 [ 387.631383][ T8652] ? validate_mm_rb+0xa3/0xc0 [ 387.636059][ T8652] ? __vma_link_rb+0x5ad/0x770 [ 387.640826][ T8652] dup_mm+0xa67/0x1430 [ 387.644912][ T8652] ? vm_area_dup+0x170/0x170 [ 387.649509][ T8652] ? debug_mutex_init+0x2d/0x60 [ 387.654357][ T8652] copy_process+0x2671/0x6830 [ 387.659027][ T8652] ? __kasan_check_read+0x11/0x20 [ 387.664065][ T8652] ? __cleanup_sighand+0x60/0x60 [ 387.669005][ T8652] ? __might_fault+0x12b/0x1e0 [ 387.673782][ T8652] ? __might_fault+0x12b/0x1e0 11:43:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0xff00}}], 0x1, 0x0) [ 387.678554][ T8652] _do_fork+0x146/0xfa0 [ 387.682705][ T8652] ? copy_init_mm+0x20/0x20 [ 387.687212][ T8652] ? __kasan_check_read+0x11/0x20 [ 387.692321][ T8652] ? _copy_to_user+0x118/0x160 [ 387.697091][ T8652] __x64_sys_clone+0x1ab/0x270 [ 387.701851][ T8652] ? __ia32_sys_vfork+0xd0/0xd0 [ 387.706710][ T8652] ? do_syscall_64+0x26/0x760 [ 387.711385][ T8652] ? lockdep_hardirqs_on+0x418/0x5d0 [ 387.716665][ T8652] ? trace_hardirqs_on+0x67/0x240 [ 387.721689][ T8652] do_syscall_64+0xfa/0x760 11:43:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x34000}}], 0x1, 0x0) [ 387.726195][ T8652] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 387.732083][ T8652] RIP: 0033:0x457e4a [ 387.735976][ T8652] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 387.755581][ T8652] RSP: 002b:00007fff9ff77040 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 387.763995][ T8652] RAX: ffffffffffffffda RBX: 00007fff9ff77040 RCX: 0000000000457e4a [ 387.771967][ T8652] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 387.779943][ T8652] RBP: 00007fff9ff77080 R08: 0000000000000001 R09: 00005555557c9940 [ 387.787924][ T8652] R10: 00005555557c9c10 R11: 0000000000000246 R12: 0000000000000001 [ 387.795901][ T8652] R13: 0000000000000000 R14: 0000000000000000 R15: 00007fff9ff770d0 [ 387.803899][T22225] CPU: 1 PID: 22225 Comm: syz-executor.2 Not tainted 5.3.0-rc6-next-20190830 #75 [ 387.813003][T22225] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 387.813009][T22225] Call Trace: [ 387.813027][T22225] dump_stack+0x172/0x1f0 [ 387.813047][T22225] should_fail.cold+0xa/0x15 [ 387.813066][T22225] ? fault_create_debugfs_attr+0x180/0x180 [ 387.841068][T22225] ? ___might_sleep+0x163/0x280 [ 387.845926][T22225] __should_failslab+0x121/0x190 [ 387.850867][T22225] should_failslab+0x9/0x14 [ 387.850880][T22225] __kmalloc+0x2e0/0x770 [ 387.850897][T22225] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 387.850915][T22225] ? d_absolute_path+0x11b/0x170 [ 387.859627][T22225] ? __d_path+0x140/0x140 [ 387.859643][T22225] ? tomoyo_encode2.part.0+0xf5/0x400 [ 387.859662][T22225] tomoyo_encode2.part.0+0xf5/0x400 [ 387.870786][T22225] tomoyo_encode+0x2b/0x50 [ 387.870802][T22225] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 387.870824][T22225] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 387.880474][T22225] tomoyo_check_open_permission+0x2a8/0x3f0 [ 387.880490][T22225] ? __check_heap_object+0x64/0xb3 [ 387.880507][T22225] ? tomoyo_path_number_perm+0x520/0x520 [ 387.890076][T22225] ? __kasan_check_read+0x11/0x20 [ 387.890091][T22225] ? mark_lock+0xc2/0x1220 [ 387.890121][T22225] ? lock_downgrade+0x920/0x920 [ 387.890137][T22225] ? rwlock_bug.part.0+0x90/0x90 [ 387.902056][T22225] tomoyo_file_open+0xa9/0xd0 [ 387.902073][T22225] security_file_open+0x71/0x300 [ 387.902094][T22225] do_dentry_open+0x373/0x1250 [ 387.918700][T22225] ? __kasan_check_read+0x11/0x20 [ 387.918722][T22225] ? chown_common+0x5c0/0x5c0 [ 387.918740][T22225] ? inode_permission+0xb4/0x560 [ 387.928140][T22225] vfs_open+0xa0/0xd0 [ 387.947466][T22225] path_openat+0x10e9/0x46d0 [ 387.947481][T22225] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 387.947498][T22225] ? kasan_slab_alloc+0xf/0x20 [ 387.961987][T22225] ? kmem_cache_alloc+0x121/0x710 [ 387.962002][T22225] ? getname_flags+0xd6/0x5b0 [ 387.962018][T22225] ? getname+0x1a/0x20 [ 387.999754][T22225] ? do_sys_open+0x2c9/0x5d0 [ 388.004369][T22225] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 388.009760][T22225] ? __alloc_fd+0x487/0x620 [ 388.014304][T22225] do_filp_open+0x1a1/0x280 [ 388.018822][T22225] ? may_open_dev+0x100/0x100 [ 388.023519][T22225] ? __kasan_check_read+0x11/0x20 [ 388.028547][T22225] ? do_raw_spin_unlock+0x57/0x270 [ 388.033664][T22225] ? _raw_spin_unlock+0x2d/0x50 [ 388.038520][T22225] ? __alloc_fd+0x487/0x620 [ 388.043042][T22225] do_sys_open+0x3fe/0x5d0 [ 388.047472][T22225] ? filp_open+0x80/0x80 [ 388.051727][T22225] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 388.057192][T22225] ? do_syscall_64+0x26/0x760 [ 388.061875][T22225] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 388.064342][ T8652] memory: usage 307200kB, limit 307200kB, failcnt 1189 [ 388.067940][T22225] ? do_syscall_64+0x26/0x760 11:43:03 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='//ev/usbmon#\x00', 0x0, 0x0) 11:43:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) [ 388.067971][T22225] __x64_sys_open+0x7e/0xc0 [ 388.074863][ T8652] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 388.079475][T22225] do_syscall_64+0xfa/0x760 [ 388.079498][T22225] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 388.079508][T22225] RIP: 0033:0x413761 [ 388.079526][T22225] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 388.084024][ T8652] Memory cgroup stats for /syz5: [ 388.084132][ T8652] anon 267841536 [ 388.084132][ T8652] file 0 [ 388.084132][ T8652] kernel_stack 6291456 [ 388.084132][ T8652] slab 12525568 [ 388.084132][ T8652] sock 0 [ 388.084132][ T8652] shmem 45056 [ 388.084132][ T8652] file_mapped 135168 [ 388.084132][ T8652] file_dirty 0 [ 388.084132][ T8652] file_writeback 0 [ 388.084132][ T8652] anon_thp 245366784 [ 388.084132][ T8652] inactive_anon 135168 [ 388.084132][ T8652] active_anon 267841536 [ 388.084132][ T8652] inactive_file 0 [ 388.084132][ T8652] active_file 0 [ 388.084132][ T8652] unevictable 0 [ 388.084132][ T8652] slab_reclaimable 2703360 [ 388.084132][ T8652] slab_unreclaimable 9822208 [ 388.084132][ T8652] pgfault 46728 [ 388.084132][ T8652] pgmajfault 0 [ 388.084132][ T8652] workingset_refault 66 [ 388.084132][ T8652] workingset_activate 0 [ 388.084132][ T8652] workingset_nodereclaim 0 [ 388.084132][ T8652] pgrefill 1170 [ 388.084132][ T8652] pgscan 1118 [ 388.084132][ T8652] pgsteal 219 [ 388.090813][T22225] RSP: 002b:00007f3fcc4c47a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 388.090827][T22225] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000413761 [ 388.090835][T22225] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f3fcc4c4850 [ 388.090844][T22225] RBP: 000000000075bf20 R08: 000000000000000f R09: 0000000000000000 [ 388.090852][T22225] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f3fcc4c56d4 [ 388.090864][T22225] R13: 00000000004c8e36 R14: 00000000004dfe20 R15: 0000000000000004 11:43:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x40000}}], 0x1, 0x0) [ 388.095343][ T8652] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=22204,uid=0 [ 388.171764][T22225] ERROR: Out of memory at tomoyo_realpath_from_path. [ 388.291213][ T8652] Memory cgroup out of memory: Killed process 22204 (syz-executor.5) total-vm:72708kB, anon-rss:2208kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 11:43:03 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x109, 0x0) 11:43:03 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/\\ev/usbmon#\x00', 0x0, 0x0) 11:43:03 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}], [], 0xff00000000000000}) [ 388.378134][T22253] overlayfs: unrecognized mount option "i\dex=off" or missing value [ 388.413816][T22256] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:03 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x400300}}], 0x1, 0x0) 11:43:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) [ 388.506812][ T8652] syz-executor.5 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=0 [ 388.632218][ T8652] CPU: 1 PID: 8652 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 388.641276][ T8652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 388.651332][ T8652] Call Trace: [ 388.654630][ T8652] dump_stack+0x172/0x1f0 [ 388.658969][ T8652] dump_header+0x177/0x1152 [ 388.663480][ T8652] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 388.669291][ T8652] ? ___ratelimit+0x2c8/0x595 [ 388.673961][ T8652] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 388.673980][ T8652] ? lockdep_hardirqs_on+0x418/0x5d0 [ 388.685212][ T8652] ? trace_hardirqs_on+0x67/0x240 [ 388.690241][ T8652] ? pagefault_out_of_memory+0x11c/0x11c [ 388.695880][ T8652] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 388.701701][ T8652] ? ___ratelimit+0x60/0x595 [ 388.706284][ T8652] ? do_raw_spin_unlock+0x57/0x270 [ 388.711399][ T8652] oom_kill_process.cold+0x10/0x15 [ 388.716528][ T8652] out_of_memory+0x334/0x1340 [ 388.721207][ T8652] ? lock_downgrade+0x920/0x920 [ 388.726064][ T8652] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 388.731964][ T8652] ? oom_killer_disable+0x280/0x280 [ 388.737186][ T8652] mem_cgroup_out_of_memory+0x1d8/0x240 [ 388.742737][ T8652] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 388.748383][ T8652] ? do_raw_spin_unlock+0x57/0x270 [ 388.753499][ T8652] ? _raw_spin_unlock+0x2d/0x50 [ 388.758360][ T8652] try_charge+0xf4b/0x1440 [ 388.762786][ T8652] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 388.768331][ T8652] ? find_held_lock+0x35/0x130 [ 388.773102][ T8652] ? get_mem_cgroup_from_mm+0x139/0x320 [ 388.778658][ T8652] ? lock_downgrade+0x920/0x920 [ 388.783512][ T8652] ? percpu_ref_tryget_live+0x111/0x290 [ 388.789067][ T8652] __memcg_kmem_charge_memcg+0x71/0xf0 [ 388.794526][ T8652] ? memcg_kmem_put_cache+0x50/0x50 [ 388.799733][ T8652] ? get_mem_cgroup_from_mm+0x156/0x320 [ 388.805293][ T8652] __memcg_kmem_charge+0x13a/0x3a0 [ 388.810411][ T8652] __alloc_pages_nodemask+0x4f7/0x900 [ 388.815789][ T8652] ? stack_trace_consume_entry+0x190/0x190 [ 388.821602][ T8652] ? __alloc_pages_slowpath+0x2540/0x2540 [ 388.827326][ T8652] ? copy_page_range+0xef4/0x1ed0 [ 388.832358][ T8652] ? copy_page_range+0xef4/0x1ed0 [ 388.837396][ T8652] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 388.843647][ T8652] alloc_pages_current+0x107/0x210 [ 388.848766][ T8652] pte_alloc_one+0x1b/0x1a0 [ 388.853269][ T8652] __pte_alloc+0x20/0x310 [ 388.857609][ T8652] copy_page_range+0x14da/0x1ed0 [ 388.862574][ T8652] ? pmd_alloc+0x180/0x180 [ 388.866991][ T8652] ? __rb_insert_augmented+0x20c/0xd90 [ 388.872453][ T8652] ? validate_mm_rb+0xa3/0xc0 [ 388.877139][ T8652] ? __vma_link_rb+0x5ad/0x770 [ 388.881922][ T8652] dup_mm+0xa67/0x1430 [ 388.886011][ T8652] ? vm_area_dup+0x170/0x170 [ 388.890602][ T8652] ? debug_mutex_init+0x2d/0x60 [ 388.895485][ T8652] copy_process+0x2671/0x6830 [ 388.900169][ T8652] ? __kasan_check_read+0x11/0x20 [ 388.905210][ T8652] ? __cleanup_sighand+0x60/0x60 [ 388.910157][ T8652] ? __might_fault+0x12b/0x1e0 [ 388.914936][ T8652] ? __might_fault+0x12b/0x1e0 [ 388.919705][ T8652] _do_fork+0x146/0xfa0 [ 388.923867][ T8652] ? copy_init_mm+0x20/0x20 [ 388.928382][ T8652] ? __kasan_check_read+0x11/0x20 [ 388.933409][ T8652] ? _copy_to_user+0x118/0x160 [ 388.938185][ T8652] __x64_sys_clone+0x1ab/0x270 [ 388.942953][ T8652] ? __ia32_sys_vfork+0xd0/0xd0 [ 388.947799][ T8652] ? do_syscall_64+0x26/0x760 [ 388.952481][ T8652] ? lockdep_hardirqs_on+0x418/0x5d0 [ 388.957766][ T8652] ? trace_hardirqs_on+0x67/0x240 [ 388.962800][ T8652] do_syscall_64+0xfa/0x760 [ 388.967318][ T8652] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 388.973212][ T8652] RIP: 0033:0x457e4a [ 388.977109][ T8652] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 388.996712][ T8652] RSP: 002b:00007fff9ff77040 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 389.005859][ T8652] RAX: ffffffffffffffda RBX: 00007fff9ff77040 RCX: 0000000000457e4a [ 389.013842][ T8652] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 389.022113][ T8652] RBP: 00007fff9ff77080 R08: 0000000000000001 R09: 00005555557c9940 11:43:03 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='Kdev/usbmon#\x00', 0x0, 0x0) 11:43:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}, 0x2}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:03 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x10a, 0x0) 11:43:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}, 0x4}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:04 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x10b, 0x0) 11:43:04 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/d%v/usbmon#\x00', 0x0, 0x0) 11:43:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x1000000}}], 0x1, 0x0) 11:43:04 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='\\dev/usbmon#\x00', 0x0, 0x0) [ 389.030207][ T8652] R10: 00005555557c9c10 R11: 0000000000000246 R12: 0000000000000001 [ 389.038185][ T8652] R13: 0000000000000000 R14: 0000000000000000 R15: 00007fff9ff770d0 [ 389.066448][ T8652] memory: usage 307200kB, limit 307200kB, failcnt 1203 [ 389.137442][ T8652] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 389.173218][ T8652] Memory cgroup stats for /syz5: [ 389.173322][ T8652] anon 267833344 [ 389.173322][ T8652] file 0 [ 389.173322][ T8652] kernel_stack 6291456 [ 389.173322][ T8652] slab 12525568 [ 389.173322][ T8652] sock 0 [ 389.173322][ T8652] shmem 45056 [ 389.173322][ T8652] file_mapped 135168 [ 389.173322][ T8652] file_dirty 0 [ 389.173322][ T8652] file_writeback 0 [ 389.173322][ T8652] anon_thp 245366784 [ 389.173322][ T8652] inactive_anon 135168 [ 389.173322][ T8652] active_anon 267833344 [ 389.173322][ T8652] inactive_file 0 [ 389.173322][ T8652] active_file 0 [ 389.173322][ T8652] unevictable 0 [ 389.173322][ T8652] slab_reclaimable 2703360 [ 389.173322][ T8652] slab_unreclaimable 9822208 [ 389.173322][ T8652] pgfault 46761 [ 389.173322][ T8652] pgmajfault 0 [ 389.173322][ T8652] workingset_refault 66 [ 389.173322][ T8652] workingset_activate 0 [ 389.173322][ T8652] workingset_nodereclaim 0 [ 389.173322][ T8652] pgrefill 1170 [ 389.173322][ T8652] pgscan 1118 [ 389.173322][ T8652] pgsteal 219 [ 389.438770][ T8652] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=22254,uid=0 [ 389.465760][ T8652] Memory cgroup out of memory: Killed process 22254 (syz-executor.5) total-vm:72708kB, anon-rss:2208kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 389.492409][T22295] syz-executor.3 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 389.508627][T22295] CPU: 0 PID: 22295 Comm: syz-executor.3 Not tainted 5.3.0-rc6-next-20190830 #75 [ 389.517762][T22295] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 389.527806][T22295] Call Trace: [ 389.531096][T22295] dump_stack+0x172/0x1f0 [ 389.535415][T22295] dump_header+0x177/0x1152 [ 389.539896][T22295] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 389.545677][T22295] ? ___ratelimit+0x2c8/0x595 [ 389.550341][T22295] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 389.556138][T22295] ? lockdep_hardirqs_on+0x418/0x5d0 [ 389.561418][T22295] ? trace_hardirqs_on+0x67/0x240 [ 389.566437][T22295] ? pagefault_out_of_memory+0x11c/0x11c [ 389.572068][T22295] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 389.577855][T22295] ? ___ratelimit+0x60/0x595 [ 389.582423][T22295] ? do_raw_spin_unlock+0x57/0x270 [ 389.587509][T22295] oom_kill_process.cold+0x10/0x15 [ 389.592602][T22295] out_of_memory+0x334/0x1340 [ 389.597256][T22295] ? lock_downgrade+0x920/0x920 [ 389.602086][T22295] ? oom_killer_disable+0x280/0x280 [ 389.607265][T22295] mem_cgroup_out_of_memory+0x1d8/0x240 [ 389.612787][T22295] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 389.618395][T22295] ? do_raw_spin_unlock+0x57/0x270 [ 389.623481][T22295] ? _raw_spin_unlock+0x2d/0x50 [ 389.628306][T22295] try_charge+0xf4b/0x1440 [ 389.632723][T22295] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 389.638243][T22295] ? find_held_lock+0x35/0x130 [ 389.642985][T22295] ? get_mem_cgroup_from_mm+0x139/0x320 [ 389.648511][T22295] ? lock_downgrade+0x920/0x920 [ 389.653342][T22295] ? percpu_ref_tryget_live+0x111/0x290 [ 389.658873][T22295] __memcg_kmem_charge_memcg+0x71/0xf0 [ 389.664307][T22295] ? memcg_kmem_put_cache+0x50/0x50 [ 389.669498][T22295] ? get_mem_cgroup_from_mm+0x156/0x320 [ 389.675035][T22295] __memcg_kmem_charge+0x13a/0x3a0 [ 389.680127][T22295] __alloc_pages_nodemask+0x4f7/0x900 [ 389.685474][T22295] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 389.690994][T22295] ? __alloc_pages_slowpath+0x2540/0x2540 [ 389.696689][T22295] ? percpu_ref_put_many+0xb6/0x190 [ 389.701866][T22295] ? lockdep_hardirqs_on+0x418/0x5d0 [ 389.707129][T22295] ? trace_hardirqs_on+0x67/0x240 [ 389.712146][T22295] ? __kasan_check_read+0x11/0x20 [ 389.717152][T22295] copy_process+0x3f8/0x6830 [ 389.721716][T22295] ? __handle_mm_fault+0x21bf/0x3f20 [ 389.726975][T22295] ? find_held_lock+0x35/0x130 [ 389.731715][T22295] ? __handle_mm_fault+0x21bf/0x3f20 [ 389.736981][T22295] ? __cleanup_sighand+0x60/0x60 [ 389.741890][T22295] ? set_pte_at+0xcc/0x130 [ 389.746278][T22295] ? pud_val+0x100/0x100 [ 389.750510][T22295] ? __do_page_fault+0x56a/0xdd0 [ 389.755462][T22295] _do_fork+0x146/0xfa0 [ 389.759602][T22295] ? copy_init_mm+0x20/0x20 [ 389.764080][T22295] ? lock_downgrade+0x920/0x920 [ 389.768925][T22295] ? __kasan_check_write+0x14/0x20 [ 389.774022][T22295] __x64_sys_clone+0x1ab/0x270 [ 389.778761][T22295] ? down_read_non_owner+0x490/0x490 [ 389.784225][T22295] ? __ia32_sys_vfork+0xd0/0xd0 [ 389.789066][T22295] ? handle_mm_fault+0x1d3/0x6c0 [ 389.793991][T22295] ? do_syscall_64+0x26/0x760 [ 389.798660][T22295] ? lockdep_hardirqs_on+0x418/0x5d0 [ 389.803944][T22295] ? trace_hardirqs_on+0x67/0x240 [ 389.808956][T22295] do_syscall_64+0xfa/0x760 [ 389.813449][T22295] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 389.819334][T22295] RIP: 0033:0x45c249 [ 389.823236][T22295] Code: ff 48 85 f6 0f 84 27 8e fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c fe 8d fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 389.842814][T22295] RSP: 002b:00007ffc54f1a778 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 389.851202][T22295] RAX: ffffffffffffffda RBX: 00007fbbf4933700 RCX: 000000000045c249 [ 389.859150][T22295] RDX: 00007fbbf49339d0 RSI: 00007fbbf4932db0 RDI: 00000000003d0f00 [ 389.867097][T22295] RBP: 00007ffc54f1a990 R08: 00007fbbf4933700 R09: 00007fbbf4933700 [ 389.875047][T22295] R10: 00007fbbf49339d0 R11: 0000000000000202 R12: 0000000000000000 [ 389.883012][T22295] R13: 00007ffc54f1a82f R14: 00007fbbf49339c0 R15: 000000000075bfd4 [ 389.891943][T22295] memory: usage 307172kB, limit 307200kB, failcnt 412 [ 389.898826][T22295] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 389.905664][T22295] Memory cgroup stats for /syz3: [ 389.905742][T22295] anon 275357696 [ 389.905742][T22295] file 32768 [ 389.905742][T22295] kernel_stack 6946816 [ 389.905742][T22295] slab 11128832 [ 389.905742][T22295] sock 0 [ 389.905742][T22295] shmem 0 [ 389.905742][T22295] file_mapped 0 [ 389.905742][T22295] file_dirty 0 [ 389.905742][T22295] file_writeback 0 [ 389.905742][T22295] anon_thp 257949696 [ 389.905742][T22295] inactive_anon 0 [ 389.905742][T22295] active_anon 275357696 [ 389.905742][T22295] inactive_file 135168 [ 389.905742][T22295] active_file 0 [ 389.905742][T22295] unevictable 0 [ 389.905742][T22295] slab_reclaimable 2162688 [ 389.905742][T22295] slab_unreclaimable 8966144 [ 389.905742][T22295] pgfault 31053 [ 389.905742][T22295] pgmajfault 0 [ 389.905742][T22295] workingset_refault 33 [ 389.905742][T22295] workingset_activate 0 [ 389.905742][T22295] workingset_nodereclaim 0 [ 389.905742][T22295] pgrefill 344 [ 389.905742][T22295] pgscan 358 [ 389.905742][T22295] pgsteal 157 [ 389.905742][T22295] pgactivate 198 [ 390.002576][T22295] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=17715,uid=0 [ 390.018113][T22295] Memory cgroup out of memory: Killed process 17715 (syz-executor.3) total-vm:72972kB, anon-rss:2224kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 390.038376][T22307] syz-executor.5 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 390.050894][T22307] CPU: 1 PID: 22307 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 390.060014][T22307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 390.070076][T22307] Call Trace: [ 390.073373][T22307] dump_stack+0x172/0x1f0 [ 390.077714][T22307] dump_header+0x177/0x1152 [ 390.082231][T22307] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 390.088031][T22307] ? ___ratelimit+0x2c8/0x595 [ 390.088053][T22307] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 390.098496][T22307] ? lockdep_hardirqs_on+0x418/0x5d0 [ 390.098517][T22307] ? trace_hardirqs_on+0x67/0x240 [ 390.108801][T22307] ? pagefault_out_of_memory+0x11c/0x11c [ 390.114441][T22307] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 390.120253][T22307] ? ___ratelimit+0x60/0x595 [ 390.124847][T22307] ? do_raw_spin_unlock+0x57/0x270 [ 390.129965][T22307] oom_kill_process.cold+0x10/0x15 [ 390.135079][T22307] out_of_memory+0x334/0x1340 [ 390.139736][T22307] ? lock_downgrade+0x920/0x920 [ 390.144569][T22307] ? oom_killer_disable+0x280/0x280 [ 390.149750][T22307] mem_cgroup_out_of_memory+0x1d8/0x240 [ 390.155272][T22307] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 390.160885][T22307] ? do_raw_spin_unlock+0x57/0x270 [ 390.165979][T22307] ? _raw_spin_unlock+0x2d/0x50 [ 390.170809][T22307] try_charge+0xf4b/0x1440 [ 390.175210][T22307] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 390.180734][T22307] ? find_held_lock+0x35/0x130 [ 390.185476][T22307] ? get_mem_cgroup_from_mm+0x139/0x320 [ 390.191025][T22307] ? lock_downgrade+0x920/0x920 [ 390.195864][T22307] ? percpu_ref_tryget_live+0x111/0x290 [ 390.201387][T22307] __memcg_kmem_charge_memcg+0x71/0xf0 [ 390.206833][T22307] ? memcg_kmem_put_cache+0x50/0x50 [ 390.212024][T22307] ? get_mem_cgroup_from_mm+0x156/0x320 [ 390.217559][T22307] __memcg_kmem_charge+0x13a/0x3a0 [ 390.222658][T22307] __alloc_pages_nodemask+0x4f7/0x900 [ 390.228008][T22307] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 390.233533][T22307] ? __alloc_pages_slowpath+0x2540/0x2540 [ 390.239227][T22307] ? percpu_ref_put_many+0xb6/0x190 [ 390.244430][T22307] copy_process+0x3f8/0x6830 [ 390.249007][T22307] ? do_sys_open+0x318/0x5d0 [ 390.253576][T22307] ? __kasan_check_read+0x11/0x20 [ 390.258573][T22307] ? __lock_acquire+0x16f2/0x4a00 [ 390.263577][T22307] ? __cleanup_sighand+0x60/0x60 [ 390.268490][T22307] ? __might_fault+0x12b/0x1e0 [ 390.273231][T22307] ? __might_fault+0x12b/0x1e0 [ 390.278028][T22307] _do_fork+0x146/0xfa0 [ 390.282173][T22307] ? copy_init_mm+0x20/0x20 [ 390.286659][T22307] ? __kasan_check_read+0x11/0x20 [ 390.291658][T22307] ? _copy_to_user+0x118/0x160 [ 390.296402][T22307] __x64_sys_clone+0x1ab/0x270 [ 390.301146][T22307] ? __ia32_sys_vfork+0xd0/0xd0 [ 390.306004][T22307] ? do_syscall_64+0x26/0x760 [ 390.310672][T22307] ? lockdep_hardirqs_on+0x418/0x5d0 [ 390.315937][T22307] ? trace_hardirqs_on+0x67/0x240 [ 390.320944][T22307] do_syscall_64+0xfa/0x760 [ 390.325433][T22307] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 390.331306][T22307] RIP: 0033:0x459879 [ 390.335193][T22307] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 390.354792][T22307] RSP: 002b:00007fd520517c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 390.363209][T22307] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000459879 [ 390.371162][T22307] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 00000200000007fd [ 390.379111][T22307] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 390.387058][T22307] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5205186d4 [ 390.395006][T22307] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 00000000ffffffff [ 390.404125][T22307] memory: usage 307108kB, limit 307200kB, failcnt 1222 [ 390.411191][T22307] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 390.418028][T22307] Memory cgroup stats for /syz5: [ 390.418148][T22307] anon 267968512 [ 390.418148][T22307] file 0 [ 390.418148][T22307] kernel_stack 6356992 [ 390.418148][T22307] slab 12525568 [ 390.418148][T22307] sock 0 [ 390.418148][T22307] shmem 45056 [ 390.418148][T22307] file_mapped 135168 [ 390.418148][T22307] file_dirty 0 [ 390.418148][T22307] file_writeback 0 [ 390.418148][T22307] anon_thp 245366784 [ 390.418148][T22307] inactive_anon 135168 [ 390.418148][T22307] active_anon 267968512 [ 390.418148][T22307] inactive_file 0 [ 390.418148][T22307] active_file 0 [ 390.418148][T22307] unevictable 0 [ 390.418148][T22307] slab_reclaimable 2703360 [ 390.418148][T22307] slab_unreclaimable 9822208 [ 390.418148][T22307] pgfault 46827 [ 390.418148][T22307] pgmajfault 0 [ 390.418148][T22307] workingset_refault 66 [ 390.418148][T22307] workingset_activate 0 [ 390.418148][T22307] workingset_nodereclaim 0 [ 390.418148][T22307] pgrefill 1170 [ 390.418148][T22307] pgscan 1118 [ 390.418148][T22307] pgsteal 219 [ 390.511641][T22307] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=22187,uid=0 [ 390.527131][T22307] Memory cgroup out of memory: Killed process 22187 (syz-executor.5) total-vm:72708kB, anon-rss:2208kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 390.546202][ T1065] oom_reaper: reaped process 22187 (syz-executor.5), now anon-rss:0kB, file-rss:34832kB, shmem-rss:0kB [ 390.548539][T22306] syz-executor.5 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 390.570208][T22306] CPU: 0 PID: 22306 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 390.579318][T22306] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 390.589357][T22306] Call Trace: [ 390.592630][T22306] dump_stack+0x172/0x1f0 [ 390.596938][T22306] dump_header+0x177/0x1152 [ 390.601431][T22306] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 390.607219][T22306] ? ___ratelimit+0x2c8/0x595 [ 390.611872][T22306] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 390.617654][T22306] ? lockdep_hardirqs_on+0x418/0x5d0 [ 390.622924][T22306] ? trace_hardirqs_on+0x67/0x240 [ 390.627937][T22306] ? pagefault_out_of_memory+0x11c/0x11c [ 390.633546][T22306] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 390.639336][T22306] ? ___ratelimit+0x60/0x595 [ 390.643921][T22306] ? do_raw_spin_unlock+0x57/0x270 [ 390.649023][T22306] oom_kill_process.cold+0x10/0x15 [ 390.654115][T22306] out_of_memory+0x334/0x1340 [ 390.658777][T22306] ? lock_downgrade+0x920/0x920 [ 390.663630][T22306] ? oom_killer_disable+0x280/0x280 [ 390.668835][T22306] mem_cgroup_out_of_memory+0x1d8/0x240 [ 390.674368][T22306] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 390.679994][T22306] ? do_raw_spin_unlock+0x57/0x270 [ 390.685091][T22306] ? _raw_spin_unlock+0x2d/0x50 [ 390.689919][T22306] try_charge+0xa2d/0x1440 [ 390.694320][T22306] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 390.699849][T22306] ? find_held_lock+0x35/0x130 [ 390.704597][T22306] ? get_mem_cgroup_from_mm+0x139/0x320 [ 390.710122][T22306] ? lock_downgrade+0x920/0x920 [ 390.714948][T22306] ? percpu_ref_tryget_live+0x111/0x290 [ 390.720484][T22306] __memcg_kmem_charge_memcg+0x71/0xf0 [ 390.725927][T22306] ? memcg_kmem_put_cache+0x50/0x50 [ 390.731104][T22306] ? get_mem_cgroup_from_mm+0x156/0x320 [ 390.736626][T22306] __memcg_kmem_charge+0x13a/0x3a0 [ 390.741725][T22306] __alloc_pages_nodemask+0x4f7/0x900 [ 390.747084][T22306] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 390.752610][T22306] ? __alloc_pages_slowpath+0x2540/0x2540 [ 390.758304][T22306] ? percpu_ref_put_many+0xb6/0x190 [ 390.763492][T22306] ? lockdep_hardirqs_on+0x418/0x5d0 [ 390.768762][T22306] ? trace_hardirqs_on+0x67/0x240 [ 390.773772][T22306] ? __kasan_check_read+0x11/0x20 [ 390.778796][T22306] copy_process+0x3f8/0x6830 [ 390.783380][T22306] ? psi_memstall_leave+0x12e/0x180 [ 390.788570][T22306] ? __cleanup_sighand+0x60/0x60 [ 390.793486][T22306] ? __kasan_check_read+0x11/0x20 [ 390.798484][T22306] ? __lock_acquire+0x8a0/0x4a00 [ 390.803407][T22306] ? _raw_spin_unlock_irq+0x5e/0x90 [ 390.808605][T22306] _do_fork+0x146/0xfa0 [ 390.812785][T22306] ? copy_init_mm+0x20/0x20 [ 390.817271][T22306] ? lock_downgrade+0x920/0x920 [ 390.822113][T22306] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 390.828342][T22306] __x64_sys_clone+0x1ab/0x270 [ 390.833083][T22306] ? __ia32_sys_vfork+0xd0/0xd0 [ 390.837908][T22306] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 390.844143][T22306] ? do_syscall_64+0x26/0x760 [ 390.848808][T22306] ? lockdep_hardirqs_on+0x418/0x5d0 [ 390.854067][T22306] ? trace_hardirqs_on+0x67/0x240 [ 390.859082][T22306] do_syscall_64+0xfa/0x760 [ 390.863589][T22306] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 390.869466][T22306] RIP: 0033:0x45c249 [ 390.873338][T22306] Code: ff 48 85 f6 0f 84 27 8e fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c fe 8d fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 390.892924][T22306] RSP: 002b:00007fff9ff76da8 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 390.901497][T22306] RAX: ffffffffffffffda RBX: 00007fd5204f7700 RCX: 000000000045c249 [ 390.909457][T22306] RDX: 00007fd5204f79d0 RSI: 00007fd5204f6db0 RDI: 00000000003d0f00 [ 390.917409][T22306] RBP: 00007fff9ff76fc0 R08: 00007fd5204f7700 R09: 00007fd5204f7700 [ 390.925356][T22306] R10: 00007fd5204f79d0 R11: 0000000000000202 R12: 0000000000000000 [ 390.933478][T22306] R13: 00007fff9ff76e5f R14: 00007fd5204f79c0 R15: 000000000075bfd4 [ 390.942148][T22306] memory: usage 304776kB, limit 307200kB, failcnt 1222 [ 390.949063][T22306] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 390.955896][T22306] Memory cgroup stats for /syz5: [ 390.955994][T22306] anon 265768960 [ 390.955994][T22306] file 0 [ 390.955994][T22306] kernel_stack 6291456 [ 390.955994][T22306] slab 12525568 [ 390.955994][T22306] sock 0 [ 390.955994][T22306] shmem 45056 [ 390.955994][T22306] file_mapped 135168 [ 390.955994][T22306] file_dirty 0 [ 390.955994][T22306] file_writeback 0 [ 390.955994][T22306] anon_thp 243269632 [ 390.955994][T22306] inactive_anon 135168 [ 390.955994][T22306] active_anon 265768960 [ 390.955994][T22306] inactive_file 0 [ 390.955994][T22306] active_file 0 [ 390.955994][T22306] unevictable 0 [ 390.955994][T22306] slab_reclaimable 2703360 [ 390.955994][T22306] slab_unreclaimable 9822208 [ 390.955994][T22306] pgfault 46827 [ 390.955994][T22306] pgmajfault 0 [ 390.955994][T22306] workingset_refault 66 [ 390.955994][T22306] workingset_activate 0 [ 390.955994][T22306] workingset_nodereclaim 0 [ 390.955994][T22306] pgrefill 1170 [ 390.955994][T22306] pgscan 1118 [ 390.955994][T22306] pgsteal 219 [ 391.050042][T22306] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=16256,uid=0 [ 391.065546][T22306] Memory cgroup out of memory: Killed process 16256 (syz-executor.5) total-vm:72708kB, anon-rss:2208kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 391.084635][ T1065] oom_reaper: reaped process 16256 (syz-executor.5), now anon-rss:0kB, file-rss:34832kB, shmem-rss:0kB 11:43:06 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}], [], 0xffffff7f00000000}) 11:43:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}, 0xf}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x2000000}}], 0x1, 0x0) 11:43:06 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x10c, 0x0) 11:43:06 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/.ev/usbmon#\x00', 0x0, 0x0) 11:43:06 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/d\\v/usbmon#\x00', 0x0, 0x0) [ 391.090751][T22311] overlayfs: unrecognized mount option "i\dex=off" or missing value [ 391.114044][T22311] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:06 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='//ev/usbmon#\x00', 0x0, 0x0) 11:43:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}, 0x5d}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:06 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x10d, 0x0) 11:43:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x3000000}}], 0x1, 0x0) 11:43:06 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}]}) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x40, 0x2) 11:43:06 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/de\\/usbmon#\x00', 0x0, 0x0) [ 391.240558][T22329] overlayfs: unrecognized mount option "i\dex=off" or missing value [ 391.273133][T22331] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}, 0xf00}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:06 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/\\ev/usbmon#\x00', 0x0, 0x0) 11:43:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x4000000}}], 0x1, 0x0) 11:43:06 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/devKusbmon#\x00', 0x0, 0x0) 11:43:06 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x10e, 0x0) [ 391.527817][T22356] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}, 0x4000}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) [ 391.606320][T22364] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x5000000}}], 0x1, 0x0) 11:43:06 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/d%v/usbmon#\x00', 0x0, 0x0) 11:43:06 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f0000000180)={0xa0, 0x797f777f, 0xfb, 0x0, 0x2, @stepwise={{0x9}, {0x6, 0x4}, {0x2e25aac5, 0x8e4}}}) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="695c6465783d6f66662c001d989063125dd235b05303ac62b84b3b8fee1716377b84132302ada955b194ff68ec7fa331dac46ad8a036c12a16878c5483979e205005"]) ioctl$PPPIOCCONNECT(r1, 0x4004743a, &(0x7f0000000000)=0x1) 11:43:06 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev\\usbmon#\x00', 0x0, 0x0) 11:43:06 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x10f, 0x0) 11:43:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x6000000}}], 0x1, 0x0) 11:43:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}, 0x5d00}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:07 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/d\\v/usbmon#\x00', 0x0, 0x0) [ 391.901442][T22390] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:07 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/.sbmon#\x00', 0x0, 0x0) 11:43:07 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="695c64a76a32011af55c5fa806bd1d5a0665d1bf409f9113a86c59dc2cfa783d6f66662c00"]) 11:43:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x7000000}}], 0x1, 0x0) [ 392.023017][T22394] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}, 0x40000}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:07 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/de\\/usbmon#\x00', 0x0, 0x0) 11:43:07 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x110, 0x0) 11:43:07 executing program 5: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}]}) write$9p(r0, &(0x7f0000000000)="c2f32b13d9ffae9a7d162006ac918044bb0462fc278c787f334a462d6e7aad96a77c401d8dbbab3523cac1d30932a8092f7d00bd", 0x34) 11:43:07 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev//sbmon#\x00', 0x0, 0x0) 11:43:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x8000000}}], 0x1, 0x0) 11:43:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}, 0x1000000}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) [ 392.356988][ T8652] syz-executor.5 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=0 [ 392.420791][ T8652] CPU: 0 PID: 8652 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 392.429847][ T8652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 392.439899][ T8652] Call Trace: [ 392.443194][ T8652] dump_stack+0x172/0x1f0 [ 392.447527][ T8652] dump_header+0x177/0x1152 [ 392.452034][ T8652] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 392.457838][ T8652] ? ___ratelimit+0x2c8/0x595 [ 392.462511][ T8652] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 392.468301][ T8652] ? lockdep_hardirqs_on+0x418/0x5d0 [ 392.473565][ T8652] ? trace_hardirqs_on+0x67/0x240 [ 392.478570][ T8652] ? pagefault_out_of_memory+0x11c/0x11c [ 392.484187][ T8652] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 392.489972][ T8652] ? ___ratelimit+0x60/0x595 [ 392.494541][ T8652] ? do_raw_spin_unlock+0x57/0x270 [ 392.499633][ T8652] oom_kill_process.cold+0x10/0x15 [ 392.504728][ T8652] out_of_memory+0x334/0x1340 [ 392.509386][ T8652] ? lock_downgrade+0x920/0x920 [ 392.514220][ T8652] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 392.520007][ T8652] ? oom_killer_disable+0x280/0x280 [ 392.525195][ T8652] mem_cgroup_out_of_memory+0x1d8/0x240 [ 392.530723][ T8652] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 392.536345][ T8652] ? do_raw_spin_unlock+0x57/0x270 [ 392.541438][ T8652] ? _raw_spin_unlock+0x2d/0x50 [ 392.546284][ T8652] try_charge+0xf4b/0x1440 [ 392.550689][ T8652] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 392.556213][ T8652] ? find_held_lock+0x35/0x130 [ 392.560957][ T8652] ? get_mem_cgroup_from_mm+0x139/0x320 [ 392.566484][ T8652] ? lock_downgrade+0x920/0x920 [ 392.571311][ T8652] ? percpu_ref_tryget_live+0x111/0x290 [ 392.576838][ T8652] __memcg_kmem_charge_memcg+0x71/0xf0 [ 392.582275][ T8652] ? memcg_kmem_put_cache+0x50/0x50 [ 392.587455][ T8652] ? get_mem_cgroup_from_mm+0x156/0x320 [ 392.592984][ T8652] __memcg_kmem_charge+0x13a/0x3a0 [ 392.598089][ T8652] __alloc_pages_nodemask+0x4f7/0x900 [ 392.603443][ T8652] ? stack_trace_consume_entry+0x190/0x190 [ 392.609227][ T8652] ? __alloc_pages_slowpath+0x2540/0x2540 [ 392.614924][ T8652] ? copy_page_range+0xef4/0x1ed0 [ 392.619932][ T8652] ? copy_page_range+0xef4/0x1ed0 [ 392.624937][ T8652] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 392.631160][ T8652] alloc_pages_current+0x107/0x210 [ 392.636255][ T8652] pte_alloc_one+0x1b/0x1a0 [ 392.640736][ T8652] __pte_alloc+0x20/0x310 [ 392.645048][ T8652] copy_page_range+0x14da/0x1ed0 [ 392.649983][ T8652] ? pmd_alloc+0x180/0x180 [ 392.654378][ T8652] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 392.660076][ T8652] ? vma_compute_subtree_gap+0x158/0x230 [ 392.665716][ T8652] ? validate_mm_rb+0xa3/0xc0 [ 392.670376][ T8652] ? __vma_link_rb+0x5ad/0x770 [ 392.675123][ T8652] dup_mm+0xa67/0x1430 [ 392.679187][ T8652] ? vm_area_dup+0x170/0x170 [ 392.683773][ T8652] ? debug_mutex_init+0x2d/0x60 [ 392.688609][ T8652] copy_process+0x2671/0x6830 [ 392.693265][ T8652] ? __kasan_check_read+0x11/0x20 [ 392.698287][ T8652] ? __cleanup_sighand+0x60/0x60 [ 392.703215][ T8652] ? __might_fault+0x12b/0x1e0 [ 392.707958][ T8652] ? __might_fault+0x12b/0x1e0 [ 392.712709][ T8652] _do_fork+0x146/0xfa0 [ 392.716848][ T8652] ? copy_init_mm+0x20/0x20 [ 392.721334][ T8652] ? __kasan_check_read+0x11/0x20 [ 392.726339][ T8652] ? _copy_to_user+0x118/0x160 [ 392.731089][ T8652] __x64_sys_clone+0x1ab/0x270 [ 392.735835][ T8652] ? __ia32_sys_vfork+0xd0/0xd0 [ 392.740673][ T8652] ? do_syscall_64+0x26/0x760 [ 392.745328][ T8652] ? lockdep_hardirqs_on+0x418/0x5d0 [ 392.750591][ T8652] ? trace_hardirqs_on+0x67/0x240 [ 392.755602][ T8652] do_syscall_64+0xfa/0x760 [ 392.760089][ T8652] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 392.765957][ T8652] RIP: 0033:0x457e4a [ 392.769832][ T8652] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 392.789414][ T8652] RSP: 002b:00007fff9ff77040 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 392.797802][ T8652] RAX: ffffffffffffffda RBX: 00007fff9ff77040 RCX: 0000000000457e4a [ 392.805752][ T8652] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 392.813705][ T8652] RBP: 00007fff9ff77080 R08: 0000000000000001 R09: 00005555557c9940 11:43:07 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/devKusbmon#\x00', 0x0, 0x0) 11:43:07 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/\\sbmon#\x00', 0x0, 0x0) [ 392.821657][ T8652] R10: 00005555557c9c10 R11: 0000000000000246 R12: 0000000000000001 [ 392.829607][ T8652] R13: 0000000000000000 R14: 0000000000000000 R15: 00007fff9ff770d0 [ 392.860560][ T8652] memory: usage 307200kB, limit 307200kB, failcnt 1264 [ 392.867440][ T8652] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 392.867452][ T8652] Memory cgroup stats for /syz5: [ 392.867559][ T8652] anon 267919360 [ 392.867559][ T8652] file 0 [ 392.867559][ T8652] kernel_stack 6356992 [ 392.867559][ T8652] slab 12525568 [ 392.867559][ T8652] sock 0 [ 392.867559][ T8652] shmem 45056 [ 392.867559][ T8652] file_mapped 135168 [ 392.867559][ T8652] file_dirty 0 [ 392.867559][ T8652] file_writeback 0 [ 392.867559][ T8652] anon_thp 245366784 [ 392.867559][ T8652] inactive_anon 135168 [ 392.867559][ T8652] active_anon 267919360 11:43:08 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x111, 0x0) 11:43:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}, 0x2000000}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x9000000}}], 0x1, 0x0) [ 392.867559][ T8652] inactive_file 0 [ 392.867559][ T8652] active_file 0 [ 392.867559][ T8652] unevictable 0 [ 392.867559][ T8652] slab_reclaimable 2703360 [ 392.867559][ T8652] slab_unreclaimable 9822208 [ 392.867559][ T8652] pgfault 47091 [ 392.867559][ T8652] pgmajfault 0 [ 392.867559][ T8652] workingset_refault 66 [ 392.867559][ T8652] workingset_activate 0 [ 392.867559][ T8652] workingset_nodereclaim 0 [ 392.867559][ T8652] pgrefill 1170 [ 392.867559][ T8652] pgscan 1118 [ 392.867559][ T8652] pgsteal 219 11:43:08 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev\\usbmon#\x00', 0x0, 0x0) 11:43:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}, 0xf000000}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:08 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/u#bmon#\x00', 0x0, 0x0) [ 393.115061][ T8652] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=22393,uid=0 [ 393.142479][ T8652] Memory cgroup out of memory: Killed process 22393 (syz-executor.5) total-vm:72708kB, anon-rss:2208kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 393.172722][ T1065] oom_reaper: reaped process 22393 (syz-executor.5), now anon-rss:0kB, file-rss:34832kB, shmem-rss:0kB 11:43:08 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200200007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)) 11:43:08 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x112, 0x0) 11:43:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0xa000000}}], 0x1, 0x0) 11:43:08 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/.sbmon#\x00', 0x0, 0x0) 11:43:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}, 0x40000000}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:08 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/u%bmon#\x00', 0x0, 0x0) [ 393.377657][T22476] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:08 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev//sbmon#\x00', 0x0, 0x0) [ 393.447557][ T8652] syz-executor.5 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=0 11:43:08 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/u*bmon#\x00', 0x0, 0x0) 11:43:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0xe000000}}], 0x1, 0x0) 11:43:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}, 0x5d000000}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:08 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x113, 0x0) [ 393.537933][ T8652] CPU: 1 PID: 8652 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 393.546987][ T8652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 393.557045][ T8652] Call Trace: [ 393.560345][ T8652] dump_stack+0x172/0x1f0 [ 393.564685][ T8652] dump_header+0x177/0x1152 [ 393.569193][ T8652] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 393.575000][ T8652] ? ___ratelimit+0x2c8/0x595 [ 393.579686][ T8652] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 393.585499][ T8652] ? lockdep_hardirqs_on+0x418/0x5d0 [ 393.590788][ T8652] ? trace_hardirqs_on+0x67/0x240 [ 393.595817][ T8652] ? pagefault_out_of_memory+0x11c/0x11c [ 393.601457][ T8652] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 393.607272][ T8652] ? ___ratelimit+0x60/0x595 [ 393.611864][ T8652] ? do_raw_spin_unlock+0x57/0x270 [ 393.616988][ T8652] oom_kill_process.cold+0x10/0x15 [ 393.622106][ T8652] out_of_memory+0x334/0x1340 [ 393.626790][ T8652] ? lock_downgrade+0x920/0x920 [ 393.631650][ T8652] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 11:43:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}, 0x7fffeedf}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) [ 393.637470][ T8652] ? oom_killer_disable+0x280/0x280 [ 393.642685][ T8652] mem_cgroup_out_of_memory+0x1d8/0x240 [ 393.648237][ T8652] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 393.653874][ T8652] ? do_raw_spin_unlock+0x57/0x270 [ 393.658988][ T8652] ? _raw_spin_unlock+0x2d/0x50 [ 393.663849][ T8652] try_charge+0xf4b/0x1440 [ 393.668284][ T8652] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 393.673836][ T8652] ? find_held_lock+0x35/0x130 [ 393.678613][ T8652] ? get_mem_cgroup_from_mm+0x139/0x320 [ 393.684171][ T8652] ? lock_downgrade+0x920/0x920 [ 393.689028][ T8652] ? percpu_ref_tryget_live+0x111/0x290 [ 393.694591][ T8652] __memcg_kmem_charge_memcg+0x71/0xf0 [ 393.700071][ T8652] ? memcg_kmem_put_cache+0x50/0x50 [ 393.705285][ T8652] ? get_mem_cgroup_from_mm+0x156/0x320 [ 393.710845][ T8652] __memcg_kmem_charge+0x13a/0x3a0 [ 393.715968][ T8652] __alloc_pages_nodemask+0x4f7/0x900 [ 393.721345][ T8652] ? stack_trace_consume_entry+0x190/0x190 [ 393.727149][ T8652] ? __alloc_pages_slowpath+0x2540/0x2540 [ 393.732856][ T8652] ? copy_page_range+0xef4/0x1ed0 [ 393.732873][ T8652] ? copy_page_range+0xef4/0x1ed0 [ 393.732892][ T8652] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 393.732910][ T8652] alloc_pages_current+0x107/0x210 [ 393.732924][ T8652] pte_alloc_one+0x1b/0x1a0 [ 393.732941][ T8652] __pte_alloc+0x20/0x310 [ 393.749177][ T8652] copy_page_range+0x14da/0x1ed0 [ 393.749217][ T8652] ? pmd_alloc+0x180/0x180 [ 393.749233][ T8652] ? __rb_insert_augmented+0x20c/0xd90 [ 393.749251][ T8652] ? validate_mm_rb+0xa3/0xc0 [ 393.758830][ T8652] ? __vma_link_rb+0x5ad/0x770 [ 393.758853][ T8652] dup_mm+0xa67/0x1430 [ 393.758884][ T8652] ? vm_area_dup+0x170/0x170 [ 393.768110][ T8652] ? debug_mutex_init+0x2d/0x60 [ 393.768133][ T8652] copy_process+0x2671/0x6830 [ 393.768153][ T8652] ? __kasan_check_read+0x11/0x20 [ 393.777988][ T8652] ? __cleanup_sighand+0x60/0x60 [ 393.778004][ T8652] ? __might_fault+0x12b/0x1e0 [ 393.778019][ T8652] ? __might_fault+0x12b/0x1e0 [ 393.778042][ T8652] _do_fork+0x146/0xfa0 [ 393.829111][ T8652] ? copy_init_mm+0x20/0x20 [ 393.833630][ T8652] ? __kasan_check_read+0x11/0x20 [ 393.838655][ T8652] ? _copy_to_user+0x118/0x160 [ 393.843430][ T8652] __x64_sys_clone+0x1ab/0x270 [ 393.848199][ T8652] ? __ia32_sys_vfork+0xd0/0xd0 [ 393.853065][ T8652] ? do_syscall_64+0x26/0x760 [ 393.857745][ T8652] ? lockdep_hardirqs_on+0x418/0x5d0 [ 393.863037][ T8652] ? trace_hardirqs_on+0x67/0x240 [ 393.868070][ T8652] do_syscall_64+0xfa/0x760 [ 393.872583][ T8652] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 393.878474][ T8652] RIP: 0033:0x457e4a [ 393.882368][ T8652] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 393.901969][ T8652] RSP: 002b:00007fff9ff77040 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 393.910387][ T8652] RAX: ffffffffffffffda RBX: 00007fff9ff77040 RCX: 0000000000457e4a [ 393.918364][ T8652] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 393.926341][ T8652] RBP: 00007fff9ff77080 R08: 0000000000000001 R09: 00005555557c9940 [ 393.934312][ T8652] R10: 00005555557c9c10 R11: 0000000000000246 R12: 0000000000000001 [ 393.942275][ T8652] R13: 0000000000000000 R14: 0000000000000000 R15: 00007fff9ff770d0 [ 393.964658][ T8652] memory: usage 307200kB, limit 307200kB, failcnt 1299 [ 393.973297][ T8652] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 393.980657][ T8652] Memory cgroup stats for /syz5: [ 393.980752][ T8652] anon 267890688 [ 393.980752][ T8652] file 0 [ 393.980752][ T8652] kernel_stack 6291456 [ 393.980752][ T8652] slab 12525568 [ 393.980752][ T8652] sock 0 [ 393.980752][ T8652] shmem 45056 [ 393.980752][ T8652] file_mapped 135168 [ 393.980752][ T8652] file_dirty 0 [ 393.980752][ T8652] file_writeback 0 [ 393.980752][ T8652] anon_thp 245366784 [ 393.980752][ T8652] inactive_anon 135168 [ 393.980752][ T8652] active_anon 267890688 [ 393.980752][ T8652] inactive_file 0 [ 393.980752][ T8652] active_file 0 [ 393.980752][ T8652] unevictable 0 [ 393.980752][ T8652] slab_reclaimable 2703360 [ 393.980752][ T8652] slab_unreclaimable 9822208 [ 393.980752][ T8652] pgfault 47157 [ 393.980752][ T8652] pgmajfault 0 [ 393.980752][ T8652] workingset_refault 66 [ 393.980752][ T8652] workingset_activate 0 [ 393.980752][ T8652] workingset_nodereclaim 0 [ 393.980752][ T8652] pgrefill 1170 [ 393.980752][ T8652] pgscan 1118 [ 393.980752][ T8652] pgsteal 219 [ 394.080243][ T8652] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=22477,uid=0 [ 394.095902][ T8652] Memory cgroup out of memory: Killed process 22477 (syz-executor.5) total-vm:72708kB, anon-rss:2208kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 11:43:09 executing program 5: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000000)={0x0, 0xffffffffffff7fff}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000080)={r1, 0x3}, &(0x7f0000000180)=0x8) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f00000001c0)={0x3, 0x0, 0x10001, 0x6}) ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, &(0x7f0000000200)={0x6, r2}) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}]}) 11:43:09 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x114, 0x0) 11:43:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}, 0x7fffeeee}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:09 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/\\sbmon#\x00', 0x0, 0x0) 11:43:09 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/u+bmon#\x00', 0x0, 0x0) 11:43:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x11000000}}], 0x1, 0x0) [ 394.132549][T22519] overlayfs: missing 'lowerdir' [ 394.140496][T22521] overlayfs: missing 'lowerdir' 11:43:09 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/u-bmon#\x00', 0x0, 0x0) 11:43:09 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x115, 0x0) 11:43:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x18000000}}], 0x1, 0x0) 11:43:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}, 0xdfeeff7f}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:09 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/u#bmon#\x00', 0x0, 0x0) [ 394.307879][T22539] overlayfs: unrecognized mount option "i\dex=off" or missing value [ 394.336794][T22543] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:09 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}]}) 11:43:09 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/u.bmon#\x00', 0x0, 0x0) 11:43:09 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/u%bmon#\x00', 0x0, 0x0) 11:43:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x20000000}}], 0x1, 0x0) 11:43:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}, 0xeeeeff7f}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:09 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x116, 0x0) 11:43:09 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/u0bmon#\x00', 0x0, 0x0) [ 394.656922][T22567] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:09 executing program 5: clone(0x20000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='system.sockprotoname\x00', &(0x7f0000000080)='i\\dex=off', 0x9, 0x3) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='i\\dHx=off,\x00']) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f00000000c0), &(0x7f0000000180)=0x4) 11:43:09 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/u*bmon#\x00', 0x0, 0x0) 11:43:09 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x117, 0x0) 11:43:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x24000000}}], 0x1, 0x0) 11:43:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}, 0x7ffffffff000}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:10 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/uXbmon#\x00', 0x0, 0x0) 11:43:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}, 0x4000000000000}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:10 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/u+bmon#\x00', 0x0, 0x0) 11:43:10 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/u\\bmon#\x00', 0x0, 0x0) 11:43:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x3f000000}}], 0x1, 0x0) 11:43:10 executing program 5: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x2710, @my=0x1}, 0x10) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}]}) 11:43:10 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x118, 0x0) 11:43:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}, 0xf0ffffff7f0000}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x40000000}}], 0x1, 0x0) [ 395.243468][T22626] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:10 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/u-bmon#\x00', 0x0, 0x0) 11:43:10 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/ucbmon#\x00', 0x0, 0x0) 11:43:10 executing program 5: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000740)={0x0, 0x0}, &(0x7f0000000780)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000840)={{{@in, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f0000000940)=0xe8) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x4e3, 0x9, &(0x7f0000000640)=[{&(0x7f0000000180)="6e9190fb72b9dc087640bf624390e8f8c740185f7c1a77510af361cb818b78b2c8c7ee903c2a77eba1470e9637f2d6dcc5a4f1e52c56718fb0e0dfe2bd97a3f65f6656f8274e7dd32d03ad3c03cf988ce4d61488fdd63ba87103eac20d47d8ea51a3edb7f827d834635a5fdaed0539abc5d25166f906cd371cb4a6f2cc691f9a536cd9b55661e5adc92225382006b419c594059e227fcfca0fbfef32a7f88e0bf1c6489edaa5c80284e8b4450872f6dbb2b7406b1c5bccd8559f89de8e", 0xbd, 0x37}, {&(0x7f0000000240)="53bba3a655e3801f93a60893ccb2038551dbfb48a08891a4686a118ed4ebbd057f8fcb5c21c91fd17cc6494f588f0a82b2e699969ea7bf5afbfb3f83da5f762016f93326f109d4b2fa890f354a778d8960acb39b52576a5b7cd01392f0fcf51dd4a808dc69ff06beea202ff0caf4bea980c93a", 0x73}, {&(0x7f0000000300)="c452c777f09198b41610f697befda78d5b28d7f6dfd365158cd229e31e770908495e816fbfb04f1b60d12b9a0ec6777b03c841a7f745df6440b8041d051d5aa9d9b8d394ff89081299e85136e93148413646312b0b9d176928bbe0c662323df385d051bf4d10459d91070b62005ea128ca2cbeb147582cbf60544793a4fddb1c1070e52e9fd01ac7b883e7664becc04137c61e0aea80584497ee4c4d7e61b3e7880bfe1386dec2a0e4b302d178c52cd0f506619761", 0xb5, 0x5}, {&(0x7f00000003c0)="14e25f957b9216c895b4fc0c3f6d7fd5651852244b2498efd6797cc4ffd278114801a3a2b21e3957e4396c25dc760ff6e5d1fbce80acaa771a5a4f7a72e0b0268674b0441fd220319f3cf44b3099d32b59050960711d57abd8b9a2c67d9a2130307dba161eec234ab0bcdbdc554b356d73066fd14862befe8937025a0ec29cad2687793f42f1587dd16e3081ac4e4f3b10dcf920", 0x94, 0x5}, {&(0x7f00000000c0)="b8f378ca0fce8c27a8a88d3e58798870446cd6f7e395fabe21", 0x19, 0x9}, {&(0x7f0000000480)="b7a07bc919a9d948f3ccb7e4b6d91f8c901ac02e3598dda8a1ef62d7df346c07377b5e76b3cf6b8613ae107b756ccf2e2267bc266d54327a787c8eaa219355a8d260d3e6a9ca07d11e963da53b3d29b60ead8c15ce060bbd114dbcfd3324618c51acc84b0daac61888e9c7f2256329351f6a55b6f830dca8ab367ed13ddd3515676e7dffa09b4e3c0d5c5598677c99ea1ad693a9d0f7023af99478622bb452228de2cf409385550149e44c7dcdccefb3d6ec6fa3f5e22a07", 0xb8, 0x9}, {&(0x7f0000000540)="688e77a7a39fc8f0d78364395fb31b5e", 0x10, 0x9}, {&(0x7f0000000580)="10a7a8300de6162752386b8ed49fc4bbf491bd7315428e91822530c9e90f880d761983d07f831e2cdf9efc1796b9155a9f0208804b0918ffe5a41988cc16d8df21544cbb0d5fdbfbb883cd491ede3452f3878259c2f6d6693c7ea01fcd955fe418acbd59df3c8612833856", 0x6b, 0x7}, {&(0x7f0000000600)="0049cd4df731d8f339d96c35e6086c2f9b4b55efec936ae91662f51fb9cbe228ce8232ea9c03", 0x26, 0x8000}], 0x100000, &(0x7f0000000980)={[{@umask={'umask', 0x3d, 0x4}}, {@uid={'uid', 0x3d, r1}}, {@force='force'}, {@gid={'gid', 0x3d, r2}}, {@uid={'uid', 0x3d, r3}}, {@type={'type', 0x3d, "5f61fa61"}}, {@nobarrier='nobarrier'}, {@umask={'umask', 0x3d, 0x6}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}]}) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@xino_on='xino=on'}]}) 11:43:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}, 0x100000000000000}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:10 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x119, 0x0) 11:43:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x48000000}}], 0x1, 0x0) 11:43:10 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/udbmon#\x00', 0x0, 0x0) 11:43:10 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/u.bmon#\x00', 0x0, 0x0) [ 395.565826][T22656] overlayfs: missing 'lowerdir' 11:43:10 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x9, 0x2000) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000200)) write$P9_ROPEN(r0, &(0x7f0000000180)={0x18, 0x71, 0x2, {{0x40, 0x1, 0x6}, 0xe57c}}, 0x1) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f0000000000)) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="fff9c901010000cac11b483449a300e5e53f06c706000000c934da07bbf3484c03000000000000085e5db0c89f320417bac39ddb2579"]) syz_open_dev$usb(&(0x7f00000001c0)='/dev/bus/usb/00#/00#\x00', 0x2, 0x4400) 11:43:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}, 0x200000000000000}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x4c000000}}], 0x1, 0x0) 11:43:10 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/uibmon#\x00', 0x0, 0x0) 11:43:10 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x11a, 0x0) 11:43:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}, 0xf00000000000000}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:11 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/u0bmon#\x00', 0x0, 0x0) [ 395.858340][T22680] overlayfs: unrecognized mount option "ÿùÉ" or missing value 11:43:11 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000002) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}]}) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x3212c682d77c5d73) bind$unix(r0, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) 11:43:11 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/uXbmon#\x00', 0x0, 0x0) 11:43:11 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/ulbmon#\x00', 0x0, 0x0) 11:43:11 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x11b, 0x0) [ 396.016060][T22695] overlayfs: unrecognized mount option "ÿùÉ" or missing value 11:43:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x60000000}}], 0x1, 0x0) 11:43:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}, 0x4000000000000000}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) [ 396.209358][T22718] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:11 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/u\\bmon#\x00', 0x0, 0x0) 11:43:11 executing program 5: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x1c, r1, 0x1, 0x70bd2c, 0x25dfdbfe, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}]}) 11:43:11 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/uobmon#\x00', 0x0, 0x0) 11:43:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}, 0x5d00000000000000}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) [ 396.271833][T22718] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x63000000}}], 0x1, 0x0) 11:43:11 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x11c, 0x0) 11:43:11 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/upbmon#\x00', 0x0, 0x0) 11:43:11 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/ucbmon#\x00', 0x0, 0x0) [ 396.507356][T22732] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 11:43:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}, 0xdfeeff7f00000000}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x68000000}}], 0x1, 0x0) [ 396.576563][T22732] CPU: 1 PID: 22732 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 396.585707][T22732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 396.595763][T22732] Call Trace: [ 396.599063][T22732] dump_stack+0x172/0x1f0 [ 396.603409][T22732] dump_header+0x177/0x1152 [ 396.607926][T22732] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 396.613737][T22732] ? ___ratelimit+0x2c8/0x595 [ 396.618428][T22732] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 11:43:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x6c000000}}], 0x1, 0x0) 11:43:11 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x11d, 0x0) [ 396.624247][T22732] ? lockdep_hardirqs_on+0x418/0x5d0 [ 396.629543][T22732] ? trace_hardirqs_on+0x67/0x240 [ 396.634580][T22732] ? pagefault_out_of_memory+0x11c/0x11c [ 396.640217][T22732] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 396.646028][T22732] ? ___ratelimit+0x60/0x595 [ 396.650617][T22732] ? do_raw_spin_unlock+0x57/0x270 [ 396.655731][T22732] oom_kill_process.cold+0x10/0x15 [ 396.660847][T22732] out_of_memory+0x334/0x1340 [ 396.665524][T22732] ? lock_downgrade+0x920/0x920 [ 396.670380][T22732] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 396.676199][T22732] ? oom_killer_disable+0x280/0x280 [ 396.681411][T22732] mem_cgroup_out_of_memory+0x1d8/0x240 [ 396.686974][T22732] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 396.692618][T22732] ? do_raw_spin_unlock+0x57/0x270 [ 396.697739][T22732] ? _raw_spin_unlock+0x2d/0x50 [ 396.702606][T22732] try_charge+0xf4b/0x1440 [ 396.707040][T22732] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 396.712600][T22732] ? percpu_ref_tryget_live+0x111/0x290 [ 396.718153][T22732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 11:43:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x74000000}}], 0x1, 0x0) [ 396.724404][T22732] ? __kasan_check_read+0x11/0x20 [ 396.729448][T22732] ? get_mem_cgroup_from_mm+0x156/0x320 [ 396.734996][T22732] mem_cgroup_try_charge+0x136/0x590 [ 396.740284][T22732] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 396.746537][T22732] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 396.752185][T22732] wp_page_copy+0x41e/0x1590 [ 396.756789][T22732] ? find_held_lock+0x35/0x130 [ 396.761563][T22732] ? pmd_pfn+0x1d0/0x1d0 [ 396.765814][T22732] ? lock_downgrade+0x920/0x920 [ 396.770677][T22732] ? vm_normal_page+0x15d/0x3c0 [ 396.775543][T22732] ? __pte_alloc_kernel+0x210/0x210 [ 396.780753][T22732] ? __kasan_check_read+0x11/0x20 [ 396.785789][T22732] ? do_raw_spin_unlock+0x57/0x270 [ 396.790990][T22732] do_wp_page+0x499/0x14d0 [ 396.795406][T22732] ? do_raw_spin_lock+0x12a/0x2e0 [ 396.800445][T22732] ? rwlock_bug.part.0+0x90/0x90 [ 396.805390][T22732] ? finish_mkwrite_fault+0x570/0x570 [ 396.810771][T22732] ? add_mm_counter_fast.part.0+0x40/0x40 [ 396.816504][T22732] __handle_mm_fault+0x22f1/0x3f20 [ 396.821632][T22732] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 396.827203][T22732] ? __kasan_check_read+0x11/0x20 [ 396.832230][T22732] handle_mm_fault+0x1b5/0x6c0 [ 396.837002][T22732] __do_page_fault+0x536/0xdd0 [ 396.841774][T22732] do_page_fault+0x38/0x590 [ 396.846275][T22732] page_fault+0x39/0x40 [ 396.850430][T22732] RIP: 0033:0x40ea18 [ 396.854323][T22732] Code: 8b 34 c6 4a 8d 04 2e 48 3d ff ff ff 7e 0f 86 77 ff ff ff bf 95 ee 4b 00 31 c0 e8 13 33 ff ff 31 ff e8 5c 2f ff ff 0f 1f 40 00 <89> 3c b5 00 00 73 00 eb b6 31 ed 0f 1f 44 00 00 80 3d 4e 1a 66 00 [ 396.873924][T22732] RSP: 002b:00007fff9ff76e10 EFLAGS: 00010246 [ 396.879986][T22732] RAX: 00000000363446af RBX: 000000001c8a6fec RCX: 0000001b31720000 [ 396.887950][T22732] RDX: 0000000000000000 RSI: 00000000000006af RDI: ffffffff363446af [ 396.887962][T22732] RBP: 0000000000000001 R08: 00000000363446af R09: 00000000363446b3 [ 396.903867][T22732] R10: 00007fff9ff76fb0 R11: 0000000000000246 R12: 000000000075bfa8 [ 396.903875][T22732] R13: 0000000080000000 R14: 00007fd522519008 R15: 0000000000000001 [ 396.911554][T22732] memory: usage 307200kB, limit 307200kB, failcnt 1339 [ 396.928621][T22732] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 396.936682][T22732] Memory cgroup stats for /syz5: [ 396.936786][T22732] anon 266579968 [ 396.936786][T22732] file 0 [ 396.936786][T22732] kernel_stack 6553600 [ 396.936786][T22732] slab 12660736 [ 396.936786][T22732] sock 0 [ 396.936786][T22732] shmem 45056 [ 396.936786][T22732] file_mapped 135168 [ 396.936786][T22732] file_dirty 0 [ 396.936786][T22732] file_writeback 0 [ 396.936786][T22732] anon_thp 243269632 [ 396.936786][T22732] inactive_anon 135168 [ 396.936786][T22732] active_anon 266579968 [ 396.936786][T22732] inactive_file 0 [ 396.936786][T22732] active_file 57344 [ 396.936786][T22732] unevictable 0 [ 396.936786][T22732] slab_reclaimable 2703360 [ 396.936786][T22732] slab_unreclaimable 9957376 [ 396.936786][T22732] pgfault 47784 [ 396.936786][T22732] pgmajfault 0 [ 396.936786][T22732] workingset_refault 66 [ 396.936786][T22732] workingset_activate 0 [ 396.936786][T22732] workingset_nodereclaim 0 [ 396.936786][T22732] pgrefill 1203 11:43:12 executing program 5: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x3e, "d7969d528fc1e429ba1c0cbdc4898dd4a50e0c5887fda0fd4ba302e82286aed2320a5ea68d950de877026eb93611f23eea185d26e2a283b0d79f58de69bb"}, &(0x7f0000000080)=0x46) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x5c, r2, 0x100, 0x70bd26, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x48, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xffff}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x80}, 0x48000) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000180)={r1, 0xffff, 0x4}, 0x10) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}]}) 11:43:12 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x11e, 0x0) 11:43:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x7a000000}}], 0x1, 0x0) 11:43:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}, 0xeeeeff7f00000000}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:12 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/udbmon#\x00', 0x0, 0x0) 11:43:12 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/uubmon#\x00', 0x0, 0x0) [ 396.936786][T22732] pgscan 1184 [ 396.936786][T22732] pgsteal 219 [ 396.942014][T22732] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=22330,uid=0 [ 396.942125][T22732] Memory cgroup out of memory: Killed process 22330 (syz-executor.5) total-vm:72708kB, anon-rss:2208kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 396.956601][T22744] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:12 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/uibmon#\x00', 0x0, 0x0) 11:43:12 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/uxbmon#\x00', 0x0, 0x0) 11:43:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0xb80b0000}}], 0x1, 0x0) [ 397.263769][T22790] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:12 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="95e3"], &(0x7f0000000180)=""/61, 0x3d) clone(0x20000080ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}]}) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x400, 0x0) 11:43:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}, 0x0}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:12 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x11f, 0x0) [ 397.470353][T22809] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0xe8030000}}], 0x1, 0x0) 11:43:12 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/us\\mon#\x00', 0x0, 0x0) 11:43:12 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/ulbmon#\x00', 0x0, 0x0) 11:43:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0xeffdffff}}], 0x1, 0x0) 11:43:12 executing program 5: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000000)={0xbe0e, 0x77, "7be924e71a37c1d1aaf8a3f98bf0cc8f4a8feebfa3af8bc4c52f2bfbc5e9aa4ea0d2c6e562487f0a6fb53b1eda54c87c2a71e42ec7a64301ea502e5866bd2c2bdb582a295b3edbb711f8442177b53bfe3522ff9a8f841e4ba0e1724a0c63f8f946596458f95478678d165e2f33168a0e585fd781f377a0"}) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000080)) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}]}) 11:43:12 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x120, 0x0) 11:43:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}, 0x0}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:12 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usb\\on#\x00', 0x0, 0x0) [ 397.760640][T22833] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:12 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/uobmon#\x00', 0x0, 0x0) 11:43:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0xf4010000}}], 0x1, 0x0) 11:43:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}, 0x0}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) [ 397.873819][T22845] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:13 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x121, 0x0) 11:43:13 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbm\\n#\x00', 0x0, 0x0) 11:43:13 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='iKdex=off,\x00']) 11:43:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0xfeffffff}}], 0x1, 0x0) 11:43:13 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/upbmon#\x00', 0x0, 0x0) 11:43:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}, 0x0}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:13 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x122, 0x0) 11:43:13 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmo\\#\x00', 0x0, 0x0) 11:43:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0xff000000}}], 0x1, 0x0) [ 398.269111][T22871] overlayfs: unrecognized mount option "iKdex=off" or missing value 11:43:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}, 0x0}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:13 executing program 5: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x2) clone(0x40000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f0000000040)=0x200) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f0000000000)={0x5, 0x0, 0x8, 0x9, 0x3, @discrete={0x4, 0xdc}}) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}]}) [ 398.313601][T22878] overlayfs: unrecognized mount option "iKdex=off" or missing value 11:43:13 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/uubmon#\x00', 0x0, 0x0) 11:43:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0xffff0000}}], 0x1, 0x0) 11:43:13 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x123, 0x0) 11:43:13 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmonK\x00', 0x0, 0x0) 11:43:13 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/uxbmon#\x00', 0x0, 0x0) 11:43:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}, 0x0}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) [ 398.609270][T22901] overlayfs: unrecognized mount option "i\dex=off" or missing value [ 398.642729][T22904] IPVS: ftp: loaded support on port[0] = 21 11:43:13 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x02', 0x0, 0x0) 11:43:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0xfffffdef}}], 0x1, 0x0) 11:43:13 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x124, 0x0) 11:43:13 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/us\\mon#\x00', 0x0, 0x0) 11:43:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}, 0x0}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) [ 399.057969][T22946] overlayfs: unrecognized mount option "i\dex=off" or missing value [ 399.059446][T22901] IPVS: ftp: loaded support on port[0] = 21 11:43:14 executing program 5: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) io_setup(0x1, &(0x7f0000000000)=0x0) io_cancel(r1, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1, 0x40, r0, &(0x7f0000000280)="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", 0x1000, 0x3, 0x0, 0x1}, &(0x7f0000000080)) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="695c6465783d6f666628119ca316ec5fa0fa2ec7ae52b1aa981cb5ad465f5bf24bbf817829eb4c11183fe0d9515487b2787de25ac9b9e9cd7b6c9812179f8415a4b4af63a3afd9ae479f74c847013def8747335d1d6f753feb49d29407ea98cbb5c4c374e1804a123cb71e8e2eba7bb9cb1c8104ccc1e4cb08642682e8ca0f7479467eb74561f5094dbf9d40f2ba17c15d9f3d7526769e0d451de28fe165b9f1bc22dfc961e6c0f6b039d534a8d51886c667aec779636bbd1fb49a8a812c7b19f42fb8cb546aeddcd9caee765ab79f39b15a94054f801f089c5ce23c490d66c3d353"]) 11:43:14 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x03', 0x0, 0x0) 11:43:14 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usb\\on#\x00', 0x0, 0x0) 11:43:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0xfffffffe}}], 0x1, 0x0) 11:43:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}, 0x0}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:14 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x125, 0x0) 11:43:14 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbm\\n#\x00', 0x0, 0x0) 11:43:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x4000000000000}}], 0x1, 0x0) 11:43:14 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x04', 0x0, 0x0) 11:43:14 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x126, 0x0) 11:43:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}, 0x0}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) [ 399.350574][T22970] overlayfs: unrecognized mount option "i\dex=off(œ£ì_ ú.Ç®R±ª˜µ­F_[òK¿x)ëL?àÙQT‡²x}âZɹéÍ{l˜Ÿ„¤´¯c£¯Ù®GŸtÈG=ï‡G3]ou?ëIÒ”ê˜ËµÄÃtá€J<·Ž.º{¹ËÌÁäËd&‚èÊtyF~·Eaõ M¿@òºÁ]Ÿ=u&vž Eâáe¹ñ¼"ßÉaæÀö°9Õ4¨Õ†Æg®Çyck½´šŠ" or missing value 11:43:14 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmo\\#\x00', 0x0, 0x0) [ 399.499733][T22984] overlayfs: unrecognized mount option "i\dex=off(œ£ì_ ú.Ç®R±ª˜µ­F_[òK¿x)ëL?àÙQT‡²x}âZɹéÍ{l˜Ÿ„¤´¯c£¯Ù®GŸtÈG=ï‡G3]ou?ëIÒ”ê˜ËµÄÃtá€J<·Ž.º{¹ËÌÁäËd&‚èÊtyF~·Eaõ M¿@òºÁ]Ÿ=u&vž Eâáe¹ñ¼"ßÉaæÀö°9Õ4¨Õ†Æg®Çyck½´šŠ" or missing value 11:43:14 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="695c6465783d6f66662c00a758596ad829a567274f0b7a84b6b83d0b36f410d7c6d0c03c28303a59c308a1c197a69bcdf021ccbf7e95f03edf8be3eecc85fd596e63dbebbe99fce924068b7ad6b490b8e5acf62c5f6f530dc9ea28ab3038b737ce0851fd379f5eb813922c67e57cc171c1fbba7f9ff743bfb4577a8c76c5843653847a58cabbb83dc99c7b3263a2c75d3addec5ca3d66e5f07d9028605b6b89e20"]) 11:43:14 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmonK\x00', 0x0, 0x0) 11:43:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x40030000000000}}], 0x1, 0x0) 11:43:14 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x05', 0x0, 0x0) 11:43:14 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x127, 0x0) 11:43:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}, 0x0}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:14 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x06', 0x0, 0x0) 11:43:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x100000000000000}}], 0x1, 0x0) 11:43:14 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x128, 0x0) 11:43:14 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x02', 0x0, 0x0) 11:43:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}, 0x0}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:15 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\a', 0x0, 0x0) [ 399.989303][T23015] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:15 executing program 5: r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000280)=0x6e, 0x80800) write$binfmt_aout(r0, &(0x7f00000002c0)={{0xcc, 0xffffffffffffff82, 0xda5b, 0x3cb, 0x36c, 0x8, 0x3b6, 0x1}, "fa5798806331443c796904c3eadfdb435c5565e290a8dcb4044de73bb18b4da36374997b1f58a6211d3088bc97744d8789bd0fa035e3ff3d0eee2f382c3f614441d6c5da103e", [[]]}, 0x166) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000080)={0x0, 0x401, 0x4}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f00000001c0)={r2, 0x4}, 0x8) creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$isdn(0x22, 0x3, 0x24) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="695c6465783d6f66662c0099e9b308e7581732277018ec6b1fbeca6ec22bd887a52a"]) 11:43:15 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x03', 0x0, 0x0) 11:43:15 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x129, 0x0) 11:43:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x200000000000000}}], 0x1, 0x0) 11:43:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}, 0x0}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:15 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:15 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x12a, 0x0) 11:43:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x300000000000000}}], 0x1, 0x0) 11:43:15 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x04', 0x0, 0x0) [ 400.339620][T23056] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}, 0x0}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:15 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:15 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f0000000000)={[], [{@smackfsdef={'smackfsdef', 0x3d, '*md5sum.'}}]}) [ 400.449707][T23071] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x400000000000000}}], 0x1, 0x0) 11:43:15 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x05', 0x0, 0x0) 11:43:15 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x12b, 0x0) [ 400.690654][T23088] overlayfs: unrecognized mount option "smackfsdef=*md5sum." or missing value 11:43:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x500000000000000}}], 0x1, 0x0) 11:43:15 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 400.775122][T23099] overlayfs: unrecognized mount option "smackfsdef=*md5sum." or missing value 11:43:15 executing program 5: r0 = creat(&(0x7f00000000c0)='./file1\x00', 0x0) clone(0x10100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VIDIOC_SUBDEV_G_EDID(r0, 0xc0285628, &(0x7f0000000140)={0x0, 0x33, 0x8, [], &(0x7f0000000100)=0x64737817}) connect(r0, &(0x7f0000000000)=@vsock={0x28, 0x0, 0x2710, @hyper}, 0x80) accept4$bt_l2cap(r0, &(0x7f0000000380), &(0x7f00000003c0)=0xe, 0x80800) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x48, &(0x7f0000000240)=[@in6={0xa, 0x4e21, 0x3, @loopback, 0x1}, @in6={0xa, 0x4e22, 0x5, @empty}, @in={0x2, 0x5, @remote}]}, &(0x7f00000002c0)=0x10) syz_genetlink_get_family_id$SEG6(&(0x7f0000000400)='SEG6\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000300)={r1, 0x8001, 0x7ff}, &(0x7f0000000340)=0x8) mount$overlay(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000200)={[{@index_off='i\\dex=off'}]}) 11:43:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}, 0x0}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:16 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x06', 0x0, 0x0) 11:43:16 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x12c, 0x0) 11:43:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x600000000000000}}], 0x1, 0x0) 11:43:16 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:16 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\a', 0x0, 0x0) [ 401.091617][T23114] syz-executor.5 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 11:43:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}, 0x0}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) [ 401.157982][T23114] CPU: 0 PID: 23114 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 401.167127][T23114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 401.177184][T23114] Call Trace: [ 401.180481][T23114] dump_stack+0x172/0x1f0 [ 401.184823][T23114] dump_header+0x177/0x1152 [ 401.189328][T23114] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 401.195131][T23114] ? ___ratelimit+0x2c8/0x595 [ 401.199813][T23114] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 11:43:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}, 0x0}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) [ 401.205620][T23114] ? lockdep_hardirqs_on+0x418/0x5d0 [ 401.210913][T23114] ? trace_hardirqs_on+0x67/0x240 [ 401.215944][T23114] ? pagefault_out_of_memory+0x11c/0x11c [ 401.221581][T23114] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 401.227386][T23114] ? ___ratelimit+0x60/0x595 [ 401.232059][T23114] ? do_raw_spin_unlock+0x57/0x270 [ 401.237175][T23114] oom_kill_process.cold+0x10/0x15 [ 401.242289][T23114] out_of_memory+0x334/0x1340 [ 401.246972][T23114] ? lock_downgrade+0x920/0x920 [ 401.251833][T23114] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 401.257646][T23114] ? oom_killer_disable+0x280/0x280 [ 401.262869][T23114] mem_cgroup_out_of_memory+0x1d8/0x240 [ 401.268434][T23114] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 401.274076][T23114] ? do_raw_spin_unlock+0x57/0x270 [ 401.279195][T23114] ? _raw_spin_unlock+0x2d/0x50 [ 401.284056][T23114] try_charge+0xf4b/0x1440 [ 401.288491][T23114] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 401.294044][T23114] ? find_held_lock+0x35/0x130 [ 401.298817][T23114] ? get_mem_cgroup_from_mm+0x139/0x320 [ 401.304381][T23114] ? lock_downgrade+0x920/0x920 [ 401.309236][T23114] ? percpu_ref_tryget_live+0x111/0x290 [ 401.314787][T23114] __memcg_kmem_charge_memcg+0x71/0xf0 [ 401.320248][T23114] ? memcg_kmem_put_cache+0x50/0x50 [ 401.325455][T23114] ? get_mem_cgroup_from_mm+0x156/0x320 [ 401.331014][T23114] __memcg_kmem_charge+0x13a/0x3a0 [ 401.336134][T23114] __alloc_pages_nodemask+0x4f7/0x900 [ 401.341511][T23114] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 401.347057][T23114] ? __alloc_pages_slowpath+0x2540/0x2540 [ 401.352776][T23114] ? percpu_ref_put_many+0xb6/0x190 [ 401.357981][T23114] ? lockdep_hardirqs_on+0x418/0x5d0 [ 401.363271][T23114] ? trace_hardirqs_on+0x67/0x240 [ 401.368296][T23114] ? __kasan_check_read+0x11/0x20 [ 401.373331][T23114] copy_process+0x3f8/0x6830 [ 401.377922][T23114] ? psi_memstall_leave+0x12e/0x180 [ 401.383134][T23114] ? __cleanup_sighand+0x60/0x60 [ 401.388079][T23114] ? __kasan_check_read+0x11/0x20 [ 401.393104][T23114] ? __lock_acquire+0x8a0/0x4a00 [ 401.398044][T23114] ? _raw_spin_unlock_irq+0x5e/0x90 [ 401.403255][T23114] _do_fork+0x146/0xfa0 11:43:16 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 401.407419][T23114] ? copy_init_mm+0x20/0x20 [ 401.411931][T23114] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 401.418175][T23114] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 401.424426][T23114] ? debug_smp_processor_id+0x3c/0x214 [ 401.429896][T23114] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 401.436061][T23114] __x64_sys_clone+0x1ab/0x270 [ 401.440841][T23114] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 401.446820][T23114] ? __ia32_sys_vfork+0xd0/0xd0 [ 401.451663][T23114] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 401.451684][T23114] ? do_syscall_64+0x26/0x760 [ 401.451700][T23114] ? lockdep_hardirqs_on+0x418/0x5d0 [ 401.451714][T23114] ? trace_hardirqs_on+0x67/0x240 [ 401.451730][T23114] do_syscall_64+0xfa/0x760 [ 401.451749][T23114] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 401.451760][T23114] RIP: 0033:0x45c249 [ 401.451777][T23114] Code: ff 48 85 f6 0f 84 27 8e fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c fe 8d fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 11:43:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x700000000000000}}], 0x1, 0x0) 11:43:16 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x12d, 0x0) [ 401.506742][T23114] RSP: 002b:00007fff9ff76da8 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 401.515158][T23114] RAX: ffffffffffffffda RBX: 00007fd5204f7700 RCX: 000000000045c249 [ 401.523139][T23114] RDX: 00007fd5204f79d0 RSI: 00007fd5204f6db0 RDI: 00000000003d0f00 [ 401.531121][T23114] RBP: 00007fff9ff76fc0 R08: 00007fd5204f7700 R09: 00007fd5204f7700 [ 401.539097][T23114] R10: 00007fd5204f79d0 R11: 0000000000000202 R12: 0000000000000000 [ 401.547072][T23114] R13: 00007fff9ff76e5f R14: 00007fd5204f79c0 R15: 000000000075bfd4 [ 401.588950][T23114] memory: usage 307188kB, limit 307200kB, failcnt 1359 [ 401.616322][T23114] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 401.678085][T23114] Memory cgroup stats for /syz5: [ 401.678192][T23114] anon 265220096 [ 401.678192][T23114] file 0 [ 401.678192][T23114] kernel_stack 6815744 [ 401.678192][T23114] slab 12931072 [ 401.678192][T23114] sock 0 [ 401.678192][T23114] shmem 45056 [ 401.678192][T23114] file_mapped 135168 [ 401.678192][T23114] file_dirty 0 [ 401.678192][T23114] file_writeback 0 [ 401.678192][T23114] anon_thp 241172480 [ 401.678192][T23114] inactive_anon 135168 [ 401.678192][T23114] active_anon 265224192 [ 401.678192][T23114] inactive_file 0 [ 401.678192][T23114] active_file 57344 [ 401.678192][T23114] unevictable 0 [ 401.678192][T23114] slab_reclaimable 2703360 [ 401.678192][T23114] slab_unreclaimable 10227712 [ 401.678192][T23114] pgfault 48510 [ 401.678192][T23114] pgmajfault 0 [ 401.678192][T23114] workingset_refault 66 [ 401.678192][T23114] workingset_activate 0 [ 401.678192][T23114] workingset_nodereclaim 0 [ 401.678192][T23114] pgrefill 1236 [ 401.678192][T23114] pgscan 1316 [ 401.678192][T23114] pgsteal 252 11:43:17 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="69060000003d6f66662c00"]) 11:43:17 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}, 0x0}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x800000000000000}}], 0x1, 0x0) 11:43:17 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:17 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x12e, 0x0) [ 401.902150][T23114] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=16224,uid=0 [ 401.918890][T23114] Memory cgroup out of memory: Killed process 16224 (syz-executor.5) total-vm:72708kB, anon-rss:2208kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 401.938829][ T1065] oom_reaper: reaped process 16224 (syz-executor.5), now anon-rss:0kB, file-rss:34832kB, shmem-rss:0kB 11:43:17 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x900000000000000}}], 0x1, 0x0) 11:43:17 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}, 0x0}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:17 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x12f, 0x0) 11:43:17 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 402.310650][T23185] overlayfs: unrecognized mount option "i" or missing value 11:43:17 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='i\\dex=Off,\x00']) 11:43:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0xa00000000000000}}], 0x1, 0x0) 11:43:17 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x130, 0x0) 11:43:17 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}, 0x0}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:17 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0xe00000000000000}}], 0x1, 0x0) [ 402.620650][T23206] syz-executor.5 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 11:43:17 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 402.710190][T23206] CPU: 0 PID: 23206 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 402.719367][T23206] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 402.729423][T23206] Call Trace: [ 402.732724][T23206] dump_stack+0x172/0x1f0 [ 402.737071][T23206] dump_header+0x177/0x1152 [ 402.741593][T23206] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 402.748118][T23206] ? ___ratelimit+0x2c8/0x595 [ 402.752803][T23206] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 402.758604][T23206] ? lockdep_hardirqs_on+0x418/0x5d0 [ 402.763899][T23206] ? trace_hardirqs_on+0x67/0x240 [ 402.768937][T23206] ? pagefault_out_of_memory+0x11c/0x11c [ 402.774581][T23206] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 402.780396][T23206] ? ___ratelimit+0x60/0x595 [ 402.784992][T23206] ? do_raw_spin_unlock+0x57/0x270 [ 402.790113][T23206] oom_kill_process.cold+0x10/0x15 [ 402.795243][T23206] out_of_memory+0x334/0x1340 [ 402.799915][T23206] ? lock_downgrade+0x920/0x920 [ 402.804760][T23206] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 402.810571][T23206] ? oom_killer_disable+0x280/0x280 [ 402.815790][T23206] mem_cgroup_out_of_memory+0x1d8/0x240 [ 402.821441][T23206] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 402.827091][T23206] ? do_raw_spin_unlock+0x57/0x270 [ 402.832226][T23206] ? _raw_spin_unlock+0x2d/0x50 [ 402.837085][T23206] try_charge+0xf4b/0x1440 [ 402.841518][T23206] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 402.847063][T23206] ? find_held_lock+0x35/0x130 [ 402.851835][T23206] ? get_mem_cgroup_from_mm+0x139/0x320 [ 402.857395][T23206] ? lock_downgrade+0x920/0x920 [ 402.862246][T23206] ? percpu_ref_tryget_live+0x111/0x290 [ 402.867802][T23206] __memcg_kmem_charge_memcg+0x71/0xf0 [ 402.873268][T23206] ? memcg_kmem_put_cache+0x50/0x50 [ 402.878465][T23206] ? get_mem_cgroup_from_mm+0x156/0x320 [ 402.884011][T23206] __memcg_kmem_charge+0x13a/0x3a0 [ 402.889111][T23206] __alloc_pages_nodemask+0x4f7/0x900 [ 402.889127][T23206] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 402.889142][T23206] ? __alloc_pages_slowpath+0x2540/0x2540 [ 402.889154][T23206] ? percpu_ref_put_many+0xb6/0x190 11:43:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}, 0x0}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}, 0x0}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x1100000000000000}}], 0x1, 0x0) [ 402.889172][T23206] ? lockdep_hardirqs_on+0x418/0x5d0 [ 402.889185][T23206] ? trace_hardirqs_on+0x67/0x240 [ 402.889197][T23206] ? __kasan_check_read+0x11/0x20 [ 402.889217][T23206] copy_process+0x3f8/0x6830 [ 402.930838][T23206] ? __kasan_check_read+0x11/0x20 [ 402.935859][T23206] ? __lock_acquire+0x16f2/0x4a00 [ 402.940890][T23206] ? __cleanup_sighand+0x60/0x60 [ 402.945837][T23206] ? __might_fault+0x12b/0x1e0 [ 402.950615][T23206] ? __might_fault+0x12b/0x1e0 [ 402.955398][T23206] _do_fork+0x146/0xfa0 [ 402.959569][T23206] ? copy_init_mm+0x20/0x20 [ 402.964071][T23206] ? __kasan_check_read+0x11/0x20 [ 402.969098][T23206] ? _copy_to_user+0x118/0x160 [ 402.969120][T23206] __x64_sys_clone+0x1ab/0x270 [ 402.969137][T23206] ? __ia32_sys_vfork+0xd0/0xd0 [ 402.969159][T23206] ? do_syscall_64+0x26/0x760 [ 402.969174][T23206] ? lockdep_hardirqs_on+0x418/0x5d0 [ 402.969191][T23206] ? trace_hardirqs_on+0x67/0x240 [ 402.998459][T23206] do_syscall_64+0xfa/0x760 [ 403.004502][T23206] entry_SYSCALL_64_after_hwframe+0x49/0xbe 11:43:18 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 403.010389][T23206] RIP: 0033:0x459879 [ 403.014287][T23206] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 403.033896][T23206] RSP: 002b:00007fd520517c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 403.042327][T23206] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000459879 [ 403.050299][T23206] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 00000200000007fd [ 403.050307][T23206] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 403.050314][T23206] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5205186d4 [ 403.050322][T23206] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 00000000ffffffff [ 403.126796][T23206] memory: usage 307188kB, limit 307200kB, failcnt 1398 [ 403.135198][T23206] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 403.154421][T23206] Memory cgroup stats for /syz5: [ 403.154520][T23206] anon 265289728 [ 403.154520][T23206] file 0 [ 403.154520][T23206] kernel_stack 6815744 [ 403.154520][T23206] slab 12931072 [ 403.154520][T23206] sock 0 [ 403.154520][T23206] shmem 45056 [ 403.154520][T23206] file_mapped 135168 [ 403.154520][T23206] file_dirty 0 [ 403.154520][T23206] file_writeback 0 [ 403.154520][T23206] anon_thp 241172480 [ 403.154520][T23206] inactive_anon 135168 [ 403.154520][T23206] active_anon 265289728 [ 403.154520][T23206] inactive_file 0 [ 403.154520][T23206] active_file 57344 [ 403.154520][T23206] unevictable 0 [ 403.154520][T23206] slab_reclaimable 2703360 [ 403.154520][T23206] slab_unreclaimable 10227712 [ 403.154520][T23206] pgfault 48642 [ 403.154520][T23206] pgmajfault 0 [ 403.154520][T23206] workingset_refault 66 [ 403.154520][T23206] workingset_activate 0 [ 403.154520][T23206] workingset_nodereclaim 0 [ 403.154520][T23206] pgrefill 1269 [ 403.154520][T23206] pgscan 1448 [ 403.154520][T23206] pgsteal 252 [ 403.318890][T23206] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=16205,uid=0 [ 403.428983][T23206] Memory cgroup out of memory: Killed process 16205 (syz-executor.5) total-vm:72708kB, anon-rss:2208kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 403.457658][ T1065] oom_reaper: reaped process 16205 (syz-executor.5), now anon-rss:0kB, file-rss:34832kB, shmem-rss:0kB [ 403.470433][T23199] syz-executor.5 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 403.483239][T23199] CPU: 1 PID: 23199 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 403.492351][T23199] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 403.502407][T23199] Call Trace: [ 403.505702][T23199] dump_stack+0x172/0x1f0 [ 403.510035][T23199] dump_header+0x177/0x1152 [ 403.514534][T23199] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 403.520335][T23199] ? ___ratelimit+0x2c8/0x595 [ 403.525025][T23199] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 403.530831][T23199] ? lockdep_hardirqs_on+0x418/0x5d0 [ 403.536108][T23199] ? trace_hardirqs_on+0x67/0x240 [ 403.541141][T23199] ? pagefault_out_of_memory+0x11c/0x11c [ 403.546770][T23199] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 403.552559][T23199] ? ___ratelimit+0x60/0x595 [ 403.557131][T23199] ? do_raw_spin_unlock+0x57/0x270 [ 403.562232][T23199] oom_kill_process.cold+0x10/0x15 [ 403.567327][T23199] out_of_memory+0x334/0x1340 [ 403.571984][T23199] ? lock_downgrade+0x920/0x920 [ 403.576902][T23199] ? oom_killer_disable+0x280/0x280 [ 403.582089][T23199] mem_cgroup_out_of_memory+0x1d8/0x240 [ 403.587615][T23199] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 403.593241][T23199] ? do_raw_spin_unlock+0x57/0x270 [ 403.598331][T23199] ? _raw_spin_unlock+0x2d/0x50 [ 403.603162][T23199] try_charge+0xa2d/0x1440 [ 403.607563][T23199] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 403.613087][T23199] ? find_held_lock+0x35/0x130 [ 403.617838][T23199] ? get_mem_cgroup_from_mm+0x139/0x320 [ 403.623379][T23199] ? lock_downgrade+0x920/0x920 [ 403.628209][T23199] ? percpu_ref_tryget_live+0x111/0x290 [ 403.633740][T23199] __memcg_kmem_charge_memcg+0x71/0xf0 [ 403.639190][T23199] ? memcg_kmem_put_cache+0x50/0x50 [ 403.644371][T23199] ? get_mem_cgroup_from_mm+0x156/0x320 [ 403.649901][T23199] __memcg_kmem_charge+0x13a/0x3a0 [ 403.654994][T23199] __alloc_pages_nodemask+0x4f7/0x900 [ 403.660349][T23199] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 403.665874][T23199] ? __alloc_pages_slowpath+0x2540/0x2540 [ 403.671585][T23199] ? percpu_ref_put_many+0xb6/0x190 [ 403.676786][T23199] copy_process+0x3f8/0x6830 [ 403.681363][T23199] ? psi_memstall_leave+0x12e/0x180 [ 403.686565][T23199] ? __cleanup_sighand+0x60/0x60 [ 403.691504][T23199] ? __kasan_check_read+0x11/0x20 [ 403.696509][T23199] ? __lock_acquire+0x8a0/0x4a00 [ 403.701435][T23199] ? _raw_spin_unlock_irq+0x5e/0x90 [ 403.706619][T23199] _do_fork+0x146/0xfa0 [ 403.710756][T23199] ? copy_init_mm+0x20/0x20 [ 403.715244][T23199] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 403.721463][T23199] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 403.727684][T23199] ? debug_smp_processor_id+0x3c/0x214 [ 403.733137][T23199] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 403.739276][T23199] __x64_sys_clone+0x1ab/0x270 [ 403.744194][T23199] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 403.750152][T23199] ? __ia32_sys_vfork+0xd0/0xd0 [ 403.754983][T23199] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 403.761222][T23199] ? do_syscall_64+0x26/0x760 [ 403.765880][T23199] ? lockdep_hardirqs_on+0x418/0x5d0 [ 403.771147][T23199] ? trace_hardirqs_on+0x67/0x240 [ 403.776155][T23199] do_syscall_64+0xfa/0x760 [ 403.780726][T23199] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 403.786600][T23199] RIP: 0033:0x45c249 [ 403.790478][T23199] Code: ff 48 85 f6 0f 84 27 8e fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c fe 8d fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 403.810061][T23199] RSP: 002b:00007fff9ff76da8 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 403.818449][T23199] RAX: ffffffffffffffda RBX: 00007fd5204f7700 RCX: 000000000045c249 [ 403.826412][T23199] RDX: 00007fd5204f79d0 RSI: 00007fd5204f6db0 RDI: 00000000003d0f00 [ 403.834368][T23199] RBP: 00007fff9ff76fc0 R08: 00007fd5204f7700 R09: 00007fd5204f7700 [ 403.842317][T23199] R10: 00007fd5204f79d0 R11: 0000000000000202 R12: 0000000000000000 [ 403.850265][T23199] R13: 00007fff9ff76e5f R14: 00007fd5204f79c0 R15: 000000000075bfd4 [ 403.870882][T23199] memory: usage 304952kB, limit 307200kB, failcnt 1398 [ 403.877934][T23199] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 403.891360][T23199] Memory cgroup stats for /syz5: [ 403.891472][T23199] anon 263090176 [ 403.891472][T23199] file 0 [ 403.891472][T23199] kernel_stack 6815744 [ 403.891472][T23199] slab 12931072 [ 403.891472][T23199] sock 0 [ 403.891472][T23199] shmem 45056 [ 403.891472][T23199] file_mapped 135168 [ 403.891472][T23199] file_dirty 0 [ 403.891472][T23199] file_writeback 0 [ 403.891472][T23199] anon_thp 239075328 [ 403.891472][T23199] inactive_anon 135168 [ 403.891472][T23199] active_anon 263090176 [ 403.891472][T23199] inactive_file 0 [ 403.891472][T23199] active_file 57344 [ 403.891472][T23199] unevictable 0 [ 403.891472][T23199] slab_reclaimable 2703360 [ 403.891472][T23199] slab_unreclaimable 10227712 [ 403.891472][T23199] pgfault 48642 [ 403.891472][T23199] pgmajfault 0 [ 403.891472][T23199] workingset_refault 66 [ 403.891472][T23199] workingset_activate 0 [ 403.891472][T23199] workingset_nodereclaim 0 [ 403.891472][T23199] pgrefill 1269 [ 403.891472][T23199] pgscan 1448 [ 403.891472][T23199] pgsteal 252 [ 403.990292][T23199] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=16182,uid=0 [ 404.005878][T23199] Memory cgroup out of memory: Killed process 16182 (syz-executor.5) total-vm:72708kB, anon-rss:2208kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 11:43:19 executing program 5: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x40) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000180)) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}]}) r1 = gettid() sched_getattr(r1, &(0x7f0000000000)={0x30}, 0x30, 0x0) 11:43:19 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x131, 0x0) 11:43:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x1800000000000000}}], 0x1, 0x0) 11:43:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}, 0x0}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:19 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:19 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 404.025483][ T1065] oom_reaper: reaped process 16182 (syz-executor.5), now anon-rss:0kB, file-rss:34832kB, shmem-rss:0kB [ 404.025733][T23243] overlayfs: unrecognized mount option "i\dex=Off" or missing value [ 404.053066][T23243] overlayfs: unrecognized mount option "i\dex=Off" or missing value 11:43:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}, 0x0}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x2000000000000000}}], 0x1, 0x0) 11:43:19 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:19 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 404.231137][T23261] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:19 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x132, 0x0) [ 404.274437][T23262] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:19 executing program 5: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = semget$private(0x0, 0x2, 0x100) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000000)=[0x1]) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}]}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000040)={0x3, 0x3ff, 0x8, 0x89, 0x100000000}) 11:43:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}, 0x0}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x2400000000000000}}], 0x1, 0x0) 11:43:19 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:19 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:19 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x133, 0x0) [ 404.584873][T23287] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x3f00000000000000}}], 0x1, 0x0) [ 404.713874][T23297] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:19 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:19 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:19 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="e95c6465783d6f66662c00"]) 11:43:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}, 0x0}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:20 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x134, 0x0) 11:43:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x4000000000000000}}], 0x1, 0x0) 11:43:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}, 0x0}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:20 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:20 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\xff', 0x0, 0x0) [ 405.037134][T23325] overlayfs: unrecognized mount option "é\dex=off" or missing value [ 405.066715][T23321] syz-executor.5 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 405.170426][T23321] CPU: 1 PID: 23321 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 405.179571][T23321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 405.190503][T23321] Call Trace: [ 405.193805][T23321] dump_stack+0x172/0x1f0 [ 405.198159][T23321] dump_header+0x177/0x1152 [ 405.202682][T23321] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 405.208492][T23321] ? ___ratelimit+0x2c8/0x595 [ 405.213179][T23321] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 405.218989][T23321] ? lockdep_hardirqs_on+0x418/0x5d0 [ 405.224277][T23321] ? trace_hardirqs_on+0x67/0x240 [ 405.229304][T23321] ? pagefault_out_of_memory+0x11c/0x11c [ 405.234944][T23321] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 405.240748][T23321] ? ___ratelimit+0x60/0x595 [ 405.245350][T23321] ? do_raw_spin_unlock+0x57/0x270 [ 405.250472][T23321] oom_kill_process.cold+0x10/0x15 [ 405.255591][T23321] out_of_memory+0x334/0x1340 [ 405.260276][T23321] ? lock_downgrade+0x920/0x920 [ 405.265137][T23321] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 405.270958][T23321] ? oom_killer_disable+0x280/0x280 [ 405.276177][T23321] mem_cgroup_out_of_memory+0x1d8/0x240 [ 405.281732][T23321] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 405.287376][T23321] ? do_raw_spin_unlock+0x57/0x270 [ 405.292492][T23321] ? _raw_spin_unlock+0x2d/0x50 [ 405.297349][T23321] try_charge+0xf4b/0x1440 [ 405.301778][T23321] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 405.307327][T23321] ? find_held_lock+0x35/0x130 [ 405.312098][T23321] ? get_mem_cgroup_from_mm+0x139/0x320 [ 405.317663][T23321] ? lock_downgrade+0x920/0x920 [ 405.322603][T23321] ? percpu_ref_tryget_live+0x111/0x290 [ 405.328163][T23321] __memcg_kmem_charge_memcg+0x71/0xf0 [ 405.333635][T23321] ? memcg_kmem_put_cache+0x50/0x50 [ 405.338848][T23321] ? get_mem_cgroup_from_mm+0x156/0x320 [ 405.344408][T23321] __memcg_kmem_charge+0x13a/0x3a0 [ 405.349530][T23321] __alloc_pages_nodemask+0x4f7/0x900 [ 405.354918][T23321] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 405.360499][T23321] ? __alloc_pages_slowpath+0x2540/0x2540 [ 405.366222][T23321] ? percpu_ref_put_many+0xb6/0x190 [ 405.371432][T23321] ? lockdep_hardirqs_on+0x418/0x5d0 [ 405.376725][T23321] ? trace_hardirqs_on+0x67/0x240 [ 405.382286][T23321] ? __kasan_check_read+0x11/0x20 [ 405.387321][T23321] copy_process+0x3f8/0x6830 [ 405.391915][T23321] ? psi_memstall_leave+0x12e/0x180 [ 405.397129][T23321] ? __cleanup_sighand+0x60/0x60 [ 405.402078][T23321] ? __kasan_check_read+0x11/0x20 [ 405.407116][T23321] ? __lock_acquire+0x8a0/0x4a00 [ 405.412073][T23321] ? _raw_spin_unlock_irq+0x5e/0x90 [ 405.417284][T23321] _do_fork+0x146/0xfa0 [ 405.421443][T23321] ? copy_init_mm+0x20/0x20 [ 405.425978][T23321] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 405.432222][T23321] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 405.438470][T23321] ? debug_smp_processor_id+0x3c/0x214 [ 405.443948][T23321] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 405.450112][T23321] __x64_sys_clone+0x1ab/0x270 [ 405.454885][T23321] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 405.460875][T23321] ? __ia32_sys_vfork+0xd0/0xd0 [ 405.465736][T23321] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 11:43:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x4800000000000000}}], 0x1, 0x0) 11:43:20 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x4c00000000000000}}], 0x1, 0x0) 11:43:20 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x6000000000000000}}], 0x1, 0x0) [ 405.471988][T23321] ? do_syscall_64+0x26/0x760 [ 405.476668][T23321] ? lockdep_hardirqs_on+0x418/0x5d0 [ 405.481955][T23321] ? trace_hardirqs_on+0x67/0x240 [ 405.486987][T23321] do_syscall_64+0xfa/0x760 [ 405.491501][T23321] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 405.497388][T23321] RIP: 0033:0x45c249 [ 405.501274][T23321] Code: ff 48 85 f6 0f 84 27 8e fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c fe 8d fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 405.501282][T23321] RSP: 002b:00007fff9ff76da8 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 405.501297][T23321] RAX: ffffffffffffffda RBX: 00007fd5204f7700 RCX: 000000000045c249 [ 405.501304][T23321] RDX: 00007fd5204f79d0 RSI: 00007fd5204f6db0 RDI: 00000000003d0f00 [ 405.501312][T23321] RBP: 00007fff9ff76fc0 R08: 00007fd5204f7700 R09: 00007fd5204f7700 [ 405.501319][T23321] R10: 00007fd5204f79d0 R11: 0000000000000202 R12: 0000000000000000 [ 405.501327][T23321] R13: 00007fff9ff76e5f R14: 00007fd5204f79c0 R15: 000000000075bfd4 [ 405.508580][T23321] memory: usage 307192kB, limit 307200kB, failcnt 1433 [ 405.579628][T23321] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 405.586498][T23321] Memory cgroup stats for /syz5: [ 405.586610][T23321] anon 265138176 [ 405.586610][T23321] file 0 [ 405.586610][T23321] kernel_stack 6815744 [ 405.586610][T23321] slab 12931072 [ 405.586610][T23321] sock 0 [ 405.586610][T23321] shmem 45056 [ 405.586610][T23321] file_mapped 135168 [ 405.586610][T23321] file_dirty 0 [ 405.586610][T23321] file_writeback 0 [ 405.586610][T23321] anon_thp 241172480 [ 405.586610][T23321] inactive_anon 135168 [ 405.586610][T23321] active_anon 265138176 [ 405.586610][T23321] inactive_file 0 [ 405.586610][T23321] active_file 57344 [ 405.586610][T23321] unevictable 0 [ 405.586610][T23321] slab_reclaimable 2703360 [ 405.586610][T23321] slab_unreclaimable 10227712 [ 405.586610][T23321] pgfault 48840 [ 405.586610][T23321] pgmajfault 0 [ 405.586610][T23321] workingset_refault 66 [ 405.586610][T23321] workingset_activate 0 [ 405.586610][T23321] workingset_nodereclaim 0 [ 405.586610][T23321] pgrefill 1336 [ 405.586610][T23321] pgscan 1514 [ 405.586610][T23321] pgsteal 252 [ 405.592039][T23321] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=23301,uid=0 [ 405.697321][T23321] Memory cgroup out of memory: Killed process 23301 (syz-executor.5) total-vm:72708kB, anon-rss:2208kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 405.733737][T23327] syz-executor.5 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 405.748844][T23327] CPU: 0 PID: 23327 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 405.749922][T23358] overlayfs: unrecognized mount option "é\dex=off" or missing value [ 405.757962][T23327] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 405.757967][T23327] Call Trace: [ 405.757988][T23327] dump_stack+0x172/0x1f0 11:43:20 executing program 5: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x80000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}]}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=0x9e22, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x3, 0x3}, 0x0, 0x0, &(0x7f0000000080)={0x3, 0xa, 0x20, 0x9}, &(0x7f0000000180)=0x3ff, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0xfff}}, 0x10) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x3c618f34) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000340)={'team0\x00', 0x0}) fstat(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@multicast1, @in6=@ipv4={[], [], @empty}, 0x4e23, 0x35, 0x4e21, 0xaed9, 0xa, 0x20, 0x80, 0x3c, r1, r2}, {0x7, 0x4, 0x8001, 0xff, 0x5, 0x1f, 0x7fffffff, 0x4}, {0x3, 0x40aa, 0x0, 0x3}, 0xfffffffffffffc2c, 0x0, 0x2, 0x1, 0x1, 0x1}, {{@in=@rand_addr=0x8, 0x4d3, 0x2b}, 0x2, @in6=@rand_addr="d3edb829b2ca51e1033d1d3fb4c9feb0", 0x3505, 0x2, 0x3, 0x0, 0x0, 0x5, 0x8001}}, 0xe8) 11:43:20 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:20 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x135, 0x0) 11:43:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x6300000000000000}}], 0x1, 0x0) 11:43:20 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\xf6', 0x0, 0x0) 11:43:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}, 0x0}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) [ 405.758006][T23327] dump_header+0x177/0x1152 [ 405.758028][T23327] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 405.793991][T23327] ? ___ratelimit+0x2c8/0x595 [ 405.798675][T23327] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 405.804486][T23327] ? lockdep_hardirqs_on+0x418/0x5d0 [ 405.809778][T23327] ? trace_hardirqs_on+0x67/0x240 [ 405.814816][T23327] ? pagefault_out_of_memory+0x11c/0x11c [ 405.820462][T23327] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 405.826282][T23327] ? ___ratelimit+0x60/0x595 [ 405.830883][T23327] ? do_raw_spin_unlock+0x57/0x270 [ 405.836018][T23327] oom_kill_process.cold+0x10/0x15 [ 405.841119][T23327] out_of_memory+0x334/0x1340 [ 405.841133][T23327] ? lock_downgrade+0x920/0x920 [ 405.841149][T23327] ? oom_killer_disable+0x280/0x280 [ 405.841173][T23327] mem_cgroup_out_of_memory+0x1d8/0x240 [ 405.841187][T23327] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 405.841206][T23327] ? do_raw_spin_unlock+0x57/0x270 [ 405.872131][T23327] ? _raw_spin_unlock+0x2d/0x50 [ 405.876993][T23327] try_charge+0xa2d/0x1440 [ 405.881441][T23327] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 405.886999][T23327] ? find_held_lock+0x35/0x130 [ 405.891777][T23327] ? get_mem_cgroup_from_mm+0x139/0x320 [ 405.897344][T23327] ? lock_downgrade+0x920/0x920 [ 405.902203][T23327] ? percpu_ref_tryget_live+0x111/0x290 [ 405.907763][T23327] __memcg_kmem_charge_memcg+0x71/0xf0 [ 405.913230][T23327] ? memcg_kmem_put_cache+0x50/0x50 [ 405.918437][T23327] ? get_mem_cgroup_from_mm+0x156/0x320 [ 405.923994][T23327] __memcg_kmem_charge+0x13a/0x3a0 [ 405.929114][T23327] __alloc_pages_nodemask+0x4f7/0x900 [ 405.934496][T23327] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 405.940054][T23327] ? __alloc_pages_slowpath+0x2540/0x2540 [ 405.945785][T23327] ? percpu_ref_put_many+0xb6/0x190 [ 405.951004][T23327] ? lockdep_hardirqs_on+0x418/0x5d0 [ 405.956397][T23327] ? trace_hardirqs_on+0x67/0x240 [ 405.961428][T23327] ? __kasan_check_read+0x11/0x20 [ 405.966465][T23327] copy_process+0x3f8/0x6830 [ 405.971061][T23327] ? do_sys_open+0x318/0x5d0 [ 405.975659][T23327] ? __kasan_check_read+0x11/0x20 [ 405.980690][T23327] ? __lock_acquire+0x16f2/0x4a00 [ 405.985725][T23327] ? __cleanup_sighand+0x60/0x60 [ 405.990668][T23327] ? __might_fault+0x12b/0x1e0 [ 405.995440][T23327] ? __might_fault+0x12b/0x1e0 [ 406.000220][T23327] _do_fork+0x146/0xfa0 [ 406.004384][T23327] ? copy_init_mm+0x20/0x20 [ 406.008898][T23327] ? __kasan_check_read+0x11/0x20 [ 406.013916][T23327] ? _copy_to_user+0x118/0x160 [ 406.018688][T23327] __x64_sys_clone+0x1ab/0x270 [ 406.023454][T23327] ? __ia32_sys_vfork+0xd0/0xd0 [ 406.028318][T23327] ? do_syscall_64+0x26/0x760 11:43:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x6800000000000000}}], 0x1, 0x0) [ 406.033004][T23327] ? lockdep_hardirqs_on+0x418/0x5d0 [ 406.038295][T23327] ? trace_hardirqs_on+0x67/0x240 [ 406.043329][T23327] do_syscall_64+0xfa/0x760 [ 406.047848][T23327] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 406.053742][T23327] RIP: 0033:0x459879 [ 406.057631][T23327] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 11:43:21 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x2, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) [ 406.077219][T23327] RSP: 002b:00007fd520517c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 406.077232][T23327] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000459879 [ 406.077240][T23327] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 00000200000007fd [ 406.077246][T23327] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 406.077254][T23327] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5205186d4 [ 406.077261][T23327] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 00000000ffffffff [ 406.096337][T23327] memory: usage 307200kB, limit 307200kB, failcnt 1464 11:43:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x6c00000000000000}}], 0x1, 0x0) 11:43:21 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:21 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x136, 0x0) 11:43:21 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x4, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) [ 406.243015][T23327] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 406.254374][T23327] Memory cgroup stats for /syz5: [ 406.254529][T23327] anon 265166848 [ 406.254529][T23327] file 0 [ 406.254529][T23327] kernel_stack 6815744 [ 406.254529][T23327] slab 12931072 [ 406.254529][T23327] sock 0 [ 406.254529][T23327] shmem 45056 [ 406.254529][T23327] file_mapped 135168 [ 406.254529][T23327] file_dirty 0 [ 406.254529][T23327] file_writeback 0 [ 406.254529][T23327] anon_thp 241172480 [ 406.254529][T23327] inactive_anon 135168 [ 406.254529][T23327] active_anon 265166848 [ 406.254529][T23327] inactive_file 0 [ 406.254529][T23327] active_file 57344 [ 406.254529][T23327] unevictable 0 [ 406.254529][T23327] slab_reclaimable 2703360 [ 406.254529][T23327] slab_unreclaimable 10227712 [ 406.254529][T23327] pgfault 48906 [ 406.254529][T23327] pgmajfault 0 [ 406.254529][T23327] workingset_refault 66 [ 406.254529][T23327] workingset_activate 0 [ 406.254529][T23327] workingset_nodereclaim 0 [ 406.254529][T23327] pgrefill 1336 [ 406.254529][T23327] pgscan 1547 [ 406.254529][T23327] pgsteal 252 [ 406.259545][T23327] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=23265,uid=0 [ 406.369798][T23327] Memory cgroup out of memory: Killed process 23265 (syz-executor.5) total-vm:72708kB, anon-rss:2208kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 406.523965][T23364] syz-executor.5 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 [ 406.597920][T23364] CPU: 0 PID: 23364 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 406.607067][T23364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 406.617129][T23364] Call Trace: [ 406.620430][T23364] dump_stack+0x172/0x1f0 [ 406.624773][T23364] dump_header+0x177/0x1152 [ 406.629291][T23364] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 406.635104][T23364] ? ___ratelimit+0x2c8/0x595 [ 406.639786][T23364] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 406.645599][T23364] ? lockdep_hardirqs_on+0x418/0x5d0 [ 406.650893][T23364] ? trace_hardirqs_on+0x67/0x240 [ 406.655927][T23364] ? pagefault_out_of_memory+0x11c/0x11c [ 406.661569][T23364] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 406.667383][T23364] ? ___ratelimit+0x60/0x595 [ 406.671995][T23364] ? do_raw_spin_unlock+0x57/0x270 [ 406.677102][T23364] oom_kill_process.cold+0x10/0x15 [ 406.682196][T23364] out_of_memory+0x334/0x1340 [ 406.686866][T23364] ? lock_downgrade+0x920/0x920 [ 406.691728][T23364] ? oom_killer_disable+0x280/0x280 [ 406.696932][T23364] mem_cgroup_out_of_memory+0x1d8/0x240 [ 406.702477][T23364] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 406.708124][T23364] ? do_raw_spin_unlock+0x57/0x270 [ 406.713234][T23364] ? _raw_spin_unlock+0x2d/0x50 [ 406.718074][T23364] try_charge+0xf4b/0x1440 [ 406.722477][T23364] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 406.728010][T23364] ? find_held_lock+0x35/0x130 [ 406.732768][T23364] ? get_mem_cgroup_from_mm+0x139/0x320 [ 406.738426][T23364] ? lock_downgrade+0x920/0x920 [ 406.743256][T23364] ? percpu_ref_tryget_live+0x111/0x290 [ 406.748794][T23364] __memcg_kmem_charge_memcg+0x71/0xf0 [ 406.754253][T23364] ? memcg_kmem_put_cache+0x50/0x50 [ 406.759463][T23364] ? get_mem_cgroup_from_mm+0x156/0x320 [ 406.765232][T23364] __memcg_kmem_charge+0x13a/0x3a0 [ 406.770539][T23364] __alloc_pages_nodemask+0x4f7/0x900 [ 406.775908][T23364] ? find_held_lock+0x35/0x130 [ 406.780668][T23364] ? __alloc_pages_slowpath+0x2540/0x2540 [ 406.786406][T23364] ? percpu_ref_put_many+0x94/0x190 [ 406.791602][T23364] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 406.797845][T23364] alloc_pages_current+0x107/0x210 [ 406.802954][T23364] __get_free_pages+0xc/0x40 [ 406.807520][T23364] pgd_alloc+0x8b/0x3f0 [ 406.811669][T23364] ? pgd_page_get_mm+0x40/0x40 [ 406.816422][T23364] ? lockdep_init_map+0x1be/0x6d0 [ 406.821427][T23364] ? lockdep_init_map+0x1be/0x6d0 [ 406.826458][T23364] mm_init+0x590/0x9b0 [ 406.830522][T23364] dup_mm+0xde/0x1430 [ 406.834504][T23364] ? copy_process+0x22ba/0x6830 [ 406.839362][T23364] ? lock_downgrade+0x920/0x920 [ 406.844206][T23364] ? vm_area_dup+0x170/0x170 [ 406.848793][T23364] ? debug_mutex_init+0x2d/0x60 [ 406.853644][T23364] copy_process+0x2671/0x6830 [ 406.858308][T23364] ? __cleanup_sighand+0x60/0x60 [ 406.863228][T23364] ? __might_fault+0x12b/0x1e0 [ 406.867985][T23364] ? __might_fault+0x12b/0x1e0 [ 406.872769][T23364] _do_fork+0x146/0xfa0 [ 406.877015][T23364] ? copy_init_mm+0x20/0x20 [ 406.882290][T23364] ? __kasan_check_read+0x11/0x20 [ 406.887341][T23364] ? _copy_to_user+0x118/0x160 [ 406.892108][T23364] __x64_sys_clone+0x1ab/0x270 [ 406.896887][T23364] ? __ia32_sys_vfork+0xd0/0xd0 [ 406.901840][T23364] ? do_syscall_64+0x26/0x760 [ 406.906594][T23364] ? lockdep_hardirqs_on+0x418/0x5d0 [ 406.911868][T23364] ? trace_hardirqs_on+0x67/0x240 [ 406.916883][T23364] do_syscall_64+0xfa/0x760 [ 406.921368][T23364] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 406.927234][T23364] RIP: 0033:0x459879 [ 406.931126][T23364] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 406.950726][T23364] RSP: 002b:00007fd520517c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 406.959138][T23364] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000459879 [ 406.967277][T23364] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000080000 [ 406.975232][T23364] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 406.983187][T23364] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5205186d4 [ 406.991147][T23364] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 00000000ffffffff [ 406.999870][T23364] memory: usage 304572kB, limit 307200kB, failcnt 1464 [ 407.007441][T23364] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 407.015222][T23364] Memory cgroup stats for /syz5: [ 407.015343][T23364] anon 263053312 [ 407.015343][T23364] file 0 [ 407.015343][T23364] kernel_stack 6815744 [ 407.015343][T23364] slab 12931072 [ 407.015343][T23364] sock 0 [ 407.015343][T23364] shmem 45056 [ 407.015343][T23364] file_mapped 135168 [ 407.015343][T23364] file_dirty 0 [ 407.015343][T23364] file_writeback 0 [ 407.015343][T23364] anon_thp 239075328 [ 407.015343][T23364] inactive_anon 135168 [ 407.015343][T23364] active_anon 263053312 [ 407.015343][T23364] inactive_file 0 [ 407.015343][T23364] active_file 57344 [ 407.015343][T23364] unevictable 0 [ 407.015343][T23364] slab_reclaimable 2703360 [ 407.015343][T23364] slab_unreclaimable 10227712 [ 407.015343][T23364] pgfault 48906 [ 407.015343][T23364] pgmajfault 0 [ 407.015343][T23364] workingset_refault 66 [ 407.015343][T23364] workingset_activate 0 [ 407.015343][T23364] workingset_nodereclaim 0 [ 407.015343][T23364] pgrefill 1336 [ 407.015343][T23364] pgscan 1547 [ 407.015343][T23364] pgsteal 252 [ 407.110297][T23364] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=16157,uid=0 [ 407.125871][T23364] Memory cgroup out of memory: Killed process 16157 (syz-executor.5) total-vm:72708kB, anon-rss:2208kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 407.144555][ T1065] oom_reaper: reaped process 16157 (syz-executor.5), now anon-rss:0kB, file-rss:34832kB, shmem-rss:0kB [ 407.146997][T23363] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 407.166237][T23363] CPU: 0 PID: 23363 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 407.175516][T23363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 407.185568][T23363] Call Trace: [ 407.188854][T23363] dump_stack+0x172/0x1f0 [ 407.193340][T23363] dump_header+0x177/0x1152 [ 407.197839][T23363] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 407.203685][T23363] ? ___ratelimit+0x2c8/0x595 [ 407.208520][T23363] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 407.214317][T23363] ? lockdep_hardirqs_on+0x418/0x5d0 [ 407.219590][T23363] ? trace_hardirqs_on+0x67/0x240 [ 407.224787][T23363] ? pagefault_out_of_memory+0x11c/0x11c [ 407.230416][T23363] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 407.236256][T23363] ? ___ratelimit+0x60/0x595 [ 407.240833][T23363] ? do_raw_spin_unlock+0x57/0x270 [ 407.246214][T23363] oom_kill_process.cold+0x10/0x15 [ 407.251321][T23363] out_of_memory+0x334/0x1340 [ 407.255979][T23363] ? lock_downgrade+0x920/0x920 [ 407.260910][T23363] ? oom_killer_disable+0x280/0x280 [ 407.266138][T23363] mem_cgroup_out_of_memory+0x1d8/0x240 [ 407.271667][T23363] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 407.277280][T23363] ? do_raw_spin_unlock+0x57/0x270 [ 407.282390][T23363] ? _raw_spin_unlock+0x2d/0x50 [ 407.287231][T23363] try_charge+0xa2d/0x1440 [ 407.291636][T23363] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 407.297161][T23363] ? percpu_ref_tryget_live+0x111/0x290 [ 407.302691][T23363] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 407.308926][T23363] ? __kasan_check_read+0x11/0x20 [ 407.313944][T23363] ? get_mem_cgroup_from_mm+0x156/0x320 [ 407.319480][T23363] mem_cgroup_try_charge+0x136/0x590 [ 407.324755][T23363] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 407.331008][T23363] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 407.336626][T23363] __handle_mm_fault+0x1e34/0x3f20 [ 407.341739][T23363] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 407.347282][T23363] ? __kasan_check_read+0x11/0x20 [ 407.352310][T23363] handle_mm_fault+0x1b5/0x6c0 [ 407.357057][T23363] __do_page_fault+0x536/0xdd0 [ 407.361818][T23363] do_page_fault+0x38/0x590 [ 407.366321][T23363] page_fault+0x39/0x40 [ 407.370460][T23363] RIP: 0033:0x4111bf [ 407.374342][T23363] Code: 0f 84 c8 02 00 00 48 83 bd 78 ff ff ff 00 0f 84 f9 04 00 00 48 8b 95 68 ff ff ff 44 89 95 38 ff ff ff 4c 8d ac 10 00 f7 ff ff <49> 89 85 90 06 00 00 49 8d 85 10 03 00 00 49 89 95 98 06 00 00 41 [ 407.393932][T23363] RSP: 002b:00007fff9ff76df0 EFLAGS: 00010206 [ 407.399987][T23363] RAX: 00007fd5204d7000 RBX: 0000000000020000 RCX: 00000000004598ca [ 407.407949][T23363] RDX: 0000000000021000 RSI: 0000000000021000 RDI: 0000000000000000 [ 407.416045][T23363] RBP: 00007fff9ff76ed0 R08: ffffffffffffffff R09: 0000000000000000 [ 407.424018][T23363] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fff9ff76fc0 [ 407.431992][T23363] R13: 00007fd5204f7700 R14: 0000000000000001 R15: 000000000075bfd4 [ 407.440388][T23363] memory: usage 302224kB, limit 307200kB, failcnt 1464 [ 407.447262][T23363] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 407.454199][T23363] Memory cgroup stats for /syz5: [ 407.454308][T23363] anon 260857856 [ 407.454308][T23363] file 0 [ 407.454308][T23363] kernel_stack 6815744 [ 407.454308][T23363] slab 12931072 [ 407.454308][T23363] sock 0 [ 407.454308][T23363] shmem 45056 [ 407.454308][T23363] file_mapped 135168 [ 407.454308][T23363] file_dirty 0 [ 407.454308][T23363] file_writeback 0 [ 407.454308][T23363] anon_thp 236978176 [ 407.454308][T23363] inactive_anon 135168 [ 407.454308][T23363] active_anon 260857856 [ 407.454308][T23363] inactive_file 0 [ 407.454308][T23363] active_file 57344 [ 407.454308][T23363] unevictable 0 [ 407.454308][T23363] slab_reclaimable 2703360 [ 407.454308][T23363] slab_unreclaimable 10227712 [ 407.454308][T23363] pgfault 48906 [ 407.454308][T23363] pgmajfault 0 [ 407.454308][T23363] workingset_refault 66 [ 407.454308][T23363] workingset_activate 0 [ 407.454308][T23363] workingset_nodereclaim 0 [ 407.454308][T23363] pgrefill 1336 [ 407.454308][T23363] pgscan 1547 [ 407.454308][T23363] pgsteal 252 [ 407.548306][T23363] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=16133,uid=0 [ 407.564354][T23363] Memory cgroup out of memory: Killed process 16133 (syz-executor.5) total-vm:72708kB, anon-rss:2208kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 407.584022][ T1065] oom_reaper: reaped process 16133 (syz-executor.5), now anon-rss:0kB, file-rss:34832kB, shmem-rss:0kB 11:43:22 executing program 5: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x8e997b0134a245f4, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x9, 0x3, 0x2f0, 0x0, 0x128, 0x128, 0x128, 0x0, 0x220, 0x220, 0x220, 0x220, 0x220, 0x3, &(0x7f00000001c0), {[{{@uncond, 0x0, 0xc8, 0x128}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@empty, [0xffffffff, 0x0, 0xff, 0xffffff00], 0x4e21, 0x4e23, 0x4e23, 0x4e24, 0xd5f, 0x2, 0x64, 0x8001, 0x1}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x2, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [0xffffff00, 0x0, 0xffffffff], [0x0, 0xffffff00, 0xffffffff], 'nr0\x00', 'syzkaller0\x00', {0xff}, {}, 0x5e, 0xfff, 0x5, 0x2}, 0x0, 0xc8, 0xf8}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0xfff, 0x5, 0xd8}, {0x9, 0xffff, 0xc7}, 0x6, 0x8000}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x350) write$P9_RREADLINK(r0, &(0x7f0000000040)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x28940000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}]}) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000180)='TRUE', 0x3, 0x98ee91966b454d56) 11:43:22 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\xff', 0x0, 0x0) 11:43:22 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0xf, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x7400000000000000}}], 0x1, 0x0) 11:43:22 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x137, 0x0) [ 407.600162][T23404] overlayfs: unrecognized mount option "i\dex=off" or missing value [ 407.626346][T23404] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x7a00000000000000}}], 0x1, 0x0) 11:43:22 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\xf6', 0x0, 0x0) 11:43:22 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x5d, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:22 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x138, 0x0) [ 407.910961][T23429] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:23 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:23 executing program 5: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}]}) getsockname$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10) syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x48000) accept$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14) 11:43:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0xb80b000000000000}}], 0x1, 0x0) 11:43:23 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0xf00, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:23 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x139, 0x0) 11:43:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x4000, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0xe803000000000000}}], 0x1, 0x0) 11:43:23 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:23 executing program 5: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fcntl$getown(r0, 0x9) syz_open_procfs(r1, &(0x7f0000000000)='net/rt6_stats\x00') 11:43:23 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 408.281967][T23461] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:23 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x13a, 0x0) 11:43:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x5d00, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0xeffdffff00000000}}], 0x1, 0x0) 11:43:23 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:23 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:23 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x13b, 0x0) 11:43:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x40000, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:23 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="695c6465783d6f66662c00447927267eec4d7eb29423342f4d3629dc7e5cb0f37b9ecd90e111ec77dd9cababc1ee"]) 11:43:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0xf401000000000000}}], 0x1, 0x0) 11:43:23 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:23 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 408.830790][T23507] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:24 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x6c) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}]}) 11:43:24 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x1000000, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:24 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x13c, 0x0) 11:43:24 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:24 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0xfeffffff00000000}}], 0x1, 0x0) [ 409.013963][T23525] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:24 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}]}) 11:43:24 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x2000000, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:24 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x13d, 0x0) 11:43:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0xff00000000000000}}], 0x1, 0x0) 11:43:24 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:24 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 409.281969][T23550] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:24 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0xf000000, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:24 executing program 5: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000000), &(0x7f0000000040)=0x4) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}]}) 11:43:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0xffff000000000000}}], 0x1, 0x0) 11:43:24 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x13e, 0x0) 11:43:24 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:24 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:24 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x40000000, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) [ 409.598633][T23573] syz-executor.5 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 409.653581][T23573] CPU: 0 PID: 23573 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 409.662727][T23573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 409.672790][T23573] Call Trace: [ 409.676092][T23573] dump_stack+0x172/0x1f0 [ 409.680436][T23573] dump_header+0x177/0x1152 [ 409.684954][T23573] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 409.690767][T23573] ? ___ratelimit+0x2c8/0x595 [ 409.695453][T23573] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 409.701265][T23573] ? lockdep_hardirqs_on+0x418/0x5d0 [ 409.706557][T23573] ? trace_hardirqs_on+0x67/0x240 [ 409.711592][T23573] ? pagefault_out_of_memory+0x11c/0x11c [ 409.717232][T23573] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 409.723042][T23573] ? ___ratelimit+0x60/0x595 [ 409.727639][T23573] ? do_raw_spin_unlock+0x57/0x270 [ 409.732751][T23573] oom_kill_process.cold+0x10/0x15 [ 409.732767][T23573] out_of_memory+0x334/0x1340 [ 409.732781][T23573] ? lock_downgrade+0x920/0x920 [ 409.732798][T23573] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 409.732813][T23573] ? oom_killer_disable+0x280/0x280 [ 409.732838][T23573] mem_cgroup_out_of_memory+0x1d8/0x240 [ 409.732858][T23573] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 409.747444][T23573] ? do_raw_spin_unlock+0x57/0x270 [ 409.747465][T23573] ? _raw_spin_unlock+0x2d/0x50 [ 409.779599][T23573] try_charge+0xf4b/0x1440 [ 409.784030][T23573] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 409.789585][T23573] ? find_held_lock+0x35/0x130 [ 409.794363][T23573] ? get_mem_cgroup_from_mm+0x139/0x320 11:43:24 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x13f, 0x0) [ 409.799910][T23573] ? lock_downgrade+0x920/0x920 [ 409.804757][T23573] ? percpu_ref_tryget_live+0x111/0x290 [ 409.810321][T23573] __memcg_kmem_charge_memcg+0x71/0xf0 [ 409.815796][T23573] ? memcg_kmem_put_cache+0x50/0x50 [ 409.821010][T23573] ? get_mem_cgroup_from_mm+0x156/0x320 [ 409.826567][T23573] __memcg_kmem_charge+0x13a/0x3a0 [ 409.831693][T23573] __alloc_pages_nodemask+0x4f7/0x900 [ 409.837080][T23573] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 409.842643][T23573] ? __alloc_pages_slowpath+0x2540/0x2540 [ 409.848374][T23573] ? percpu_ref_put_many+0xb6/0x190 [ 409.853762][T23573] ? lockdep_hardirqs_on+0x418/0x5d0 [ 409.859059][T23573] ? trace_hardirqs_on+0x67/0x240 [ 409.864090][T23573] ? __kasan_check_read+0x11/0x20 [ 409.869129][T23573] copy_process+0x3f8/0x6830 [ 409.873734][T23573] ? psi_memstall_leave+0x12e/0x180 [ 409.878951][T23573] ? __cleanup_sighand+0x60/0x60 [ 409.883899][T23573] ? __kasan_check_read+0x11/0x20 [ 409.888926][T23573] ? __lock_acquire+0x8a0/0x4a00 [ 409.893871][T23573] ? _raw_spin_unlock_irq+0x5e/0x90 [ 409.899080][T23573] _do_fork+0x146/0xfa0 11:43:25 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:25 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x140, 0x0) [ 409.903240][T23573] ? copy_init_mm+0x20/0x20 [ 409.907754][T23573] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 409.914000][T23573] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 409.920248][T23573] ? debug_smp_processor_id+0x3c/0x214 [ 409.925723][T23573] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 409.931886][T23573] __x64_sys_clone+0x1ab/0x270 [ 409.936640][T23573] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 409.942622][T23573] ? __ia32_sys_vfork+0xd0/0xd0 [ 409.947478][T23573] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 409.953734][T23573] ? do_syscall_64+0x26/0x760 [ 409.958421][T23573] ? lockdep_hardirqs_on+0x418/0x5d0 [ 409.963719][T23573] ? trace_hardirqs_on+0x67/0x240 [ 409.968759][T23573] do_syscall_64+0xfa/0x760 [ 409.973268][T23573] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 409.973280][T23573] RIP: 0033:0x45c249 [ 409.973296][T23573] Code: ff 48 85 f6 0f 84 27 8e fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c fe 8d fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 11:43:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x5d000000, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0xffffffff00000000}}], 0x1, 0x0) [ 409.973307][T23573] RSP: 002b:00007fff9ff76da8 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 410.011153][T23573] RAX: ffffffffffffffda RBX: 00007fd520518700 RCX: 000000000045c249 [ 410.011162][T23573] RDX: 00007fd5205189d0 RSI: 00007fd520517db0 RDI: 00000000003d0f00 [ 410.011171][T23573] RBP: 00007fff9ff76fc0 R08: 00007fd520518700 R09: 00007fd520518700 [ 410.011179][T23573] R10: 00007fd5205189d0 R11: 0000000000000202 R12: 0000000000000000 [ 410.011187][T23573] R13: 00007fff9ff76e5f R14: 00007fd5205189c0 R15: 000000000075bf2c 11:43:25 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 410.146409][T23573] memory: usage 307192kB, limit 307200kB, failcnt 1499 [ 410.162855][T23573] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 410.175924][T23573] Memory cgroup stats for /syz5: [ 410.176034][T23573] anon 265150464 [ 410.176034][T23573] file 0 [ 410.176034][T23573] kernel_stack 6750208 [ 410.176034][T23573] slab 13066240 [ 410.176034][T23573] sock 0 [ 410.176034][T23573] shmem 45056 [ 410.176034][T23573] file_mapped 135168 [ 410.176034][T23573] file_dirty 0 [ 410.176034][T23573] file_writeback 0 [ 410.176034][T23573] anon_thp 241172480 [ 410.176034][T23573] inactive_anon 135168 [ 410.176034][T23573] active_anon 265150464 [ 410.176034][T23573] inactive_file 0 [ 410.176034][T23573] active_file 57344 [ 410.176034][T23573] unevictable 0 [ 410.176034][T23573] slab_reclaimable 2703360 [ 410.176034][T23573] slab_unreclaimable 10362880 [ 410.176034][T23573] pgfault 49401 [ 410.176034][T23573] pgmajfault 0 [ 410.176034][T23573] workingset_refault 66 [ 410.176034][T23573] workingset_activate 0 [ 410.176034][T23573] workingset_nodereclaim 0 [ 410.176034][T23573] pgrefill 1336 [ 410.176034][T23573] pgscan 1580 [ 410.176034][T23573] pgsteal 252 [ 410.295323][T23573] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=23551,uid=0 [ 410.311168][T23573] Memory cgroup out of memory: Killed process 23551 (syz-executor.5) total-vm:72708kB, anon-rss:2208kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 11:43:25 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) accept4(r0, &(0x7f00000009c0)=@sco, &(0x7f0000000a40)=0x80, 0x80000) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x40, 0x0) r2 = eventfd2(0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000280)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@empty, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in=@empty, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@dev}}, &(0x7f0000000540)=0x362) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@multicast1, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@empty}}, &(0x7f0000000680)=0xe8) openat$fuse(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x80000, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@version_L='version=9p2000.L'}, {@access_uid={'access', 0x3d, r3}}, {@dfltuid={'dfltuid', 0x3d, r4}}, {@cache_loose='cache=loose'}, {@access_uid={'access', 0x3d, r5}}, {@cache_fscache='cache=fscache'}], [{@fsmagic={'fsmagic', 0x3d, 0x2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}, {@euid_lt={'euid<', r6}}, {@euid_gt={'euid>', r7}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@seclabel='seclabel'}, {@fowner_lt={'fowner<', r8}}]}}) socket$inet_udplite(0x2, 0x2, 0x88) creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="6727d72fff2903b5662c00"]) 11:43:25 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x141, 0x0) 11:43:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:25 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x2, 0x0) 11:43:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x7fffeedf, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:25 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 410.349440][T23616] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x7fffeeee, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:25 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x3, 0x0) 11:43:25 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x142, 0x0) 11:43:25 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:25 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380)='/dev/btrfs-control\x00', 0x18000, 0x0) setsockopt$packet_buf(r0, 0x107, 0xd, &(0x7f0000000140)="9c0c42ca948333cc77f6e0148db94d0368c855c93b9c499ca801c0ec6b145ff2f5e7c6f2529bd2d0ba95b97dd3a99e97df0db393bed0b9c9984dc4c2c3d354ff3b43857a40cec00d7388c31ce59da4818e03d5117f124f7d0ef7faa191f421a6257937e4e543ba5b889ca0c6ffc9320bce666fa9347625f42c7bd515db964b053321a6", 0x83) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x10088) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="8af6c3695c6465da9a1b0f5a8c83de652dc21f40bb7575783d6f66662cf2005f31e8cf1863009ef0ffcaf3335dc30f72e9791a9e8b37710e5a626c69921798b48933d407d94b77b570df685ac7609754af56a5f6d0156d41571256f87b0c4afa4906c8a75c1191234911c564785841f2334011571ac2dc6e93c74d2c4f32a07407e638a522fb2f739cf0067864cb6d9eee6f7de5068312b0778a768a305655455ee53fd4a20652b9a7dbf96121ef5e661bf428705fd784509b37f42ba86d4ea53c1667c291cc1c8fe5477efb517b373a98bab5983611816a8c390dc8dbded175d57f098064a30f2c09adb71075aadc27"]) getsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000080)=0x8000, &(0x7f0000000200)=0x2) [ 410.579386][T23637] overlayfs: unrecognized mount option "g'×/ÿ)µf" or missing value 11:43:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:25 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x4, 0x0) 11:43:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0xdfeeff7f, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:25 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) [ 410.860677][T23657] syz-executor.5 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 410.922009][T23657] CPU: 0 PID: 23657 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 410.931165][T23657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 410.941229][T23657] Call Trace: [ 410.944534][T23657] dump_stack+0x172/0x1f0 [ 410.948879][T23657] dump_header+0x177/0x1152 [ 410.953408][T23657] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 410.959221][T23657] ? ___ratelimit+0x2c8/0x595 [ 410.963901][T23657] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 410.969713][T23657] ? lockdep_hardirqs_on+0x418/0x5d0 [ 410.975007][T23657] ? trace_hardirqs_on+0x67/0x240 [ 410.980042][T23657] ? pagefault_out_of_memory+0x11c/0x11c [ 410.985683][T23657] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 410.991488][T23657] ? ___ratelimit+0x60/0x595 [ 410.996428][T23657] ? do_raw_spin_unlock+0x57/0x270 [ 411.001551][T23657] oom_kill_process.cold+0x10/0x15 [ 411.008114][T23657] out_of_memory+0x334/0x1340 [ 411.012796][T23657] ? lock_downgrade+0x920/0x920 [ 411.017656][T23657] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 411.023473][T23657] ? oom_killer_disable+0x280/0x280 [ 411.028685][T23657] mem_cgroup_out_of_memory+0x1d8/0x240 [ 411.034238][T23657] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 411.039887][T23657] ? do_raw_spin_unlock+0x57/0x270 [ 411.045010][T23657] ? _raw_spin_unlock+0x2d/0x50 [ 411.049876][T23657] try_charge+0xf4b/0x1440 [ 411.054316][T23657] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 411.059866][T23657] ? find_held_lock+0x35/0x130 [ 411.064635][T23657] ? get_mem_cgroup_from_mm+0x139/0x320 [ 411.070192][T23657] ? lock_downgrade+0x920/0x920 [ 411.075048][T23657] ? percpu_ref_tryget_live+0x111/0x290 [ 411.080702][T23657] __memcg_kmem_charge_memcg+0x71/0xf0 [ 411.086162][T23657] ? memcg_kmem_put_cache+0x50/0x50 [ 411.091370][T23657] ? get_mem_cgroup_from_mm+0x156/0x320 [ 411.097434][T23657] __memcg_kmem_charge+0x13a/0x3a0 [ 411.102546][T23657] __alloc_pages_nodemask+0x4f7/0x900 [ 411.102561][T23657] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 411.102575][T23657] ? __alloc_pages_slowpath+0x2540/0x2540 [ 411.102586][T23657] ? percpu_ref_put_many+0xb6/0x190 [ 411.102604][T23657] ? lockdep_hardirqs_on+0x418/0x5d0 [ 411.102617][T23657] ? trace_hardirqs_on+0x67/0x240 [ 411.102628][T23657] ? __kasan_check_read+0x11/0x20 [ 411.102647][T23657] copy_process+0x3f8/0x6830 [ 411.102661][T23657] ? psi_memstall_leave+0x12e/0x180 [ 411.102686][T23657] ? __cleanup_sighand+0x60/0x60 [ 411.102701][T23657] ? __kasan_check_read+0x11/0x20 [ 411.102716][T23657] ? __lock_acquire+0x8a0/0x4a00 [ 411.164737][T23657] ? _raw_spin_unlock_irq+0x5e/0x90 [ 411.169942][T23657] _do_fork+0x146/0xfa0 [ 411.174097][T23657] ? copy_init_mm+0x20/0x20 [ 411.178618][T23657] ? lock_downgrade+0x920/0x920 [ 411.183479][T23657] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 411.189729][T23657] __x64_sys_clone+0x1ab/0x270 [ 411.194511][T23657] ? __ia32_sys_vfork+0xd0/0xd0 [ 411.199368][T23657] ? __blkcg_punt_bio_submit+0x1e0/0x1e0 [ 411.204997][T23657] ? mem_cgroup_handle_over_high+0x21b/0x2a0 [ 411.211077][T23657] ? do_syscall_64+0x26/0x760 [ 411.215759][T23657] ? lockdep_hardirqs_on+0x418/0x5d0 11:43:26 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x2, 0x0) 11:43:26 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x143, 0x0) 11:43:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0xeeeeff7f, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) [ 411.221051][T23657] ? trace_hardirqs_on+0x67/0x240 [ 411.226092][T23657] do_syscall_64+0xfa/0x760 [ 411.230600][T23657] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 411.236588][T23657] RIP: 0033:0x45c249 [ 411.240489][T23657] Code: ff 48 85 f6 0f 84 27 8e fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c fe 8d fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 411.260181][T23657] RSP: 002b:00007fff9ff76da8 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 11:43:26 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x0) [ 411.268690][T23657] RAX: ffffffffffffffda RBX: 00007fd520518700 RCX: 000000000045c249 [ 411.276671][T23657] RDX: 00007fd5205189d0 RSI: 00007fd520517db0 RDI: 00000000003d0f00 [ 411.284652][T23657] RBP: 00007fff9ff76fc0 R08: 00007fd520518700 R09: 00007fd520518700 [ 411.292631][T23657] R10: 00007fd5205189d0 R11: 0000000000000202 R12: 0000000000000000 [ 411.300610][T23657] R13: 00007fff9ff76e5f R14: 00007fd5205189c0 R15: 000000000075bf2c 11:43:26 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x3, 0x0) [ 411.415030][T23657] memory: usage 307196kB, limit 307200kB, failcnt 1533 [ 411.429020][T23657] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 411.466836][T23657] Memory cgroup stats for /syz5: [ 411.466941][T23657] anon 265261056 [ 411.466941][T23657] file 0 [ 411.466941][T23657] kernel_stack 6750208 [ 411.466941][T23657] slab 13066240 [ 411.466941][T23657] sock 0 [ 411.466941][T23657] shmem 45056 [ 411.466941][T23657] file_mapped 135168 [ 411.466941][T23657] file_dirty 0 [ 411.466941][T23657] file_writeback 0 [ 411.466941][T23657] anon_thp 241172480 [ 411.466941][T23657] inactive_anon 135168 [ 411.466941][T23657] active_anon 265261056 [ 411.466941][T23657] inactive_file 0 [ 411.466941][T23657] active_file 57344 [ 411.466941][T23657] unevictable 0 [ 411.466941][T23657] slab_reclaimable 2703360 [ 411.466941][T23657] slab_unreclaimable 10362880 [ 411.466941][T23657] pgfault 49533 [ 411.466941][T23657] pgmajfault 0 [ 411.466941][T23657] workingset_refault 66 [ 411.466941][T23657] workingset_activate 0 [ 411.466941][T23657] workingset_nodereclaim 0 [ 411.466941][T23657] pgrefill 1336 [ 411.466941][T23657] pgscan 1580 [ 411.466941][T23657] pgsteal 252 [ 411.570487][T23657] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=23639,uid=0 [ 411.594685][T23657] Memory cgroup out of memory: Killed process 23639 (syz-executor.5) total-vm:72576kB, anon-rss:2200kB, file-rss:35800kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 11:43:26 executing program 5: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendto$inet(r0, &(0x7f0000000000)="99baff34ab318ecfe79a042f8aec5d47d38437c18251e6c589909fd7a90e94255e190bf78ef4b04c17921c062a0f63aa3e98b4181acea8ec8028f55b0157e436d74aef99db407a8cf569cdbc615132", 0x4f, 0x4000000, &(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}]}) 11:43:26 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x144, 0x0) 11:43:26 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x6, 0x0) 11:43:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x7ffffffff000, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:26 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x4, 0x0) [ 411.668659][T23699] overlayfs: unrecognized mount option "ŠöÃi\deÚšZŒƒÞe-Â@»uux=off" or missing value 11:43:26 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x7, 0x0) 11:43:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:26 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x0) 11:43:27 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x4000000000000, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) [ 411.891677][T23719] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:27 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x145, 0x0) 11:43:27 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x300, 0x0) [ 411.954881][T23725] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:27 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x3, 0x0) sync_file_range(r0, 0xdb8, 0x9, 0x92560d8afcb85da6) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}]}) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000200)={0x1000}, 0x4) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000300)={0x0, 0xed, "bd495ed52fad490ef105f8d5feb6ef1df1c3bd3bc82134de0c90c98c788638b7528aad2a7173b00a9ae012cdaa85921da46f0b46d34658654c5299cfc518abfd4d7015f12fe4902bdcbb024d16cc5fbbc1a4ef744fa7405c3db02d4b9859d6013d6b7f60b544ea66a77c56941742883eb714beee2d984e59756fa2110d590d01e8fdd743b7376febac83049a2139504861c59a8bc8ecd4ed234ff4528829533c7f106accdf1e651609168d1fd94679dd936940ef2ccb95e2abc0bfbd61bb825368f33222020f0bb078b060b7b3b0de3a2b8c5f375fbccc915b973a428c918ebc47b40d16fb2c22fc490215aa04"}, &(0x7f0000000240)=0xf5) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000280)={r2, 0x1}, 0x8) mount(&(0x7f0000000040)=@md0='/dev/md0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='anon_inodefs\x00', 0x400, &(0x7f00000001c0)='i\\dex=off') 11:43:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:27 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x6, 0x0) 11:43:27 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0xf0ffffff7f0000, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:27 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x146, 0x0) 11:43:27 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x7, 0x0) 11:43:27 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x500, 0x0) 11:43:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) [ 412.249914][T23752] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:27 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x100000000000000, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:27 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x300, 0x0) [ 412.367620][T23769] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:27 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x600, 0x0) 11:43:27 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x147, 0x0) 11:43:27 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = geteuid() mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f0000000400)={[{@nfs_export_off='nfs_export=off'}], [{@subj_role={'subj_role', 0x3d, ']:eth0#selinux\xc4cgrouplwlan0userem0'}}, {@fsname={'fsname', 0x3d, 'i\\dex=off'}}, {@context={'context', 0x3d, 'system_u'}}, {@fowner_eq={'fowner', 0x3d, r0}}, {@smackfshat={'smackfshat', 0x3d, 'overlay\x00'}}, {@permit_directio='permit_directio'}, {@subj_type={'subj_type', 0x3d, 'i\\dex=off'}}, {@euid_lt={'euid<', r0}}, {@appraise_type='appraise_type=imasig'}, {@obj_user={'obj_user', 0x3d, 'overlay\x00'}}]}) 11:43:27 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x200000000000000, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:27 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x500, 0x0) 11:43:27 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0xf00000000000000, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:27 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x700, 0x0) [ 412.692154][T23799] overlayfs: unrecognized mount option "subj_role=]:eth0#selinuxÄcgrouplwlan0userem0" or missing value 11:43:27 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x2) lseek(r0, 0x0, 0x1) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x10102) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}]}) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040)=0x5, 0x4) 11:43:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:27 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x148, 0x0) 11:43:28 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x600, 0x0) 11:43:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) [ 412.921200][T23819] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:28 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x4000, 0x0) 11:43:28 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x149, 0x0) 11:43:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x4000000000000000, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) [ 413.050657][T23825] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:28 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1000000, 0x0) 11:43:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x5d00000000000000, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:28 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}]}) 11:43:28 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x700, 0x0) 11:43:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:28 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x2000000, 0x0) 11:43:28 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x14a, 0x0) 11:43:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0xdfeeff7f00000000, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) [ 413.402279][T23860] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:28 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x4000, 0x0) 11:43:28 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x14b, 0x0) 11:43:28 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="2840f619a825f02c96bb9b839851c307a42782b68dbe100ef235489b4b201d1895bfead5bc3169659efbab42721dedce23b908ac"]) 11:43:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0xeeeeff7f00000000, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:28 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x3000000, 0x0) 11:43:28 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1000000, 0x0) [ 413.712910][T23888] overlayfs: unrecognized mount option "(@ö¨%ð" or missing value 11:43:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:28 executing program 5: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x4) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x2000006, &(0x7f0000000180)=ANY=[]) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x1000, 0x0) socket$xdp(0x2c, 0x3, 0x0) mq_timedsend(r0, &(0x7f0000000140)="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", 0xfa, 0x6997cff3, &(0x7f0000000080)={0x77359400}) [ 413.775087][T23898] overlayfs: unrecognized mount option "(@ö¨%ð" or missing value 11:43:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:29 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x4000000, 0x0) 11:43:29 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x14c, 0x0) 11:43:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:29 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x2000000, 0x0) [ 414.011109][T23920] overlayfs: missing 'lowerdir' 11:43:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:29 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5000000, 0x0) [ 414.079670][T23925] overlayfs: unrecognized mount option "—F/O¬d4§YæÖ¿mâ¬r½Û)® µ7¬  [ 414.079670][T23925] ¿‰á¶«–ŸZe/+«=*AµÑ¤w•ŠÞÔ£ïû[Id¬yÖñ ò×w±kˬ´oæÛ è`ÏdHE|ÇŒ5 Ë„‡" or missing value 11:43:29 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x14d, 0x0) 11:43:29 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x3000000, 0x0) 11:43:29 executing program 5: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x80000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000180)={0x0, 0xf, 0xfffffffffffffff8, 0x3}, &(0x7f00000001c0)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000300)={r1, @in6={{0xa, 0x4e24, 0x401, @local, 0x5}}, [0x4, 0x81, 0x200, 0x5, 0x8, 0x81, 0x6, 0x5, 0x2, 0x8, 0x1000, 0x200, 0x1b13348c, 0x1]}, &(0x7f0000000200)=0x100) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}]}) fsync(r0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000400)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x22, @local, 0xffff}, r2}}, 0x30) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x3) 11:43:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:29 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x4000000, 0x0) 11:43:29 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x6000000, 0x0) 11:43:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:29 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x14e, 0x0) 11:43:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) [ 414.561800][T23959] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:29 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5000000, 0x0) 11:43:29 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x7000000, 0x0) 11:43:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) [ 414.666169][T23976] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:29 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x800, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}]}) 11:43:29 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x14f, 0x0) 11:43:29 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x6000000, 0x0) 11:43:30 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x40000000, 0x0) 11:43:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:30 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:30 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x150, 0x0) [ 415.049208][T24014] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:30 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x7000000, 0x0) 11:43:30 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xf6ffffff, 0x0) [ 415.126439][T24022] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:30 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:30 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x80000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="695c6465783d6f66662c008ab6935d35295420548400000000000000000000000000aa0000"]) 11:43:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:30 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x151, 0x0) 11:43:30 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xfffffff6, 0x0) 11:43:30 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x40000000, 0x0) 11:43:30 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:30 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x152, 0x0) [ 415.534420][T24043] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:30 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1000000000000, 0x0) 11:43:30 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xf6ffffff, 0x0) 11:43:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:30 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) [ 415.735778][T24042] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 415.815267][T24049] overlayfs: unrecognized mount option "i\dex=off" or missing value [ 415.836346][T24042] CPU: 1 PID: 24042 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 415.845487][T24042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 415.855551][T24042] Call Trace: [ 415.858848][T24042] dump_stack+0x172/0x1f0 [ 415.863190][T24042] dump_header+0x177/0x1152 [ 415.867704][T24042] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 415.873514][T24042] ? ___ratelimit+0x2c8/0x595 [ 415.878201][T24042] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 415.884011][T24042] ? lockdep_hardirqs_on+0x418/0x5d0 [ 415.889309][T24042] ? trace_hardirqs_on+0x67/0x240 [ 415.894331][T24042] ? pagefault_out_of_memory+0x11c/0x11c [ 415.900058][T24042] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 415.905869][T24042] ? ___ratelimit+0x60/0x595 [ 415.910453][T24042] ? do_raw_spin_unlock+0x57/0x270 [ 415.910471][T24042] oom_kill_process.cold+0x10/0x15 [ 415.910488][T24042] out_of_memory+0x334/0x1340 [ 415.910501][T24042] ? lock_downgrade+0x920/0x920 [ 415.910518][T24042] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 415.910537][T24042] ? oom_killer_disable+0x280/0x280 [ 415.920750][T24042] mem_cgroup_out_of_memory+0x1d8/0x240 [ 415.920765][T24042] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 415.920784][T24042] ? do_raw_spin_unlock+0x57/0x270 [ 415.920801][T24042] ? _raw_spin_unlock+0x2d/0x50 [ 415.920818][T24042] try_charge+0xf4b/0x1440 [ 415.930333][T24042] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 415.930347][T24042] ? percpu_ref_tryget_live+0x111/0x290 [ 415.930364][T24042] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 415.930382][T24042] ? __kasan_check_read+0x11/0x20 [ 415.941355][T24042] ? get_mem_cgroup_from_mm+0x156/0x320 [ 415.941372][T24042] mem_cgroup_try_charge+0x136/0x590 [ 415.941388][T24042] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 415.941410][T24042] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 415.952546][T24042] wp_page_copy+0x41e/0x1590 [ 415.952563][T24042] ? find_held_lock+0x35/0x130 [ 415.952580][T24042] ? pmd_pfn+0x1d0/0x1d0 [ 415.952597][T24042] ? lock_downgrade+0x920/0x920 [ 415.962512][T24042] ? swp_swapcount+0x540/0x540 [ 415.962529][T24042] ? __kasan_check_read+0x11/0x20 [ 415.962543][T24042] ? do_raw_spin_unlock+0x57/0x270 [ 415.962558][T24042] do_wp_page+0x499/0x14d0 [ 415.962577][T24042] ? finish_mkwrite_fault+0x570/0x570 [ 416.055456][T24042] __handle_mm_fault+0x22f1/0x3f20 [ 416.060555][T24042] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 416.066086][T24042] ? __kasan_check_read+0x11/0x20 [ 416.071100][T24042] handle_mm_fault+0x1b5/0x6c0 [ 416.075863][T24042] __do_page_fault+0x536/0xdd0 [ 416.080640][T24042] do_page_fault+0x38/0x590 [ 416.085126][T24042] page_fault+0x39/0x40 [ 416.089259][T24042] RIP: 0033:0x40de63 [ 416.093137][T24042] Code: e8 32 63 00 00 8b 10 48 8d b4 24 80 00 00 00 bf 88 b7 4c 00 31 c0 e8 cc 3e ff ff e9 69 fd ff ff bb 03 00 00 00 89 df 83 c3 01 c8 56 00 00 83 fb 1e 75 f1 e9 8c fd ff ff bf ed e1 4b 00 31 c0 [ 416.112723][T24042] RSP: 002b:00007fff9ff77090 EFLAGS: 00010202 [ 416.118768][T24042] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000413561 [ 416.126720][T24042] RDX: fffffffffffffff7 RSI: 0000000000000000 RDI: 0000000000000003 [ 416.134670][T24042] RBP: 0000000000000000 R08: ffffffffffffffff R09: ffffffffffffffff [ 416.142620][T24042] R10: 00007fff9ff76fb0 R11: 0000000000000000 R12: 0000000000000001 [ 416.150576][T24042] R13: 00007fff9ff770c0 R14: 0000000000000000 R15: 00007fff9ff770d0 [ 416.160072][T24042] memory: usage 307200kB, limit 307200kB, failcnt 1591 [ 416.166935][T24042] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 416.175548][T24042] Memory cgroup stats for /syz5: [ 416.175654][T24042] anon 263749632 [ 416.175654][T24042] file 0 [ 416.175654][T24042] kernel_stack 7012352 [ 416.175654][T24042] slab 13201408 [ 416.175654][T24042] sock 0 [ 416.175654][T24042] shmem 45056 [ 416.175654][T24042] file_mapped 135168 [ 416.175654][T24042] file_dirty 0 [ 416.175654][T24042] file_writeback 0 [ 416.175654][T24042] anon_thp 239075328 [ 416.175654][T24042] inactive_anon 135168 [ 416.175654][T24042] active_anon 263749632 [ 416.175654][T24042] inactive_file 0 [ 416.175654][T24042] active_file 57344 [ 416.175654][T24042] unevictable 0 [ 416.175654][T24042] slab_reclaimable 2703360 [ 416.175654][T24042] slab_unreclaimable 10498048 [ 416.175654][T24042] pgfault 50325 [ 416.175654][T24042] pgmajfault 0 [ 416.175654][T24042] workingset_refault 66 [ 416.175654][T24042] workingset_activate 0 [ 416.175654][T24042] workingset_nodereclaim 0 [ 416.175654][T24042] pgrefill 1336 [ 416.175654][T24042] pgscan 1679 [ 416.175654][T24042] pgsteal 252 [ 416.269820][T24042] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=15971,uid=0 [ 416.285356][T24042] Memory cgroup out of memory: Killed process 15971 (syz-executor.5) total-vm:72708kB, anon-rss:2208kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 416.304770][ T1065] oom_reaper: reaped process 15971 (syz-executor.5), now anon-rss:0kB, file-rss:34832kB, shmem-rss:0kB 11:43:31 executing program 5: r0 = creat(&(0x7f0000000040)='./file0\x00', 0xcc) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="9afbec83502d0a194bd3dc47977b2ea640513661edcae5ffd6068334dae581b2bab8947267efe22d97f87ab49d01ff227ef1da6f737358bf4bd14cd6bc2cae8b926a592a151e44abe8b0a58ae8c5033a36"]) setsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000000)=0x1, 0x4) ioctl$TIOCSSERIAL(r0, 0x541f, &(0x7f0000000180)={0x97, 0x0, 0x9, 0x0, 0x7, 0xfff, 0x0, 0x1, 0x4e06, 0x5f6a, 0x401, 0x8, 0x401, 0x2db, &(0x7f0000000080)=""/66, 0x4, 0x72, 0x101}) 11:43:31 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x153, 0x0) 11:43:31 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x100000000000000, 0x0) 11:43:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:31 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xfffffff6, 0x0) 11:43:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) [ 416.317405][T24073] syz-executor.5 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 [ 416.329911][T24073] CPU: 1 PID: 24073 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 416.339018][T24073] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 416.349077][T24073] Call Trace: [ 416.352372][T24073] dump_stack+0x172/0x1f0 [ 416.356711][T24073] dump_header+0x177/0x1152 [ 416.361244][T24073] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 416.367060][T24073] ? ___ratelimit+0x2c8/0x595 [ 416.371744][T24073] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 416.377566][T24073] ? lockdep_hardirqs_on+0x418/0x5d0 [ 416.382875][T24073] ? trace_hardirqs_on+0x67/0x240 [ 416.387906][T24073] ? pagefault_out_of_memory+0x11c/0x11c [ 416.393529][T24073] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 416.393542][T24073] ? ___ratelimit+0x60/0x595 [ 416.393553][T24073] ? do_raw_spin_unlock+0x57/0x270 [ 416.393569][T24073] oom_kill_process.cold+0x10/0x15 [ 416.393583][T24073] out_of_memory+0x334/0x1340 [ 416.393600][T24073] ? lock_downgrade+0x920/0x920 [ 416.423721][T24073] ? oom_killer_disable+0x280/0x280 [ 416.428938][T24073] mem_cgroup_out_of_memory+0x1d8/0x240 [ 416.434500][T24073] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 416.440155][T24073] ? do_raw_spin_unlock+0x57/0x270 [ 416.445287][T24073] ? _raw_spin_unlock+0x2d/0x50 [ 416.450150][T24073] try_charge+0xa2d/0x1440 [ 416.454585][T24073] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 416.460137][T24073] ? find_held_lock+0x35/0x130 11:43:31 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x154, 0x0) [ 416.464907][T24073] ? get_mem_cgroup_from_mm+0x139/0x320 [ 416.470468][T24073] ? lock_downgrade+0x920/0x920 [ 416.475324][T24073] ? percpu_ref_tryget_live+0x111/0x290 [ 416.480883][T24073] __memcg_kmem_charge_memcg+0x71/0xf0 [ 416.486352][T24073] ? memcg_kmem_put_cache+0x50/0x50 [ 416.491565][T24073] ? get_mem_cgroup_from_mm+0x156/0x320 [ 416.497121][T24073] __memcg_kmem_charge+0x13a/0x3a0 [ 416.499595][T24098] overlayfs: unrecognized mount option "šûìƒP- [ 416.499595][T24098] KÓÜG—{.¦@Q6aíÊåÿÖƒ4Ú岺¸”rgïâ-—øz´ÿ"~ñÚossX¿KÑLÖ¼" or missing value [ 416.502241][T24073] __alloc_pages_nodemask+0x4f7/0x900 [ 416.502258][T24073] ? find_held_lock+0x35/0x130 [ 416.502276][T24073] ? __alloc_pages_slowpath+0x2540/0x2540 [ 416.502298][T24073] ? __kasan_check_read+0x11/0x20 [ 416.502317][T24073] ? mark_lock+0xc2/0x1220 [ 416.527028][T24073] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 416.537737][T24073] alloc_pages_current+0x107/0x210 [ 416.537757][T24073] pte_alloc_one+0x1b/0x1a0 [ 416.557982][T24073] __handle_mm_fault+0x34d7/0x3f20 [ 416.563112][T24073] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 416.568695][T24073] ? __kasan_check_read+0x11/0x20 [ 416.573742][T24073] handle_mm_fault+0x1b5/0x6c0 [ 416.578529][T24073] __do_page_fault+0x536/0xdd0 [ 416.583301][T24073] ? page_fault+0x16/0x40 [ 416.587650][T24073] do_page_fault+0x38/0x590 [ 416.592165][T24073] page_fault+0x39/0x40 [ 416.596325][T24073] RIP: 0033:0x459879 [ 416.600228][T24073] Code: Bad RIP value. [ 416.601401][T24103] overlayfs: unrecognized mount option "šûìƒP- [ 416.601401][T24103] KÓÜG—{.¦@Q6aíÊåÿÖƒ4Ú岺¸”rgïâ-—øz´ÿ"~ñÚossX¿KÑLÖ¼" or missing value [ 416.604287][T24073] RSP: 002b:00007fd520517c78 EFLAGS: 00010246 [ 416.604300][T24073] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000459879 [ 416.604309][T24073] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000080000000 [ 416.604318][T24073] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 416.604327][T24073] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5205186d4 [ 416.604336][T24073] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 00000000ffffffff [ 416.661384][T24073] memory: usage 307084kB, limit 307200kB, failcnt 1591 11:43:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:31 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x200000000000000, 0x0) 11:43:31 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1000000000000, 0x0) 11:43:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) [ 416.705428][T24073] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 416.712917][T24073] Memory cgroup stats for /syz5: [ 416.713030][T24073] anon 263806976 [ 416.713030][T24073] file 0 [ 416.713030][T24073] kernel_stack 7077888 [ 416.713030][T24073] slab 13201408 [ 416.713030][T24073] sock 0 [ 416.713030][T24073] shmem 45056 [ 416.713030][T24073] file_mapped 135168 [ 416.713030][T24073] file_dirty 0 [ 416.713030][T24073] file_writeback 0 [ 416.713030][T24073] anon_thp 239075328 [ 416.713030][T24073] inactive_anon 135168 [ 416.713030][T24073] active_anon 263806976 [ 416.713030][T24073] inactive_file 0 [ 416.713030][T24073] active_file 57344 [ 416.713030][T24073] unevictable 0 [ 416.713030][T24073] slab_reclaimable 2703360 [ 416.713030][T24073] slab_unreclaimable 10498048 [ 416.713030][T24073] pgfault 50391 [ 416.713030][T24073] pgmajfault 0 [ 416.713030][T24073] workingset_refault 66 [ 416.713030][T24073] workingset_activate 0 [ 416.713030][T24073] workingset_nodereclaim 0 [ 416.713030][T24073] pgrefill 1336 [ 416.713030][T24073] pgscan 1679 [ 416.713030][T24073] pgsteal 252 [ 416.718192][T24073] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=15949,uid=0 11:43:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) [ 416.898904][T24073] Memory cgroup out of memory: Killed process 15949 (syz-executor.5) total-vm:72708kB, anon-rss:2208kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 11:43:32 executing program 5: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f0000000000)) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='i\\dex@\x00ff,\x00']) 11:43:32 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x100000000000000, 0x0) 11:43:32 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x155, 0x0) 11:43:32 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x300000000000000, 0x0) 11:43:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:32 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x400000000000000, 0x0) 11:43:32 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x200000000000000, 0x0) 11:43:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:32 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x156, 0x0) [ 417.242453][T24151] overlayfs: unrecognized mount option "i\dex@" or missing value 11:43:32 executing program 5: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) accept4$x25(r0, &(0x7f0000000000)={0x9, @remote}, &(0x7f0000000040)=0x12, 0x800) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r0, 0xc0905664, &(0x7f0000000200)={0x0, 0x0, [], @bt={0x7, 0x0, 0x800, 0x7d6, 0x8, 0x0, 0x10, 0x4}}) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}]}) gettid() ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f0000000180)={{0x3, 0x3, 0x1a, 0x1, 0x7}, 0x7, 0x2}) 11:43:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:32 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x300000000000000, 0x0) 11:43:32 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x500000000000000, 0x0) [ 417.532901][T24171] syz-executor.5 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 [ 417.592434][T24171] CPU: 1 PID: 24171 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 417.601581][T24171] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 417.611641][T24171] Call Trace: [ 417.614939][T24171] dump_stack+0x172/0x1f0 [ 417.619277][T24171] dump_header+0x177/0x1152 [ 417.623793][T24171] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 417.629600][T24171] ? ___ratelimit+0x2c8/0x595 [ 417.634289][T24171] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 11:43:32 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x400000000000000, 0x0) 11:43:32 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x600000000000000, 0x0) 11:43:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) [ 417.640103][T24171] ? lockdep_hardirqs_on+0x418/0x5d0 [ 417.645389][T24171] ? trace_hardirqs_on+0x67/0x240 [ 417.650420][T24171] ? pagefault_out_of_memory+0x11c/0x11c [ 417.656058][T24171] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 417.661868][T24171] ? ___ratelimit+0x60/0x595 [ 417.666465][T24171] ? do_raw_spin_unlock+0x57/0x270 [ 417.671580][T24171] oom_kill_process.cold+0x10/0x15 [ 417.676695][T24171] out_of_memory+0x334/0x1340 [ 417.681380][T24171] ? lock_downgrade+0x920/0x920 [ 417.686241][T24171] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 11:43:32 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x700000000000000, 0x0) [ 417.692055][T24171] ? oom_killer_disable+0x280/0x280 [ 417.697273][T24171] mem_cgroup_out_of_memory+0x1d8/0x240 [ 417.702917][T24171] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 417.708570][T24171] ? do_raw_spin_unlock+0x57/0x270 [ 417.713695][T24171] ? _raw_spin_unlock+0x2d/0x50 [ 417.718558][T24171] try_charge+0xf4b/0x1440 [ 417.722987][T24171] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 417.728544][T24171] ? find_held_lock+0x35/0x130 [ 417.733315][T24171] ? get_mem_cgroup_from_mm+0x139/0x320 11:43:32 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x500000000000000, 0x0) [ 417.738874][T24171] ? lock_downgrade+0x920/0x920 [ 417.743726][T24171] ? percpu_ref_tryget_live+0x111/0x290 [ 417.749284][T24171] __memcg_kmem_charge_memcg+0x71/0xf0 [ 417.754752][T24171] ? memcg_kmem_put_cache+0x50/0x50 [ 417.759965][T24171] ? get_mem_cgroup_from_mm+0x156/0x320 [ 417.765524][T24171] __memcg_kmem_charge+0x13a/0x3a0 [ 417.770645][T24171] __alloc_pages_nodemask+0x4f7/0x900 [ 417.776025][T24171] ? free_transhuge_page+0x372/0x4b0 [ 417.781320][T24171] ? __alloc_pages_slowpath+0x2540/0x2540 [ 417.787044][T24171] ? __put_compound_page+0x90/0xd0 [ 417.792174][T24171] ? put_page+0xe7/0x130 [ 417.796438][T24171] ? do_huge_pmd_anonymous_page+0xd52/0x1b00 [ 417.802424][T24171] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 417.808674][T24171] alloc_pages_current+0x107/0x210 [ 417.813789][T24171] pte_alloc_one+0x1b/0x1a0 [ 417.818302][T24171] __pte_alloc+0x20/0x310 [ 417.822643][T24171] __handle_mm_fault+0x340e/0x3f20 [ 417.827768][T24171] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 417.833344][T24171] ? __kasan_check_read+0x11/0x20 [ 417.838378][T24171] handle_mm_fault+0x1b5/0x6c0 [ 417.843138][T24171] __do_page_fault+0x536/0xdd0 [ 417.843163][T24171] do_page_fault+0x38/0x590 [ 417.843179][T24171] page_fault+0x39/0x40 [ 417.843189][T24171] RIP: 0033:0x440af9 [ 417.843202][T24171] Code: b7 0e 66 89 0f 48 83 c6 02 48 83 c7 02 0f 1f 40 00 f6 c2 04 74 0c 8b 0e 89 0f 48 83 c6 04 48 83 c7 04 f6 c2 08 74 0e 48 8b 0e <48> 89 0f 48 83 c6 08 48 83 c7 08 81 e2 f0 00 00 00 74 1f 0f 1f 40 [ 417.843208][T24171] RSP: 002b:00007fff9ff76ed8 EFLAGS: 00010202 11:43:33 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x157, 0x0) [ 417.852444][T24171] RAX: 00000000200000c0 RBX: 0000000000000000 RCX: 0030656c69662f2e [ 417.852453][T24171] RDX: 0000000000000008 RSI: 0000000000760020 RDI: 00000000200000c0 [ 417.852461][T24171] RBP: 0000000000760000 R08: 0000000000000000 R09: 0000000000000000 [ 417.852474][T24171] R10: 00000000004395d0 R11: 0000000000000012 R12: 00000000004c5e06 [ 417.860492][T24171] R13: 000000000000012c R14: 0000000000760008 R15: fffffffffffffffe [ 417.976765][T24171] memory: usage 307200kB, limit 307200kB, failcnt 1623 [ 417.984399][T24171] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 418.008876][T24171] Memory cgroup stats for /syz5: [ 418.008987][T24171] anon 263811072 [ 418.008987][T24171] file 0 [ 418.008987][T24171] kernel_stack 7012352 [ 418.008987][T24171] slab 13201408 [ 418.008987][T24171] sock 0 [ 418.008987][T24171] shmem 45056 [ 418.008987][T24171] file_mapped 135168 [ 418.008987][T24171] file_dirty 0 [ 418.008987][T24171] file_writeback 0 [ 418.008987][T24171] anon_thp 239075328 [ 418.008987][T24171] inactive_anon 135168 [ 418.008987][T24171] active_anon 263811072 [ 418.008987][T24171] inactive_file 0 [ 418.008987][T24171] active_file 57344 [ 418.008987][T24171] unevictable 0 [ 418.008987][T24171] slab_reclaimable 2703360 [ 418.008987][T24171] slab_unreclaimable 10498048 [ 418.008987][T24171] pgfault 50490 [ 418.008987][T24171] pgmajfault 0 [ 418.008987][T24171] workingset_refault 66 [ 418.008987][T24171] workingset_activate 0 [ 418.008987][T24171] workingset_nodereclaim 0 [ 418.008987][T24171] pgrefill 1369 [ 418.008987][T24171] pgscan 1812 [ 418.008987][T24171] pgsteal 252 [ 418.114496][T24171] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=24099,uid=0 [ 418.130296][T24171] Memory cgroup out of memory: Killed process 24099 (syz-executor.5) total-vm:72972kB, anon-rss:2224kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 11:43:33 executing program 5: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$TIOCGPTLCK(r0, 0x80045439, &(0x7f0000000000)) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}]}) 11:43:33 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x4000000000000000, 0x0) 11:43:33 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x600000000000000, 0x0) 11:43:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:33 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x158, 0x0) 11:43:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) [ 418.172814][T24212] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:33 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x700000000000000, 0x0) 11:43:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:33 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xf6ffffff00000000, 0x0) 11:43:33 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x159, 0x0) [ 418.374769][T24231] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:33 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x4000000000000000, 0x0) 11:43:33 executing program 5: socket(0x11, 0x2, 0x5) creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}]}) 11:43:33 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xffffffff00000000, 0x0) 11:43:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:33 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x15a, 0x0) 11:43:33 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x2) 11:43:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:33 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xf6ffffff00000000, 0x0) 11:43:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) [ 418.805158][T24272] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:34 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x3) 11:43:34 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x15b, 0x0) 11:43:34 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xffffffff00000000, 0x0) 11:43:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) [ 418.914291][T24272] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:34 executing program 5: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000500)={'broute\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f0000000040)=[{}, {}, {}], 0x0, [{}]}, 0x88) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000000000)=""/54) clone(0x44000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000600)='overlay\x00', 0x0, &(0x7f00000002c0)) sendmmsg$sock(r0, &(0x7f0000000480)=[{{0x0, 0x0, &(0x7f0000000040)}}, {{&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e22, @multicast1}, 0x3, 0x4, 0x3, 0x4}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000200)="d73083f473785e6b55d6a05821520544bf779173c93745a5f124c89aba46f006f384526185ff816b194f14dcc5513e91d3170cc75824a27714c874d8171a222bf022f64c120125dc40dbc794ce35242577767ca8dc37ce9c2bf0d2886f6bbe5e4be07798a8a76340fd016121f93d4f71a6f324561f4f9e8679680b7c4782739287", 0x81}, {&(0x7f0000000300)="2024b212ebba4675a3569a5129c01728693d0319e353629b2626cb5a24a9a560d6a0c2968f403ca73b6baa7ba35daa52a8fdf0ccd8879cac552a7d5679f150373b33a292d99b8c7567f96b3f6c563a56499cf869db6d7239d855623b7e11d57b7f6274df35ff7b967f388993b56389cbaeb60c123701102d35df143937045ca2d3ecfa2e8e77d25cfc87f66a3a6ba3ebe756a5f563cf8b3e5a217483359ae605e721f690763dfa85c669d28371", 0xad}, {&(0x7f00000003c0)="7fc9aa6a1bbfd9fca2c98c75d14bf62994e0703c3d44bfce76bbadf8ddcc31c3b1420abc0c9b7808ebb3de4367a8b4fd1f08d15bd4b8f9ae2549afb05376f6d26114eb8900b9722eb08735b5354e02c348c0aa2f31bc84e756a673d5db66533256db0c4161a88320", 0x68}], 0x3, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0xfffffffffffffffc}}], 0x18}}], 0x2, 0x10) 11:43:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:34 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x2) 11:43:34 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x15c, 0x0) 11:43:34 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x4) 11:43:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) [ 419.274696][T24313] overlayfs: missing 'lowerdir' [ 419.303164][T24308] IPVS: ftp: loaded support on port[0] = 21 11:43:34 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x15d, 0x0) 11:43:34 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x3) 11:43:34 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x5) 11:43:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) [ 419.604768][T24320] overlayfs: missing 'lowerdir' [ 419.631168][T24313] IPVS: ftp: loaded support on port[0] = 21 11:43:34 executing program 5: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x7}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000080)={r1, 0x7ff, 0xbb}, 0x8) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}]}) 11:43:34 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x15e, 0x0) 11:43:34 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x6) 11:43:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:34 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x4) 11:43:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:35 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x5) 11:43:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:35 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x7) 11:43:35 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x15f, 0x0) [ 420.036617][T24370] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:35 executing program 5: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='!']) syz_open_pts(r0, 0x800) 11:43:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:35 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x300) 11:43:35 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x6) 11:43:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:35 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x160, 0x0) [ 420.332494][T24396] overlayfs: unrecognized mount option "!" or missing value 11:43:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) [ 420.348672][T24404] overlayfs: unrecognized mount option "!" or missing value 11:43:35 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x500) 11:43:35 executing program 5: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000000)) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}]}) 11:43:35 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x7) 11:43:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:35 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x161, 0x0) 11:43:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:35 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x600) 11:43:35 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x300) [ 420.685319][T24432] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:35 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="695c6465783d6f66662c00708654fd24ec6965d9bf5bc611263d842960c0a53c0fad5f93adf4995bf0f89dbaf91c7d3464adc2809d52b4f41550a334a6d87bd1e37f05d81495387fef1908cc41165ae7eb37bff7a5959c0178d264f7d1b366347bb84c1c293d5155e347b0010b8c43a41a2eb378e4dc012b876e0ff47863b9a1847d30006c719a4183235098e3d9140018d5f1a9b39a59c751a1ff50e31ea9647582722ee83ff0702a721ce4dea9e0"]) 11:43:35 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x162, 0x0) [ 420.768264][T24434] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:36 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x700) 11:43:36 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x500) 11:43:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:36 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x163, 0x0) [ 421.069597][T24461] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:36 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x4000) [ 421.136096][T24465] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:36 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x600) 11:43:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x10}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:36 executing program 5: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="695c6465783dafcc642c00"]) recvfrom$rose(r0, &(0x7f0000000000)=""/147, 0xfffffffffffffe30, 0x2002, &(0x7f0000000240)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x5, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default]}, 0xfffffffffffffffc) 11:43:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:36 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x1000000) 11:43:36 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x164, 0x0) 11:43:36 executing program 5: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x108000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$tipc(0x1e, 0x2, 0x0) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}]}) r1 = socket(0x1f, 0x3, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x5}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000180)={r2, 0x80000001, 0xb8b, 0x5, 0xee, 0x7}, 0x14) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000001c0), 0x10) getsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f0000000000)={@loopback, 0x0}, &(0x7f0000000200)=0x14) modify_ldt$read_default(0x2, &(0x7f0000000480)=""/77, 0x4d) ioctl$KVM_GET_DIRTY_LOG(r0, 0x4010ae42, &(0x7f0000000280)={0x10200, 0x0, &(0x7f0000ffa000/0x3000)=nil}) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000003c0)={@xdp={0x2c, 0x6, r3, 0x37}, {&(0x7f0000000300)=""/189, 0xbd}, &(0x7f0000000240), 0x5}, 0xa0) [ 421.436342][T24494] overlayfs: unrecognized mount option "i\dex=¯Ìd" or missing value 11:43:36 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x700) 11:43:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x121}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:36 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x2000000) 11:43:36 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x165, 0x0) 11:43:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0xfeb8}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:36 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x4000) [ 421.772293][T24526] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:37 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x1000000) 11:43:37 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x3000000) 11:43:37 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x166, 0x0) [ 421.961782][T24516] syz-executor.5 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 [ 422.087651][T24516] CPU: 0 PID: 24516 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 422.096798][T24516] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 422.106861][T24516] Call Trace: [ 422.110159][T24516] dump_stack+0x172/0x1f0 [ 422.114491][T24516] dump_header+0x177/0x1152 [ 422.118993][T24516] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 422.124792][T24516] ? ___ratelimit+0x2c8/0x595 [ 422.129465][T24516] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 422.135276][T24516] ? lockdep_hardirqs_on+0x418/0x5d0 [ 422.140560][T24516] ? trace_hardirqs_on+0x67/0x240 [ 422.145581][T24516] ? pagefault_out_of_memory+0x11c/0x11c [ 422.151221][T24516] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 422.157024][T24516] ? ___ratelimit+0x60/0x595 [ 422.161612][T24516] ? do_raw_spin_unlock+0x57/0x270 [ 422.166740][T24516] oom_kill_process.cold+0x10/0x15 [ 422.172416][T24516] out_of_memory+0x334/0x1340 [ 422.177101][T24516] ? lock_downgrade+0x920/0x920 [ 422.181955][T24516] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 422.187752][T24516] ? oom_killer_disable+0x280/0x280 [ 422.192967][T24516] mem_cgroup_out_of_memory+0x1d8/0x240 [ 422.198522][T24516] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 422.204155][T24516] ? do_raw_spin_unlock+0x57/0x270 [ 422.209265][T24516] ? _raw_spin_unlock+0x2d/0x50 [ 422.214114][T24516] try_charge+0xf4b/0x1440 [ 422.218546][T24516] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 422.224098][T24516] ? find_held_lock+0x35/0x130 [ 422.228869][T24516] ? get_mem_cgroup_from_mm+0x139/0x320 [ 422.234425][T24516] ? lock_downgrade+0x920/0x920 [ 422.239272][T24516] ? percpu_ref_tryget_live+0x111/0x290 [ 422.244837][T24516] __memcg_kmem_charge_memcg+0x71/0xf0 [ 422.250300][T24516] ? memcg_kmem_put_cache+0x50/0x50 [ 422.255501][T24516] ? get_mem_cgroup_from_mm+0x156/0x320 [ 422.261057][T24516] __memcg_kmem_charge+0x13a/0x3a0 [ 422.266180][T24516] __alloc_pages_nodemask+0x4f7/0x900 [ 422.271561][T24516] ? stack_trace_consume_entry+0x190/0x190 [ 422.277849][T24516] ? __alloc_pages_slowpath+0x2540/0x2540 [ 422.283554][T24516] ? copy_page_range+0xef4/0x1ed0 [ 422.283570][T24516] ? copy_page_range+0xef4/0x1ed0 [ 422.283590][T24516] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 422.283607][T24516] alloc_pages_current+0x107/0x210 [ 422.283624][T24516] pte_alloc_one+0x1b/0x1a0 [ 422.283638][T24516] __pte_alloc+0x20/0x310 [ 422.283656][T24516] copy_page_range+0x14da/0x1ed0 [ 422.318922][T24516] ? pmd_alloc+0x180/0x180 [ 422.323346][T24516] ? __rb_insert_augmented+0x20c/0xd90 [ 422.328807][T24516] ? validate_mm_rb+0xa3/0xc0 [ 422.333493][T24516] ? __vma_link_rb+0x5ad/0x770 [ 422.338265][T24516] dup_mm+0xa67/0x1430 [ 422.342354][T24516] ? vm_area_dup+0x170/0x170 [ 422.346957][T24516] ? debug_mutex_init+0x2d/0x60 [ 422.351820][T24516] copy_process+0x2671/0x6830 [ 422.356505][T24516] ? do_sys_open+0x318/0x5d0 [ 422.361114][T24516] ? __cleanup_sighand+0x60/0x60 [ 422.366066][T24516] ? __might_fault+0x12b/0x1e0 [ 422.370837][T24516] ? __might_fault+0x12b/0x1e0 [ 422.375602][T24516] _do_fork+0x146/0xfa0 [ 422.379756][T24516] ? copy_init_mm+0x20/0x20 [ 422.384270][T24516] ? __kasan_check_read+0x11/0x20 [ 422.389297][T24516] ? _copy_to_user+0x118/0x160 [ 422.394073][T24516] __x64_sys_clone+0x1ab/0x270 [ 422.398840][T24516] ? __ia32_sys_vfork+0xd0/0xd0 [ 422.403702][T24516] ? do_syscall_64+0x26/0x760 [ 422.408380][T24516] ? lockdep_hardirqs_on+0x418/0x5d0 [ 422.413679][T24516] ? trace_hardirqs_on+0x67/0x240 [ 422.418715][T24516] do_syscall_64+0xfa/0x760 [ 422.423229][T24516] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 422.429123][T24516] RIP: 0033:0x459879 [ 422.433020][T24516] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 422.452622][T24516] RSP: 002b:00007fd520517c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 422.461038][T24516] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000459879 [ 422.469003][T24516] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000108000 [ 422.476968][T24516] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 422.484935][T24516] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5205186d4 [ 422.492904][T24516] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 00000000ffffffff [ 422.546465][T24516] memory: usage 307200kB, limit 307200kB, failcnt 1643 [ 422.554159][T24516] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 422.561130][T24516] Memory cgroup stats for /syz5: [ 422.561232][T24516] anon 262385664 [ 422.561232][T24516] file 0 [ 422.561232][T24516] kernel_stack 7274496 [ 422.561232][T24516] slab 13201408 [ 422.561232][T24516] sock 0 [ 422.561232][T24516] shmem 45056 [ 422.561232][T24516] file_mapped 135168 [ 422.561232][T24516] file_dirty 0 [ 422.561232][T24516] file_writeback 0 [ 422.561232][T24516] anon_thp 236978176 [ 422.561232][T24516] inactive_anon 135168 [ 422.561232][T24516] active_anon 262385664 [ 422.561232][T24516] inactive_file 0 [ 422.561232][T24516] active_file 57344 [ 422.561232][T24516] unevictable 0 [ 422.561232][T24516] slab_reclaimable 2703360 [ 422.561232][T24516] slab_unreclaimable 10498048 [ 422.561232][T24516] pgfault 51183 [ 422.561232][T24516] pgmajfault 0 [ 422.561232][T24516] workingset_refault 66 [ 422.561232][T24516] workingset_activate 0 [ 422.561232][T24516] workingset_nodereclaim 0 [ 422.561232][T24516] pgrefill 1435 [ 422.561232][T24516] pgscan 1878 [ 422.561232][T24516] pgsteal 252 [ 422.656049][T24516] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=24154,uid=0 [ 422.671990][T24516] Memory cgroup out of memory: Killed process 24154 (syz-executor.5) total-vm:72708kB, anon-rss:2208kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 11:43:37 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x4) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}]}) 11:43:37 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x2000579d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) 11:43:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:37 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x4000000) 11:43:37 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x167, 0x0) 11:43:37 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x2000000) [ 422.710694][T24526] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:37 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x5000000) 11:43:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:38 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x3000000) 11:43:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x7ffff000}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf}}], 0x2, 0x0, 0x0) [ 422.895279][T24576] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) [ 423.009695][T24588] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:38 executing program 5: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x8000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x0) inotify_rm_watch(r0, r1) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='i\\dex-off,\x00']) 11:43:38 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x4000000) 11:43:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0x3}], 0xf}}], 0x2, 0x0, 0x0) 11:43:38 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x168, 0x0) 11:43:38 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x6000000) [ 423.232905][T24602] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 423.281464][T24602] CPU: 0 PID: 24602 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 423.290690][T24602] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 423.300748][T24602] Call Trace: [ 423.304035][T24602] dump_stack+0x172/0x1f0 [ 423.308381][T24602] dump_header+0x177/0x1152 [ 423.312897][T24602] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 423.318710][T24602] ? ___ratelimit+0x2c8/0x595 [ 423.323392][T24602] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 423.329203][T24602] ? lockdep_hardirqs_on+0x418/0x5d0 [ 423.334495][T24602] ? trace_hardirqs_on+0x67/0x240 [ 423.339531][T24602] ? pagefault_out_of_memory+0x11c/0x11c [ 423.345168][T24602] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 423.350997][T24602] ? ___ratelimit+0x60/0x595 [ 423.355591][T24602] ? do_raw_spin_unlock+0x57/0x270 [ 423.360709][T24602] oom_kill_process.cold+0x10/0x15 [ 423.365823][T24602] out_of_memory+0x334/0x1340 [ 423.370496][T24602] ? lock_downgrade+0x920/0x920 [ 423.375349][T24602] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 423.381161][T24602] ? oom_killer_disable+0x280/0x280 [ 423.386375][T24602] mem_cgroup_out_of_memory+0x1d8/0x240 [ 423.391928][T24602] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 423.397567][T24602] ? do_raw_spin_unlock+0x57/0x270 [ 423.402681][T24602] ? _raw_spin_unlock+0x2d/0x50 [ 423.407540][T24602] try_charge+0xf4b/0x1440 [ 423.411973][T24602] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 423.417520][T24602] ? percpu_ref_tryget_live+0x111/0x290 [ 423.423068][T24602] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 11:43:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xc4}], 0xf}}], 0x2, 0x0, 0x0) 11:43:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) [ 423.429329][T24602] ? __kasan_check_read+0x11/0x20 [ 423.434373][T24602] ? get_mem_cgroup_from_mm+0x156/0x320 [ 423.439931][T24602] mem_cgroup_try_charge+0x136/0x590 [ 423.445224][T24602] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 423.451471][T24602] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 423.457112][T24602] wp_page_copy+0x41e/0x1590 [ 423.461700][T24602] ? find_held_lock+0x35/0x130 [ 423.466471][T24602] ? pmd_pfn+0x1d0/0x1d0 [ 423.470717][T24602] ? lock_downgrade+0x920/0x920 [ 423.475577][T24602] ? swp_swapcount+0x540/0x540 [ 423.480342][T24602] ? __kasan_check_read+0x11/0x20 [ 423.485367][T24602] ? do_raw_spin_unlock+0x57/0x270 [ 423.490480][T24602] do_wp_page+0x499/0x14d0 [ 423.494890][T24602] ? finish_mkwrite_fault+0x570/0x570 [ 423.500273][T24602] __handle_mm_fault+0x22f1/0x3f20 [ 423.505395][T24602] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 423.510978][T24602] ? __kasan_check_read+0x11/0x20 [ 423.516016][T24602] handle_mm_fault+0x1b5/0x6c0 [ 423.520789][T24602] __do_page_fault+0x536/0xdd0 [ 423.525567][T24602] do_page_fault+0x38/0x590 11:43:38 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x7000000) [ 423.530077][T24602] page_fault+0x39/0x40 [ 423.534227][T24602] RIP: 0033:0x457e7e [ 423.538121][T24602] Code: 00 00 85 c0 41 89 c5 0f 85 fc 00 00 00 64 8b 04 25 d0 02 00 00 41 39 c4 0f 84 12 02 00 00 48 8b 05 c7 e8 61 00 48 85 c0 74 04 <48> 83 00 04 64 8b 04 25 d0 02 00 00 64 89 04 25 d4 02 00 00 0f 31 [ 423.557725][T24602] RSP: 002b:00007fff9ff77040 EFLAGS: 00010206 [ 423.563798][T24602] RAX: 0000000000a76248 RBX: 00007fff9ff77040 RCX: 0000000000457e4a [ 423.571774][T24602] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 11:43:38 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x169, 0x0) [ 423.579754][T24602] RBP: 00007fff9ff77080 R08: 0000000000000001 R09: 00005555557c9940 [ 423.587731][T24602] R10: 00005555557c9c10 R11: 0000000000000246 R12: 0000000000000001 [ 423.595702][T24602] R13: 0000000000000000 R14: 0000000000000000 R15: 00007fff9ff770d0 [ 423.649044][T24602] memory: usage 307200kB, limit 307200kB, failcnt 1671 [ 423.667992][T24602] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 423.702262][T24602] Memory cgroup stats for /syz5: [ 423.702371][T24602] anon 262508544 [ 423.702371][T24602] file 0 [ 423.702371][T24602] kernel_stack 7208960 [ 423.702371][T24602] slab 13201408 [ 423.702371][T24602] sock 0 [ 423.702371][T24602] shmem 45056 [ 423.702371][T24602] file_mapped 135168 [ 423.702371][T24602] file_dirty 0 [ 423.702371][T24602] file_writeback 0 [ 423.702371][T24602] anon_thp 236978176 [ 423.702371][T24602] inactive_anon 135168 [ 423.702371][T24602] active_anon 262508544 [ 423.702371][T24602] inactive_file 0 11:43:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:38 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x16a, 0x0) 11:43:38 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x40000000) [ 423.702371][T24602] active_file 57344 [ 423.702371][T24602] unevictable 0 [ 423.702371][T24602] slab_reclaimable 2703360 [ 423.702371][T24602] slab_unreclaimable 10498048 [ 423.702371][T24602] pgfault 51315 [ 423.702371][T24602] pgmajfault 0 [ 423.702371][T24602] workingset_refault 66 [ 423.702371][T24602] workingset_activate 0 [ 423.702371][T24602] workingset_nodereclaim 0 [ 423.702371][T24602] pgrefill 1469 [ 423.702371][T24602] pgscan 2010 [ 423.702371][T24602] pgsteal 252 [ 424.009802][T24602] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=24577,uid=0 [ 424.047686][T24602] Memory cgroup out of memory: Killed process 24577 (syz-executor.5) total-vm:72708kB, anon-rss:2208kB, file-rss:35796kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 424.067568][ T1065] oom_reaper: reaped process 24577 (syz-executor.5), now anon-rss:0kB, file-rss:34836kB, shmem-rss:0kB [ 424.080651][ T8652] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 424.095892][ T8652] CPU: 0 PID: 8652 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 424.104924][ T8652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 424.114976][ T8652] Call Trace: [ 424.118265][ T8652] dump_stack+0x172/0x1f0 [ 424.122596][ T8652] dump_header+0x177/0x1152 [ 424.127094][ T8652] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 424.132892][ T8652] ? ___ratelimit+0x2c8/0x595 [ 424.137572][ T8652] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 424.143379][ T8652] ? lockdep_hardirqs_on+0x418/0x5d0 [ 424.148653][ T8652] ? trace_hardirqs_on+0x67/0x240 [ 424.153675][ T8652] ? pagefault_out_of_memory+0x11c/0x11c [ 424.159393][ T8652] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 424.165191][ T8652] ? ___ratelimit+0x60/0x595 [ 424.170327][ T8652] ? do_raw_spin_unlock+0x57/0x270 [ 424.175438][ T8652] oom_kill_process.cold+0x10/0x15 [ 424.180543][ T8652] out_of_memory+0x334/0x1340 [ 424.185218][ T8652] ? lock_downgrade+0x920/0x920 [ 424.190073][ T8652] ? oom_killer_disable+0x280/0x280 [ 424.195284][ T8652] mem_cgroup_out_of_memory+0x1d8/0x240 [ 424.200831][ T8652] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 424.206463][ T8652] ? do_raw_spin_unlock+0x57/0x270 [ 424.211574][ T8652] ? _raw_spin_unlock+0x2d/0x50 [ 424.216423][ T8652] try_charge+0xa2d/0x1440 [ 424.220847][ T8652] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 424.226383][ T8652] ? percpu_ref_tryget_live+0x111/0x290 [ 424.231926][ T8652] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 424.238158][ T8652] ? __kasan_check_read+0x11/0x20 [ 424.243177][ T8652] ? get_mem_cgroup_from_mm+0x156/0x320 [ 424.248716][ T8652] mem_cgroup_try_charge+0x136/0x590 [ 424.253989][ T8652] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 424.260211][ T8652] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 424.265826][ T8652] wp_page_copy+0x41e/0x1590 [ 424.270399][ T8652] ? find_held_lock+0x35/0x130 [ 424.275145][ T8652] ? pmd_pfn+0x1d0/0x1d0 [ 424.279382][ T8652] ? lock_downgrade+0x920/0x920 [ 424.284219][ T8652] ? swp_swapcount+0x540/0x540 [ 424.288963][ T8652] ? __kasan_check_read+0x11/0x20 [ 424.293966][ T8652] ? do_raw_spin_unlock+0x57/0x270 [ 424.299079][ T8652] do_wp_page+0x499/0x14d0 [ 424.303477][ T8652] ? finish_mkwrite_fault+0x570/0x570 [ 424.308836][ T8652] __handle_mm_fault+0x22f1/0x3f20 [ 424.313934][ T8652] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 424.319470][ T8652] ? __kasan_check_read+0x11/0x20 [ 424.324480][ T8652] handle_mm_fault+0x1b5/0x6c0 [ 424.329233][ T8652] __do_page_fault+0x536/0xdd0 [ 424.333984][ T8652] do_page_fault+0x38/0x590 [ 424.338470][ T8652] page_fault+0x39/0x40 [ 424.342602][ T8652] RIP: 0033:0x401d29 [ 424.346477][ T8652] Code: e1 4b 00 be 01 00 00 00 31 c0 e8 02 b3 05 00 31 ff e8 5b fc ff ff 90 66 2e 0f 1f 84 00 00 00 00 00 48 81 ec d8 00 00 00 84 c0 <48> 89 74 24 28 48 89 54 24 30 48 89 4c 24 38 4c 89 44 24 40 4c 89 [ 424.366060][ T8652] RSP: 002b:00007fff9ff76fb0 EFLAGS: 00010246 [ 424.372106][ T8652] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000457e4a [ 424.380055][ T8652] RDX: 0000000000000000 RSI: 0000000000000a66 RDI: 00000000004bf131 [ 424.388009][ T8652] RBP: 0000000000000a66 R08: 0000000000000001 R09: 00005555557c9940 [ 424.395958][ T8652] R10: 00005555557c9c10 R11: 0000000000000246 R12: 0000000000000001 [ 424.403922][ T8652] R13: 00007fff9ff770c0 R14: 0000000000000000 R15: 00007fff9ff770d0 [ 424.420567][ T8652] memory: usage 305000kB, limit 307200kB, failcnt 1672 [ 424.427525][ T8652] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 424.440723][ T8652] Memory cgroup stats for /syz5: [ 424.440837][ T8652] anon 260345856 [ 424.440837][ T8652] file 0 [ 424.440837][ T8652] kernel_stack 7274496 [ 424.440837][ T8652] slab 13201408 [ 424.440837][ T8652] sock 0 [ 424.440837][ T8652] shmem 45056 [ 424.440837][ T8652] file_mapped 135168 [ 424.440837][ T8652] file_dirty 0 [ 424.440837][ T8652] file_writeback 0 [ 424.440837][ T8652] anon_thp 234881024 [ 424.440837][ T8652] inactive_anon 135168 [ 424.440837][ T8652] active_anon 260345856 [ 424.440837][ T8652] inactive_file 0 [ 424.440837][ T8652] active_file 57344 [ 424.440837][ T8652] unevictable 0 [ 424.440837][ T8652] slab_reclaimable 2703360 [ 424.440837][ T8652] slab_unreclaimable 10498048 [ 424.440837][ T8652] pgfault 51348 [ 424.440837][ T8652] pgmajfault 0 [ 424.440837][ T8652] workingset_refault 66 [ 424.440837][ T8652] workingset_activate 0 [ 424.440837][ T8652] workingset_nodereclaim 0 [ 424.440837][ T8652] pgrefill 1469 [ 424.440837][ T8652] pgscan 2010 [ 424.440837][ T8652] pgsteal 252 [ 424.477801][T24639] overlayfs: unrecognized mount option "i\dex-off" or missing value 11:43:39 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}]}) r0 = semget(0x1, 0x1, 0x2) semctl$GETNCNT(r0, 0x2, 0xe, &(0x7f0000000000)=""/37) 11:43:39 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x5000000) 11:43:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0x20005875}], 0xf}}], 0x2, 0x0, 0x0) 11:43:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:39 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0xf6ffffff) 11:43:39 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x16b, 0x0) [ 424.547153][ T8652] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=15830,uid=0 [ 424.558877][T24641] overlayfs: unrecognized mount option "i\dex-off" or missing value [ 424.570002][ T8652] Memory cgroup out of memory: Killed process 15830 (syz-executor.5) total-vm:72708kB, anon-rss:2208kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 11:43:39 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x6000000) 11:43:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) [ 424.742466][T24659] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:39 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0xfffffff6) 11:43:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0x7fffefa3}], 0xf}}], 0x2, 0x0, 0x0) 11:43:39 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x16c, 0x0) [ 424.863450][T24661] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:40 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='i\\dey=off,\x00']) 11:43:40 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x16d, 0x0) 11:43:40 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x1000000000000) 11:43:40 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x7000000) 11:43:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0x2}}], 0x2, 0x0, 0x0) 11:43:40 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x40000000) 11:43:40 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x16e, 0x0) [ 425.207952][T24700] overlayfs: unrecognized mount option "i\dey=off" or missing value [ 425.244545][T24704] overlayfs: unrecognized mount option "i\dey=off" or missing value 11:43:40 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x100000000000000) 11:43:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:40 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="65783d6f6066f000"]) 11:43:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0x3}}], 0x2, 0x0, 0x0) 11:43:40 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0xf6ffffff) 11:43:40 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x200000000000000) 11:43:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:40 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x16f, 0x0) [ 425.598246][T24725] overlayfs: unrecognized mount option "ex=o`fð" or missing value 11:43:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0x4}}], 0x2, 0x0, 0x0) 11:43:40 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0xfffffff6) 11:43:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:40 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="695c6465783d6f66662c005642af36fd78ffc635c27f61326bc0e7c9b941cb34831d2b19bcfee9384fd1b9d81dc42ceda7fca898c4a298d0abadb351f7eab6b7ca8dc20c23665b99c9b47967cdea5e2be85c8d2b0981a678d369061c3971c2d7454eb05c6e4f78b6ac99f7e95797a2b7a4277725d4c7045f30e735826ff52050234ad981cf47e47eb3882801a5673e8108910908b16d1538da6585a59ac347ec71c780c641555c0bdc6ac13f002e6c03444fc07f0b57abb7b9832ad8c23b93f6b6073db7b5315dc098c67b5c9b"]) 11:43:40 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x300000000000000) 11:43:41 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x170, 0x0) 11:43:41 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x1000000000000) 11:43:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0x5}}], 0x2, 0x0, 0x0) 11:43:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:41 executing program 5: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) recvmsg(r0, &(0x7f0000001440)={&(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001300)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/76, 0x4c}, {&(0x7f0000000080)=""/4, 0x4}, {&(0x7f0000001200)=""/186, 0xba}, {&(0x7f00000012c0)=""/35, 0x23}], 0x6, &(0x7f0000001380)=""/144, 0x90}, 0x40) [ 426.034739][T24764] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:41 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x400000000000000) 11:43:41 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x100000000000000) 11:43:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0x6}}], 0x2, 0x0, 0x0) 11:43:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:41 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x171, 0x0) 11:43:41 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x200000000000000) 11:43:41 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x500000000000000) 11:43:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0x7}}], 0x2, 0x0, 0x0) 11:43:41 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x172, 0x0) 11:43:41 executing program 5: creat(&(0x7f0000000240)='./file0\x00', 0x12) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64EXEC\x00', &(0x7f0000000080)='i\\dex=off', 0x9, 0x3) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}]}) 11:43:41 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x300000000000000) 11:43:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:41 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x600000000000000) 11:43:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0x8}}], 0x2, 0x0, 0x0) 11:43:41 executing program 5: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000000)={0x0, 0xf, 0x3, [0x401, 0x3, 0x8]}, &(0x7f0000000040)=0xe) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000080)={r1, 0x80000000}, &(0x7f0000000180)=0x8) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}]}) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r0) 11:43:41 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x173, 0x0) [ 426.715143][T24826] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:41 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x400000000000000) 11:43:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0x9}}], 0x2, 0x0, 0x0) [ 426.931538][T24851] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:42 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x500000000000000) 11:43:42 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x700000000000000) 11:43:42 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x174, 0x0) 11:43:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) [ 427.019930][T24860] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:42 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="d0b80000837c1933ee51ef"]) 11:43:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xa}}], 0x2, 0x0, 0x0) 11:43:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:42 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x4000000000000000) 11:43:42 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x600000000000000) 11:43:42 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x175, 0x0) 11:43:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xb}}], 0x2, 0x0, 0x0) 11:43:42 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x700000000000000) 11:43:42 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0xf6ffffff00000000) [ 427.402435][T24895] overlayfs: unrecognized mount option "и" or missing value 11:43:42 executing program 5: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000000)) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self\x00', 0x100, 0x0) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}]}) 11:43:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:42 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x176, 0x0) 11:43:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xc}}], 0x2, 0x0, 0x0) 11:43:42 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0xffffffff00000000) 11:43:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) [ 427.662004][T24914] syz-executor.5 invoked oom-killer: gfp_mask=0x40cc0(GFP_KERNEL|__GFP_COMP), order=1, oom_score_adj=1000 11:43:42 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x4000000000000000) [ 427.786541][T24914] CPU: 0 PID: 24914 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 427.795693][T24914] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 427.805754][T24914] Call Trace: [ 427.809063][T24914] dump_stack+0x172/0x1f0 [ 427.813410][T24914] dump_header+0x177/0x1152 [ 427.817930][T24914] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 427.823746][T24914] ? ___ratelimit+0x2c8/0x595 [ 427.828440][T24914] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 11:43:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xd}}], 0x2, 0x0, 0x0) [ 427.834262][T24914] ? lockdep_hardirqs_on+0x418/0x5d0 [ 427.839555][T24914] ? trace_hardirqs_on+0x67/0x240 [ 427.844593][T24914] ? pagefault_out_of_memory+0x11c/0x11c [ 427.850238][T24914] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 427.856051][T24914] ? ___ratelimit+0x60/0x595 [ 427.860652][T24914] ? do_raw_spin_unlock+0x57/0x270 [ 427.865774][T24914] oom_kill_process.cold+0x10/0x15 [ 427.870896][T24914] out_of_memory+0x334/0x1340 [ 427.875579][T24914] ? lock_downgrade+0x920/0x920 [ 427.880442][T24914] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 11:43:43 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) fremovexattr(r0, &(0x7f0000000080)=@random={'osx.', '.\'\x00'}) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 427.886260][T24914] ? oom_killer_disable+0x280/0x280 [ 427.891485][T24914] mem_cgroup_out_of_memory+0x1d8/0x240 [ 427.897039][T24914] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 427.902691][T24914] ? do_raw_spin_unlock+0x57/0x270 [ 427.907817][T24914] ? _raw_spin_unlock+0x2d/0x50 [ 427.912681][T24914] try_charge+0xf4b/0x1440 [ 427.917105][T24914] ? __lock_acquire+0x800/0x4a00 [ 427.922062][T24914] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 427.927611][T24914] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 427.933597][T24914] ? cache_grow_begin+0x122/0xd20 [ 427.938630][T24914] ? find_held_lock+0x35/0x130 [ 427.943397][T24914] ? cache_grow_begin+0x122/0xd20 [ 427.948449][T24914] __memcg_kmem_charge_memcg+0x71/0xf0 [ 427.953925][T24914] ? memcg_kmem_put_cache+0x50/0x50 [ 427.959131][T24914] ? __kasan_check_read+0x11/0x20 [ 427.964169][T24914] cache_grow_begin+0x629/0xd20 [ 427.969030][T24914] ? __sanitizer_cov_trace_cmp2+0x11/0x20 [ 427.974762][T24914] ? mempolicy_slab_node+0x139/0x390 [ 427.980052][T24914] fallback_alloc+0x1fd/0x2d0 11:43:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xe}}], 0x2, 0x0, 0x0) [ 427.984739][T24914] ____cache_alloc_node+0x1bc/0x1d0 [ 427.989946][T24914] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 427.996278][T24914] kmem_cache_alloc+0x1ef/0x710 [ 428.001137][T24914] ? __kasan_check_read+0x11/0x20 [ 428.006173][T24914] copy_process+0x1ce2/0x6830 [ 428.010870][T24914] ? __cleanup_sighand+0x60/0x60 [ 428.015812][T24914] ? __might_fault+0x12b/0x1e0 [ 428.020584][T24914] ? __might_fault+0x12b/0x1e0 [ 428.025363][T24914] _do_fork+0x146/0xfa0 [ 428.029524][T24914] ? copy_init_mm+0x20/0x20 [ 428.034034][T24914] ? __kasan_check_read+0x11/0x20 [ 428.039069][T24914] ? _copy_to_user+0x118/0x160 [ 428.043846][T24914] __x64_sys_clone+0x1ab/0x270 [ 428.048616][T24914] ? __ia32_sys_vfork+0xd0/0xd0 [ 428.053483][T24914] ? do_syscall_64+0x26/0x760 [ 428.058171][T24914] ? lockdep_hardirqs_on+0x418/0x5d0 [ 428.063462][T24914] ? trace_hardirqs_on+0x67/0x240 [ 428.068498][T24914] do_syscall_64+0xfa/0x760 [ 428.073018][T24914] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 428.078908][T24914] RIP: 0033:0x459879 [ 428.078925][T24914] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 428.078933][T24914] RSP: 002b:00007fd520517c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 428.078948][T24914] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000459879 [ 428.078957][T24914] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 00000200000007fd [ 428.078966][T24914] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 11:43:43 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x177, 0x0) 11:43:43 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0xf6ffffff00000000) [ 428.078975][T24914] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5205186d4 [ 428.078984][T24914] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 00000000ffffffff [ 428.144499][T24914] memory: usage 307200kB, limit 307200kB, failcnt 1714 [ 428.164080][T24914] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 428.179106][T24914] Memory cgroup stats for /syz5: [ 428.179222][T24914] anon 261160960 [ 428.179222][T24914] file 0 [ 428.179222][T24914] kernel_stack 7471104 [ 428.179222][T24914] slab 13471744 [ 428.179222][T24914] sock 0 [ 428.179222][T24914] shmem 45056 [ 428.179222][T24914] file_mapped 135168 [ 428.179222][T24914] file_dirty 0 [ 428.179222][T24914] file_writeback 0 [ 428.179222][T24914] anon_thp 234881024 [ 428.179222][T24914] inactive_anon 135168 [ 428.179222][T24914] active_anon 261226496 [ 428.179222][T24914] inactive_file 0 [ 428.179222][T24914] active_file 57344 [ 428.179222][T24914] unevictable 0 [ 428.179222][T24914] slab_reclaimable 2703360 [ 428.179222][T24914] slab_unreclaimable 10768384 [ 428.179222][T24914] pgfault 52041 [ 428.179222][T24914] pgmajfault 0 [ 428.179222][T24914] workingset_refault 66 [ 428.179222][T24914] workingset_activate 0 [ 428.179222][T24914] workingset_nodereclaim 0 [ 428.179222][T24914] pgrefill 1602 [ 428.179222][T24914] pgscan 2214 [ 428.179222][T24914] pgsteal 252 [ 428.358838][T24914] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=24701,uid=0 [ 428.390531][T24914] Memory cgroup out of memory: Killed process 24701 (syz-executor.5) total-vm:72708kB, anon-rss:2208kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 428.442257][T24909] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 428.459163][T24909] CPU: 0 PID: 24909 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 428.468303][T24909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 428.478361][T24909] Call Trace: [ 428.481658][T24909] dump_stack+0x172/0x1f0 [ 428.485985][T24909] dump_header+0x177/0x1152 [ 428.490486][T24909] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 428.496292][T24909] ? ___ratelimit+0x2c8/0x595 [ 428.500970][T24909] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 428.506796][T24909] ? lockdep_hardirqs_on+0x418/0x5d0 [ 428.512785][T24909] ? trace_hardirqs_on+0x67/0x240 [ 428.517814][T24909] ? pagefault_out_of_memory+0x11c/0x11c [ 428.523452][T24909] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 428.529268][T24909] ? ___ratelimit+0x60/0x595 [ 428.533852][T24909] ? do_raw_spin_unlock+0x57/0x270 [ 428.538966][T24909] oom_kill_process.cold+0x10/0x15 [ 428.544068][T24909] out_of_memory+0x334/0x1340 [ 428.548731][T24909] ? lock_downgrade+0x920/0x920 [ 428.553584][T24909] ? oom_killer_disable+0x280/0x280 [ 428.558788][T24909] mem_cgroup_out_of_memory+0x1d8/0x240 [ 428.564365][T24909] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 428.569990][T24909] ? do_raw_spin_unlock+0x57/0x270 [ 428.575094][T24909] ? _raw_spin_unlock+0x2d/0x50 [ 428.579934][T24909] try_charge+0xa2d/0x1440 [ 428.584333][T24909] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 428.589865][T24909] ? percpu_ref_tryget_live+0x111/0x290 [ 428.595397][T24909] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 428.601625][T24909] ? __kasan_check_read+0x11/0x20 [ 428.606628][T24909] ? get_mem_cgroup_from_mm+0x156/0x320 [ 428.612165][T24909] mem_cgroup_try_charge+0x136/0x590 [ 428.617458][T24909] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 428.623693][T24909] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 428.629346][T24909] __handle_mm_fault+0x1e34/0x3f20 [ 428.634447][T24909] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 428.639997][T24909] ? __kasan_check_read+0x11/0x20 [ 428.645010][T24909] handle_mm_fault+0x1b5/0x6c0 [ 428.649767][T24909] __do_page_fault+0x536/0xdd0 [ 428.654547][T24909] do_page_fault+0x38/0x590 [ 428.659054][T24909] page_fault+0x39/0x40 [ 428.663189][T24909] RIP: 0033:0x45c22d [ 428.667065][T24909] Code: 5b 5d f3 c3 66 0f 1f 84 00 00 00 00 00 48 c7 c0 ea ff ff ff 48 85 ff 0f 84 30 8e fb ff 48 85 f6 0f 84 27 8e fb ff 48 83 ee 10 <48> 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 [ 428.686650][T24909] RSP: 002b:00007fff9ff76da8 EFLAGS: 00010202 [ 428.692706][T24909] RAX: ffffffffffffffea RBX: 00007fd5204f7700 RCX: 00007fd5204f7700 [ 428.700666][T24909] RDX: 00000000003d0f00 RSI: 00007fd5204f6db0 RDI: 00000000004105b0 [ 428.708640][T24909] RBP: 00007fff9ff76fc0 R08: 00007fd5204f79d0 R09: 00007fd5204f7700 [ 428.716595][T24909] R10: 00007fd5204f6dc0 R11: 0000000000000246 R12: 0000000000000000 [ 428.724564][T24909] R13: 00007fff9ff76e5f R14: 00007fd5204f79c0 R15: 000000000075bfd4 [ 428.735733][T24909] memory: usage 304844kB, limit 307200kB, failcnt 1714 [ 428.742936][T24909] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 428.750191][T24909] Memory cgroup stats for /syz5: [ 428.750294][T24909] anon 259076096 [ 428.750294][T24909] file 0 [ 428.750294][T24909] kernel_stack 7471104 [ 428.750294][T24909] slab 13471744 [ 428.750294][T24909] sock 0 [ 428.750294][T24909] shmem 45056 [ 428.750294][T24909] file_mapped 135168 [ 428.750294][T24909] file_dirty 0 [ 428.750294][T24909] file_writeback 0 [ 428.750294][T24909] anon_thp 232783872 [ 428.750294][T24909] inactive_anon 135168 [ 428.750294][T24909] active_anon 259076096 [ 428.750294][T24909] inactive_file 0 [ 428.750294][T24909] active_file 57344 [ 428.750294][T24909] unevictable 0 [ 428.750294][T24909] slab_reclaimable 2703360 [ 428.750294][T24909] slab_unreclaimable 10768384 [ 428.750294][T24909] pgfault 52041 [ 428.750294][T24909] pgmajfault 0 [ 428.750294][T24909] workingset_refault 66 [ 428.750294][T24909] workingset_activate 0 [ 428.750294][T24909] workingset_nodereclaim 0 [ 428.750294][T24909] pgrefill 1602 [ 428.750294][T24909] pgscan 2214 [ 428.750294][T24909] pgsteal 252 [ 428.844249][T24909] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=15805,uid=0 [ 428.859786][T24909] Memory cgroup out of memory: Killed process 15805 (syz-executor.5) total-vm:72708kB, anon-rss:2208kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 428.879376][ T1065] oom_reaper: reaped process 15805 (syz-executor.5), now anon-rss:0kB, file-rss:34832kB, shmem-rss:0kB 11:43:44 executing program 5: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) name_to_handle_at(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x11, 0x1, "d4d46facf37b052804"}, &(0x7f0000000080), 0x400) clone(0x976796a4e8ab20ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TCSBRKP(r0, 0x5425, 0x7) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='if, ']) r1 = geteuid() getgroups(0x7, &(0x7f0000000180)=[0xee00, 0x0, 0x0, 0xee00, 0x0, 0xee00, 0x0]) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000300)=0xe8) write$P9_RSTATu(r0, &(0x7f0000000340)={0x70, 0x7d, 0x2, {{0x0, 0x53, 0x7fff, 0x4, {0x3, 0x0, 0x3}, 0x40000, 0x8000, 0xffff, 0x30000000000000, 0x8, 'overlay\x00', 0x8, 'overlay\x00', 0x8, 'overlay\x00', 0x8, 'overlay\x00'}, 0x8, 'overlay\x00', r1, r2, r3}}, 0x70) 11:43:44 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x1, 0x200102) r2 = fcntl$dupfd(r1, 0x406, r1) ioctl$VIDIOC_G_MODULATOR(r2, 0xc0445636, &(0x7f0000000080)={0x7, "7adbe87d749b3682f0cd4b7798cc28a2525e0d8434f697bc8ab422d4d99bbd25", 0x9ca6e543553da355, 0x401, 0xffff, 0x0, 0x5}) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r2) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) 11:43:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:44 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x178, 0x0) 11:43:44 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0xffffffff00000000) 11:43:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0x2000588f}}], 0x2, 0x0, 0x0) [ 428.894771][T24914] overlayfs: unrecognized mount option "i\dex=off" or missing value [ 428.909266][T24960] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:44 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x179, 0x0) 11:43:44 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x2, 0x2) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000001c0)=0xe8) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000200)={r2, 0x1, 0x6, @remote}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e22, @multicast2}}, 0x7, 0x0, 0x5, 0x22c376}, &(0x7f0000000340)=0x98) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000380)={0x8, 0x81, 0xc, 0x3ff, 0x9dd, 0x1, 0x867, 0x4, r3}, 0x20) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)={0x0}) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000240)=0x5, 0x4) ioctl$DRM_IOCTL_SWITCH_CTX(r1, 0x40086424, &(0x7f0000000040)={r4, 0x3}) 11:43:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0x7fffeeee}}], 0x2, 0x0, 0x0) 11:43:44 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000080)={'batadv0\x00', {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}}) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 429.070952][T24978] overlayfs: unrecognized mount option "if" or missing value 11:43:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) [ 429.176353][T24987] overlayfs: unrecognized mount option "if" or missing value 11:43:44 executing program 5: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_ifreq(r0, 0x8942, &(0x7f0000000000)={'ifb0\x00', @ifru_map={0x1800000000, 0x6, 0x1, 0x0, 0x8, 0x1ff}}) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="655c67b280"]) 11:43:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x2}}], 0x2, 0x0, 0x0) 11:43:44 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x3, 0x40000) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) setxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000100)=@v2={0x5, 0x2, 0x2, 0x0, 0x15, "54f97b5fd6577cc84ac52081fc123692b6f48f9dd0"}, 0x1f, 0x2) 11:43:44 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x17a, 0x0) 11:43:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:44 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_tcp_buf(r1, 0x6, 0xd, &(0x7f0000000080)=""/159, &(0x7f0000000140)=0x9f) ioctl$TIOCLINUX3(r1, 0x541c, &(0x7f0000000180)) readlinkat(r1, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=""/188, 0xbc) 11:43:44 executing program 2: r0 = syz_open_dev$sndpcmp(&(0x7f00000003c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x20800) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000400)={0x0, @bt={0xffffffff, 0x8c, 0x1, 0x2, 0xca, 0x401, 0xff, 0x8, 0x7, 0x7, 0x5, 0x0, 0x81, 0x9, 0x2, 0xc16969337cf5da3a}}) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x100, 0x0) syz_open_dev$evdev(&(0x7f0000000240)='/dev/input/event#\x00', 0x8, 0x40) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000280)={0x0, 0xa6, "d8a993dd80671db34e8d8dda4dced178e5fcfcc2083ab1d2ab247ba5319b7922024ba334dfc88c318c6e703c2e39aedff9dc2ecbf73ac985b7cd7515ea4be38a097416c842ebe6eab0fc02fbee3e4bde28d78c4251e4e46efd25d612ba8ddc1d42e7800d428e59da0ebc347565fb78db0d5d5e2670ed459ddefb853b9d519aa61232ba622e94ec8a66def6a052bdccb37b6204dbd99e14b5e4965d980fbfa04114721ac71958"}, &(0x7f0000000340)=0xae) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000380)={0x1, 0x8004, 0x200, 0x92f, r3}, 0x10) ioctl$EVIOCGBITSW(r2, 0x80404525, &(0x7f00000000c0)=""/2) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r2, 0xc1205531, &(0x7f0000000100)={0x200, 0x9, 0xfffffffffffffffe, 0x1, [], [], [], 0x7, 0x0, 0x9a0f, 0x3, "b4eb98f15712d0e72e783d620bf25450"}) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 429.520130][T25015] overlayfs: unrecognized mount option "e\g²€" or missing value 11:43:44 executing program 5: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x7, 0x9, 0x2}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x400000, 0x3f, 0x20820000, 0x1, 0xfffffffffffffffc}, 0x3c) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000080)=0xe8) ioprio_set$uid(0x7b2ec9ee2a5c249c, r3, 0x9) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000500)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0xc0040200}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xec, r4, 0x200, 0x70bd28, 0x25dfdbfd, {}, [{{0x8, 0x1, r2}, {0x84, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffbff}}, {0x8, 0x6, r2}}}]}}, {{0x8, 0x1, r2}, {0x44, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8}}}]}}]}, 0xec}, 0x1, 0x0, 0x0, 0x20008004}, 0x4040810) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1e2764ea4fe1d2c42eda44af3cf39e613c43d6825959acc092832a940600cf3311884fb2e29102326b2982c2b56cea0fce075683ef2bb272626b5689d5c00bc6ae5547ab575c27fbffd76aadfa9241dc5958208200581c8a6c54707dcc7f5d40d4a9e4062e40cb5385df6c18a6f725defe9d84af84982f"]) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f0000000280)=[0x1, 0x7f]) 11:43:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x4}}], 0x2, 0x0, 0x0) 11:43:44 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x17b, 0x0) 11:43:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:44 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x40, 0x0) arch_prctl$ARCH_SET_GS(0x1001, 0x9) setsockopt$IP_VS_SO_SET_EDITDEST(r1, 0x0, 0x489, &(0x7f0000000140)={{0x5f, @local, 0x4e21, 0x4, 'sed\x00', 0x0, 0xddf, 0x1e}, {@remote, 0x4e23, 0x2000, 0x1, 0x2, 0x200}}, 0x44) fgetxattr(r1, &(0x7f0000000080)=@random={'os2.', '/dev/usbmon#\x00'}, &(0x7f00000000c0)=""/102, 0x66) 11:43:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0xf}}], 0x2, 0x0, 0x0) 11:43:45 executing program 5: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200020007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}]}) fsetxattr$security_smack_entry(r0, &(0x7f0000000000)='security.SMACK64IPOUT\x00', &(0x7f0000000040)='i\\dex=off', 0x9, 0x63e749f7abc2880a) 11:43:45 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") epoll_create1(0x80000) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000229bd7000ffdbdf25080000000800040008000000080006000100000008000400fff00000eee20027fb9b9a9097cdfa7c69af82acf4b46e8779148856474d6a83df46bf2aa546ee7c2aee46a5fb78aa6f8310c68288067f450151672a567ac44fb03a770d0a9a44cb65ef776a2d7d9c0691f8825bef20f4973b399a606ce056c9734501221f390c"], 0x2c}, 0x1, 0x0, 0x0, 0x4040090}, 0x20000000) 11:43:45 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x17c, 0x0) 11:43:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x5d}}], 0x2, 0x0, 0x0) 11:43:45 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = dup2(r0, r0) ioctl$VIDIOC_DQEVENT(r1, 0x80885659, &(0x7f0000000200)={0x0, @data}) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000227bd7000fedbdf250400000008000600040000000808000100050000008a16fd5449796e4c056ec65327be5642222fcc5e8c889fad6c5e249f"], 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x8005) setsockopt$sock_void(r1, 0x1, 0x24, 0x0, 0x0) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 430.039233][T25064] overlayfs: unrecognized mount option "i\dex=off" or missing value [ 430.097462][T25072] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:45 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r2, 0x710, 0x70bd2b, 0x25dfdbfc, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x840}, 0x4000000) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000200)={0x6, 0xce86}) openat$vimc2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video2\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r1, 0x81785501, &(0x7f0000000240)=""/89) 11:43:45 executing program 3: r0 = socket$inet6(0xa, 0x7, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:45 executing program 5: creat(&(0x7f0000000040)='./file0\x00', 0x80) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="695c78e33cbb7e65b34bb53c82e9af8aa104f53a038254eaf288620eb39b62fc55d4291a6a1770a03cbc68c7"]) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 11:43:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0xf00}}], 0x2, 0x0, 0x0) 11:43:45 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x17d, 0x0) 11:43:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) [ 430.307228][T25092] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 430.369641][T25092] CPU: 1 PID: 25092 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 430.378790][T25092] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 430.388851][T25092] Call Trace: [ 430.392151][T25092] dump_stack+0x172/0x1f0 [ 430.396496][T25092] dump_header+0x177/0x1152 [ 430.401015][T25092] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 430.406954][T25092] ? ___ratelimit+0x2c8/0x595 [ 430.411671][T25092] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 11:43:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) [ 430.417486][T25092] ? lockdep_hardirqs_on+0x418/0x5d0 [ 430.422788][T25092] ? trace_hardirqs_on+0x67/0x240 [ 430.427831][T25092] ? pagefault_out_of_memory+0x11c/0x11c [ 430.433479][T25092] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 430.439293][T25092] ? ___ratelimit+0x60/0x595 [ 430.443892][T25092] ? do_raw_spin_unlock+0x57/0x270 [ 430.449015][T25092] oom_kill_process.cold+0x10/0x15 [ 430.454138][T25092] out_of_memory+0x334/0x1340 [ 430.458824][T25092] ? lock_downgrade+0x920/0x920 [ 430.463688][T25092] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 11:43:45 executing program 3: r0 = socket$inet6(0xa, 0x800, 0x9) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) splice(r2, &(0x7f0000000040), r3, 0x0, 0x100000200002, 0x0) iopl(0xff) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r4 = syz_open_procfs(0x0, &(0x7f0000000180)='clear_refs\x00') ioctl$MON_IOCX_GET(r4, 0x40189206, &(0x7f0000000280)={&(0x7f00000001c0), &(0x7f0000000200)=""/121, 0x79}) r5 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000000c0)={0x0, 0x0, 0xd3}) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000100)={0x0, 0x0, 0x2d8}) ioctl$DRM_IOCTL_GEM_FLINK(r5, 0xc008640a, &(0x7f0000000140)={r6, r7}) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 430.469505][T25092] ? oom_killer_disable+0x280/0x280 [ 430.474725][T25092] mem_cgroup_out_of_memory+0x1d8/0x240 [ 430.480284][T25092] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 430.485935][T25092] ? do_raw_spin_unlock+0x57/0x270 [ 430.491060][T25092] ? _raw_spin_unlock+0x2d/0x50 [ 430.495921][T25092] try_charge+0xf4b/0x1440 [ 430.500356][T25092] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 430.505906][T25092] ? percpu_ref_tryget_live+0x111/0x290 [ 430.511461][T25092] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 11:43:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) [ 430.517710][T25092] ? __kasan_check_read+0x11/0x20 [ 430.522748][T25092] ? get_mem_cgroup_from_mm+0x156/0x320 [ 430.528287][T25092] mem_cgroup_try_charge+0x136/0x590 [ 430.533670][T25092] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 430.533688][T25092] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 430.533704][T25092] wp_page_copy+0x41e/0x1590 [ 430.533719][T25092] ? find_held_lock+0x35/0x130 [ 430.533736][T25092] ? pmd_pfn+0x1d0/0x1d0 [ 430.559127][T25092] ? lock_downgrade+0x920/0x920 [ 430.563986][T25092] ? swp_swapcount+0x540/0x540 [ 430.568758][T25092] ? __kasan_check_read+0x11/0x20 [ 430.573785][T25092] ? do_raw_spin_unlock+0x57/0x270 [ 430.578904][T25092] do_wp_page+0x499/0x14d0 [ 430.583337][T25092] ? finish_mkwrite_fault+0x570/0x570 [ 430.588728][T25092] __handle_mm_fault+0x22f1/0x3f20 [ 430.593851][T25092] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 430.599429][T25092] ? __kasan_check_read+0x11/0x20 [ 430.604472][T25092] handle_mm_fault+0x1b5/0x6c0 [ 430.609251][T25092] __do_page_fault+0x536/0xdd0 [ 430.614036][T25092] do_page_fault+0x38/0x590 [ 430.618553][T25092] page_fault+0x39/0x40 [ 430.622709][T25092] RIP: 0033:0x457eba [ 430.626608][T25092] Code: 00 00 0f 31 48 c1 e2 20 89 c0 48 09 c2 64 48 89 14 25 20 06 00 00 b8 40 43 41 00 48 89 15 fe e8 61 00 48 85 c0 74 08 4c 89 cf 81 c4 fb ff 45 85 f6 0f 85 58 01 00 00 48 85 db 48 c7 05 ba e0 [ 430.646223][T25092] RSP: 002b:00007fff9ff77040 EFLAGS: 00010202 [ 430.652305][T25092] RAX: 0000000000414340 RBX: 00007fff9ff77040 RCX: 0000000000457e4a [ 430.660284][T25092] RDX: 000000e803616af8 RSI: 0000000000000000 RDI: 00005555557c9940 11:43:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) [ 430.668265][T25092] RBP: 00007fff9ff77080 R08: 0000000000000001 R09: 00005555557c9940 [ 430.676251][T25092] R10: 00005555557c9c10 R11: 0000000000000246 R12: 0000000000000001 [ 430.684229][T25092] R13: 0000000000000000 R14: 0000000000000000 R15: 00007fff9ff770d0 11:43:45 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x9, 0x0) 11:43:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x4000}}], 0x2, 0x0, 0x0) 11:43:45 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x17e, 0x0) 11:43:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) [ 430.978253][T25092] memory: usage 307200kB, limit 307200kB, failcnt 1745 [ 430.985646][T25092] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 430.998274][T25092] Memory cgroup stats for /syz5: [ 430.998377][T25092] anon 261226496 [ 430.998377][T25092] file 0 [ 430.998377][T25092] kernel_stack 7405568 [ 430.998377][T25092] slab 13611008 [ 430.998377][T25092] sock 0 [ 430.998377][T25092] shmem 45056 [ 430.998377][T25092] file_mapped 135168 [ 430.998377][T25092] file_dirty 0 [ 430.998377][T25092] file_writeback 0 [ 430.998377][T25092] anon_thp 234881024 [ 430.998377][T25092] inactive_anon 135168 [ 430.998377][T25092] active_anon 261152768 [ 430.998377][T25092] inactive_file 0 [ 430.998377][T25092] active_file 57344 [ 430.998377][T25092] unevictable 0 [ 430.998377][T25092] slab_reclaimable 2703360 [ 430.998377][T25092] slab_unreclaimable 10907648 [ 430.998377][T25092] pgfault 52338 [ 430.998377][T25092] pgmajfault 0 [ 430.998377][T25092] workingset_refault 66 [ 430.998377][T25092] workingset_activate 0 [ 430.998377][T25092] workingset_nodereclaim 0 [ 430.998377][T25092] pgrefill 1635 [ 430.998377][T25092] pgscan 2348 [ 430.998377][T25092] pgsteal 252 [ 431.097407][T25092] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=25021,uid=0 [ 431.113290][T25092] Memory cgroup out of memory: Killed process 25021 (syz-executor.5) total-vm:72840kB, anon-rss:2216kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 431.132808][ T1065] oom_reaper: reaped process 25021 (syz-executor.5), now anon-rss:0kB, file-rss:34832kB, shmem-rss:0kB [ 431.145159][ T8652] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 431.175086][ T8652] CPU: 0 PID: 8652 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 431.184142][ T8652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 431.188204][T25142] overlayfs: unrecognized mount option "i\xã<»~e³Kµ<‚鯊¡õ:‚Têòˆb³›büUÔ)jp <¼hÇ" or missing value [ 431.194194][ T8652] Call Trace: [ 431.194217][ T8652] dump_stack+0x172/0x1f0 [ 431.194234][ T8652] dump_header+0x177/0x1152 [ 431.194250][ T8652] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 431.194260][ T8652] ? ___ratelimit+0x2c8/0x595 [ 431.194271][ T8652] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 431.194286][ T8652] ? lockdep_hardirqs_on+0x418/0x5d0 [ 431.194300][ T8652] ? trace_hardirqs_on+0x67/0x240 [ 431.194315][ T8652] ? pagefault_out_of_memory+0x11c/0x11c [ 431.194331][ T8652] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 431.194344][ T8652] ? ___ratelimit+0x60/0x595 [ 431.194354][ T8652] ? do_raw_spin_unlock+0x57/0x270 [ 431.194370][ T8652] oom_kill_process.cold+0x10/0x15 [ 431.194383][ T8652] out_of_memory+0x334/0x1340 [ 431.194396][ T8652] ? lock_downgrade+0x920/0x920 [ 431.194414][ T8652] ? oom_killer_disable+0x280/0x280 [ 431.194438][ T8652] mem_cgroup_out_of_memory+0x1d8/0x240 [ 431.291149][ T8652] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 431.296866][ T8652] ? do_raw_spin_unlock+0x57/0x270 [ 431.301963][ T8652] ? _raw_spin_unlock+0x2d/0x50 [ 431.306792][ T8652] try_charge+0xa2d/0x1440 [ 431.311211][ T8652] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 431.316741][ T8652] ? percpu_ref_tryget_live+0x111/0x290 [ 431.322267][ T8652] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 431.328496][ T8652] ? __kasan_check_read+0x11/0x20 [ 431.333504][ T8652] ? get_mem_cgroup_from_mm+0x156/0x320 [ 431.339041][ T8652] mem_cgroup_try_charge+0x136/0x590 [ 431.344313][ T8652] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 431.350548][ T8652] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 431.356228][ T8652] wp_page_copy+0x41e/0x1590 [ 431.360815][ T8652] ? find_held_lock+0x35/0x130 [ 431.365584][ T8652] ? pmd_pfn+0x1d0/0x1d0 [ 431.369815][ T8652] ? lock_downgrade+0x920/0x920 [ 431.374656][ T8652] ? swp_swapcount+0x540/0x540 [ 431.379409][ T8652] ? __kasan_check_read+0x11/0x20 [ 431.384419][ T8652] ? do_raw_spin_unlock+0x57/0x270 [ 431.389519][ T8652] do_wp_page+0x499/0x14d0 [ 431.393954][ T8652] ? finish_mkwrite_fault+0x570/0x570 [ 431.399325][ T8652] __handle_mm_fault+0x22f1/0x3f20 [ 431.404429][ T8652] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 431.409979][ T8652] ? __kasan_check_read+0x11/0x20 [ 431.414996][ T8652] handle_mm_fault+0x1b5/0x6c0 [ 431.419753][ T8652] __do_page_fault+0x536/0xdd0 [ 431.424527][ T8652] do_page_fault+0x38/0x590 [ 431.429016][ T8652] page_fault+0x39/0x40 [ 431.433156][ T8652] RIP: 0033:0x457faa [ 431.437027][ T8652] Code: 48 85 db 74 b6 41 bc ca 00 00 00 eb 0c 0f 1f 00 48 8b 5b 08 48 85 db 74 a2 48 8b 3b 48 8b 47 10 48 85 c0 74 05 ff d0 48 8b 3b ff 4f 28 0f 94 c0 84 c0 74 db 8b 47 2c 85 c0 74 d4 45 31 d2 ba [ 431.456639][ T8652] RSP: 002b:00007fff9ff77040 EFLAGS: 00010246 [ 431.462699][ T8652] RAX: 0000000000000000 RBX: 00007fff9ff77040 RCX: 0000000000457e4a [ 431.470659][ T8652] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000a74fc8 [ 431.478631][ T8652] RBP: 00007fff9ff77080 R08: 0000000000000001 R09: 00005555557c9940 [ 431.486595][ T8652] R10: 00005555557c9c10 R11: 0000000000000246 R12: 00000000000000ca [ 431.494554][ T8652] R13: 0000000000000aa8 R14: 0000000000000000 R15: 00007fff9ff770d0 [ 431.505804][ T8652] memory: usage 305120kB, limit 307200kB, failcnt 1746 [ 431.512742][ T8652] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 431.519638][ T8652] Memory cgroup stats for /syz5: [ 431.519726][ T8652] anon 259076096 [ 431.519726][ T8652] file 0 [ 431.519726][ T8652] kernel_stack 7405568 [ 431.519726][ T8652] slab 13611008 [ 431.519726][ T8652] sock 0 [ 431.519726][ T8652] shmem 45056 [ 431.519726][ T8652] file_mapped 135168 [ 431.519726][ T8652] file_dirty 0 [ 431.519726][ T8652] file_writeback 0 [ 431.519726][ T8652] anon_thp 232783872 [ 431.519726][ T8652] inactive_anon 135168 [ 431.519726][ T8652] active_anon 259076096 [ 431.519726][ T8652] inactive_file 0 [ 431.519726][ T8652] active_file 57344 [ 431.519726][ T8652] unevictable 0 [ 431.519726][ T8652] slab_reclaimable 2703360 [ 431.519726][ T8652] slab_unreclaimable 10907648 [ 431.519726][ T8652] pgfault 52371 [ 431.519726][ T8652] pgmajfault 0 [ 431.519726][ T8652] workingset_refault 66 [ 431.519726][ T8652] workingset_activate 0 [ 431.519726][ T8652] workingset_nodereclaim 0 [ 431.519726][ T8652] pgrefill 1635 [ 431.519726][ T8652] pgscan 2348 [ 431.519726][ T8652] pgsteal 252 [ 431.613924][ T8652] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=25065,uid=0 11:43:46 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x17f, 0x0) 11:43:46 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x400100, 0x0) getdents64(r1, &(0x7f00000000c0)=""/126, 0x7e) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xa1e84dc}}, 0x9, 0x4, 0xa04, 0x100, 0x69}, &(0x7f0000000200)=0x98) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000240)={r2, 0x55, "9a5ff478371d03a7e8311d56b61c1663cf8634704416bf25b6637e87dcc6b0a78364f9f9be72bca4c1a49b1866fd28dc886181b2d7e92885cc4881dbdd2968fbfa9d5a312899539d5811803be606e1bdfc281ccea0"}, &(0x7f00000002c0)=0x5d) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x5d00}}], 0x2, 0x0, 0x0) 11:43:46 executing program 2: socket$inet6(0xa, 0x2, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x12000, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r0, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0xc5da06c79ee2c2bd}, 0xc, &(0x7f0000000280)={&(0x7f0000000100)=ANY=[@ANYBLOB="ffe9cddb", @ANYRES16=r1, @ANYBLOB="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"], 0x164}}, 0xc4) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:46 executing program 5: clone(0x20000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x200, 0x0) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}]}) recvfrom$rxrpc(r0, &(0x7f0000000040)=""/148, 0x94, 0x40000020, 0x0, 0x0) 11:43:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) [ 431.629448][ T8652] Memory cgroup out of memory: Killed process 25065 (syz-executor.5) total-vm:72708kB, anon-rss:2208kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 431.648945][ T1065] oom_reaper: reaped process 25065 (syz-executor.5), now anon-rss:0kB, file-rss:34832kB, shmem-rss:0kB 11:43:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x40000}}], 0x2, 0x0, 0x0) 11:43:46 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f00000000c0)={0x5, 0x2, 0x1, 0x3, 0x9, 0x9, 0xac02, 0x400, 0x6, 0xf2e3, 0x8000}, 0xb) 11:43:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:46 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x4) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f00000000c0)={'filter\x00', 0x3, [{}, {}, {}]}, 0x58) 11:43:47 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x180, 0x0) 11:43:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x1000000}}], 0x2, 0x0, 0x0) 11:43:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:47 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x400) ioctl(r0, 0x1000008919, &(0x7f00000000c0)="11dca569410cc67e2c9ef5726e6b8e21055e0bcfe47bf0707704ca9e305037c34b6f2a8000dc03ba880ca55a1d78736b47") fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'U-', 0xffffffff80000000}, 0x28, 0x2) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:47 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x2) 11:43:47 executing program 5: creat(&(0x7f0000000040)='./file0\x00', 0x102) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="691c6465783d6f66662c00"]) bpf$OBJ_GET_PROG(0x7, 0xfffffffffffffffe, 0x0) 11:43:47 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000080)=0xcf, 0x4) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:47 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x181, 0x0) 11:43:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x2000000}}], 0x2, 0x0, 0x0) 11:43:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) [ 432.283858][T25203] overlayfs: unrecognized mount option "idex=off" or missing value 11:43:47 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x3) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x0, &(0x7f0000000080)=0x200, 0x4) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xfff, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r1, 0x541b, &(0x7f0000000100)) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r2 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x40000000000, 0x4000) fsmount(r2, 0x1, 0x8) 11:43:47 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x182, 0x0) 11:43:47 executing program 2: r0 = socket$inet6(0xa, 0xa, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0xfffffffffffffffe, 0x400800) ioctl$TIOCGRS485(r1, 0x542e, &(0x7f00000000c0)) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xffffffffffff7ffd, 0xeb0cd65a2050342e) [ 432.363322][T25215] overlayfs: unrecognized mount option "idex=off" or missing value 11:43:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0xf000000}}], 0x2, 0x0, 0x0) 11:43:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:47 executing program 5: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}]}) ioctl$PPPIOCATTCHAN(r0, 0x40047438, &(0x7f0000000000)=0x2) 11:43:47 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x183, 0x0) 11:43:47 executing program 3: r0 = socket$inet6(0xa, 0x4, 0xd) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$netlink(r1, 0x10e, 0x2, &(0x7f0000000080)=""/69, &(0x7f0000000100)=0xfffffffffffffd7c) 11:43:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) [ 432.741258][T25248] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x40000000}}], 0x2, 0x0, 0x0) 11:43:47 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1000, 0x20c100) ioctl$KVM_SET_TSC_KHZ(r0, 0xaea2, 0x2) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYRESOCT=r1]) 11:43:47 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x3) fallocate(r0, 0x1, 0xea8, 0x0) r1 = dup2(r0, r0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f0000000100)={0x73622a85, 0x101}) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) read(r2, &(0x7f0000000080)=""/87, 0x57) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000040)=r2) 11:43:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:48 executing program 3: r0 = accept4$rose(0xffffffffffffffff, &(0x7f0000000040)=@full={0xb, @dev, @default, 0x0, [@bcast, @null, @null, @bcast, @null]}, &(0x7f00000002c0)=0x40, 0x800) setsockopt$sock_timeval(r0, 0x1, 0x42, &(0x7f0000000300)={0x77359400}, 0x10) r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x80000000, 0x80000) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000340)="59a0ef310dd76c678d2d29f1dcb7ca93", 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e21, 0x651f, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x9}}, [0x1, 0x7f, 0x2, 0xca, 0x5, 0x0, 0x0, 0xffffffffba78cde1, 0x5, 0xc0b, 0xa1b, 0x6, 0xffffffffffffff0a, 0x6, 0x8001]}, &(0x7f00000001c0)=0x100) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@empty, @in=@multicast1}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@empty}}, &(0x7f0000000480)=0xe8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000200)={r2, 0x3}, &(0x7f0000000240)=0x8) write$P9_RVERSION(r1, &(0x7f00000004c0)={0x13, 0x65, 0xffff, 0x9, 0x6, '9P2000'}, 0x13) r3 = socket$inet6(0xa, 0x2, 0x0) ioctl(r3, 0xda, &(0x7f0000000280)="11dca505140000007bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:48 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x184, 0x0) [ 432.997811][T25275] overlayfs: unrecognized mount option "00000000000000000000004" or missing value 11:43:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x5d000000}}], 0x2, 0x0, 0x0) 11:43:48 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x10000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}]}) 11:43:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:48 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x400000, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:48 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x185, 0x0) 11:43:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) [ 433.283573][T25295] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x7fffeedf}}], 0x2, 0x0, 0x0) [ 433.352949][T25306] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:48 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x200, 0x40000) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f00000000c0)=0xcf) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000100)=0x2, &(0x7f0000000140)=0x4) 11:43:48 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="1124c600cb10a6ecbfa5158153af2f16b0701ea98d") r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x4000, 0x0) write$P9_RSTAT(r1, &(0x7f00000000c0)={0x71, 0x7d, 0x9, {0x0, 0x6a, 0x5, 0xa0, {0x40, 0x4, 0x2}, 0x1000000, 0x800000, 0x6, 0xd664, 0xd, '/dev/usbmon#\x00', 0x6, '\\\xcc%GPL', 0x17, '\x8b+}selinuxppp1security}', 0xd, '/dev/usbmon#\x00'}}, 0x71) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0xa001) 11:43:48 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x186, 0x0) 11:43:48 executing program 5: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x4000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}]}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000)={0x3ff, 0x10000, 0x122a9fcb, 0x6aa, 0x3f, 0x7, 0x1000, 0x7, 0x8, 0x2, 0x52}, 0xb) 11:43:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x7fffeeee}}], 0x2, 0x0, 0x0) 11:43:48 executing program 3: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x3, 0x2) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:49 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0xdfeeff7f}}], 0x2, 0x0, 0x0) [ 433.862593][T25339] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:49 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x187, 0x0) 11:43:49 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x4, 0x109200) ioctl$EVIOCGBITSND(r1, 0x80404532, &(0x7f0000000140)=""/181) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5055e0bcfe47bf070") ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000040)=0x6) r2 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x40000000, 0x40000) ioctl$EVIOCGLED(r2, 0x80404519, &(0x7f0000000000)) 11:43:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:49 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0xeeeeff7f}}], 0x2, 0x0, 0x0) 11:43:49 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x2c2100, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f00000000c0)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000100)={0x0, 0x5}, &(0x7f0000000140)=0x2) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000180)={r1}, &(0x7f00000001c0)=0x8) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:49 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x2000000000000) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000000c0)={@multicast1, @remote, 0x0}, &(0x7f0000000100)=0xc) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2, 0x4e23, 0x800080000000000, 0x4e23, 0xffffffff7fffffff, 0xa, 0x80, 0x80, 0xae7130295db1310e, r2, r3}, {0x2, 0x20, 0x0, 0x100, 0xfff, 0x7fffffff, 0x7fffffff, 0x762}, {0xc00000, 0x8001, 0x81, 0xf1d9}, 0xb6e, 0x6e6bb1, 0x0, 0x1, 0x1, 0x1}, {{@in=@dev={0xac, 0x14, 0x14, 0x20}, 0x4d4, 0x32}, 0x2, @in=@remote, 0x0, 0x2, 0x0, 0x9, 0xfc1, 0x62a, 0x7}}, 0xe8) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x800, @empty, 0x1ff}, 0x1c) 11:43:49 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x188, 0x0) 11:43:49 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x7ffffffff000}}], 0x2, 0x0, 0x0) 11:43:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:49 executing program 5: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) getpeername$packet(r0, &(0x7f0000003080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000030c0)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000003100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4, r1}) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}]}) 11:43:49 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x1, 0x10000) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) r2 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x2, 0x2) ioctl$SCSI_IOCTL_PROBE_HOST(r2, 0x5385, &(0x7f00000000c0)=ANY=[@ANYBLOB="550000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300"/89]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000001c0)={&(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000a00000/0x600000)=nil, &(0x7f0000ca1000/0x2000)=nil, &(0x7f0000faf000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000b28000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000c16000/0x4000)=nil, &(0x7f0000000180), 0x0, r0}, 0x68) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 434.605608][T25374] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:49 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r1, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400200}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0xe8, r2, 0x1, 0x70bd25, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0xc8, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8000}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xf9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xf1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xab}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}]}]}, 0xe8}, 0x1, 0x0, 0x0, 0x40800}, 0x1) 11:43:49 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x4000000000000}}], 0x2, 0x0, 0x0) 11:43:49 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x189, 0x0) [ 434.814961][T25395] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:50 executing program 5: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x10022) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}]}) sync() accept$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @dev={[], 0x29}}, 0x10) 11:43:50 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x6, 0x40480) ioctl$VIDIOC_G_FMT(r1, 0xc0d05604, &(0x7f00000000c0)={0x7, @raw_data="1f549ed76754e7f440ced3047fff0b852c9956a648f1a1a968e5979f9463b4163d0cb91a5cd527fbeb93e25eb8c8886ea7cc18714c3818309a4972c354eca441bfabbac96b69f4e00a3912fa63ee5d8b1acf7dfc3d34dd1b934520ee789d1619024efb825a397ab364b7644e83d02e2bf533795117256cedd09763ea2c5de6e6f4a0bd630047bf09e6f3fbbee700f336cc8a846b11e3428b27f5c5f3101a0047b1b83b12c9fa3a5087e01903487956131348e60c13a4b140b8d05bddbdb65ebca47349aa40086fb7"}) ioctl(r0, 0x100000890f, &(0x7f0000000200)="11dca5154e7bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:50 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xa8, 0x4) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000000)={0x0, @initdev}, &(0x7f00000000c0)=0xc) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000100)={@ipv4={[], [], @local}, r2}, 0x14) 11:43:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0xf0ffffff7f0000}}], 0x2, 0x0, 0x0) 11:43:50 executing program 5: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}]}) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) 11:43:50 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008d12, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) recvmmsg(r0, &(0x7f0000003400)=[{{&(0x7f0000000080)=@l2, 0x80, &(0x7f0000001100)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1}, 0x6}, {{&(0x7f0000001140)=@nfc, 0x80, &(0x7f0000001200)=[{&(0x7f00000011c0)=""/51, 0x33}], 0x1, &(0x7f0000001240)=""/11, 0xb}, 0x3}, {{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000001280)}, {&(0x7f00000012c0)=""/120, 0x78}, {&(0x7f0000001340)=""/141, 0x8d}, {&(0x7f0000001400)=""/113, 0x71}, {&(0x7f0000001480)=""/105, 0x69}], 0x5, &(0x7f0000001580)=""/158, 0x9e}}, {{&(0x7f0000001640)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000016c0)=""/122, 0x7a}, {&(0x7f0000001740)=""/252, 0xfc}, {&(0x7f0000001840)=""/229, 0xe5}, {&(0x7f0000001940)=""/55, 0x37}, {&(0x7f0000001980)=""/103, 0x67}], 0x5, &(0x7f0000001a80)=""/5, 0x5}, 0x3}, {{&(0x7f0000001ac0)=@nfc, 0x80, &(0x7f0000002f80)=[{&(0x7f0000001b40)=""/136, 0x88}, {&(0x7f0000001c00)=""/9, 0x9}, {&(0x7f0000001c40)=""/54, 0x36}, {&(0x7f0000001c80)=""/76, 0x4c}, {&(0x7f0000001d00)=""/4096, 0x1000}, {&(0x7f0000002d00)=""/62, 0x3e}, {&(0x7f0000002d40)=""/255, 0xff}, {&(0x7f0000002e40)=""/39, 0x27}, {&(0x7f0000002e80)=""/110, 0x6e}, {&(0x7f0000002f00)=""/80, 0x50}], 0xa, &(0x7f0000003040)=""/30, 0x1e}, 0x6}, {{&(0x7f0000003080)=@un=@abs, 0x80, &(0x7f00000032c0)=[{&(0x7f0000003100)=""/243, 0xf3}, {&(0x7f0000003200)=""/149, 0x95}], 0x2, &(0x7f0000003300)=""/245, 0xf5}, 0x5}], 0x6, 0x20, &(0x7f0000003580)) 11:43:50 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x18a, 0x0) 11:43:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:50 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0xe5b580d321a35157, 0x0) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SIOCAX25GETUID(r1, 0x89e0, &(0x7f0000000280)={0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, r2}) r3 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000100)={[], 0x3ff, 0x200, 0x8000, 0x5, 0x193b, r4}) [ 435.220066][T25438] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 11:43:50 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x18b, 0x0) [ 435.312587][T25438] CPU: 0 PID: 25438 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 435.321744][T25438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 435.331806][T25438] Call Trace: [ 435.335105][T25438] dump_stack+0x172/0x1f0 [ 435.339444][T25438] dump_header+0x177/0x1152 [ 435.343953][T25438] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 435.349757][T25438] ? ___ratelimit+0x2c8/0x595 [ 435.354441][T25438] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 435.360258][T25438] ? lockdep_hardirqs_on+0x418/0x5d0 [ 435.365533][T25438] ? trace_hardirqs_on+0x67/0x240 [ 435.370563][T25438] ? pagefault_out_of_memory+0x11c/0x11c [ 435.376203][T25438] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 435.382014][T25438] ? ___ratelimit+0x60/0x595 [ 435.386613][T25438] ? do_raw_spin_unlock+0x57/0x270 [ 435.391739][T25438] oom_kill_process.cold+0x10/0x15 [ 435.396852][T25438] out_of_memory+0x334/0x1340 [ 435.401533][T25438] ? lock_downgrade+0x920/0x920 [ 435.406388][T25438] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 11:43:50 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x18c, 0x0) [ 435.412197][T25438] ? oom_killer_disable+0x280/0x280 [ 435.417413][T25438] mem_cgroup_out_of_memory+0x1d8/0x240 [ 435.422949][T25438] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 435.422966][T25438] ? do_raw_spin_unlock+0x57/0x270 [ 435.422984][T25438] ? _raw_spin_unlock+0x2d/0x50 [ 435.423000][T25438] try_charge+0xf4b/0x1440 [ 435.423022][T25438] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 435.442952][T25438] ? percpu_ref_tryget_live+0x111/0x290 [ 435.442973][T25438] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 11:43:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:50 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x18d, 0x0) [ 435.442990][T25438] ? __kasan_check_read+0x11/0x20 [ 435.465306][T25438] ? get_mem_cgroup_from_mm+0x156/0x320 [ 435.470864][T25438] mem_cgroup_try_charge+0x136/0x590 [ 435.476149][T25438] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 435.482397][T25438] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 435.482414][T25438] wp_page_copy+0x41e/0x1590 [ 435.482429][T25438] ? find_held_lock+0x35/0x130 [ 435.482447][T25438] ? pmd_pfn+0x1d0/0x1d0 [ 435.482461][T25438] ? lock_downgrade+0x920/0x920 [ 435.482478][T25438] ? swp_swapcount+0x540/0x540 [ 435.511237][T25438] ? __kasan_check_read+0x11/0x20 [ 435.516267][T25438] ? do_raw_spin_unlock+0x57/0x270 [ 435.521373][T25438] do_wp_page+0x499/0x14d0 [ 435.521392][T25438] ? finish_mkwrite_fault+0x570/0x570 [ 435.521416][T25438] __handle_mm_fault+0x22f1/0x3f20 [ 435.521434][T25438] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 435.521460][T25438] ? __kasan_check_read+0x11/0x20 [ 435.546860][T25438] handle_mm_fault+0x1b5/0x6c0 [ 435.551647][T25438] __do_page_fault+0x536/0xdd0 [ 435.556615][T25438] do_page_fault+0x38/0x590 [ 435.561123][T25438] page_fault+0x39/0x40 [ 435.565290][T25438] RIP: 0010:__put_user_4+0x1c/0x30 [ 435.570399][T25438] Code: 1f 00 c3 90 66 2e 0f 1f 84 00 00 00 00 00 65 48 8b 1c 25 40 fe 01 00 48 8b 9b 58 14 00 00 48 83 eb 03 48 39 d9 73 3f 0f 1f 00 <89> 01 31 c0 0f 1f 00 c3 66 90 66 2e 0f 1f 84 00 00 00 00 00 65 48 [ 435.590009][T25438] RSP: 0018:ffff88805ddf7f30 EFLAGS: 00010293 [ 435.596081][T25438] RAX: 0000000000000ace RBX: 00007fffffffeffd RCX: 00005555557c9c10 [ 435.604060][T25438] RDX: dffffc0000000000 RSI: 1ffff11012ab3144 RDI: ffff888095598730 11:43:50 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000400)={{{@in=@multicast2, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000500)=0xe8) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="2a27b8d7909e60fa47ea08b919fd897e722d1f472ad47e8d862ca92f68d18889bad6212344820dcb80cb4e64d3eff3a9627ce89c84cbd1efa63b89442f1b0bf46f6d445f2c4068", 0x47, 0x8}, {&(0x7f00000001c0)="cca3b6b2990d6329d257e4157f1ff6149bd6853b58282dae35e7b8f4d902568f6eca089ce1eff9ae2d86d11a9a43271143836d5e6c85d10824cc73c60055dfaa7c5631da6b7581aa4d462ef4b42c366fd13bc4d9847f1eee8c2a8dd75db86a4d23897d47839c5c119797f1a2a7101c628e373f1aa3cad5928ffd74a4af160a25173e52a5bc6384d024bde6035f3c3bf092adbb11082990235aa14a80a5137382ddc66e135e025b91bdd2369f2456fe122624e4350feae7ba978c308afbd482e0fa84197c5be271875f30c7e8ef1101ac6949", 0xd2, 0xfffffffffffffff9}, {&(0x7f00000002c0)="ec11e2ee37495b2725074e236660450b36d955d5e6fbefe8edfaced36e519734e35ae15d01d9d1c563a600bfe13794fc0c7fc337e23ab2f7528be73e075133da5a00059a403db8a275852971e07b4d2f756f4bd45c65489552fe1271d428292961f0eb95652427fca15837ca6133048c8b14370a19d31c3f1554f878007a89f4fec8", 0x82, 0x6}], 0x1000009, &(0x7f0000000540)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}, {@jqfmt_vfsold='jqfmt=vfsold'}], [{@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@euid_eq={'euid', 0x3d, r2}}]}) ioctl$PPPIOCATTACH(r1, 0x4004743d, &(0x7f0000000080)) [ 435.612033][T25438] RBP: ffff88805ddf7f48 R08: 0000000000000001 R09: ffff888095598a18 [ 435.620270][T25438] R10: fffffbfff138aef8 R11: ffffffff89c577c7 R12: 0000000000000000 [ 435.628248][T25438] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 435.636247][T25438] ? schedule_tail+0xd8/0x130 [ 435.640934][T25438] ret_from_fork+0x8/0x30 [ 435.645256][T25438] RIP: 0033:0x457e4a [ 435.649149][T25438] Code: Bad RIP value. [ 435.649157][T25438] RSP: 002b:00007fff9ff77040 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 11:43:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x100000000000000}}], 0x2, 0x0, 0x0) [ 435.649169][T25438] RAX: 0000000000000000 RBX: 00007fff9ff77040 RCX: 0000000000457e4a [ 435.649176][T25438] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 435.649185][T25438] RBP: 00007fff9ff77080 R08: 0000000000000001 R09: 00005555557c9940 [ 435.649192][T25438] R10: 00005555557c9c10 R11: 0000000000000246 R12: 0000000000000001 [ 435.649199][T25438] R13: 0000000000000000 R14: 0000000000000000 R15: 00007fff9ff770d0 11:43:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) [ 435.709181][T25464] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 435.750891][T25438] memory: usage 307200kB, limit 307200kB, failcnt 1778 [ 435.766270][T25438] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 435.776510][T25468] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 435.784321][T25438] Memory cgroup stats for /syz5: [ 435.784429][T25438] anon 259813376 [ 435.784429][T25438] file 0 [ 435.784429][T25438] kernel_stack 7602176 [ 435.784429][T25438] slab 13750272 [ 435.784429][T25438] sock 0 [ 435.784429][T25438] shmem 45056 [ 435.784429][T25438] file_mapped 135168 [ 435.784429][T25438] file_dirty 0 [ 435.784429][T25438] file_writeback 0 [ 435.784429][T25438] anon_thp 232783872 [ 435.784429][T25438] inactive_anon 135168 [ 435.784429][T25438] active_anon 259813376 [ 435.784429][T25438] inactive_file 0 [ 435.784429][T25438] active_file 57344 [ 435.784429][T25438] unevictable 0 [ 435.784429][T25438] slab_reclaimable 2703360 [ 435.784429][T25438] slab_unreclaimable 11046912 [ 435.784429][T25438] pgfault 52998 [ 435.784429][T25438] pgmajfault 0 [ 435.784429][T25438] workingset_refault 66 [ 435.784429][T25438] workingset_activate 0 [ 435.784429][T25438] workingset_nodereclaim 0 [ 435.784429][T25438] pgrefill 1668 [ 435.784429][T25438] pgscan 2481 [ 435.784429][T25438] pgsteal 252 [ 435.878879][T25438] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=15785,uid=0 [ 435.894429][T25438] Memory cgroup out of memory: Killed process 15785 (syz-executor.5) total-vm:72708kB, anon-rss:2208kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 435.913977][ T1065] oom_reaper: reaped process 15785 (syz-executor.5), now anon-rss:0kB, file-rss:34832kB, shmem-rss:0kB [ 435.927125][ T8652] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 435.943972][T25472] overlayfs: unrecognized mount option "i\dex=off" or missing value [ 435.951942][ T8652] CPU: 1 PID: 8652 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 435.960995][ T8652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 435.971307][ T8652] Call Trace: [ 435.974581][ T8652] dump_stack+0x172/0x1f0 [ 435.978896][ T8652] dump_header+0x177/0x1152 [ 435.983380][ T8652] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 435.989204][ T8652] ? ___ratelimit+0x2c8/0x595 [ 435.993861][ T8652] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 435.999651][ T8652] ? lockdep_hardirqs_on+0x418/0x5d0 [ 436.005015][ T8652] ? trace_hardirqs_on+0x67/0x240 [ 436.010061][ T8652] ? pagefault_out_of_memory+0x11c/0x11c [ 436.015678][ T8652] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 436.021460][ T8652] ? ___ratelimit+0x60/0x595 [ 436.026033][ T8652] ? do_raw_spin_unlock+0x57/0x270 [ 436.031149][ T8652] oom_kill_process.cold+0x10/0x15 [ 436.036241][ T8652] out_of_memory+0x334/0x1340 [ 436.040896][ T8652] ? lock_downgrade+0x920/0x920 [ 436.045725][ T8652] ? oom_killer_disable+0x280/0x280 [ 436.050933][ T8652] mem_cgroup_out_of_memory+0x1d8/0x240 [ 436.056472][ T8652] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 436.062091][ T8652] ? do_raw_spin_unlock+0x57/0x270 [ 436.067199][ T8652] ? _raw_spin_unlock+0x2d/0x50 [ 436.072036][ T8652] try_charge+0xa2d/0x1440 [ 436.076434][ T8652] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 436.081958][ T8652] ? percpu_ref_tryget_live+0x111/0x290 [ 436.087503][ T8652] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 436.093745][ T8652] ? __kasan_check_read+0x11/0x20 [ 436.098751][ T8652] ? get_mem_cgroup_from_mm+0x156/0x320 [ 436.104275][ T8652] mem_cgroup_try_charge+0x136/0x590 [ 436.109539][ T8652] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 436.115762][ T8652] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 436.121375][ T8652] wp_page_copy+0x41e/0x1590 [ 436.125962][ T8652] ? find_held_lock+0x35/0x130 [ 436.130706][ T8652] ? pmd_pfn+0x1d0/0x1d0 [ 436.134948][ T8652] ? lock_downgrade+0x920/0x920 [ 436.139794][ T8652] ? swp_swapcount+0x540/0x540 [ 436.144535][ T8652] ? __kasan_check_read+0x11/0x20 [ 436.149533][ T8652] ? do_raw_spin_unlock+0x57/0x270 [ 436.154623][ T8652] do_wp_page+0x499/0x14d0 [ 436.159022][ T8652] ? finish_mkwrite_fault+0x570/0x570 [ 436.164375][ T8652] __handle_mm_fault+0x22f1/0x3f20 [ 436.170122][ T8652] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 436.175651][ T8652] ? __kasan_check_read+0x11/0x20 [ 436.180657][ T8652] handle_mm_fault+0x1b5/0x6c0 [ 436.185400][ T8652] __do_page_fault+0x536/0xdd0 [ 436.190165][ T8652] do_page_fault+0x38/0x590 [ 436.194655][ T8652] page_fault+0x39/0x40 [ 436.198805][ T8652] RIP: 0033:0x457f6e [ 436.202686][ T8652] Code: 5c 41 5d 41 5e 5d c3 48 c7 c2 d4 ff ff ff f7 d8 41 bd ff ff ff ff 64 89 02 64 8b 04 25 d0 02 00 00 41 39 c4 0f 85 2f 01 00 00 <64> 44 89 04 25 d4 02 00 00 45 85 f6 0f 85 7f 00 00 00 48 85 db 74 [ 436.222272][ T8652] RSP: 002b:00007fff9ff77040 EFLAGS: 00010246 [ 436.228314][ T8652] RAX: 0000000000000001 RBX: 00007fff9ff77040 RCX: 0000000000457e4a [ 436.236263][ T8652] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 436.244213][ T8652] RBP: 00007fff9ff77080 R08: 0000000000000001 R09: 00005555557c9940 [ 436.252175][ T8652] R10: 00005555557c9c10 R11: 0000000000000246 R12: 0000000000000001 [ 436.260125][ T8652] R13: 0000000000000ace R14: 0000000000000000 R15: 00007fff9ff770d0 [ 436.269504][ T8652] memory: usage 305128kB, limit 307200kB, failcnt 1779 [ 436.276356][ T8652] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 436.276361][ T8652] Memory cgroup stats for /syz5: [ 436.276462][ T8652] anon 257609728 [ 436.276462][ T8652] file 0 [ 436.276462][ T8652] kernel_stack 7602176 [ 436.276462][ T8652] slab 13750272 [ 436.276462][ T8652] sock 0 [ 436.276462][ T8652] shmem 45056 [ 436.276462][ T8652] file_mapped 135168 [ 436.276462][ T8652] file_dirty 0 [ 436.276462][ T8652] file_writeback 0 [ 436.276462][ T8652] anon_thp 230686720 [ 436.276462][ T8652] inactive_anon 135168 [ 436.276462][ T8652] active_anon 257609728 [ 436.276462][ T8652] inactive_file 0 [ 436.276462][ T8652] active_file 57344 [ 436.276462][ T8652] unevictable 0 [ 436.276462][ T8652] slab_reclaimable 2703360 [ 436.276462][ T8652] slab_unreclaimable 11046912 [ 436.276462][ T8652] pgfault 53031 [ 436.276462][ T8652] pgmajfault 0 [ 436.276462][ T8652] workingset_refault 66 [ 436.276462][ T8652] workingset_activate 0 [ 436.276462][ T8652] workingset_nodereclaim 0 [ 436.276462][ T8652] pgrefill 1668 [ 436.276462][ T8652] pgscan 2481 [ 436.276462][ T8652] pgsteal 252 [ 436.378916][ T8652] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=15703,uid=0 [ 436.394601][ T8652] Memory cgroup out of memory: Killed process 15703 (syz-executor.5) total-vm:72708kB, anon-rss:2208kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 11:43:51 executing program 5: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x2) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x80201000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}]}) mkdirat(r1, &(0x7f0000000000)='./file0\x00', 0x6fb45221cdfcdeb1) 11:43:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x200000000000000}}], 0x2, 0x0, 0x0) 11:43:51 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x18e, 0x0) 11:43:51 executing program 3: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000080)=0x63, 0x2) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:51 executing program 2: r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000480)=0xffffffffffffffff, 0x4) vmsplice(r0, &(0x7f0000001680)=[{&(0x7f00000004c0)="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", 0x1000}, {&(0x7f00000014c0)="6c6b5d1285dae59e393a6fdeddfbec3484d0fa8377dc551db8e3672c46169539afdc6a2d7bffed6602eec4e01a0a70b8b8343bd311845e2e762145f8447db637211fa68163a739f313a68c8aec563a4f29089ffb9c4159a97c1713c17b96c300c5398b1e8661de0bc6d6a8f2e1385033def779c103850e1d21ceae791ffa6f3254a195ab27c8013f2ee750b90c6a848071ac60b02c175d3710a370", 0x9b}, {&(0x7f0000001580)="6f51730cfefab065994f22b86b5ad4688e09ffe226c5f182097be307db38e83335ad0c5d5608ad894df8c9ad9bf646e7bedb965845bff31d4bcb3cf319049b1c157558a22baf66c807be53fc2256bae7da1ea3a5e71db25882624347df80a9f5f00d472b2d320a635668655aad174a33ab0e6ace3f230fe6c911648fe6093bf57d2c7d32d325cc6fb11cb5e44c6c109555aae1b39806187c298fcad760d6cfa6a4a191a465e43ffd4687ec3ec63da275e50a60e91660aa8b176cf24e9ecf8263200fecac6238f433f344df0404b843696ee9387e7ae0b8c1ee74d30f3516", 0xde}], 0x3, 0x7) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x406, r1) ioctl$KVM_GET_LAPIC(r2, 0x8400ae8e, &(0x7f0000000080)={"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"}) ioctl(r1, 0x401, &(0x7f0000000040)="11dda4055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xfffffffffffffffb, 0x400000) 11:43:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:51 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1a}}}}, &(0x7f0000000140)=0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000180)=@assoc_value={r1, 0x200}, &(0x7f00000001c0)=0x8) getsockname(r0, &(0x7f0000000240)=@ax25={{0x3, @null}, [@netrom, @rose, @null, @bcast, @remote, @remote, @bcast, @default]}, &(0x7f00000002c0)=0x80) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r2 = syz_open_dev$sndpcmc(&(0x7f0000000300)='/dev/snd/pcmC#D#c\x00', 0x9, 0x2) ioctl$VIDIOC_G_OUTPUT(r2, 0x8004562e, &(0x7f0000000340)) syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x38, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0xf00000000000000}}], 0x2, 0x0, 0x0) 11:43:51 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x7393e) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000080)={&(0x7f0000ffa000/0x4000)=nil, 0x75ff, 0x5, 0x80, &(0x7f0000ffa000/0x3000)=nil, 0x7}) 11:43:51 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x18f, 0x0) 11:43:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x4000000000000000}}], 0x2, 0x0, 0x0) 11:43:52 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x200, 0x0) close(r0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="695c6465785077cf41eb03"]) 11:43:52 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'erspan0\x00', @ifru_mtu=0x7cd}}) 11:43:52 executing program 2: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_IRQ_LINE_STATUS(r0, 0xc008ae67, &(0x7f0000000080)={0x4, 0x2}) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:52 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x190, 0x0) 11:43:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x5d00000000000000}}], 0x2, 0x0, 0x0) 11:43:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:52 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x10000, 0x0) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r1, 0xc0845657, &(0x7f00000000c0)={0x0, @bt={0x1, 0x8, 0x1, 0x3, 0x5a7, 0x2, 0x80, 0x6, 0x101, 0x6, 0x2, 0x7fffffff, 0x1ff, 0x3, 0x8, 0x20}}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:52 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008914, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:52 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x191, 0x0) 11:43:52 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="699f57686c190e48212c00"]) [ 437.271137][T25550] overlayfs: unrecognized mount option "i\dexPwÏAë" or missing value 11:43:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0xdfeeff7f00000000}}], 0x2, 0x0, 0x0) 11:43:52 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}]}) 11:43:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:52 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000010c0)="11dcb0055e0bcfe47bf070") r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x81, 0x400000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x100000001, 0x0) pidfd_send_signal(r2, 0x40, &(0x7f0000000140)={0x3e, 0x7}, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'erspan0\x00', 0x0}) write$P9_RATTACH(r1, &(0x7f0000001000)={0x14, 0x69, 0x2, {0x84, 0x3, 0x2}}, 0x14) r4 = inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0x6dffb9fc5107fba0) inotify_rm_watch(r2, r4) setsockopt$ax25_int(r2, 0x101, 0x9, &(0x7f0000000fc0)=0x4, 0x4) sendmsg$nl_route_sched(r1, &(0x7f0000000f80)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000f40)={&(0x7f0000001100)=ANY=[@ANYBLOB="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", @ANYRES32=r3, @ANYBLOB="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"], 0xcc8}, 0x1, 0x0, 0x0, 0x4000000}, 0x4) 11:43:52 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x192, 0x0) 11:43:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0xeeeeff7f00000000}}], 0x2, 0x0, 0x0) 11:43:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:52 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x1, 0x20000) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x400) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f00000000c0)={0x0, 0x48, "c54a95fb0b05e88a8c469c70aa63135aab21819e73a2e0f7275c66fe7e16261b43f3bee6fd020e61e0a82458115176befc9b3a8f2a50a7622c7bcb6e98a4e0e72fda144950ab2847"}, &(0x7f0000000140)=0x50) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e23, @rand_addr=0x1}}, [0x1, 0x80000000, 0x4770, 0x5b1, 0x3f, 0xd847, 0x9, 0x38, 0x100, 0x4, 0xffffffff, 0x3ff, 0x3, 0x85b3, 0x3f]}, &(0x7f0000000280)=0x100) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000002c0)={r2, 0x1, 0x8, 0x100000001, 0x7, 0x0, 0x0, 0x9, {r3, @in={{0x2, 0x4e20, @remote}}, 0x100000000, 0x9, 0x8, 0xc22, 0xac}}, &(0x7f0000000380)=0xb0) 11:43:52 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x193, 0x0) 11:43:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x0, 0x2}}], 0x2, 0x0, 0x0) [ 437.706090][T25593] overlayfs: unrecognized mount option "i\dex=off" or missing value [ 437.744394][T25599] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:52 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$bt_rfcomm(0x1f, 0x1, 0x3) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}]}) 11:43:53 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @rand_addr="ef8439f4d57feed05ee6408545ae3c9b", 0x8}, 0x1c) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:53 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f0000000080)="ba5e010ae1472d778f4d09fb785e7a0400b7e9bf78d151570cc541544d4d56144f635cbc782bdbd0677b20b5e10b8203a08fe08e6b6771489b16d6b30cfc49c666059074b340df258385d15da8c4720935f3c8c36fbff6c501f0996fa36b4cfcfaf8cb586e8b08f7ad48365104f1c932653a26dbd7b5da213ed8309b0861e918e12172f89851719104c96b8ddd3378da2d415e29502c7b5cdd12e16e45", 0x9d) [ 437.942906][T25614] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:53 executing program 5: shmget(0x1, 0x3000, 0x90e8aafbb7c4c1f5, &(0x7f0000ffb000/0x3000)=nil) creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}]}) 11:43:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x0, 0x4}}], 0x2, 0x0, 0x0) 11:43:53 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x194, 0x0) 11:43:53 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x20000, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000140)={0x20, 0x7}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r2 = dup3(r0, r0, 0x80000) write$P9_RCLUNK(r2, &(0x7f00000000c0)={0x7, 0x79, 0x1}, 0x7) r3 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FD(r3, 0x5, &(0x7f0000000080)='/dev/usbmon#\x00', 0x0, r0) 11:43:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x0, 0xf}}], 0x2, 0x0, 0x0) 11:43:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:53 executing program 2: r0 = socket$inet(0x2, 0xb, 0x8) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r2 = gettid() sched_setscheduler(r2, 0x2, &(0x7f0000000080)=0x2e) fcntl$notify(r1, 0x402, 0x39) [ 438.267385][T25645] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x0, 0x5d}}], 0x2, 0x0, 0x0) [ 438.347765][T25646] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:53 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$bt_hci(r1, 0x0, 0x3, &(0x7f0000000140)=""/151, &(0x7f0000000200)=0x97) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000080)={[0x1, 0xfff, 0x3ff, 0xfffffffffffffffd, 0x29, 0x800, 0x9, 0x0, 0x823, 0x7, 0x88, 0x8001, 0x0, 0x5, 0x5], 0x5000, 0x244090}) 11:43:53 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x20, 0x80000) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f0000000000)={0x8, 0x2}) 11:43:53 executing program 5: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000080)="6c57aa536c1874bd17851a4a71f9a3e1", 0x10) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VT_WAITACTIVE(r0, 0x5607) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}]}) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000000)={0x1, 0x1}) r1 = shmget(0x3, 0x3000, 0x40, &(0x7f0000ffd000/0x3000)=nil) shmctl$SHM_STAT(r1, 0xd, &(0x7f0000000040)=""/13) 11:43:53 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x195, 0x0) 11:43:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x0, 0xf00}}], 0x2, 0x0, 0x0) 11:43:53 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x2) [ 438.619132][T25680] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:53 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_DOORLOCK(r1, 0x5380) 11:43:53 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x196, 0x0) [ 438.691537][T25691] overlayfs: unrecognized mount option "i\dex=off" or missing value 11:43:53 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x2004080, &(0x7f0000000240)={[{@index_on='index=on'}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}]}) 11:43:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x0, 0x4000}}], 0x2, 0x0, 0x0) 11:43:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:54 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") listen(r0, 0x3) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x2001) 11:43:54 executing program 5: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000180)={0x6, 0x118, 0xfa00, {{0x5, 0x59a1, "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", 0x2, 0x1000, 0x200, 0xffffffffffff0001, 0x3, 0x4, 0x83, 0x1}, r1}}, 0x120) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="695c784b9edaceb49d7d3aa11f788ecbd6e065f8faffffff"]) [ 438.893702][T25705] overlayfs: unrecognized mount option "fscontext=user_u" or missing value 11:43:54 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x197, 0x0) 11:43:54 executing program 2: r0 = socket$inet6(0xa, 0xe, 0x9) lseek(r0, 0x0, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dc46a76d0728bd095b702cbf27b85294fb63061244c17d7b79a768de4585baaf5673d88fbda102d88a331c0145a9498a9ac43f07a7d12b298588653cb585eab4a637d6600cfea2d1b6b40ec5e4e0446c8f5651b3bd0b54651e7a5b2286737d") 11:43:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x0, 0x5d00}}], 0x2, 0x0, 0x0) 11:43:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:54 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x80000, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f00000000c0)=0x1e, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 439.146367][T25727] overlayfs: unrecognized mount option "i\xKžÚδ}:¡xŽËÖàeøúÿÿÿ" or missing value 11:43:54 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008913, &(0x7f0000000040)="11dca50000000000000000") r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000080)=0x6) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') getpeername$packet(r1, &(0x7f0000001880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000018c0)=0x14) accept$packet(r1, &(0x7f00000019c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a00)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001a40)={{{@in6=@mcast1, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000001b40)=0xe8) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000001c40)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000001c00)={&(0x7f0000001b80)={0x60, r2, 0x100, 0x70bd2c, 0x25dfdbfe, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r3}, @FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e22}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_PEER_V4={0x8, 0x8, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e20}]}, 0x60}, 0x1, 0x0, 0x0, 0x4}, 0x1) 11:43:54 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x198, 0x0) 11:43:54 executing program 5: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x208000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000000)=0x0) ptrace$poke(0x4, r1, &(0x7f0000000040), 0x9) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@index_off='i\\dex=off'}]}) 11:43:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x0, 0x40000}}], 0x2, 0x0, 0x0) 11:43:54 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50000000000000000") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:54 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x101000, 0x0) connect$pppoe(r1, &(0x7f00000001c0)={0x18, 0x0, {0x0, @empty, 'veth1_to_bridge\x00'}}, 0x1e) connect$vsock_stream(r1, &(0x7f00000000c0)={0x28, 0x0, 0x2711, @reserved}, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") dup2(r0, r0) setsockopt$packet_buf(r1, 0x107, 0xf, &(0x7f0000000100)="5fd070376b94ac15457afda73f3ddd72248084731fcce513b6d7c7b9d7cb55f72a52988252a7c3644ad762350e1dc61947b15937f4d5a791585e8e4292403a2dd2dcff552fa62b76e5b36bd2e8d585e3b5e1dca3c4837de2c07a14206d991e6e120584103a5f6f64316d867d1590b06d889d1ab129585c1629e083ab9c34aa0e8909e208871a10b59bc846b95e969a88471bd521ef6a254b1c8396badb349ad0def24895a62a830a6bc0842e0baef6", 0xaf) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:54 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x199, 0x2) [ 439.546263][T25754] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 439.627453][T25754] CPU: 0 PID: 25754 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 439.636601][T25754] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 439.646661][T25754] Call Trace: [ 439.649962][T25754] dump_stack+0x172/0x1f0 [ 439.654319][T25754] dump_header+0x177/0x1152 [ 439.658835][T25754] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 439.664647][T25754] ? ___ratelimit+0x2c8/0x595 [ 439.669339][T25754] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 11:43:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:54 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$apparmor_exec(r0, &(0x7f0000000300)={'exec ', '/dev/usbmon#\x00'}, 0x12) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0xffff, 0x800) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@local, @in=@dev={0xac, 0x14, 0x14, 0x12}, 0x4e24, 0x0, 0x4e24, 0x4, 0xa, 0x20, 0x80, 0x0, r2, r3}, {0x3, 0x1f, 0x200, 0x10000, 0xffffffff80000001, 0x6, 0x1, 0xffff}, {0x6, 0xff, 0x7f, 0xb2}, 0x3f, 0x6e6bb7, 0x2, 0x1, 0x0, 0x3}, {{@in6=@loopback, 0x4d2, 0x6c}, 0x2, @in6=@mcast2, 0x3505, 0x4, 0x0, 0x5, 0x8, 0x2, 0x100000001}}, 0xe8) r4 = socket$inet6(0xa, 0x2, 0x0) ioctl(r4, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$adsp(&(0x7f0000000340)='/dev/adsp#\x00', 0x3, 0x80000) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 439.675156][T25754] ? lockdep_hardirqs_on+0x418/0x5d0 [ 439.680446][T25754] ? trace_hardirqs_on+0x67/0x240 [ 439.685474][T25754] ? pagefault_out_of_memory+0x11c/0x11c [ 439.691133][T25754] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 439.696950][T25754] ? ___ratelimit+0x60/0x595 [ 439.701552][T25754] ? do_raw_spin_unlock+0x57/0x270 [ 439.706701][T25754] oom_kill_process.cold+0x10/0x15 [ 439.711820][T25754] out_of_memory+0x334/0x1340 [ 439.711835][T25754] ? lock_downgrade+0x920/0x920 [ 439.711852][T25754] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 11:43:54 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x1, 0x10000) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') ioctl$DRM_IOCTL_MODESET_CTL(r1, 0x40086408, &(0x7f0000000200)={0x8000, 0x8000}) sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, r2, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xfffffffffffffff7}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x9}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x7fffffff, 0x4]}]}, 0x40}, 0x1, 0x0, 0x0, 0x40}, 0x24008090) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 439.711866][T25754] ? oom_killer_disable+0x280/0x280 [ 439.711888][T25754] mem_cgroup_out_of_memory+0x1d8/0x240 [ 439.711902][T25754] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 439.711918][T25754] ? do_raw_spin_unlock+0x57/0x270 [ 439.711934][T25754] ? _raw_spin_unlock+0x2d/0x50 [ 439.711949][T25754] try_charge+0xf4b/0x1440 [ 439.711972][T25754] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 439.711985][T25754] ? percpu_ref_tryget_live+0x111/0x290 [ 439.712008][T25754] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 439.753621][T25754] ? __kasan_check_read+0x11/0x20 [ 439.763536][T25754] ? get_mem_cgroup_from_mm+0x156/0x320 [ 439.763551][T25754] mem_cgroup_try_charge+0x136/0x590 [ 439.763568][T25754] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 439.763584][T25754] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 439.763602][T25754] wp_page_copy+0x41e/0x1590 [ 439.807595][T25754] ? find_held_lock+0x35/0x130 [ 439.812374][T25754] ? pmd_pfn+0x1d0/0x1d0 [ 439.816627][T25754] ? lock_downgrade+0x920/0x920 [ 439.821494][T25754] ? swp_swapcount+0x540/0x540 11:43:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) [ 439.826269][T25754] ? __kasan_check_read+0x11/0x20 [ 439.831300][T25754] ? do_raw_spin_unlock+0x57/0x270 [ 439.836429][T25754] do_wp_page+0x499/0x14d0 [ 439.840860][T25754] ? finish_mkwrite_fault+0x570/0x570 [ 439.846249][T25754] __handle_mm_fault+0x22f1/0x3f20 [ 439.851374][T25754] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 439.856934][T25754] ? __kasan_check_read+0x11/0x20 [ 439.862003][T25754] handle_mm_fault+0x1b5/0x6c0 [ 439.866795][T25754] __do_page_fault+0x536/0xdd0 [ 439.871574][T25754] do_page_fault+0x38/0x590 11:43:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x0, 0x1000000}}], 0x2, 0x0, 0x0) [ 439.876708][T25754] page_fault+0x39/0x40 [ 439.876720][T25754] RIP: 0033:0x40ea18 [ 439.876736][T25754] Code: 8b 34 c6 4a 8d 04 2e 48 3d ff ff ff 7e 0f 86 77 ff ff ff bf 95 ee 4b 00 31 c0 e8 13 33 ff ff 31 ff e8 5c 2f ff ff 0f 1f 40 00 <89> 3c b5 00 00 73 00 eb b6 31 ed 0f 1f 44 00 00 80 3d 4e 1a 66 00 [ 439.876743][T25754] RSP: 002b:00007fff9ff76e10 EFLAGS: 00010246 [ 439.876754][T25754] RAX: 00000000b63caf59 RBX: 00000000d1fb239b RCX: 0000001b31720000 [ 439.876761][T25754] RDX: 0000000000000000 RSI: 0000000000000f59 RDI: ffffffffb63caf59 [ 439.876767][T25754] RBP: 0000000000000001 R08: 00000000b63caf59 R09: 00000000b63caf5d [ 439.876774][T25754] R10: 00007fff9ff76fb0 R11: 0000000000000246 R12: 000000000075bfa8 11:43:55 executing program 5: creat(&(0x7f0000000080)='./file0\x00', 0xd63ffc0273114165) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.evm\x00', &(0x7f0000001340)=@v2={0x5, 0x4, 0xf, 0xfd, 0x1000, "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"}, 0x100a, 0x0) clone(0x108200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="69096465783d6f66662c01"]) 11:43:55 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000080)) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:55 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x199, 0x4000) 11:43:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x0, 0x2000000}}], 0x2, 0x0, 0x0) [ 439.876781][T25754] R13: 0000000080000000 R14: 00007fd522519008 R15: 0000000000000010 [ 440.016585][T25754] memory: usage 307200kB, limit 307200kB, failcnt 1838 11:43:55 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x199, 0xf0ff7f) 11:43:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) [ 440.016599][T25754] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 440.016603][T25754] Memory cgroup stats for /syz5: [ 440.016710][T25754] anon 258314240 [ 440.016710][T25754] file 0 [ 440.016710][T25754] kernel_stack 7864320 [ 440.016710][T25754] slab 13889536 [ 440.016710][T25754] sock 0 [ 440.016710][T25754] shmem 45056 [ 440.016710][T25754] file_mapped 135168 [ 440.016710][T25754] file_dirty 0 [ 440.016710][T25754] file_writeback 0 [ 440.016710][T25754] anon_thp 230686720 [ 440.016710][T25754] inactive_anon 135168 [ 440.016710][T25754] active_anon 258314240 [ 440.016710][T25754] inactive_file 0 [ 440.016710][T25754] active_file 57344 [ 440.016710][T25754] unevictable 0 [ 440.016710][T25754] slab_reclaimable 2703360 [ 440.016710][T25754] slab_unreclaimable 11186176 [ 440.016710][T25754] pgfault 53757 [ 440.016710][T25754] pgmajfault 0 [ 440.016710][T25754] workingset_refault 66 [ 440.016710][T25754] workingset_activate 0 [ 440.016710][T25754] workingset_nodereclaim 0 [ 440.016710][T25754] pgrefill 1769 [ 440.016710][T25754] pgscan 2650 [ 440.016710][T25754] pgsteal 252 11:43:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x0, 0xf000000}}], 0x2, 0x0, 0x0) [ 440.016726][T25754] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=25552,uid=0 [ 440.016868][T25754] Memory cgroup out of memory: Killed process 25552 (syz-executor.5) total-vm:72708kB, anon-rss:2208kB, file-rss:35800kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 440.048044][T25766] overlayfs: unrecognized mount option "i\dex=off" or missing value [ 440.098091][T25804] overlayfs: unrecognized mount option "i\dex=off" or missing value [ 440.330280][T25819] overlayfs: unrecognized mount option "i dex=off" or missing value [ 440.522004][T25819] overlayfs: unrecognized mount option "i dex=off" or missing value 11:43:55 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x84800) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, &(0x7f0000000180)={0x0, 0x4, [0x0]}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x102) ppoll(&(0x7f0000000080)=[{r2, 0x40}], 0x1, &(0x7f00000000c0), &(0x7f0000000100)={0x9}, 0x8) 11:43:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:55 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x86a9) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:55 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x199, 0x1000000) 11:43:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x0, 0x40000000}}], 0x2, 0x0, 0x0) 11:43:55 executing program 5: prctl$PR_GET_FPEXC(0xb, &(0x7f0000000000)) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VIDIOC_G_PRIORITY(r0, 0x80045643, 0x1647ec1cfa5502c4) mount$overlay(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="695c64652cc3"]) 11:43:55 executing program 5: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r0, 0x4008ae48, &(0x7f0000000000)=0x10000) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="695c646578f10ba8d5053d"]) 11:43:55 executing program 3: r0 = socket$inet6(0xa, 0x800, 0x2) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = request_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)=',\x00', 0x0) keyctl$get_keyring_id(0x0, r1, 0x3) syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x0, 0x5d000000}}], 0x2, 0x0, 0x0) 11:43:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:55 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x199, 0x2000000) 11:43:56 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x100000007) ioctl(r0, 0x1453cb6b, &(0x7f0000000100)="11dca54a5e0bcfe47bf04e18ef7db9cf18f6b04a3f16c57475cda0e4a28d85eb58d239e858e634cffa6bf200054bc41b0b74bddb18225b7083f31433504264044a669f63a2f69730559f5f448feb7796926c5c87d0b506b9b71ee910b83eaac8bb0dbcf8038679251daafc59da53ed666f283b") r1 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x101000) write$binfmt_elf32(r1, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x8000, 0x9, 0x1000, 0x0, 0x6, 0x3, 0x864ca11a7f862212, 0x7fffffff, 0x220, 0x38, 0x294, 0x2, 0x4, 0x20, 0x2, 0x80, 0x81, 0x4}, [{0x60000000, 0xffff, 0x858, 0x6, 0x5, 0x200, 0x5, 0x605cfb70}], "9495589ffab291e495ddef94ac925759b61470a923a5e4e2167d24d71c121dfe50855caba8a656"}, 0x7f) ioctl$IMGETCOUNT(r1, 0x80044943, &(0x7f0000000040)) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@local, 0x3f, 0x1, 0x3, 0x4, 0x3, 0x65c9}, &(0x7f00000000c0)=0x20) accept4$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000280)=0x14, 0x80800) sendmsg$can_bcm(r1, &(0x7f00000003c0)={&(0x7f00000002c0)={0x1d, r2}, 0x10, &(0x7f0000000380)={&(0x7f0000000300)=ANY=[@ANYBLOB="02944e4bdfcefd8a0000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="0400006001000000010000800d03000037beb41683be3a5faa60b61ff24e6bbd5a11bb29d3ba868afd3cd37aaedd282f628b321c3af3cac95c0ff3c41ae7199a152c0b10cf8eac339b7a7a22a7eacf04"], 0x80}, 0x1, 0x0, 0x0, 0x20000000}, 0x1) ioctl$UI_DEV_CREATE(r1, 0x5501) 11:43:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x0, 0x7fffeedf}}], 0x2, 0x0, 0x0) 11:43:56 executing program 5: r0 = creat(&(0x7f00000005c0)='./file0\x00', 0x11e7d663423c7fa5) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000680)={0xa, [0xacc8eb5, 0x1, 0x80, 0x2e, 0x2, 0x55e9, 0x7fff, 0x8, 0x4d18, 0x8001]}, &(0x7f00000006c0)=0x18) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) sendto(r0, &(0x7f0000000180)="9f2889ea0e8bd0cdc006e147777cef626ab457f17672d88de7e44367272c5619f5cba20544994e1ca8c38e1326e4677ba57502c769484e1243f1ec580a4b1f76224dbb02e73e04fd26e480e7b497eee45a9bb359ca2bfaadd9eaf2cdb50c60db87a1cb8f1845bebd276ddb36427d7f5a80a7bbd44f481ff9b63da9e145dffe71918a0d7c33b15569d191bbfb48e9ab2570c8d1256c7f583a67573ba28a440401f8bf562605bd4365", 0xa8, 0x4, &(0x7f0000000240)=@sco={0x1f, {0x46a, 0x5, 0x7f, 0xffffffffffffff01, 0x4, 0x1}}, 0x80) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)=@random={'security.', '\x97+^\x00'}, &(0x7f0000000400)=""/236, 0xec) sendmsg$nl_netfilter(r0, &(0x7f0000000640)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x30, 0x11, 0x4, 0x300, 0x70bd29, 0x25dfdbfe, {0x3, 0x0, 0x7}, [@typed={0x8, 0x88, @u32=0x4}, @typed={0x14, 0x2e, @ipv6=@rand_addr="8664d35e51f1d913bd32eb166adbe412"}]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x80) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x100000000, &(0x7f0000000300)={[{@redirect_dir={'redirect_dir', 0x3d, './file0'}}], [{@audit='audit'}, {@euid_gt={'euid>', r1}}, {@fsmagic={'fsmagic', 0x3d, 0x2b}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x30, 0x34, 0x37, 0x36, 0x65, 0x64, 0x77], 0x2d, [0x73, 0x35, 0x77, 0x66], 0x2d, [0x30, 0x3d, 0x33, 0x38], 0x2d, [0x31, 0x65, 0x39, 0x30], 0x2d, [0x38, 0x65, 0x35, 0x36, 0x32, 0x31, 0x64, 0x30]}}}, {@fowner_gt={'fowner>', r1}}]}) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, &(0x7f0000000500)=""/128) [ 440.955505][T25876] overlayfs: unrecognized mount option "i\dexñ ¨Õ=" or missing value 11:43:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) 11:43:56 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x199, 0x40000000) 11:43:56 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x1) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x8000, 0x0) ioctl$BLKRAGET(r1, 0x1263, &(0x7f00000000c0)) ioctl(r0, 0x1000008916, &(0x7f00000001c0)="ccae13ddfd2e25c2d096dd3f9b8595393e0c97474f9d0d6b84969fd733b9e44541383083c40c35324a535324400657de734bac77d970c40c4ee2c3854b9813c1faeb2bb6009dc48b508aaf0a681352265897da2fdc2471b5de9e1fcf28940639d2736bf38ab14fc26694a41fa88abc8a6189f489673dc38f58da38f9cee994824dc007d778") ioctl$BLKBSZSET(r1, 0x40081271, &(0x7f0000000040)=0xdd) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x1) 11:43:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x0, 0x7fffeeee}}], 0x2, 0x0, 0x0) 11:43:56 executing program 2: r0 = socket$inet6(0xa, 0x4, 0x2) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/qat_adf_ctl\x00', 0x100, 0x0) getsockopt$ax25_int(r1, 0x101, 0xa, &(0x7f0000000380), &(0x7f0000000480)=0xfffffffffffffd61) ioctl$VIDIOC_TRY_ENCODER_CMD(r1, 0xc028564e, &(0x7f00000003c0)={0x2, 0x1, [0x0, 0x8, 0x2, 0x100, 0x76a, 0x10000, 0x8, 0xffffffff]}) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x101001, 0x0) ioctl$RTC_WIE_ON(r2, 0x700f) r3 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TCSBRK(r2, 0x5409, 0x1) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000400)={&(0x7f00000004c0)=ANY=[@ANYBLOB="880000006faf5e20171b3e4542282f88ee65472b28c7376e4ced133b0867637c3351644ed70c57005b92e03a7f25fd4d301612d0d8150a4c4f01b86cdcd91d9816b64c243da320296451c41c3d4c147f325829afe9f091a01fad6a7928568a2794c980376b7f7f1b1d3122d894ac3194e05986048654f6e873a5ac240b7abb283341c248386af5608f54786cf8eaad0e308b1d9644da0a28403f2cd96fa1c2ceee814c15703881c7d30cd491e0886b70f256d28c03127baf5fa162de466068d37356c2bfbcba8c8a9088dfe987c2a794e1397ab5815a01f3b701ef55fd88c7a6b22be8ad", @ANYRES16=r4, @ANYRESOCT=r4], 0x3}, 0x1, 0x0, 0x0, 0x800}, 0x40000) fsetxattr$security_smack_entry(r3, &(0x7f0000000200)='security.SMACK64MMAP\x00', &(0x7f0000000240)='IPVS\x00', 0x5, 0x2) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r5, 0x10, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) 11:43:56 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x20000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x1000000a}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r2, 0x10e, 0x2, &(0x7f0000000080)=0x1c, 0x4) 11:43:56 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x199, 0x7ffff000) 11:43:56 executing program 5: creat(&(0x7f0000000040)='./file0\x00', 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x1f8) clone(0x40004200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="09000000ab013173000000"]) 11:43:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18, 0x0}}], 0x1, 0x0) [ 441.474611][T25934] QAT: Invalid ioctl 11:43:56 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x100, 0x0) write$P9_RSYMLINK(r1, &(0x7f0000000140)={0x14, 0x11, 0x1, {0x40, 0x1, 0x8}}, 0x14) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000000c0)={0x86, "9f879ecec0ec23c08b25e46268e39d7e1207b3b649c90c95c77bf9506722f646", 0x4, 0x2fc783c837cad938, 0x7, 0x5, 0x1, 0x0, 0x2, 0x7}) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 441.528507][T25934] QAT: Invalid ioctl 11:43:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x0, 0xdfeeff7f}}], 0x2, 0x0, 0x0) [ 441.576443][T25928] QAT: Invalid ioctl 11:43:56 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x199, 0x7ffffffff000) 11:43:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18}, 0x2}], 0x1, 0x0) [ 441.618334][T25940] IPVS: ftp: loaded support on port[0] = 21 [ 441.637865][T25943] overlayfs: unrecognized mount option " " or missing value 11:43:56 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$TIOCMBIC(r1, 0x5417, &(0x7f0000000180)=0x8) r2 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x201, 0xe48a934f63aa56f2) ioctl$SG_SET_RESERVED_SIZE(r2, 0x2275, &(0x7f00000000c0)=0xfffffffffffffff9) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x7ff, 0x80000) ioctl$VIDIOC_G_INPUT(r2, 0x80045626, &(0x7f0000000080)) [ 441.682678][T25952] QAT: Invalid ioctl [ 441.687607][T25952] QAT: Invalid ioctl [ 441.717306][T25952] QAT: Invalid ioctl 11:43:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x0, 0xeeeeff7f}}], 0x2, 0x0, 0x0) 11:43:56 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x8001, 0x28000) accept$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)={{{@in=@empty, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f0000000240)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in=@empty, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e23, 0x0, 0x4e21, 0x0, 0x2, 0x0, 0xa0, 0x32, r2, r3}, {0x3, 0x2, 0x2, 0x6, 0x0, 0x7, 0x1, 0x7}, {0x3, 0x4cf, 0x2, 0x40}, 0x6, 0x0, 0x2, 0x1, 0x2, 0x1}, {{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4d2, 0x32}, 0x2, @in=@local, 0x3502, 0x1, 0x0, 0x1, 0x0, 0x5bf, 0x9}}, 0xe8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f00000003c0)={0xffffffffffffff33}, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") modify_ldt$write2(0x11, &(0x7f0000000380)={0xffffffffffffff80, 0x20001000, 0x2000, 0x7, 0x95, 0x7fff, 0x7fff, 0x100000000, 0x4, 0xdbae}, 0x10) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:57 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x199, 0xf0ff7f00000000) 11:43:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18}, 0x3}], 0x1, 0x0) 11:43:57 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x800, &(0x7f0000000100)="11dc2a8503c622055fde47d3e551cfffa5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:57 executing program 5: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0xfffffffffffffffd}, 0x3c) ioctl$SIOCX25CALLACCPTAPPRV(r0, 0x89e8) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x33c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r3, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0}, 0x0) 11:43:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x0, 0x7ffffffff000}}], 0x2, 0x0, 0x0) 11:43:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18}, 0x4}], 0x1, 0x0) 11:43:57 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x199, 0xf0ffffff7f0000) 11:43:57 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$PPPIOCGIDLE(r1, 0x8010743f, &(0x7f0000000080)) ioctl$TIOCCBRK(r1, 0x5428) 11:43:57 executing program 3: pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') r0 = socket$inet6(0xa, 0x2, 0x0) r1 = accept(r0, &(0x7f00000003c0)=@l2, &(0x7f0000000440)=0x80) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000480)={'ah\x00'}, &(0x7f00000004c0)=0x1e) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000000c0)) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 442.273659][T25988] IPVS: ftp: loaded support on port[0] = 21 11:43:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x0, 0x4000000000000}}], 0x2, 0x0, 0x0) 11:43:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18}, 0x5}], 0x1, 0x0) 11:43:57 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x199, 0x100000000000000) 11:43:57 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10, &(0x7f00000000c0)='$:GPL!#%wlan1=\xf4\x00'}, 0x30) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000180)={{0x3, 0x0, 0x6, 0x7, 'syz1\x00', 0x3f}, 0x6, 0x10000000, 0xb1d8, r2, 0x5, 0x6, 'syz1\x00', &(0x7f0000000140)=['/dev/usbmon#\x00', '/dev/usbmon#\x00', '/dev/usbmon#\x00', '\x00', '/dev/usbmon#\x00'], 0x35, [], [0x9, 0x0, 0xb0, 0x80000001]}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:57 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x181c40, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r1, 0x4, &(0x7f00000000c0)='/dev/usbmon#\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x0, 0xf0ffffff7f0000}}], 0x2, 0x0, 0x0) [ 442.724355][T26027] syz-executor.5 invoked oom-killer: gfp_mask=0x40cc0(GFP_KERNEL|__GFP_COMP), order=1, oom_score_adj=1000 [ 442.786582][T26027] CPU: 0 PID: 26027 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 442.795729][T26027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 442.805794][T26027] Call Trace: [ 442.809100][T26027] dump_stack+0x172/0x1f0 [ 442.813442][T26027] dump_header+0x177/0x1152 [ 442.817960][T26027] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 442.823778][T26027] ? ___ratelimit+0x2c8/0x595 [ 442.828474][T26027] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 442.834294][T26027] ? lockdep_hardirqs_on+0x418/0x5d0 [ 442.839590][T26027] ? trace_hardirqs_on+0x67/0x240 [ 442.844625][T26027] ? pagefault_out_of_memory+0x11c/0x11c [ 442.850264][T26027] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 442.856081][T26027] ? ___ratelimit+0x60/0x595 [ 442.860675][T26027] ? do_raw_spin_unlock+0x57/0x270 [ 442.865807][T26027] oom_kill_process.cold+0x10/0x15 [ 442.870924][T26027] out_of_memory+0x334/0x1340 [ 442.875598][T26027] ? lock_downgrade+0x920/0x920 [ 442.880442][T26027] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 442.880458][T26027] ? oom_killer_disable+0x280/0x280 [ 442.880479][T26027] mem_cgroup_out_of_memory+0x1d8/0x240 [ 442.880493][T26027] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 442.880510][T26027] ? do_raw_spin_unlock+0x57/0x270 [ 442.880527][T26027] ? _raw_spin_unlock+0x2d/0x50 [ 442.880545][T26027] try_charge+0xf4b/0x1440 [ 442.880563][T26027] ? __lock_acquire+0x800/0x4a00 [ 442.880581][T26027] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 442.880595][T26027] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 442.880612][T26027] ? cache_grow_begin+0x122/0xd20 [ 442.938494][T26027] ? find_held_lock+0x35/0x130 [ 442.943279][T26027] ? cache_grow_begin+0x122/0xd20 [ 442.948373][T26027] __memcg_kmem_charge_memcg+0x71/0xf0 [ 442.953842][T26027] ? memcg_kmem_put_cache+0x50/0x50 [ 442.959050][T26027] ? __kasan_check_read+0x11/0x20 [ 442.964078][T26027] cache_grow_begin+0x629/0xd20 [ 442.968925][T26027] ? __sanitizer_cov_trace_cmp2+0x11/0x20 [ 442.974648][T26027] ? mempolicy_slab_node+0x139/0x390 [ 442.979948][T26027] fallback_alloc+0x1fd/0x2d0 [ 442.984622][T26027] ____cache_alloc_node+0x1bc/0x1d0 [ 442.989816][T26027] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 442.996060][T26027] kmem_cache_alloc+0x1ef/0x710 [ 443.002445][T26027] sk_prot_alloc+0x67/0x310 [ 443.006937][T26027] sk_alloc+0x39/0xf70 [ 443.011000][T26027] ? find_held_lock+0x35/0x130 [ 443.015755][T26027] tipc_sk_create+0xdb/0x22a0 [ 443.020429][T26027] ? lock_downgrade+0x920/0x920 [ 443.025334][T26027] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 443.031572][T26027] ? __kasan_check_read+0x11/0x20 [ 443.036594][T26027] __sock_create+0x3d8/0x730 [ 443.041176][T26027] __sys_socketpair+0x1ea/0x5d0 [ 443.046012][T26027] ? __ia32_sys_socket+0xb0/0xb0 [ 443.050943][T26027] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 443.056393][T26027] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 443.061833][T26027] ? do_syscall_64+0x26/0x760 [ 443.066525][T26027] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 443.072588][T26027] ? do_syscall_64+0x26/0x760 [ 443.077263][T26027] __x64_sys_socketpair+0x97/0xf0 [ 443.082276][T26027] do_syscall_64+0xfa/0x760 [ 443.086764][T26027] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 443.092643][T26027] RIP: 0033:0x459879 [ 443.096529][T26027] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 443.116117][T26027] RSP: 002b:00007fd5204f6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 443.124528][T26027] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459879 [ 443.132492][T26027] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 000000000000001e [ 443.140464][T26027] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 443.148426][T26027] R10: 0000000020000140 R11: 0000000000000246 R12: 00007fd5204f76d4 [ 443.156381][T26027] R13: 00000000004c8753 R14: 00000000004df490 R15: 00000000ffffffff [ 443.165505][T26027] memory: usage 307200kB, limit 307200kB, failcnt 1877 [ 443.172467][T26027] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 443.179759][T26027] Memory cgroup stats for /syz5: [ 443.179883][T26027] anon 256909312 [ 443.179883][T26027] file 0 [ 443.179883][T26027] kernel_stack 8126464 [ 443.179883][T26027] slab 14163968 [ 443.179883][T26027] sock 0 [ 443.179883][T26027] shmem 45056 [ 443.179883][T26027] file_mapped 135168 [ 443.179883][T26027] file_dirty 0 [ 443.179883][T26027] file_writeback 0 [ 443.179883][T26027] anon_thp 228589568 [ 443.179883][T26027] inactive_anon 135168 [ 443.179883][T26027] active_anon 256909312 [ 443.179883][T26027] inactive_file 0 [ 443.179883][T26027] active_file 57344 [ 443.179883][T26027] unevictable 0 [ 443.179883][T26027] slab_reclaimable 2703360 [ 443.179883][T26027] slab_unreclaimable 11460608 [ 443.179883][T26027] pgfault 54285 [ 443.179883][T26027] pgmajfault 0 [ 443.179883][T26027] workingset_refault 66 [ 443.179883][T26027] workingset_activate 0 [ 443.179883][T26027] workingset_nodereclaim 0 [ 443.179883][T26027] pgrefill 1804 [ 443.179883][T26027] pgscan 2751 [ 443.179883][T26027] pgsteal 286 [ 443.274061][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 443.274196][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 443.285927][T26027] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=15681,uid=0 [ 443.301461][T26027] Memory cgroup out of memory: Killed process 15681 (syz-executor.5) total-vm:72708kB, anon-rss:2208kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 443.321021][ T1065] oom_reaper: reaped process 15681 (syz-executor.5), now anon-rss:0kB, file-rss:34832kB, shmem-rss:0kB [ 443.326392][T26006] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 443.342456][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 443.342523][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 443.342640][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 443.342685][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 443.342770][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 443.342814][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 443.377478][T26006] CPU: 0 PID: 26006 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 443.386579][T26006] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 443.396627][T26006] Call Trace: [ 443.399904][T26006] dump_stack+0x172/0x1f0 [ 443.404215][T26006] dump_header+0x177/0x1152 [ 443.408705][T26006] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 443.414492][T26006] ? ___ratelimit+0x2c8/0x595 [ 443.419147][T26006] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 443.424930][T26006] ? lockdep_hardirqs_on+0x418/0x5d0 [ 443.430192][T26006] ? trace_hardirqs_on+0x67/0x240 [ 443.435191][T26006] ? pagefault_out_of_memory+0x11c/0x11c [ 443.440807][T26006] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 443.446585][T26006] ? ___ratelimit+0x60/0x595 [ 443.451169][T26006] ? do_raw_spin_unlock+0x57/0x270 [ 443.456258][T26006] oom_kill_process.cold+0x10/0x15 [ 443.461349][T26006] out_of_memory+0x334/0x1340 [ 443.466001][T26006] ? lock_downgrade+0x920/0x920 [ 443.470841][T26006] ? oom_killer_disable+0x280/0x280 [ 443.476028][T26006] mem_cgroup_out_of_memory+0x1d8/0x240 [ 443.481552][T26006] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 443.487163][T26006] ? do_raw_spin_unlock+0x57/0x270 [ 443.492252][T26006] ? _raw_spin_unlock+0x2d/0x50 [ 443.497100][T26006] try_charge+0xa2d/0x1440 [ 443.501515][T26006] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 443.507056][T26006] ? percpu_ref_tryget_live+0x111/0x290 [ 443.512585][T26006] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 443.518806][T26006] ? __kasan_check_read+0x11/0x20 [ 443.523811][T26006] ? get_mem_cgroup_from_mm+0x156/0x320 [ 443.529348][T26006] mem_cgroup_try_charge+0x136/0x590 [ 443.534643][T26006] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 443.540874][T26006] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 443.546487][T26006] __handle_mm_fault+0x1e34/0x3f20 [ 443.551582][T26006] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 443.557109][T26006] ? __kasan_check_read+0x11/0x20 [ 443.562119][T26006] handle_mm_fault+0x1b5/0x6c0 [ 443.566865][T26006] __do_page_fault+0x536/0xdd0 [ 443.571610][T26006] do_page_fault+0x38/0x590 [ 443.576095][T26006] page_fault+0x39/0x40 [ 443.580235][T26006] RIP: 0033:0x45c22d [ 443.584116][T26006] Code: 5b 5d f3 c3 66 0f 1f 84 00 00 00 00 00 48 c7 c0 ea ff ff ff 48 85 ff 0f 84 30 8e fb ff 48 85 f6 0f 84 27 8e fb ff 48 83 ee 10 <48> 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 [ 443.603706][T26006] RSP: 002b:00007fff9ff76da8 EFLAGS: 00010202 [ 443.609769][T26006] RAX: ffffffffffffffea RBX: 00007fd5204d6700 RCX: 00007fd5204d6700 [ 443.617717][T26006] RDX: 00000000003d0f00 RSI: 00007fd5204d5db0 RDI: 00000000004105b0 [ 443.625666][T26006] RBP: 00007fff9ff76fc0 R08: 00007fd5204d69d0 R09: 00007fd5204d6700 [ 443.633637][T26006] R10: 00007fd5204d5dc0 R11: 0000000000000246 R12: 0000000000000000 [ 443.641591][T26006] R13: 00007fff9ff76e5f R14: 00007fd5204d69c0 R15: 000000000075c07c [ 443.651466][T26006] memory: usage 304876kB, limit 307200kB, failcnt 1877 [ 443.658509][T26006] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 443.665718][T26006] Memory cgroup stats for /syz5: [ 443.665792][T26006] anon 254824448 [ 443.665792][T26006] file 0 [ 443.665792][T26006] kernel_stack 8126464 [ 443.665792][T26006] slab 14163968 [ 443.665792][T26006] sock 0 [ 443.665792][T26006] shmem 45056 [ 443.665792][T26006] file_mapped 135168 [ 443.665792][T26006] file_dirty 0 [ 443.665792][T26006] file_writeback 0 [ 443.665792][T26006] anon_thp 226492416 [ 443.665792][T26006] inactive_anon 135168 [ 443.665792][T26006] active_anon 254824448 [ 443.665792][T26006] inactive_file 0 [ 443.665792][T26006] active_file 57344 [ 443.665792][T26006] unevictable 0 [ 443.665792][T26006] slab_reclaimable 2703360 [ 443.665792][T26006] slab_unreclaimable 11460608 [ 443.665792][T26006] pgfault 54285 [ 443.665792][T26006] pgmajfault 0 [ 443.665792][T26006] workingset_refault 66 [ 443.665792][T26006] workingset_activate 0 [ 443.665792][T26006] workingset_nodereclaim 0 [ 443.665792][T26006] pgrefill 1804 [ 443.665792][T26006] pgscan 2751 [ 443.665792][T26006] pgsteal 286 [ 443.760575][T26006] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=15637,uid=0 11:43:58 executing program 5: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0xfffffffffffffffd}, 0x3c) ioctl$SIOCX25CALLACCPTAPPRV(r0, 0x89e8) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x33c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r3, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0}, 0x0) 11:43:58 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r1, 0xc05c5340, &(0x7f0000000100)={0x7, 0x0, 0x10001, {0x77359400}, 0x1000, 0x6}) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000080)=0x9) 11:43:58 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x199, 0x100000000000080) 11:43:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18}, 0x6}], 0x1, 0x0) 11:43:58 executing program 3: r0 = socket$inet6(0xa, 0x4, 0xffffc00000000000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x2) r1 = open(&(0x7f00000002c0)='./file0\x00', 0x400, 0x27df00de410e69e3) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000300)) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r2 = open(&(0x7f0000000140)='./file0\x00', 0xc00, 0x100) sendfile(r0, r0, &(0x7f0000000240), 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r2, 0x10e, 0x5, &(0x7f0000000280)=0x6, 0x4) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f0000000180)=ANY=[@ANYBLOB="66696c74657200000000000000000000000008000000000000000000000000002400000020fa3929523522898d43a5e688cdb2045789f520b446dd95e274d7a3096a322fb74cb54e"], &(0x7f0000000200)=0x48) r3 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) openat(r3, &(0x7f0000000100)='./file0\x00', 0x0, 0x80) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) 11:43:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x0, 0x100000000000000}}], 0x2, 0x0, 0x0) [ 443.776248][T26006] Memory cgroup out of memory: Killed process 15637 (syz-executor.5) total-vm:72708kB, anon-rss:2208kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 443.795609][ T1065] oom_reaper: reaped process 15637 (syz-executor.5), now anon-rss:0kB, file-rss:34832kB, shmem-rss:0kB 11:43:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x0, 0x200000000000000}}], 0x2, 0x0, 0x0) 11:43:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18}, 0x7}], 0x1, 0x0) 11:43:59 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") [ 443.978783][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 443.984903][ C0] protocol 88fb is buggy, dev hsr_slave_1 11:43:59 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x199, 0x200000000000000) 11:43:59 executing program 3: openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_init_net_socket$llc(0x1a, 0x1, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@initdev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@dev}}, &(0x7f00000002c0)=0xe8) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f0000000300)={r2, 0x6, 0x8e, 0x7, 0x101, 0x2, 0x3f}) ioctl$RTC_PLL_GET(r1, 0x80207011, &(0x7f0000000100)) getsockopt$inet_buf(r1, 0x0, 0x30, &(0x7f0000000340)=""/4096, &(0x7f00000000c0)=0x1000) 11:43:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x0, 0xf00000000000000}}], 0x2, 0x0, 0x0) 11:43:59 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0xc2542, 0x0) write$P9_RSTATu(r0, &(0x7f00000000c0)={0xf3, 0x7d, 0x0, {{0x500, 0xbf, 0x0, 0x5000000, {0xfffffff7}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc2f, '(nodevselfwmd5sum[vboxnet0ppp0%', 0x26, 'cpusen,user/\x96 \xd2\xc0`\f<\xeb\xe7)U9\x82H\x9f3Gb+\xc9D\xc0uM\xbdZ', 0xb, 'cgroupppp1(', 0x51, '.\x00\x00\x00\x00\x00USp\x05\x06K|UR4A\xe7\xad&\xef\x89~(\xcd\x12\x15\xc9\xe73\xd1L\xdc\xf0\x1a\xd6\x9c\xfc\x96\xf9\xf8\xd8{\x02-\x19\x88Q\xb2\x95f\xe4\x80\xa0\x95;\x9d\\\x83\xe8\xee\xb3\x91\x99kka*\x00\x954\xd1\x136\xcaB\xdf\xfc\xbf\xc3\xe5'}, 0xa, '/dev/nbd#\x00'}}, 0xf3) 11:43:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18}, 0x8}], 0x1, 0x0) 11:43:59 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x80002, 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f00000001c0)=""/4096) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x3, 0x200) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x8) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000100)="11dca5055e0bcfe47bf070") r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x131000, 0x0) ioctl$EVIOCRMFF(r3, 0x40044581, &(0x7f00000000c0)=0x6) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) io_setup(0x81, &(0x7f0000001300)=0x0) io_destroy(r4) syz_open_dev$swradio(&(0x7f00000012c0)='/dev/swradio#\x00', 0x1, 0x2) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000180)={0x0, 0x2, &(0x7f0000000340)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x3, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) ioctl$EVIOCGVERSION(r3, 0x80044501, &(0x7f00000011c0)=""/194) socket$inet6_udplite(0xa, 0x2, 0x88) 11:43:59 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x199, 0x4000000000000000) 11:43:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x0, 0x4000000000000000}}], 0x2, 0x0, 0x0) 11:43:59 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ce]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) clone(0x0, &(0x7f0000000400), 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 11:43:59 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18}, 0x9}], 0x1, 0x0) 11:43:59 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x199, 0x8000000000000001) 11:43:59 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x203, 0x0) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f00000000c0)=0x3, 0x2) ioctl$VT_OPENQRY(r1, 0x5600, &(0x7f0000000100)) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:43:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x0, 0x5d00000000000000}}], 0x2, 0x0, 0x0) 11:43:59 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x3, 0xaf99, 0x100000001, 0x1, 0xfffffffffffffff7}, 0x14) 11:43:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18}, 0xa}], 0x1, 0x0) [ 444.702187][T26101] syz-executor.5 invoked oom-killer: gfp_mask=0x40cc0(GFP_KERNEL|__GFP_COMP), order=0, oom_score_adj=1000 [ 444.792467][T26101] CPU: 1 PID: 26101 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190830 #75 [ 444.801626][T26101] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 444.811688][T26101] Call Trace: [ 444.815117][T26101] dump_stack+0x172/0x1f0 [ 444.819456][T26101] dump_header+0x177/0x1152 [ 444.823970][T26101] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 444.829783][T26101] ? ___ratelimit+0x2c8/0x595 [ 444.834643][T26101] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 444.840461][T26101] ? lockdep_hardirqs_on+0x418/0x5d0 [ 444.845762][T26101] ? trace_hardirqs_on+0x67/0x240 [ 444.850803][T26101] ? pagefault_out_of_memory+0x11c/0x11c [ 444.856448][T26101] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 444.862351][T26101] ? ___ratelimit+0x60/0x595 [ 444.866949][T26101] ? do_raw_spin_unlock+0x57/0x270 [ 444.872071][T26101] oom_kill_process.cold+0x10/0x15 [ 444.877198][T26101] out_of_memory+0x334/0x1340 [ 444.881890][T26101] ? lock_downgrade+0x920/0x920 [ 444.886754][T26101] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 444.892575][T26101] ? oom_killer_disable+0x280/0x280 [ 444.897792][T26101] mem_cgroup_out_of_memory+0x1d8/0x240 [ 444.903339][T26101] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 444.908980][T26101] ? do_raw_spin_unlock+0x57/0x270 [ 444.914101][T26101] ? _raw_spin_unlock+0x2d/0x50 [ 444.918964][T26101] try_charge+0xf4b/0x1440 [ 444.923393][T26101] ? __lock_acquire+0x800/0x4a00 [ 444.928342][T26101] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 444.933892][T26101] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 444.939880][T26101] ? cache_grow_begin+0x122/0xd20 [ 444.944918][T26101] ? find_held_lock+0x35/0x130 [ 444.949707][T26101] ? cache_grow_begin+0x122/0xd20 [ 444.954758][T26101] __memcg_kmem_charge_memcg+0x71/0xf0 [ 444.960239][T26101] ? memcg_kmem_put_cache+0x50/0x50 [ 444.965457][T26101] ? __kasan_check_read+0x11/0x20 [ 444.970506][T26101] cache_grow_begin+0x629/0xd20 [ 444.975387][T26101] ? __sanitizer_cov_trace_cmp2+0x11/0x20 [ 444.981116][T26101] ? mempolicy_slab_node+0x139/0x390 [ 444.986416][T26101] fallback_alloc+0x1fd/0x2d0 [ 444.991106][T26101] ____cache_alloc_node+0x1bc/0x1d0 [ 444.996313][T26101] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 445.003399][T26101] kmem_cache_alloc+0x1ef/0x710 [ 445.008261][T26101] ? find_held_lock+0x35/0x130 [ 445.013057][T26101] mmu_topup_memory_caches+0x97/0x490 [ 445.018436][T26101] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 445.024692][T26101] ? kvm_hv_setup_tsc_page+0xae/0x6d0 [ 445.030081][T26101] kvm_mmu_load+0x21/0x12f0 [ 445.034590][T26101] ? kvm_lapic_enable_pv_eoi+0x170/0x170 [ 445.040231][T26101] ? vcpu_enter_guest+0x28c5/0x6200 [ 445.045444][T26101] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 445.051786][T26101] vcpu_enter_guest+0x3e0a/0x6200 [ 445.056833][T26101] ? handle_emulation_failure+0x4e0/0x4e0 [ 445.062569][T26101] ? lock_acquire+0x190/0x410 [ 445.067261][T26101] ? kvm_arch_vcpu_ioctl_run+0x241/0x1750 [ 445.073005][T26101] kvm_arch_vcpu_ioctl_run+0x424/0x1750 [ 445.078569][T26101] ? kvm_arch_vcpu_ioctl_run+0x424/0x1750 [ 445.084317][T26101] kvm_vcpu_ioctl+0x4dc/0xf50 [ 445.089012][T26101] ? kvm_write_guest_cached+0x40/0x40 [ 445.094398][T26101] ? tomoyo_path_number_perm+0x263/0x520 [ 445.100046][T26101] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 445.105896][T26101] ? kvm_write_guest_cached+0x40/0x40 [ 445.111281][T26101] do_vfs_ioctl+0xdb6/0x13e0 [ 445.115885][T26101] ? ioctl_preallocate+0x210/0x210 [ 445.121003][T26101] ? __fget+0x384/0x560 [ 445.125171][T26101] ? ksys_dup3+0x3e0/0x3e0 [ 445.129596][T26101] ? nsecs_to_jiffies+0x30/0x30 [ 445.134461][T26101] ? tomoyo_file_ioctl+0x23/0x30 [ 445.139505][T26101] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 445.145759][T26101] ? security_file_ioctl+0x8d/0xc0 [ 445.150885][T26101] ksys_ioctl+0xab/0xd0 [ 445.155057][T26101] __x64_sys_ioctl+0x73/0xb0 [ 445.159747][T26101] do_syscall_64+0xfa/0x760 [ 445.164264][T26101] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 445.170159][T26101] RIP: 0033:0x459879 [ 445.174057][T26101] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 11:43:59 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x59306f219fcd72c}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x74, r1, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x50, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x20}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xffffffffee63f836}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'lo\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x9}, @IPVS_DAEMON_ATTR_STATE={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6d0}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xffffffff}]}, 0x74}, 0x1, 0x0, 0x0, 0x8800}, 0x4) preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 11:44:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18}, 0xe}], 0x1, 0x0) 11:44:00 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000080)=[r0, r1, r2, r0, r0, r2, r0], 0x7) preadv(r2, &(0x7f00000017c0), 0x199, 0x0) 11:44:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18}, 0x11}], 0x1, 0x0) [ 445.193662][T26101] RSP: 002b:00007fd520517c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 445.202082][T26101] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459879 [ 445.210054][T26101] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 445.210129][T26101] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 445.210143][T26101] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5205186d4 [ 445.226063][T26101] R13: 00000000004c2c2f R14: 00000000004d62b0 R15: 00000000ffffffff [ 445.248937][T26101] memory: usage 307200kB, limit 307200kB, failcnt 1925 [ 445.257827][T26101] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 445.268528][T26101] Memory cgroup stats for /syz5: [ 445.270586][T26101] anon 256843776 [ 445.270586][T26101] file 0 [ 445.270586][T26101] kernel_stack 8060928 [ 445.270586][T26101] slab 14905344 [ 445.270586][T26101] sock 0 [ 445.270586][T26101] shmem 45056 [ 445.270586][T26101] file_mapped 135168 [ 445.270586][T26101] file_dirty 0 [ 445.270586][T26101] file_writeback 0 [ 445.270586][T26101] anon_thp 228589568 [ 445.270586][T26101] inactive_anon 135168 [ 445.270586][T26101] active_anon 256843776 [ 445.270586][T26101] inactive_file 0 [ 445.270586][T26101] active_file 57344 [ 445.270586][T26101] unevictable 0 [ 445.270586][T26101] slab_reclaimable 2973696 [ 445.270586][T26101] slab_unreclaimable 11931648 [ 445.270586][T26101] pgfault 54483 [ 445.270586][T26101] pgmajfault 0 [ 445.270586][T26101] workingset_refault 66 [ 445.270586][T26101] workingset_activate 0 [ 445.270586][T26101] workingset_nodereclaim 0 [ 445.270586][T26101] pgrefill 1837 [ 445.270586][T26101] pgscan 2850 [ 445.270586][T26101] pgsteal 286 [ 445.390614][T26101] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=26098,uid=0 [ 445.423932][T26101] Memory cgroup out of memory: Killed process 26098 (syz-executor.5) total-vm:72840kB, anon-rss:4204kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:143360kB oom_score_adj:1000 [ 445.451513][ T1065] [ 445.453876][ T1065] ============================================ [ 445.460010][ T1065] WARNING: possible recursive locking detected [ 445.463437][ T3890] kobject: 'loop3' (00000000d8843e7b): kobject_uevent_env [ 445.466154][ T1065] 5.3.0-rc6-next-20190830 #75 Not tainted [ 445.474060][ T3890] kobject: 'loop3' (00000000d8843e7b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 445.478931][ T1065] -------------------------------------------- [ 445.478937][ T1065] oom_reaper/1065 is trying to acquire lock: [ 445.478942][ T1065] ffffffff8904ff60 (mmu_notifier_invalidate_range_start){+.+.}, at: __mmu_notifier_invalidate_range_end+0x0/0x360 [ 445.478972][ T1065] [ 445.478972][ T1065] but task is already holding lock: [ 445.478976][ T1065] ffffffff8904ff60 (mmu_notifier_invalidate_range_start){+.+.}, at: __oom_reap_task_mm+0x196/0x490 [ 445.479000][ T1065] [ 445.479000][ T1065] other info that might help us debug this: [ 445.479008][ T1065] Possible unsafe locking scenario: [ 445.479008][ T1065] [ 445.546671][ T1065] CPU0 [ 445.549930][ T1065] ---- [ 445.553185][ T1065] lock(mmu_notifier_invalidate_range_start); [ 445.559307][ T1065] lock(mmu_notifier_invalidate_range_start); [ 445.565432][ T1065] [ 445.565432][ T1065] *** DEADLOCK *** [ 445.565432][ T1065] [ 445.573549][ T1065] May be due to missing lock nesting notation [ 445.573549][ T1065] [ 445.581847][ T1065] 2 locks held by oom_reaper/1065: [ 445.586925][ T1065] #0: ffff88802f900bd0 (&mm->mmap_sem#2){++++}, at: oom_reaper+0x3a7/0x1320 [ 445.595854][ T1065] #1: ffffffff8904ff60 (mmu_notifier_invalidate_range_start){+.+.}, at: __oom_reap_task_mm+0x196/0x490 [ 445.607027][ T1065] [ 445.607027][ T1065] stack backtrace: [ 445.612897][ T1065] CPU: 0 PID: 1065 Comm: oom_reaper Not tainted 5.3.0-rc6-next-20190830 #75 [ 445.621540][ T1065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 445.631579][ T1065] Call Trace: [ 445.634850][ T1065] dump_stack+0x172/0x1f0 [ 445.639159][ T1065] __lock_acquire.cold+0x15d/0x385 [ 445.644248][ T1065] ? mark_held_locks+0xf0/0xf0 [ 445.648995][ T1065] ? unmap_page_range+0x1df4/0x2380 [ 445.654182][ T1065] lock_acquire+0x190/0x410 [ 445.658666][ T1065] ? __mmu_notifier_invalidate_range_start+0x210/0x210 [ 445.665499][ T1065] __mmu_notifier_invalidate_range_end+0x3c/0x360 [ 445.671893][ T1065] ? __mmu_notifier_invalidate_range_start+0x210/0x210 [ 445.678718][ T1065] ? __mmu_notifier_invalidate_range_start+0x1a5/0x210 [ 445.685631][ T1065] __oom_reap_task_mm+0x3fa/0x490 [ 445.690646][ T1065] ? process_shares_mm+0x130/0x130 [ 445.695733][ T1065] ? oom_reaper+0x3a7/0x1320 [ 445.700301][ T1065] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 445.706522][ T1065] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 445.712480][ T1065] ? __kasan_check_read+0x11/0x20 [ 445.717485][ T1065] ? do_raw_spin_unlock+0x57/0x270 [ 445.722575][ T1065] oom_reaper+0x2b2/0x1320 [ 445.726969][ T1065] ? __oom_reap_task_mm+0x490/0x490 [ 445.732160][ T1065] ? trace_hardirqs_on+0x67/0x240 [ 445.737162][ T1065] ? finish_wait+0x260/0x260 [ 445.741730][ T1065] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 445.747949][ T1065] ? __kthread_parkme+0x108/0x1c0 [ 445.752948][ T1065] ? __kasan_check_read+0x11/0x20 [ 445.757947][ T1065] kthread+0x361/0x430 [ 445.762008][ T1065] ? __oom_reap_task_mm+0x490/0x490 [ 445.767183][ T1065] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 445.773399][ T1065] ret_from_fork+0x24/0x30 [ 445.811556][ T1065] oom_reaper: reaped process 26098 (syz-executor.5), now anon-rss:0kB, file-rss:34840kB, shmem-rss:0kB 11:44:01 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ce]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) clone(0x0, &(0x7f0000000400), 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 11:44:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18}, 0x18}], 0x1, 0x0) 11:44:01 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) close(r0) listxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=""/120, 0x78) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x10000) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, &(0x7f00000000c0)={0x7, 0x100000000}) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) getsockname$ax25(r1, &(0x7f00000001c0)={{0x3, @null}, [@default, @rose, @null, @default, @default, @default, @remote, @rose]}, &(0x7f0000000240)=0x48) 11:44:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x0, 0xdfeeff7f00000000}}], 0x2, 0x0, 0x0) 11:44:01 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U-', 0x7fff}, 0x28, 0x0) 11:44:01 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000100)='/dev/snd/controlC#\x00', 0xffffffffffffffe1, 0x501000) close(r0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r1, 0xc05c5340, &(0x7f0000000080)={0x7fff, 0x10001, 0x2, {}, 0x401, 0xffffffff}) preadv(r1, &(0x7f00000017c0), 0x0, 0x0) [ 445.859307][T26101] kobject: 'kvm' (000000005de6d787): kobject_uevent_env [ 445.866298][T26101] kobject: 'kvm' (000000005de6d787): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 445.912244][ T3890] kobject: 'loop5' (00000000d7a5a3ce): kobject_uevent_env [ 445.949347][T26156] kobject: 'kvm' (000000005de6d787): kobject_uevent_env 11:44:01 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x0, 0x400) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000140)={0x0}) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000180)={0x0, 0x0, 0x2}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000200)={r2, r3}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r4 = msgget(0x3, 0x84) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000380)={r1, r1, 0xcfdf73720fb4a64e, 0x1}, 0x10) msgctl$IPC_INFO(r4, 0x3, &(0x7f0000000080)=""/39) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f00000000c0)=0x40) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r5 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000280)="2fdd86afc7ee14bbb37c42ea8f01f8be04d8e612740b42ef39c954708346e029a81072c6063d9f6cd66917e826d524dd80829d7dd0e5c689b3e0dad94073ec9e524cc0e29c03b0857f594751b1fc7415a163f2051c7d39b90a9e899141c4361626da9ebab1ce5ffb5a0cf9aa0091ad40f609fae42777a5125df8a56afe05b0767902dcd7040c97a35218bf6c46b1569041978b825790d8d023626e763a18d86c594db171a8fc0d3fb1c2889aa321247130ef5fa3d9ae013f4072c4cb2a5fe262a3fbfc89d497cde596bf0cd00491424abcd703a5fc84e4a43c56e41ae3ef294792e5d7207a26b1cea4371360", 0xec, 0xfffffffffffffffa) keyctl$setperm(0x5, r5, 0x400) 11:44:01 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PPPIOCSACTIVE(r0, 0x40107446, &(0x7f0000001140)={0x7, &(0x7f0000001100)=[{0x8, 0x7fffffff, 0x9, 0x9}, {0x9, 0xffffffffffffffc0, 0x7}, {0xbe0, 0x6, 0x0, 0x51}, {0x4, 0x8, 0x7, 0x4}, {0x100000000, 0x2, 0x80000001, 0x4}, {0x0, 0x101, 0x8, 0x7}, {0xf67, 0x5, 0xd482, 0x9}]}) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000080)="a3387b27fefd354f7bf070d07f345947a9bee121ba311ff8134f6a947553779c3845f6f900bf3108b409b5579192fca36a5c02669f17a06fb1ddd403aab8f4ff1fd13f995a8c65f2ead80c38d00704cf31ee8e551c677f95b6621d168ad07540a6922db25474e7ddec6958c8819c3764d90566aeadef0b9520e0c7") r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) sendto$x25(r2, &(0x7f0000000100)="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", 0x1000, 0x20000000, &(0x7f0000000040)={0x9, @remote={[], 0x3}}, 0x12) 11:44:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x0, 0xeeeeff7f00000000}}], 0x2, 0x0, 0x0) 11:44:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18}, 0x24}], 0x1, 0x0) 11:44:01 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x199, 0x0) [ 445.950988][ T3890] kobject: 'loop5' (00000000d7a5a3ce): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 445.958869][T26156] kobject: 'kvm' (000000005de6d787): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 446.029892][ T3890] kobject: 'loop4' (00000000f4cc89e1): kobject_uevent_env [ 446.037066][ T3890] kobject: 'loop4' (00000000f4cc89e1): fill_kobj_path: path = '/devices/virtual/block/loop4' 11:44:01 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in=@loopback, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f00000001c0)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000340)='/posix_acl_accessGPLsystemnodev\x00'}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0xe8) sendmsg$nl_netfilter(r0, &(0x7f0000001d40)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x48020}, 0xc, &(0x7f0000001d00)={&(0x7f0000000500)={0x17d8, 0x8, 0x1, 0x100, 0x70bd27, 0x25dfdbfe, {0xf, 0x0, 0x3}, [@nested={0x1c, 0x0, [@typed={0x4, 0x4e}, @typed={0x14, 0x47, @ipv6=@dev={0xfe, 0x80, [], 0x17}}]}, @typed={0x14, 0x72, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, @typed={0x8, 0x52, @uid=r1}, @typed={0x84, 0x44, @binary="ccddbc44caa9e8938856f61c544ae74771e882d795378bac9d5c9a534a5a760e3e087195bb18e379d498175e52e662c7cc44c1e6a6b2a829816bb178983afbbb6244bc0c67219988d8f4bb92e25598d08f6614685d55065d5470dbbf00a8bd50bd934238cd64bb3538837976f0d24b36973a4d70dffa5ad4f757feabb1c08a"}, @typed={0x4, 0x4f}, @nested={0x1138, 0x6a, [@generic="9f17ca26116a5727cc0e7bf5c09f807f9d54eef54e0a13173bde6e8db841fabfc0fed72e0783b3a813f351972f09e0b55289090687eed3cbc9617f77113048a7c69d143b237018505166dfc0de01da58b7d511cc6f5fa92b152c4ccfa4566dfbab26730d7faf0163a1c947248dffe50ddd994c1690c4b51c101732e0924499d77bc234b451d444616e13bcdb51b16767cf9ca01381acdcee5048", @generic="27706613efe58656faab7bc4c94a960e395003d761361dd88094ab588f25270129596fad8dfb5fbbbcb26d65be032ae424a2cae4f62c5a8928040fe0603608f480e7a807c813e143f076e586c24c96125dd7e5da41fbc1e82c783d82ec7fb7a9620c11766aa5ff29b4c9e843c301c8989e738252e48feb1169786ac819481909bf1cb2eede787bf836ff05db24b8912123", @typed={0x8, 0x12, @pid=r2}, @generic="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"]}, @nested={0x2cc, 0x7f, [@generic="b6505fca302e0cf64038ce5ead64d3787d7ece6560124ff1d16028fd27b3e56f73972a64d57698f49d5f2c3b59037aef554959cde387274dccfb13c28f51f4d1030cb407c014f43e032b45a33838592555b367ae1e011ddfc08409ebe1bda98668d9fa22af714f60398198937bae7d49d90396a012fc74acdf6bb9021f425c6f1b", @generic="546eb889183830015924131cdadb15a4742e0d66a319f501922361923efbb35beddf8eb4d62e28c011a69499d5720eb6e58b0731cddcb6b517a83db1d376dfbb22c67ad2f4976d67d4788ff16b70d08550606e93a9eafb40a8ebc5414bfae0190a6811a9a5db6955b7e30aeb1abba67fcdfd51526418840ec94b72d6cbbb98cc10a76d4be75e5b6ea5ea116dbb444a6fc2749e8ea826818050bdfaf69d17a5788eb04642b9c716ffe516fa0c0e06540e6ea18a5e0ae908b6cac1b70ebce390b52ed3e41a51eeb124bba11aa8fed03ea53f75adb7366449966547b7", @typed={0x8, 0x95, @uid=r3}, @typed={0x8, 0x66, @pid=r4}, @typed={0x14, 0x8f, @ipv6=@mcast1}, @generic="c5744263b9df1bace6c5011fbcb7bfa322831b30a7613e86fcb16e7f02db62557a051927651656", @generic="4daaef8f9ba4b8de89004654d99dbe476d380121af06461917132583969b28bfc58f0ad71decc2ada37270f0ba506e7d1c7c2750bf7eea7b6469b371ec440d4da9c74082f8c54b9d5b82e17f1f867ddf6bbaebc2f3859347c3709d728fedb4d872901bd679f44d19c0ede53ffc7ae4710dec9df127ac1fe8f0c5aaf8b5226aff16f1a87d7723d1f85d9a6ed34c6beef005c3f6fa38c034b8315426ec5da648a007f74d90ebd2b240d4833d142a81df5b77a2d93de0eefb8bb8c6490589445a98edceb6260a44b613e9802aa670ffd03ef80a459f534f2199ea3021b13aec96759b514342e5188f9f6f64132b2e7be6675e959a6b34087c2519", @typed={0x14, 0x93, @ipv6=@empty}, @typed={0x14, 0x34, @ipv6=@mcast2}]}, @generic="0314a3b77f93f42e7474623f41d73c6fca2483424542cc730104124b7156e785a0b16cb6c134bc5a57fbf7ec1d4b33d194cf8e7151605a1f8b7aebbe38a4ba109bb811e930bb6ee0d241edb32f68db", @nested={0x2a8, 0x36, [@typed={0x14, 0x3f, @ipv6=@empty}, @typed={0x18, 0x43, @str='ppp0vboxnet0lo(^\x00'}, @generic="1543cc5de372db1414718613b4f52f5e4b5eaae2d632a05f0fb707dc648af8e0b994e3f2df9e898cc9632d6c9af4eeabdf1c6df41deaa3954849118a5840b34286528ebfa054273635878e6f8d568db2105fc53ed5287acb8f9b7857a6828ec2af060df6a16d2ac74de697fb99107667758c971e3a3171c5728e3e8711f83e07e990ac713ca0e191741991492de0893a0196a44b814b53d1a739c1ab5c4b48b687a586521cb1f8107376a43d5f548e3add6563bb9682f49d8bca36acf62408776a87bf35e16ebdb7854faaa0365dc9c8b9bbb434abdfabfa9da0dcce13ddce", @generic="4d6112a0acf9581f4c9f65eaa313b27c3031753300ccfa791c6d76684e79dc44342ec296734db38f9b068f57da823a98244c7c6af0ba80cf5d48073a897722bcfb1d72c4e778d1a0d2dd5558d812a1a77a23ee5983fb9ab6011f944714d69ba4c666a93f54a2ab3af18e017c12aca020c1620c0b42183bf87e89a84e8b45e36585b19b7c701bd286e909427934ce9632442221224c853eefbfd5db870c02203bd5", @typed={0x4, 0x26}, @typed={0x34, 0x25, @binary="9d7d01222531b856856de1c96df97d039074dbe726ebb9b18098975f6f09100f7168d1b45399a8079181e85b07fc697c"}, @generic="2f925f029304c17bc9e1d453be43eedc5dbce8302996eb2083360c6b01515522101a5ba352735d1203e0debffe0b1cacd8cf0dd32c2861504b00cc0debfce8baafd3fcd0ae1980ce1808c42b5318798796f01b6a663a2f9a58962d3334d03b0b179f003801a1ac5776ba99e8d1bebb68e2d2e1625db53d3880f0b76cea8392c0ef57597a18cba9491dfd30d1831de65b27ef6d7ea4", @generic="5789c20c327ed8acd7a38d485be43bdb7fd3d9634e933b59ee637a2423c0abaf", @typed={0x8, 0x6c, @ipv4=@dev={0xac, 0x14, 0x14, 0xc}}]}, @typed={0x8, 0x7d, @uid=r5}]}, 0x17d8}, 0x1, 0x0, 0x0, 0x800}, 0x4000001) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 446.103300][ T3890] kobject: 'loop2' (00000000074d9709): kobject_uevent_env [ 446.121110][T26155] kobject: 'kvm' (000000005de6d787): kobject_uevent_env [ 446.139551][ T3890] kobject: 'loop2' (00000000074d9709): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 446.158167][T26155] kobject: 'kvm' (000000005de6d787): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 446.178857][ T3890] kobject: 'loop3' (00000000d8843e7b): kobject_uevent_env [ 446.186016][ T3890] kobject: 'loop3' (00000000d8843e7b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 446.200140][ T3890] kobject: 'loop1' (00000000aa16861c): kobject_uevent_env 11:44:01 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ce]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) clone(0x0, &(0x7f0000000400), 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 11:44:01 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008d12, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) setsockopt$TIPC_MCAST_BROADCAST(r1, 0x10f, 0x85) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(r1, 0x9208, 0xffffffff) ioctl$RTC_VL_CLR(r2, 0x7014) 11:44:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18}, 0x48}], 0x1, 0x0) 11:44:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 11:44:01 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b, 0x0, 0x22c}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r1, &(0x7f00000017c0), 0x199, 0x0) ioctl$VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f00000000c0)={0x5, 0x1, 0x3}) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000080)) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000140)={'gretap0\x00', @ifru_settings={0x1, 0x1, @fr=&(0x7f0000000100)={0x3ff, 0x4, 0x2, 0x400, 0x1c766109, 0x81, 0x3}}}) 11:44:01 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x2000, 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 446.211861][ T3890] kobject: 'loop1' (00000000aa16861c): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 446.260481][ T3890] kobject: 'loop3' (00000000d8843e7b): kobject_uevent_env [ 446.267657][ T3890] kobject: 'loop3' (00000000d8843e7b): fill_kobj_path: path = '/devices/virtual/block/loop3' 11:44:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 11:44:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18}, 0x4c}], 0x1, 0x0) 11:44:01 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @empty, 0x8000000000}, 0x1c) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 446.312302][ T3890] kobject: 'loop4' (00000000f4cc89e1): kobject_uevent_env [ 446.322177][T26192] kobject: 'kvm' (000000005de6d787): kobject_uevent_env [ 446.346497][ T3890] kobject: 'loop4' (00000000f4cc89e1): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 446.358788][T26192] kobject: 'kvm' (000000005de6d787): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 446.387807][ T3890] kobject: 'loop2' (00000000074d9709): kobject_uevent_env 11:44:01 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x9, 0x101000) openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x40000, 0x0) 11:44:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18}, 0x60}], 0x1, 0x0) 11:44:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 446.413165][ T3890] kobject: 'loop2' (00000000074d9709): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 446.452121][ T3890] kobject: 'loop1' (00000000aa16861c): kobject_uevent_env [ 446.475494][ T3890] kobject: 'loop1' (00000000aa16861c): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 446.513461][ T3890] kobject: 'loop5' (00000000d7a5a3ce): kobject_uevent_env [ 446.535610][ T3890] kobject: 'loop5' (00000000d7a5a3ce): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 446.548991][ T3890] kobject: 'loop3' (00000000d8843e7b): kobject_uevent_env [ 446.557238][ T3890] kobject: 'loop3' (00000000d8843e7b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 446.569746][ T3890] kobject: 'loop2' (00000000074d9709): kobject_uevent_env [ 446.577257][ T3890] kobject: 'loop2' (00000000074d9709): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 446.577911][T26189] kobject: 'kvm' (000000005de6d787): kobject_uevent_env [ 446.589708][ T3890] kobject: 'loop3' (00000000d8843e7b): kobject_uevent_env [ 446.602544][ T3890] kobject: 'loop3' (00000000d8843e7b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 446.615109][ T3890] kobject: 'loop2' (00000000074d9709): kobject_uevent_env [ 446.623810][ T3890] kobject: 'loop2' (00000000074d9709): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 446.645905][ T3890] kobject: 'loop4' (00000000f4cc89e1): kobject_uevent_env [ 446.654601][ T3890] kobject: 'loop4' (00000000f4cc89e1): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 446.660706][T26189] kobject: 'kvm' (000000005de6d787): fill_kobj_path: path = '/devices/virtual/misc/kvm' 11:44:01 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ce]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) clone(0x0, &(0x7f0000000400), 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 11:44:01 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) r1 = socket$inet6(0xa, 0x5, 0x5) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000140)) ioctl(r1, 0x1000008911, &(0x7f0000000100)="11dca5055e0b3a6cafdb281e676cca1d4323d6878ecfe47bf070") write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000040)={0x18, 0x1, 0x0, {0x80000001}}, 0x18) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r2, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x90, r3, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0x34, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3ff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfffffffeffffffff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xb43}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}]}, @TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0x38, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1000}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xa4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x90}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 11:44:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 11:44:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18}, 0x63}], 0x1, 0x0) 11:44:01 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000080)={{{@in=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000000180)=0xe8) r3 = getegid() socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_ATTR(r1, &(0x7f00000001c0)={0x78, 0xddef649a0599a3e5, 0x1, {0x4, 0x1ff, 0x0, {0x3, 0x8001, 0x2, 0x3, 0x2, 0x458, 0x8, 0x1ff, 0x40d7c2e5, 0x100000001, 0x101, r2, r3, 0x543, 0x7ff}}}, 0x78) 11:44:01 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) getpgid(r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) symlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000080), &(0x7f00000000c0)=0x4) fcntl$setlease(r0, 0x400, 0x1) [ 446.838004][ T3890] kobject: 'loop5' (00000000d7a5a3ce): kobject_uevent_env 11:44:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18}, 0x68}], 0x1, 0x0) [ 446.882177][ T3890] kobject: 'loop5' (00000000d7a5a3ce): fill_kobj_path: path = '/devices/virtual/block/loop5' 11:44:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 446.944829][T26242] kobject: 'kvm' (000000005de6d787): kobject_uevent_env 11:44:02 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x139570c1) ioctl(r0, 0x1000008912, &(0x7f0000000080)="a685d5ab066ce9ef69907bf070") r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x100000000, 0x400000) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80001000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x70, r2, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x4}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x88fb}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1f}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_DEST={0x18, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@dev={0xfe, 0x80, [], 0x28}}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x4}, 0x800) fadvise64(r0, 0x0, 0x2, 0x5) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x400000, 0x0) [ 446.989328][T26242] kobject: 'kvm' (000000005de6d787): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 447.001852][ T3890] kobject: 'loop4' (00000000f4cc89e1): kobject_uevent_env [ 447.019096][ T3890] kobject: 'loop4' (00000000f4cc89e1): fill_kobj_path: path = '/devices/virtual/block/loop4' 11:44:02 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x80000001, 0x200) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x78) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:44:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18}, 0x6c}], 0x1, 0x0) 11:44:02 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x7, &(0x7f0000000100)="11dca5045e0bcfe47bf070ed4fd9628d59b1407af42aa81d38ce5a1adb4f771eeecfcca04c67774167e702df4cc9f3e61fdc013a8363cdf8280bfebf837bf8ebf0dfc970a174eee55b9d82ceb7f1e0a6d40ab61d8841aa6fac59206fe8e913a0c0632e2ae52eb37139803a37b858c81a10115e816771b3716578c971d9b9") r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$nfc_llcp(r1, 0x118, 0x0, &(0x7f0000000180)=""/4096, 0x1000) [ 447.078227][ T3890] kobject: 'loop2' (00000000074d9709): kobject_uevent_env [ 447.103616][ T3890] kobject: 'loop2' (00000000074d9709): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 447.154844][ T3890] kobject: 'loop4' (00000000f4cc89e1): kobject_uevent_env [ 447.191143][ T3890] kobject: 'loop4' (00000000f4cc89e1): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 447.245046][ T3890] kobject: 'loop3' (00000000d8843e7b): kobject_uevent_env [ 447.267938][ T3890] kobject: 'loop3' (00000000d8843e7b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 447.272746][T26268] kobject: 'kvm' (000000005de6d787): kobject_uevent_env [ 447.280582][ T3890] kobject: 'loop1' (00000000aa16861c): kobject_uevent_env 11:44:02 executing program 5: creat(&(0x7f0000000380)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2, 0x12, r0, 0x0) truncate(&(0x7f0000000080)='./bus\x00', 0x8b3e) readv(r0, &(0x7f00000007c0)=[{&(0x7f0000002300)=""/4096, 0x1000}], 0x3b6) 11:44:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 11:44:02 executing program 1: r0 = fsopen(&(0x7f00000001c0)='nfsd\x00', 0x1) r1 = timerfd_create(0x6, 0x80800) tee(r0, r1, 0x6198, 0x9) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000180)=0x7, 0x4) sendmsg$TIPC_NL_MON_GET(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)=ANY=[@ANYBLOB="dc010000", @ANYRES16=r3, @ANYBLOB="00002dbd7000fbdbdf2512000000c80004000c00010073797a31000000000c00010073797a30000000000c00070008000300050000001400010062726f6164636173742d6c696e6b00000c00010073797a30000000000c00010073797a31000000003400070008000200020000000800020005000000080002000000000008000400d4bf2523080004000000000008000100190000000c00010073797a310000000034000700080001000300000008000100150000000800020020000000080001001e000000080001001a00000008000400f7d90000300007000c0004001f0000000000000008000200080000000c00030040000000000000000c00030007000000000000003400020008000100060000000800010001010000040004000800020020000000080001000500000004000400040004000400040014000200080001000500000008000100ffffff7f880004000c00010073797a30000000000c000100730504000000000000000700080004000500000008000300040000000800030002000000080003000008000008000400090000000800020000140600080003000500000008000400470100001400010062726f6164636173742d6c696e6b00001400070008000200810000000800040010100000"], 0x1dc}, 0x1, 0x0, 0x0, 0x800}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xfffffff8) migrate_pages(r4, 0x7fff, &(0x7f0000000540)=0xc4, &(0x7f0000000580)=0x5) getsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000200), &(0x7f0000000240)=0x4) r5 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r5, &(0x7f00000017c0), 0x0, 0x0) 11:44:02 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$CAPI_INSTALLED(r1, 0x80024322) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f0000000080)=0x8000000) socket$inet6(0xa, 0xfa422b105a302dbc, 0xf55) 11:44:02 executing program 2: r0 = socket$inet6(0xa, 0x2cbba0f528a9d6c6, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_S_FBUF(r1, 0x4030560b, &(0x7f0000000180)={0x8, 0x2b, &(0x7f00000000c0)="184f48c1c59f74a002edd3bdae4767c7f8f91e184ac79f2e9c2f1dd8cfaa264aefcf2d6b0a70f57b8350cdb4c6935d1691acdc1e430c53a1f328c5d3156820b8700bb4398f14471daab923cf16fd566c56d69e9cce50d3c9617faa4942b22e5626164543b6b72210275f86c340ebc089e1e4ab20e27dc10c8e1323655189e1c7483d5f11c4f5be98e538ccef74", {0x5, 0xa1, 0x77524747, 0x2, 0xf5, 0x40, 0x367efd028e3b4230, 0xffffffff}}) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:44:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18}, 0x74}], 0x1, 0x0) [ 447.300293][ T3890] kobject: 'loop1' (00000000aa16861c): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 447.301136][T26268] kobject: 'kvm' (000000005de6d787): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 447.319168][ T3890] kobject: 'loop2' (00000000074d9709): kobject_uevent_env [ 447.327399][ T3890] kobject: 'loop2' (00000000074d9709): fill_kobj_path: path = '/devices/virtual/block/loop2' 11:44:02 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x9de, &(0x7f0000000040)="11dca5055e0bcfe47bf070") sendto$inet6(r0, &(0x7f0000000080)="63c04c40e2e66a3568779ad30373a5d0b83cf13eb2344a369b7f57e8ca49ddb66ed8094cf00fafa2301b1eadc3313648f094ff64ae99cb3b65b7a5f7bc5f26d1a83f48408d53e901aa1860e703691b7779b9a3e9e24bee68a298ee5090078c99a788d65868f6aa398baf9e590e1e337be9ead4d7ed49ae8743f0724db8c2ee46eac9adb30c1ebf25eded042c076e245acc47178bc51c32fb21b9e04db4b8ffedcad6632cc89f79c3143b962048b0d31f78b92cf28ab0564082f8fce54d7c055c4f09734530770e96fe2c", 0xca, 0x11, &(0x7f0000000180)={0xa, 0x4e23, 0x87, @mcast2, 0x4}, 0x1c) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:44:02 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x400, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x4, 0x0) 11:44:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18}, 0x7a}], 0x1, 0x0) 11:44:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 11:44:02 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)=0x0) r2 = syz_open_procfs(r1, &(0x7f00000000c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r2, &(0x7f00000017c0), 0x199, 0x0) [ 447.397680][ T3890] kobject: 'loop4' (00000000f4cc89e1): kobject_uevent_env [ 447.425770][ T3890] kobject: 'loop4' (00000000f4cc89e1): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 447.481369][ T26] audit: type=1804 audit(1567424642.598:34): pid=26293 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir825543858/syzkaller.MMYGHD/673/bus" dev="sda1" ino=17282 res=1 11:44:02 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x8c, &(0x7f0000000140)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 447.526124][ T3890] kobject: 'loop5' (00000000d7a5a3ce): kobject_uevent_env [ 447.555047][ T3890] kobject: 'loop5' (00000000d7a5a3ce): fill_kobj_path: path = '/devices/virtual/block/loop5' 11:44:02 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2ebc12c0564fa368) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x400040, 0x0) move_mount(r1, &(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x24) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) syncfs(r1) 11:44:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 11:44:02 executing program 5: creat(&(0x7f0000000380)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2, 0x12, r0, 0x0) truncate(&(0x7f0000000080)='./bus\x00', 0x8b3e) readv(r0, &(0x7f00000007c0)=[{&(0x7f0000002300)=""/4096, 0x1000}], 0x3b6) [ 447.582999][ T26] audit: type=1804 audit(1567424642.638:35): pid=26293 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir825543858/syzkaller.MMYGHD/673/bus" dev="sda1" ino=17282 res=1 [ 447.586964][ T3890] kobject: 'loop2' (00000000074d9709): kobject_uevent_env 11:44:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18}, 0x1f4}], 0x1, 0x0) 11:44:02 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SIOCRSGCAUSE(r0, 0x89e0, &(0x7f0000000080)) [ 447.648111][ T3890] kobject: 'loop2' (00000000074d9709): fill_kobj_path: path = '/devices/virtual/block/loop2' 11:44:02 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001340)={0x0, 0x0}, &(0x7f0000001380)=0xc) fstat(r0, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$vfat(&(0x7f0000000180)='vfat\x00', &(0x7f00000001c0)='./file0\x00', 0x260a, 0x2, &(0x7f0000001300)=[{&(0x7f0000000200)="de7b91bb31f66392c69ed5cb1fe9a51dc4603c4cd9dfbd83059e195ef41051d688e3915612adfa349e39d47ec2d87cb94752e0f8f001559764e3fcbe7c18ce5760197427a33b6f44c30a8e8611f0b6784c2719571ea55ae1b5b004baa760934bcbecacaebec78d41c55c32b9057cbf7fd789188d4dc8502a2e19d6dc1d88428addce8202da1fa9026927f82c3fa76655407fab3d3f250107aba8a74a8035035239b12c799702277f", 0xa8, 0x101}, {&(0x7f0000000300)="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", 0x1000, 0x6}], 0x8000, &(0x7f0000001440)={[], [{@obj_type={'obj_type', 0x3d, 'net/unix\x00'}}, {@hash='hash'}, {@fowner_lt={'fowner<', r2}}, {@measure='measure'}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x65, 0x31, 0x36, 0x31, 0x37, 0x63, 0x64], 0x2d, [0x7f, 0x63, 0x37, 0x64], 0x2d, [0x63, 0x63, 0x30, 0x65], 0x2d, [0x61, 0x34, 0x38, 0x30], 0x2d, [0x38, 0x64, 0x0, 0x31, 0x0, 0x30, 0x34, 0x66]}}}, {@uid_gt={'uid>', r3}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}]}) preadv(r1, &(0x7f00000017c0), 0x199, 0x0) sendto$inet6(r1, &(0x7f0000000080)="dc986cff174424320fad10943a94fdf8f516b3fff634ff79c6b3635a510c1b07dac32962dbe5f265cdd7c8f465f6d17893fa479d17abfeb83f00d27276fd0c446017d68e2a8da7b225834a0d994d53291f85255c8e06767308f8beccaee52360186077c551df049bc85f1da38751f9be8b2d89df6d5e7895850cefc3df37e22a9032eb1e02aab1b44e0ed61e8db2179f2547029f8c96421d7f47f458b18885f5da26b71e5bcb83e3a66b1af39d8e0c76ba5a3b86f52d4ce930c5480dcd13cb5e704f3c3ce8f100fee81a77c1987d1ab739e48ce53d5597835a01a69764b4c0d43595ea554d89", 0xe6, 0x4004, 0x0, 0x0) 11:44:02 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r2 = socket$key(0xf, 0x3, 0x2) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={0x2, 0x3, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmsg$key(r3, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)=ANY=[@ANYBLOB="020d0000140000000000000000000000080012000000030000000000000000000600000000000000000000000000000000000000000000000000000000000000ff02000000000000000000000000000105000500000000000a0000000000000000000000000000000000ffffac141400000000000000000005000600000000000a0000000000000000000000ff00"/160], 0xa0}}, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f00000001c0), 0xfa) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000240)={0x1, 0x8, 0x1, 0x3, 0x7f, 0x0, 0xfffffffffffffffb, 0x2, 0x0}, &(0x7f00000003c0)=0x20) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @broadcast}}}, 0x84) sendmsg$key(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[@ANYBLOB="02120000020000000000000000000000a950cfa9fb616d86a5d49f8b0c1a07043587e5dbcbfd0d9805396bf330298b654b960dac66885babe4dfa0744506e537be32dc9f9ca2f68cee78365a839f626d7188f4c51df11eb79905064a402738dcc63d2761ab0a101eb7ff9fbe800be09575f9e9cceeb0ae6239a67c04462df9445465095e638161f1fa68c8"], 0x10}}, 0x0) sendmsg$key(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000480)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}}, 0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f0000000080)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) [ 447.694945][ T26] audit: type=1804 audit(1567424642.668:36): pid=26293 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir825543858/syzkaller.MMYGHD/673/bus" dev="sda1" ino=17282 res=1 [ 447.705287][ T3890] kobject: 'loop4' (00000000f4cc89e1): kobject_uevent_env 11:44:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 11:44:02 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000080)=0x4, 0x4) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 447.767704][ T3890] kobject: 'loop4' (00000000f4cc89e1): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 447.793179][ T26] audit: type=1804 audit(1567424642.858:37): pid=26321 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir825543858/syzkaller.MMYGHD/674/bus" dev="sda1" ino=17425 res=1 11:44:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18}, 0x300}], 0x1, 0x0) [ 447.825418][ T3890] kobject: 'loop3' (00000000d8843e7b): kobject_uevent_env 11:44:03 executing program 5: creat(&(0x7f0000000380)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2, 0x12, r0, 0x0) truncate(&(0x7f0000000080)='./bus\x00', 0x8b3e) readv(r0, &(0x7f00000007c0)=[{&(0x7f0000002300)=""/4096, 0x1000}], 0x3b6) 11:44:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 447.869530][ T3890] kobject: 'loop3' (00000000d8843e7b): fill_kobj_path: path = '/devices/virtual/block/loop3' 11:44:03 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x2) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f0000000000)) [ 447.924259][ T3890] kobject: 'loop2' (00000000074d9709): kobject_uevent_env [ 447.941783][ T3890] kobject: 'loop2' (00000000074d9709): fill_kobj_path: path = '/devices/virtual/block/loop2' 11:44:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18}, 0x3e8}], 0x1, 0x0) 11:44:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 447.978832][ T3890] kobject: 'loop3' (00000000d8843e7b): kobject_uevent_env [ 447.995649][ T3890] kobject: 'loop3' (00000000d8843e7b): fill_kobj_path: path = '/devices/virtual/block/loop3' 11:44:03 executing program 3: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x400) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40000, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 448.029779][ T26] audit: type=1804 audit(1567424643.148:38): pid=26344 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir825543858/syzkaller.MMYGHD/675/bus" dev="sda1" ino=17377 res=1 11:44:03 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008911, &(0x7f0000000080)="11dca5055e0bcfe47bf070a4dd14d430c1e04f2ee33669e182c1b11ae5b91fbe6c1c92e68b2cc80a06b8cf014814ac") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x115800, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) dup2(r0, r1) [ 448.073594][ T3890] kobject: 'loop5' (00000000d7a5a3ce): kobject_uevent_env [ 448.100998][ T3890] kobject: 'loop5' (00000000d7a5a3ce): fill_kobj_path: path = '/devices/virtual/block/loop5' 11:44:03 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000080)=0x400, 0x4) preadv(r1, &(0x7f00000017c0), 0x199, 0x0) 11:44:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18}, 0x500}], 0x1, 0x0) 11:44:03 executing program 5: creat(&(0x7f0000000380)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2, 0x12, r0, 0x0) truncate(&(0x7f0000000080)='./bus\x00', 0x8b3e) readv(r0, &(0x7f00000007c0)=[{&(0x7f0000002300)=""/4096, 0x1000}], 0x3b6) 11:44:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 448.141208][ T3890] kobject: 'loop4' (00000000f4cc89e1): kobject_uevent_env [ 448.169796][ T3890] kobject: 'loop4' (00000000f4cc89e1): fill_kobj_path: path = '/devices/virtual/block/loop4' 11:44:03 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) fcntl$getown(r1, 0x9) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_inet_SIOCSIFNETMASK(r2, 0x891c, &(0x7f0000000080)={'bcsf0\x00', {0x2, 0x4e20, @loopback}}) [ 448.188321][ T3890] kobject: 'loop2' (00000000074d9709): kobject_uevent_env [ 448.196721][ T3890] kobject: 'loop2' (00000000074d9709): fill_kobj_path: path = '/devices/virtual/block/loop2' 11:44:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18}, 0x600}], 0x1, 0x0) [ 448.231802][ T3890] kobject: 'loop1' (00000000aa16861c): kobject_uevent_env 11:44:03 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x2) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x210182) [ 448.278122][ T26] audit: type=1804 audit(1567424643.388:39): pid=26368 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir825543858/syzkaller.MMYGHD/676/bus" dev="sda1" ino=17586 res=1 [ 448.278654][ T3890] kobject: 'loop1' (00000000aa16861c): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 448.317037][ T3890] kobject: 'loop3' (00000000d8843e7b): kobject_uevent_env 11:44:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 448.324553][ T3890] kobject: 'loop3' (00000000d8843e7b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 448.347688][ T3890] kobject: 'loop2' (00000000074d9709): kobject_uevent_env 11:44:03 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0xfffffffffffffff5, &(0x7f0000000340)="b62c7bc5a59c12e053de512a07a81365eac49e46e735616e9a05bf51072b577a397d71761a06f574bb540fc299f8f76e00000000000000495297e2f28d6adb980b1289533c3ace766a37458a1fed7685d6a6a466e28125887181e25be82b4983c4b7505e45d730b99d60a1d3a3808f8989d96dc7640700982e5aab9abf11887d3b55ccebef6049ca34a30f9d1f46fa6e3c9611eaed2e5de8") r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x40b48635a051f4de, 0x0) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000080)={0x7, 0x5}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)=ANY=[@ANYBLOB="8100000000000000008258f4"]) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000100)=0x1000) 11:44:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18}, 0x700}], 0x1, 0x0) [ 448.373364][ T3890] kobject: 'loop2' (00000000074d9709): fill_kobj_path: path = '/devices/virtual/block/loop2' 11:44:03 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) mount(&(0x7f00000000c0)=@sg0='/dev/sg0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='devtmpfs\x00', 0x100000, &(0x7f0000000180)='SEG6\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00') 11:44:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 11:44:03 executing program 5: creat(&(0x7f0000000380)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2, 0x12, r0, 0x0) readv(r0, &(0x7f00000007c0)=[{&(0x7f0000002300)=""/4096, 0x1000}], 0x3b6) [ 448.401942][ T3890] kobject: 'loop4' (00000000f4cc89e1): kobject_uevent_env [ 448.430488][ T3890] kobject: 'loop4' (00000000f4cc89e1): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 448.473515][ T3890] kobject: 'loop1' (00000000aa16861c): kobject_uevent_env 11:44:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18}, 0x900}], 0x1, 0x0) 11:44:03 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x800, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000180)={{0x1, 0x0, 0x1ff0000000, 0x2}}) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000001700)=ANY=[@ANYRESOCT=r0], 0x1) r1 = socket$inet6(0xa, 0x6, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x6, 0x161082) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000100), &(0x7f0000000140)=0xb) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:44:03 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x5c) splice(r0, &(0x7f0000000080), r0, &(0x7f00000000c0), 0x3, 0x2) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") ioctl$int_in(r0, 0x5452, &(0x7f0000000100)) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xff, 0x400) 11:44:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 448.517869][ T26] audit: type=1804 audit(1567424643.628:40): pid=26399 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir825543858/syzkaller.MMYGHD/677/bus" dev="sda1" ino=17586 res=1 [ 448.521418][ T3890] kobject: 'loop1' (00000000aa16861c): fill_kobj_path: path = '/devices/virtual/block/loop1' 11:44:03 executing program 5: creat(&(0x7f0000000380)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2, 0x12, r0, 0x0) readv(r0, &(0x7f00000007c0)=[{&(0x7f0000002300)=""/4096, 0x1000}], 0x3b6) [ 448.620025][ T3890] kobject: 'loop5' (00000000d7a5a3ce): kobject_uevent_env 11:44:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18}, 0xa00}], 0x1, 0x0) [ 448.664184][ T3890] kobject: 'loop5' (00000000d7a5a3ce): fill_kobj_path: path = '/devices/virtual/block/loop5' 11:44:03 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x9, 0x800) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000100)=0x8e9) r1 = socket$inet6(0xa, 0x2, 0x9eb2) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") getpeername$packet(r0, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000380)=0x14) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000003c0)={r2, 0x1, 0x6}, 0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e24, @rand_addr=0x4}}, 0xdc4, 0x5}, &(0x7f0000000200)=0x90) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000240)={r3, 0x9c, "3b2a53d290850448a82de4966a027e445438ee7fa72afb7800a33de3a8f040b08e31ba16e2c41012fe339e3d499dc22e1a0398d127976dbbb577a98cfcd7375c50846c203b5e13f79f5971cf22a92fc8a111928e04427027d18bbc7362aefc61f787089b5a5a26e29a23c796a3c94f0b527d2ad3513d7f87154d9a0415c0b474cc59e29ffccbfd1b11f82abc366eb2da6d70536019bb31e51b9bd2a1"}, &(0x7f0000000300)=0xa4) r4 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x3f, 0x0) ioctl$KDSKBMODE(r4, 0x4b45, &(0x7f0000000400)=0x8aa) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x0, 0x800) 11:44:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 448.726134][ T26] audit: type=1804 audit(1567424643.838:41): pid=26414 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir825543858/syzkaller.MMYGHD/678/bus" dev="sda1" ino=16796 res=1 [ 448.764054][ T3890] kobject: 'loop4' (00000000f4cc89e1): kobject_uevent_env 11:44:03 executing program 5: creat(&(0x7f0000000380)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2, 0x12, r0, 0x0) readv(r0, &(0x7f00000007c0)=[{&(0x7f0000002300)=""/4096, 0x1000}], 0x3b6) 11:44:03 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)) r1 = gettid() r2 = syz_open_procfs(r1, &(0x7f0000000100)='\x00\x00\x00\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r2, &(0x7f00000017c0), 0x199, 0x0) [ 448.787420][ T3890] kobject: 'loop4' (00000000f4cc89e1): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 448.812299][ T3890] kobject: 'loop3' (00000000d8843e7b): kobject_uevent_env 11:44:03 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x34, 0x90a7b069f64ec29b) fsconfig$FSCONFIG_SET_BINARY(r1, 0x2, &(0x7f00000000c0)='/dev/usbmon#\x00', &(0x7f0000000100)="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", 0x1000) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:44:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18}, 0xbb8}], 0x1, 0x0) [ 448.829890][ T3890] kobject: 'loop3' (00000000d8843e7b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 448.841836][ T3890] kobject: 'loop1' (00000000aa16861c): kobject_uevent_env [ 448.849307][ T3890] kobject: 'loop1' (00000000aa16861c): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 448.870132][ T3890] kobject: 'loop4' (00000000f4cc89e1): kobject_uevent_env 11:44:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 448.906068][ T3890] kobject: 'loop4' (00000000f4cc89e1): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 448.930170][ T3890] kobject: 'loop1' (00000000aa16861c): kobject_uevent_env [ 448.937522][ T3890] kobject: 'loop1' (00000000aa16861c): fill_kobj_path: path = '/devices/virtual/block/loop1' 11:44:04 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f0000000400)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)=""/145}, {&(0x7f00000001c0)=""/137}, {&(0x7f0000000480)=""/211}, {&(0x7f0000000280)=""/37, 0xffffffffffffff1e}], 0x100000000000010f, 0xfffffffffffffffd) sendfile(r1, r0, &(0x7f0000000080), 0x7) 11:44:04 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x4000000, 0x401) [ 448.947917][ T26] audit: type=1804 audit(1567424644.048:42): pid=26432 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir825543858/syzkaller.MMYGHD/679/bus" dev="sda1" ino=17739 res=1 [ 448.991159][ T3890] kobject: 'loop5' (00000000d7a5a3ce): kobject_uevent_env 11:44:04 executing program 2: r0 = socket$inet6(0xa, 0x2, 0xab) syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x8, 0x2400) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:44:04 executing program 5: creat(&(0x7f0000000380)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) truncate(&(0x7f0000000080)='./bus\x00', 0x8b3e) readv(r0, &(0x7f00000007c0)=[{&(0x7f0000002300)=""/4096, 0x1000}], 0x3b6) [ 449.003077][ T3890] kobject: 'loop5' (00000000d7a5a3ce): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 449.023529][ T3890] kobject: 'loop3' (00000000d8843e7b): kobject_uevent_env 11:44:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18}, 0xe00}], 0x1, 0x0) 11:44:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 449.051363][ T3890] kobject: 'loop3' (00000000d8843e7b): fill_kobj_path: path = '/devices/virtual/block/loop3' 11:44:04 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$VFIO_IOMMU_GET_INFO(r1, 0x3b70, &(0x7f0000000080)={0x10}) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) 11:44:04 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r0, 0x408c563e, &(0x7f0000000080)={0x8, 0x5, 0xd, "804091557f7781e23447e6b95992640dce809d00df21a579f477dc1edc53427be56f911062116c82de447e01147d5bb4f96295aefca3f0b41a2957da", 0x34, "c6bebb45a03d75c26d4d97f6dcbf09319691cbefcc9c2829e4b5b16240e2581dc0c69f401a4bc67c0bdff65238971e0e5a10b43d50797af4adabdf85", 0x20}) preadv(r0, &(0x7f0000000780)=[{&(0x7f0000000140)=""/95, 0x5f}, {&(0x7f0000000880)=""/142, 0x8e}, {&(0x7f0000000300)=""/180, 0xb4}, {&(0x7f00000003c0)=""/217, 0xd9}, {&(0x7f0000000840)=""/5, 0x5}, {&(0x7f00000004c0)=""/38, 0x26}, {&(0x7f0000000500)=""/198, 0xc6}, {&(0x7f0000000600)=""/77, 0x4d}, {&(0x7f0000000680)=""/253, 0xfd}], 0x9, 0x0) 11:44:04 executing program 5: creat(&(0x7f0000000380)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) truncate(&(0x7f0000000080)='./bus\x00', 0x8b3e) readv(r0, &(0x7f00000007c0)=[{&(0x7f0000002300)=""/4096, 0x1000}], 0x3b6) [ 449.086403][ T26] audit: type=1804 audit(1567424644.198:43): pid=26453 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir825543858/syzkaller.MMYGHD/680/bus" dev="sda1" ino=17315 res=1 [ 449.115615][ T3890] kobject: 'loop4' (00000000f4cc89e1): kobject_uevent_env [ 449.137365][ T3890] kobject: 'loop4' (00000000f4cc89e1): fill_kobj_path: path = '/devices/virtual/block/loop4' 11:44:04 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYSTD(r1, 0x8008563f, &(0x7f0000000040)) 11:44:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18}, 0x1100}], 0x1, 0x0) 11:44:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 449.178678][ T3890] kobject: 'loop3' (00000000d8843e7b): kobject_uevent_env [ 449.223968][ T3890] kobject: 'loop3' (00000000d8843e7b): fill_kobj_path: path = '/devices/virtual/block/loop3' 11:44:04 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x0, 0x0) getsockname$netrom(r0, &(0x7f0000000280)={{0x3, @default}, [@rose, @null, @rose, @default, @bcast, @default, @bcast, @default]}, &(0x7f0000000300)=0x48) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0xc0040, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000140)={0x0, 0x3, 0x5, 0x7, 0x4, 0x8}, &(0x7f0000000180)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000001c0)={r2, 0x6, 0x10}, &(0x7f0000000200)=0xc) r3 = socket$inet6(0xa, 0xa, 0x0) r4 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x40) ioctl$EVIOCSABS2F(r4, 0x401845ef, &(0x7f00000000c0)={0x7, 0xffffffffffffff7e, 0x1, 0x9, 0x3, 0x1}) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 449.268070][ T3890] kobject: 'loop4' (00000000f4cc89e1): kobject_uevent_env [ 449.287804][ T3890] kobject: 'loop4' (00000000f4cc89e1): fill_kobj_path: path = '/devices/virtual/block/loop4' 11:44:04 executing program 2: r0 = socket$inet6(0xa, 0x2, 0xd) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x7) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000080)) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:44:04 executing program 5: creat(&(0x7f0000000380)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) truncate(&(0x7f0000000080)='./bus\x00', 0x8b3e) readv(r0, &(0x7f00000007c0)=[{&(0x7f0000002300)=""/4096, 0x1000}], 0x3b6) 11:44:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 11:44:04 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x5c, r1, 0x400, 0x70bd2b, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x48, 0x4, [@TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xbd9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x88}]}]}]}, 0x5c}}, 0x8000) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r0, 0xc0905664, &(0x7f0000000080)={0x0, 0x0, [], @raw_data=[0xfffffffffffffffa, 0x6, 0x8, 0x1fb780, 0x8aa, 0x20, 0x1, 0x7, 0x7fffffff, 0x0, 0x0, 0x100, 0x2, 0x8, 0x100, 0xff, 0x3ff, 0x401, 0x3ff, 0x100, 0x0, 0xd8e, 0xa9, 0x8, 0x5, 0x3, 0x7e4b, 0x5, 0x100, 0xc3, 0x10000, 0x6]}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 11:44:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18}, 0x1800}], 0x1, 0x0) [ 449.317880][ T3890] kobject: 'loop1' (00000000aa16861c): kobject_uevent_env [ 449.340202][ T3890] kobject: 'loop1' (00000000aa16861c): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 449.373431][ T3890] kobject: 'loop5' (00000000d7a5a3ce): kobject_uevent_env [ 449.391209][ T3890] kobject: 'loop5' (00000000d7a5a3ce): fill_kobj_path: path = '/devices/virtual/block/loop5' 11:44:04 executing program 5: creat(&(0x7f0000000380)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2, 0x12, r0, 0x0) truncate(&(0x7f0000000080)='./bus\x00', 0x8b3e) readv(r0, &(0x7f00000007c0)=[{&(0x7f0000002300)=""/4096, 0x1000}], 0x3b6) 11:44:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 449.453201][ T3890] kobject: 'loop4' (00000000f4cc89e1): kobject_uevent_env 11:44:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18}, 0x2000}], 0x1, 0x0) [ 449.493534][ T3890] kobject: 'loop4' (00000000f4cc89e1): fill_kobj_path: path = '/devices/virtual/block/loop4' 11:44:04 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000600)='/dev/full\x00', 0x2a806, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f0000000540)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0xe8, r2, 0x100, 0x70bd2a, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x50, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xb4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffff800}]}, @TIPC_NLA_MEDIA={0x6c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x969}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffff8001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_LINK={0x4}, @TIPC_NLA_NODE={0x4}]}, 0xe8}, 0x1, 0x0, 0x0, 0x4}, 0x4040041) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x51b, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x3}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x3, 0x3, 0x4}, &(0x7f0000000140)=0x101, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x100000001}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0)=r3, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r4 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$void(r4, 0x5451) write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000300)={0x1, 0x2}, 0x2) 11:44:04 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r2, 0x1, 0x70bd29, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x0, 0x6, 0x2, 0x400}}}, ["", "", "", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40010}, 0x408c1) [ 449.550521][ T3890] kobject: 'loop3' (00000000d8843e7b): kobject_uevent_env [ 449.601562][ T3890] kobject: 'loop3' (00000000d8843e7b): fill_kobj_path: path = '/devices/virtual/block/loop3' 11:44:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18}, 0x2400}], 0x1, 0x0) [ 449.646947][ T3890] kobject: 'loop5' (00000000d7a5a3ce): kobject_uevent_env [ 449.674693][ T3890] kobject: 'loop5' (00000000d7a5a3ce): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 449.686702][ T3890] kobject: 'loop4' (00000000f4cc89e1): kobject_uevent_env 11:44:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 11:44:04 executing program 5: creat(&(0x7f0000000380)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2, 0x12, r0, 0x0) truncate(&(0x7f0000000080)='./bus\x00', 0x8b3e) readv(r0, &(0x7f00000007c0)=[{&(0x7f0000002300)=""/4096, 0x1000}], 0x3b6) [ 449.700865][ T3890] kobject: 'loop4' (00000000f4cc89e1): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 449.721713][ T3890] kobject: 'loop2' (00000000074d9709): kobject_uevent_env [ 449.734592][ T3890] kobject: 'loop2' (00000000074d9709): fill_kobj_path: path = '/devices/virtual/block/loop2' 11:44:04 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x400) 11:44:04 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x110, r0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x6fe7fe953c87d1dc, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000000c0)='\xa3\x00') ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x24002) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') 11:44:04 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x10b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000009031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x100000003) madvise(&(0x7f0000a87000/0x2000)=nil, 0x2000, 0x9) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000080)={0x4, 0x3, 0xa439, 0x1, 0x2, 0x7, 0x2, 0x7fff, 0x80, 0x84}) preadv(r0, &(0x7f00000017c0), 0x199, 0x0) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f00000000c0)=0xbe3b32c88b52f142) ioctl$SCSI_IOCTL_SYNC(r0, 0x4) 11:44:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18}, 0x3f00}], 0x1, 0x0) [ 449.755168][ T3890] kobject: 'loop1' (00000000aa16861c): kobject_uevent_env [ 449.784261][ T3890] kobject: 'loop1' (00000000aa16861c): fill_kobj_path: path = '/devices/virtual/block/loop1' 11:44:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 449.837480][ T3890] kobject: 'loop5' (00000000d7a5a3ce): kobject_uevent_env 11:44:05 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x6, 0x1) [ 449.878840][ T3890] kobject: 'loop5' (00000000d7a5a3ce): fill_kobj_path: path = '/devices/virtual/block/loop5' 11:44:05 executing program 5: creat(&(0x7f0000000380)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2, 0x12, r0, 0x0) truncate(&(0x7f0000000080)='./bus\x00', 0x8b3e) readv(r0, &(0x7f00000007c0)=[{&(0x7f0000002300)=""/4096, 0x1000}], 0x3b6) 11:44:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18}, 0x4000}], 0x1, 0x0) [ 449.921786][ T3890] kobject: 'loop3' (00000000d8843e7b): kobject_uevent_env [ 449.946275][ T3890] kobject: 'loop3' (00000000d8843e7b): fill_kobj_path: path = '/devices/virtual/block/loop3' 11:44:05 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") readahead(r0, 0x20, 0x8000) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:44:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000058c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005740)=""/93, 0x5d}, {&(0x7f00000057c0)=""/181, 0xb5}], 0xf, 0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 449.991479][ T3890] kobject: 'loop2' (00000000074d9709): kobject_uevent_env [ 450.022043][ T3890] kobject: 'loop2' (00000000074d9709): fill_kobj_path: path = '/devices/virtual/block/loop2' 11:44:05 executing program 5: creat(&(0x7f0000000380)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2, 0x12, r0, 0x0) truncate(&(0x7f0000000080)='./bus\x00', 0x8b3e) readv(r0, &(0x7f00000007c0)=[{&(0x7f0000002300)=""/4096, 0x1000}], 0x3b6) 11:44:05 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x2}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000100)={r1, 0x2}, 0x8) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x2000, 0x0) accept$inet(r2, &(0x7f0000000180)={0x2, 0x0, @multicast1}, &(0x7f00000001c0)=0x10) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 450.063735][ T3890] kobject: 'loop3' (00000000d8843e7b): kobject_uevent_env [ 450.088046][ T3890] kobject: 'loop3' (00000000d8843e7b): fill_kobj_path: path = '/devices/virtual/block/loop3' 11:44:05 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5055e0bcfe47bf4e00eb5e6167a022f3733f070") syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 11:44:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0xfffffffffffffeff}]}}}], 0x18}, 0x4800}], 0x1, 0x0) [ 450.133088][ T3890] kobject: 'loop1' (00000000aa16861c): kobject_uevent_env [ 450.151581][ T3890] kobject: 'loop1' (00000000aa16861c): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 450.191135][ T3890] kobject: 'loop5' (00000000d7a5a3ce): kobject_uevent_env [ 450.213965][ T3890] kobject: 'loop5' (00000000d7a5a3ce): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 450.252229][ T3890] kobject: 'loop1' (00000000aa16861c): kobject_uevent_env [ 450.282364][ T3890] kobject: 'loop1' (00000000aa16861c): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 450.323030][ T3890] kobject: 'loop3' (00000000d8843e7b): kobject_uevent_env [ 450.330450][ T3890] kobject: 'loop3' (00000000d8843e7b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 450.342378][ T3890] kobject: 'loop5' (00000000d7a5a3ce): kobject_uevent_env [ 450.349913][ T3890] kobject: 'loop5' (00000000d7a5a3ce): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 450.361426][ T3890] kobject: 'loop2' (00000000074d9709): kobject_uevent_env [ 450.368573][ T3890] kobject: 'loop2' (00000000074d9709): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 450.380601][ T3890] kobject: 'loop3' (00000000d8843e7b): kobject_uevent_env [ 450.387748][ T3890] kobject: 'loop3' (00000000d8843e7b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 450.399329][ T3890] kobject: 'loop2' (00000000074d9709): kobject_uevent_env [ 450.406482][ T3890] kobject: 'loop2' (00000000074d9709): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 450.418001][ T3890] kobject: 'loop1' (00000000aa16861c): kobject_uevent_env [ 450.425223][ T3890] kobject: 'loop1' (000