L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) [ 376.071460] device nr0 entered promiscuous mode [ 376.108012] syz-executor2 invoked oom-killer: gfp_mask=0x7080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 376.134319] CPU: 1 PID: 14196 Comm: syz-executor2 Not tainted 5.0.0-rc4 #49 [ 376.141432] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 376.150780] Call Trace: [ 376.150802] dump_stack+0x1db/0x2d0 [ 376.150821] ? dump_stack_print_info.cold+0x20/0x20 [ 376.150849] dump_header+0x1e6/0x116c [ 376.150867] ? add_lock_to_list.isra.0+0x450/0x450 [ 376.150887] ? print_usage_bug+0xd0/0xd0 [ 376.175330] ? pagefault_out_of_memory+0x1a1/0x1a1 [ 376.180272] ? ___ratelimit+0x37c/0x686 [ 376.184257] ? mark_held_locks+0xb1/0x100 [ 376.188409] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 376.193521] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 376.198624] ? lockdep_hardirqs_on+0x415/0x5d0 [ 376.203216] ? trace_hardirqs_on+0xbd/0x310 [ 376.207538] ? kasan_check_read+0x11/0x20 [ 376.211705] ? ___ratelimit+0x37c/0x686 [ 376.215684] ? trace_hardirqs_off_caller+0x300/0x300 [ 376.220788] ? do_raw_spin_trylock+0x270/0x270 [ 376.225375] ? trace_hardirqs_on_caller+0x310/0x310 [ 376.230392] ? lock_acquire+0x1db/0x570 [ 376.234378] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 376.239501] ? ___ratelimit+0xac/0x686 [ 376.243395] ? idr_get_free+0xee0/0xee0 [ 376.247387] ? lockdep_hardirqs_on+0x415/0x5d0 [ 376.251982] oom_kill_process.cold+0x10/0x9d4 [ 376.256485] ? cgroup_procs_next+0x70/0x70 [ 376.260730] ? _raw_spin_unlock_irq+0x5e/0x90 [ 376.265230] ? oom_badness+0xa50/0xa50 [ 376.269136] ? oom_evaluate_task+0x540/0x540 [ 376.273568] ? mem_cgroup_iter_break+0x30/0x30 [ 376.278161] ? mutex_trylock+0x2d0/0x2d0 [ 376.282227] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 376.287795] ? rcu_read_unlock_special+0x380/0x380 [ 376.292738] out_of_memory+0x885/0x1420 [ 376.296715] ? mem_cgroup_iter+0x508/0xf30 [ 376.300960] ? oom_killer_disable+0x340/0x340 [ 376.305460] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 376.310568] ? lock_acquire+0x1db/0x570 [ 376.314556] mem_cgroup_out_of_memory+0x160/0x210 [ 376.319400] ? do_raw_spin_unlock+0xa0/0x330 [ 376.323817] ? memcg_memory_event+0x40/0x40 [ 376.328149] ? do_raw_spin_trylock+0x270/0x270 [ 376.332751] ? _raw_spin_unlock+0x2d/0x50 [ 376.336906] try_charge+0x12a9/0x19b0 [ 376.340708] ? lock_downgrade+0x910/0x910 [ 376.344857] ? kasan_check_read+0x11/0x20 [ 376.349013] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 376.353858] ? get_mem_cgroup_from_mm+0x1cd/0x420 [ 376.358712] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 376.364260] ? lock_downgrade+0x910/0x910 [ 376.368423] ? kasan_check_read+0x11/0x20 [ 376.372574] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 376.377855] ? rcu_read_unlock_special+0x380/0x380 [ 376.382800] ? get_mem_cgroup_from_mm+0x1ea/0x420 [ 376.387655] memcg_kmem_charge_memcg+0x7c/0x130 [ 376.392327] ? memcg_kmem_put_cache+0xb0/0xb0 [ 376.396842] ? lock_release+0xc40/0xc40 [ 376.400868] memcg_kmem_charge+0x13b/0x340 [ 376.405110] __alloc_pages_nodemask+0x7b8/0xdc0 [ 376.409825] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 376.414848] ? rcu_pm_notify+0xd0/0xd0 [ 376.418749] ? rcu_read_lock_sched_held+0x110/0x130 [ 376.423771] ? kmem_cache_alloc_node+0x347/0x710 [ 376.428529] ? print_usage_bug+0xd0/0xd0 [ 376.432606] copy_process+0x847/0x8860 [ 376.436502] ? print_usage_bug+0xd0/0xd0 [ 376.440573] ? rcu_read_unlock+0x16/0x60 [ 376.444652] ? __lock_acquire+0x572/0x4a30 [ 376.448892] ? mark_held_locks+0x100/0x100 [ 376.453153] ? __cleanup_sighand+0x70/0x70 [ 376.457396] ? mark_held_locks+0x100/0x100 [ 376.461635] ? find_held_lock+0x35/0x120 [ 376.465716] ? mark_held_locks+0x100/0x100 [ 376.469958] ? delayacct_end+0xc9/0x100 [ 376.473938] ? add_lock_to_list.isra.0+0x450/0x450 [ 376.478873] ? lock_acquire+0x1db/0x570 [ 376.482859] ? add_lock_to_list.isra.0+0x450/0x450 [ 376.487789] ? find_held_lock+0x35/0x120 [ 376.491857] ? print_usage_bug+0xd0/0xd0 [ 376.495924] ? psi_memstall_leave+0x1f8/0x280 [ 376.500424] ? find_held_lock+0x35/0x120 [ 376.504492] ? __lock_acquire+0x572/0x4a30 [ 376.508727] ? _raw_spin_unlock_irq+0x28/0x90 [ 376.513240] ? _raw_spin_unlock_irq+0x28/0x90 [ 376.517733] ? lockdep_hardirqs_on+0x415/0x5d0 [ 376.522320] ? trace_hardirqs_on+0xbd/0x310 [ 376.526656] ? mark_held_locks+0x100/0x100 [ 376.530894] ? check_preemption_disabled+0x48/0x290 [ 376.535919] ? rcu_lockdep_current_cpu_online+0x1aa/0x220 [ 376.541459] ? rcu_pm_notify+0xd0/0xd0 [ 376.545353] ? add_lock_to_list.isra.0+0x450/0x450 [ 376.550313] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 376.555853] ? try_to_free_mem_cgroup_pages+0x597/0xcd0 [ 376.561233] ? lockdep_hardirqs_on+0x415/0x5d0 [ 376.565822] ? try_to_free_pages+0xb70/0xb70 [ 376.570247] ? percpu_ref_put_many+0x129/0x270 [ 376.574858] ? blkcg_maybe_throttle_current+0x75e/0x1400 [ 376.580311] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 376.585856] _do_fork+0x1a9/0x1170 [ 376.589404] ? fork_idle+0x1d0/0x1d0 [ 376.593148] ? trace_hardirqs_off+0xb8/0x310 [ 376.597570] ? get_mctgt_type_thp.isra.0+0x4c0/0x4c0 [ 376.602677] ? prepare_exit_to_usermode+0x32e/0x3b0 [ 376.607697] ? do_syscall_64+0x8c/0x800 [ 376.611679] ? do_syscall_64+0x8c/0x800 [ 376.615667] ? lockdep_hardirqs_on+0x415/0x5d0 [ 376.620253] ? trace_hardirqs_on+0xbd/0x310 [ 376.624582] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 376.629953] ? trace_hardirqs_off_caller+0x300/0x300 [ 376.635065] __x64_sys_clone+0xbf/0x150 [ 376.639051] do_syscall_64+0x1a3/0x800 [ 376.642950] ? syscall_return_slowpath+0x5f0/0x5f0 [ 376.647897] ? prepare_exit_to_usermode+0x232/0x3b0 [ 376.652924] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 376.657781] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 376.662980] RIP: 0033:0x45aa69 [ 376.666191] Code: ff 48 85 f6 0f 84 97 8d fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c 6e 8d fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 376.685094] RSP: 002b:00007fff32860c38 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 376.692831] RAX: ffffffffffffffda RBX: 00007fe2862d7700 RCX: 000000000045aa69 [ 376.700156] RDX: 00007fe2862d79d0 RSI: 00007fe2862d6db0 RDI: 00000000003d0f00 17:55:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @multicast2}, &(0x7f0000000240)=0xc) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/mls\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(r1, 0x21, 0xcf, &(0x7f0000000280)="65bd1d8e7ed09872d0767c2e90db7f21c5b4541b84a67541c1685e55eeeebc4a82c46cfa23ad8d3b2fc8e310cb6a23c5b582706845e7a4f3b3f7327ca77ea680ed3c60de047d44df8cd76db403215d00f4881723ead7e52483e307607eaa8f6d4bf5787e3c55e0a85ae4f98952c1936973f569cac23081aab9d33b7f666c5e5c2e704b710631a81279315d95e692552e072715404df0a0b3", 0x98) openat$cgroup(r1, &(0x7f00000001c0)='syz0\x00', 0x200002, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x3, 0x191b00) r3 = openat$cgroup_ro(r2, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$P9_RAUTH(r3, &(0x7f0000000080)={0x14, 0x67, 0x0, {0x0, 0x0, 0x1}}, 0x14) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x11, r3, 0x0) ioctl$FS_IOC_GETFLAGS(r3, 0xc020660b, &(0x7f0000000000)) 17:55:21 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045700, &(0x7f0000000100)) [ 376.707438] RBP: 00007fff32860e40 R08: 00007fe2862d7700 R09: 00007fe2862d7700 [ 376.714704] R10: 00007fe2862d79d0 R11: 0000000000000202 R12: 0000000000000000 [ 376.721975] R13: 00007fff32860cef R14: 00007fe2862d79c0 R15: 0000000000000000 [ 376.805212] memory: usage 307176kB, limit 307200kB, failcnt 216 [ 376.816094] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 376.825439] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 17:55:21 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x500) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000140)={0x1}) ioctl$SIOCAX25NOUID(r2, 0x89e3, &(0x7f0000000280)=0x1) r3 = socket$kcm(0x29, 0x5, 0x0) write$FUSE_LSEEK(r2, &(0x7f0000000180)={0x18, 0xfffffffffffffffe, 0x2, {0x7fffffff}}, 0x18) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) 17:55:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs|', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:55:21 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045700, &(0x7f0000000100)) 17:55:21 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x1) r1 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x6, 0x200000) openat(r1, &(0x7f0000000200)='./file0\x00', 0x20020000, 0x4) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000180)=0x8) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$P9_RAUTH(r3, &(0x7f0000000080)={0x14, 0x67, 0x0, {0x0, 0x0, 0x1}}, 0x14) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x11, r3, 0x0) ioctl$FS_IOC_GETFLAGS(r3, 0xc020660b, &(0x7f0000000000)) [ 376.847628] Memory cgroup stats for /syz2: cache:0KB rss:270000KB rss_huge:253952KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:270124KB inactive_file:4KB active_file:0KB unevictable:0KB 17:55:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0), 0x0, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 376.906436] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2 [ 376.916165] device nr0 entered promiscuous mode [ 376.924850] ,task_memcg=/syz2,task=syz-executor2,pid=8712,uid=0 [ 376.942970] Memory cgroup out of memory: Kill process 8712 (syz-executor2) score 1113 or sacrifice child [ 377.002528] Killed process 8712 (syz-executor2) total-vm:72576kB, anon-rss:2192kB, file-rss:35788kB, shmem-rss:0kB [ 377.084290] SELinux: security policydb version 15 (MLS) not backwards compatible [ 377.106415] sel_write_load: 16 callbacks suppressed [ 377.106420] SELinux: failed to load policy [ 377.124030] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:22 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0007000009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:55:22 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045700, &(0x7f0000000100)) [ 377.136175] SELinux: failed to load policy 17:55:22 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045700, &(0x7f0000000100)) [ 377.231888] SELinux: security policydb version 15 (MLS) not backwards compatible [ 377.267226] SELinux: failed to load policy [ 377.289924] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:22 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045700, &(0x7f0000000100)) [ 377.333653] SELinux: failed to load policy 17:55:22 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0020000009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:55:22 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045700, &(0x7f0000000100)) [ 377.495488] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:22 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x80000001, 0x4f, 0x101, 0x9}]}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='pids.events\x007\f\xfc\n\xe4Q\xf2g;\x16\x92\xa7\x01\xbb\x00\xb0\xd8\x9b-H\xbc\xea\n\x95\x15\xce\x93\xfax\xf3N\x86\xfaZ\xdd\xe9\x81*W\xe1Ro\xde\xb9\x85\x96Fc\xde\x17\xb8\x81@\xc4\xe2%\xf8\xba\xa7>.\a\xa2\xdc\xd1\x86\x82&\x12]Q\x97w\x97W\xfdn\xc4U\xf4>\xbd\xfd\xe0Wz\xa5\xc7\xe6\xf67\xb2\x19A{\xa4b\xe2\xf7\xde\f\xbb\xde\x855\"lG\xe5QDk\xf3\xc9~\xb4_\xf2\r\x83\x15\x1cl\x8f\x93J\xac\x1d\xe4\v\xceM\x97\xf0z\x15\xc9\x95\x81\xec\n?\xcd\x8b\xc2s\xc8\xe9\xb8\xa9<5', 0x275a, 0x0) write$P9_RAUTH(r1, &(0x7f0000000080)={0x130, 0x67, 0x1, {0x0, 0x0, 0x1}}, 0x14) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x11, r1, 0x0) ioctl$FS_IOC_GETFLAGS(r1, 0xc020660b, &(0x7f0000000000)) setsockopt$X25_QBITINCL(r1, 0x106, 0x1, &(0x7f00000000c0)=0x1, 0x4) 17:55:22 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x500) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000140)={0x1}) ioctl$SIOCAX25NOUID(r2, 0x89e3, &(0x7f0000000280)=0x1) r3 = socket$kcm(0x29, 0x5, 0x0) write$FUSE_LSEEK(r2, &(0x7f0000000180)={0x18, 0xfffffffffffffffe, 0x2, {0x7fffffff}}, 0x18) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) [ 377.536479] SELinux: failed to load policy [ 377.554758] SELinux: security policydb version 15 (MLS) not backwards compatible [ 377.577370] SELinux: failed to load policy 17:55:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x80', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:55:22 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045700, &(0x7f0000000100)) 17:55:22 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c003f000009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 377.662939] SELinux: security policydb version 15 (MLS) not backwards compatible [ 377.700104] SELinux: failed to load policy [ 377.708941] device nr0 entered promiscuous mode [ 377.718605] SELinux: security policydb version 15 (MLS) not backwards compatible [ 377.744687] SELinux: failed to load policy 17:55:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413", 0x11, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:55:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/mls\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000380)='cpuacct.usage_user\x00', 0x275a, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r2, 0xc06855c8, &(0x7f00000001c0)={0x3, 0x3, {0x0, 0x2, 0x5, {0xff, 0x3}, {}, @period={0x5f, 0x1, 0x2bfe, 0x5, 0x100, {0xd33, 0x8, 0x6, 0x8}, 0x8, &(0x7f00000000c0)=[0x8, 0x9, 0x4, 0x8, 0x9, 0x8000, 0x0, 0xffff]}}, {0x55, 0x1, 0x0, {0x6, 0xf1}, {0x7ff, 0xb}, @period={0x5b, 0x1, 0x2, 0x0, 0x7fffffff, {0x5, 0xc7d, 0x4, 0x80000000}, 0x3, &(0x7f0000000180)=[0x101, 0x7, 0x7]}}}) write$P9_RAUTH(r2, &(0x7f0000000080)={0x14, 0x67, 0x0, {0x0, 0x0, 0x1}}, 0x14) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x11, r2, 0x0) ioctl$FS_IOC_GETFLAGS(r2, 0xc020660b, &(0x7f0000000000)) 17:55:22 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045700, &(0x7f0000000100)) 17:55:22 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0048000009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 377.878369] SELinux: security policydb version 15 (MLS) not backwards compatible [ 377.918498] SELinux: failed to load policy 17:55:22 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045700, &(0x7f0000000100)) [ 377.934266] SELinux: security policydb version 15 (MLS) not backwards compatible [ 377.956959] SELinux: failed to load policy 17:55:22 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c004c000009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:55:22 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045700, &(0x7f0000000100)) [ 378.082090] SELinux: security policydb version 15 (MLS) not backwards compatible [ 378.138354] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:23 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0060000009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:55:23 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x500) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000140)={0x1}) ioctl$SIOCAX25NOUID(r2, 0x89e3, &(0x7f0000000280)=0x1) r3 = socket$kcm(0x29, 0x5, 0x0) write$FUSE_LSEEK(r2, &(0x7f0000000180)={0x18, 0xfffffffffffffffe, 0x2, {0x7fffffff}}, 0x18) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) 17:55:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\xd2', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:55:23 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413", 0x11, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:55:23 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045700, &(0x7f0000000100)) 17:55:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$P9_RAUTH(r1, &(0x7f0000000080)={0x14, 0x67, 0x0, {0x0, 0x0, 0x1}}, 0x14) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x80007fffff, 0x11, r1, 0x0) ioctl$FS_IOC_GETFLAGS(r1, 0xc020660b, &(0x7f0000000000)) [ 378.301706] SELinux: security policydb version 15 (MLS) not backwards compatible [ 378.335150] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:23 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413", 0x11, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:55:23 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045700, &(0x7f0000000100)) 17:55:23 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$P9_RAUTH(r0, &(0x7f0000000080)={0x14, 0x67, 0x0, {0x0, 0x0, 0x1}}, 0x14) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x11, r0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0xc020660b, &(0x7f0000000000)) 17:55:23 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0068000009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 378.467814] device nr0 entered promiscuous mode [ 378.564939] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$P9_RAUTH(r1, &(0x7f0000000080)={0x14, 0x67, 0x0, {0x0, 0x0, 0x1}}, 0x14) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x11, r1, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0xc020660b, &(0x7f0000000180)) [ 378.615430] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:23 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c006c000009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:55:23 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0074000009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 378.722204] SELinux: security policydb version 15 (MLS) not backwards compatible [ 378.744953] SELinux: security policydb version 15 (MLS) not backwards compatible [ 378.850115] SELinux: security policydb version 15 (MLS) not backwards compatible [ 378.907607] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:24 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x500) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000140)={0x1}) ioctl$SIOCAX25NOUID(r2, 0x89e3, &(0x7f0000000280)=0x1) socket$kcm(0x29, 0x5, 0x0) write$FUSE_LSEEK(r2, &(0x7f0000000180)={0x18, 0xfffffffffffffffe, 0x2, {0x7fffffff}}, 0x18) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r3, 0x8905, &(0x7f0000000080)) read(r0, &(0x7f0000000040)=""/6, 0xe) 17:55:24 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c007a000009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:55:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\xf0', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:55:24 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x10, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045700, &(0x7f0000000100)) 17:55:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a060000", 0x19, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:55:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$P9_RAUTH(r1, &(0x7f0000000080)={0x14, 0x67, 0x0, {0x0, 0x0, 0x1}}, 0x14) ppoll(&(0x7f00000000c0), 0x0, &(0x7f0000000180)={0x77359400}, &(0x7f00000001c0)={0x7}, 0x8) fcntl$getflags(r0, 0xb) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x11, r1, 0x0) ioctl$FS_IOC_GETFLAGS(r1, 0xc020660b, &(0x7f0000000000)) 17:55:24 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x10, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045700, &(0x7f0000000100)) [ 379.173334] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:24 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000109000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:55:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a060000", 0x19, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 379.223150] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:24 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x10, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045700, &(0x7f0000000100)) 17:55:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\xf6', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) [ 379.323360] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:24 executing program 0: syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x2000000880045700, &(0x7f0000000100)) [ 379.377173] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:24 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x500) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000140)={0x1}) ioctl$SIOCAX25NOUID(r2, 0x89e3, &(0x7f0000000280)=0x1) socket$kcm(0x29, 0x5, 0x0) write$FUSE_LSEEK(r2, &(0x7f0000000180)={0x18, 0xfffffffffffffffe, 0x2, {0x7fffffff}}, 0x18) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r3, 0x8905, &(0x7f0000000080)) read(r0, &(0x7f0000000040)=""/6, 0xe) 17:55:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a060000", 0x19, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:55:24 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000209000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:55:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\xf8', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:55:24 executing program 0: syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x2000000880045700, &(0x7f0000000100)) 17:55:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x100000890e, &(0x7f0000000040)="0adc1f123c123f3188b070") io_setup(0x3f, &(0x7f0000000180)=0x0) pipe2(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r3, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, r4, 0x4, 0x70bd2c, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x90}, 0x20000000) io_submit(r1, 0x1, &(0x7f0000000340)=[&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x7f, r0, &(0x7f00000001c0)="7d8c5ac013883bd6a173083c87d8a65e55803e2be5f0671950a37849495335c0ac355e1ed81563dc8e7a2cf6aaabfb5a3f90aea436182af87e3a5904d77599ebb165f8dc0a5402667a21364a6181b08418d217418caf4b9c481f783ad10784ee85cec83e88bd0d6d0602f00ae1a11c7a96a62cfce5a5e1e978c3d5b8efe654d4d5cf87bc2bb642cfbe3a6b8d86fb0435f56f6e98905e0454d5f3ec109057cacb12067e9e26248bc6affb5575a04e5eb78c375be6d7de736886dc6a1ead8159ec91f2b812e39bc80a51144abdc9d9f238abd1f35b8c041d3355c575f1d313ce063dba2c", 0xe3, 0x81, 0x0, 0x3, r2}]) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x40000, 0x0) write$P9_RAUTH(r5, &(0x7f0000000080)={0x14, 0x67, 0x0, {0x0, 0x0, 0x1}}, 0x14) ftruncate(r2, 0x8) getpeername(r3, &(0x7f0000001a40), &(0x7f0000001ac0)=0x80) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x7fffff, 0x30, r0, 0x2000000000000000) readv(r2, &(0x7f00000019c0)=[{&(0x7f00000005c0)=""/115, 0x73}, {&(0x7f0000000640)=""/83, 0x53}, {&(0x7f00000006c0)=""/166, 0xa6}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000001780)=""/69, 0x45}, {&(0x7f0000001800)=""/11, 0xb}, {&(0x7f0000001840)=""/230, 0xe6}, {&(0x7f0000001940)=""/80, 0x50}], 0x8) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001b40)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000001c80)={&(0x7f0000001b00)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000001c40)={&(0x7f0000001b80)={0x98, r6, 0x8, 0x70bd27, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x600000000000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffffffffe01}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3ff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x52}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3f}]}, @TIPC_NLA_NET={0x40, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xffffffff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfffffffffffffffb}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x80}, 0x40801) ioctl$FS_IOC_GETFLAGS(r5, 0xc020660b, &(0x7f0000000000)) ioctl$TIOCGETD(r5, 0x5424, &(0x7f0000001cc0)) ioctl(r2, 0x8, &(0x7f00000004c0)="aeffb2531ba6a828745ef9e20a09c41a357f179ef0b722bad36197c07f2635c4fa0b7242c167a1a8d3e010f1abc638795b5b22ee7d98133c1fbc8ec87035af30145c3b4615598d8453ef815caabb845299a81dab0ce45bf084abe12d75bf337db482166b596bac1aca3e3088216c2e527b4b9b08567e8b6aab6d79db95ec1e1a98977ba302a7c893824b5e81f6c7d441a3c8367fdf889ed8935614969f9a70bf0de184e3cdf6b813d01a20e24db2c21853ab8be3e9379fb1596ce6d53f8393a066659f1a65f8ee4429ba367190b1bf8bf5525c6384a4cbda3231d7abd5a085dcdc88aa237f839b2c11f8c07fe0df3e9df42a1ad1") iopl(0xffffffffffffffff) [ 380.070438] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:25 executing program 0: syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x2000000880045700, &(0x7f0000000100)) 17:55:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a06000000000000", 0x1d, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 380.110699] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:25 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000309000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:55:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$P9_RAUTH(r1, &(0x7f0000000080)={0x14, 0x67, 0x0, {0x0, 0x0, 0x1}}, 0x14) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x11, r1, 0x0) ioctl$FS_IOC_GETFLAGS(r1, 0xc020660b, &(0x7f0000000000)) exit_group(0x2) 17:55:25 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x0, &(0x7f0000000100)) 17:55:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a06000000000000", 0x1d, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 380.259758] SELinux: security policydb version 15 (MLS) not backwards compatible [ 380.343477] syz-executor2 invoked oom-killer: gfp_mask=0x7080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 380.394170] SELinux: security policydb version 15 (MLS) not backwards compatible [ 380.436983] CPU: 0 PID: 14420 Comm: syz-executor2 Not tainted 5.0.0-rc4 #49 [ 380.444097] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 380.453458] Call Trace: [ 380.456056] dump_stack+0x1db/0x2d0 [ 380.459698] ? dump_stack_print_info.cold+0x20/0x20 [ 380.464755] dump_header+0x1e6/0x116c [ 380.468596] ? add_lock_to_list.isra.0+0x450/0x450 [ 380.473552] ? print_usage_bug+0xd0/0xd0 [ 380.477635] ? pagefault_out_of_memory+0x1a1/0x1a1 [ 380.482574] ? ___ratelimit+0x37c/0x686 [ 380.486565] ? mark_held_locks+0xb1/0x100 [ 380.490725] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 380.495834] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 380.500938] ? lockdep_hardirqs_on+0x415/0x5d0 [ 380.505545] ? trace_hardirqs_on+0xbd/0x310 [ 380.509873] ? kasan_check_read+0x11/0x20 [ 380.514030] ? ___ratelimit+0x37c/0x686 [ 380.518005] ? trace_hardirqs_off_caller+0x300/0x300 [ 380.523110] ? do_raw_spin_trylock+0x270/0x270 [ 380.527728] ? trace_hardirqs_on_caller+0x310/0x310 [ 380.532749] ? lock_acquire+0x1db/0x570 [ 380.536749] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 380.541859] ? ___ratelimit+0xac/0x686 [ 380.545753] ? idr_get_free+0xee0/0xee0 [ 380.549732] ? lockdep_hardirqs_on+0x415/0x5d0 [ 380.554343] oom_kill_process.cold+0x10/0x9d4 [ 380.558876] ? cgroup_procs_next+0x70/0x70 [ 380.563149] ? _raw_spin_unlock_irq+0x5e/0x90 [ 380.567686] ? oom_badness+0xa50/0xa50 [ 380.571610] ? oom_evaluate_task+0x540/0x540 [ 380.576024] ? mem_cgroup_iter_break+0x30/0x30 [ 380.580612] ? mutex_trylock+0x2d0/0x2d0 [ 380.584675] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 380.590243] ? rcu_read_unlock_special+0x380/0x380 [ 380.595191] out_of_memory+0x885/0x1420 [ 380.599192] ? mem_cgroup_iter+0x508/0xf30 [ 380.603439] ? oom_killer_disable+0x340/0x340 [ 380.607937] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 380.613048] ? lock_acquire+0x1db/0x570 [ 380.617037] mem_cgroup_out_of_memory+0x160/0x210 [ 380.621884] ? do_raw_spin_unlock+0xa0/0x330 [ 380.626296] ? memcg_memory_event+0x40/0x40 [ 380.630632] ? do_raw_spin_trylock+0x270/0x270 [ 380.635257] ? _raw_spin_unlock+0x2d/0x50 [ 380.639415] try_charge+0x12a9/0x19b0 [ 380.643223] ? lock_downgrade+0x910/0x910 [ 380.647380] ? kasan_check_read+0x11/0x20 [ 380.651540] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 380.656390] ? get_mem_cgroup_from_mm+0x1cd/0x420 [ 380.661241] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 380.666788] ? lock_downgrade+0x910/0x910 [ 380.670939] ? kasan_check_read+0x11/0x20 [ 380.675092] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 380.680376] ? rcu_read_unlock_special+0x380/0x380 [ 380.685319] ? get_mem_cgroup_from_mm+0x1ea/0x420 [ 380.690184] memcg_kmem_charge_memcg+0x7c/0x130 [ 380.694863] ? memcg_kmem_put_cache+0xb0/0xb0 [ 380.699358] ? lock_release+0xc40/0xc40 [ 380.703347] memcg_kmem_charge+0x13b/0x340 [ 380.707591] __alloc_pages_nodemask+0x7b8/0xdc0 [ 380.712274] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 380.717292] ? rcu_pm_notify+0xd0/0xd0 [ 380.721198] ? rcu_read_lock_sched_held+0x110/0x130 [ 380.726216] ? kmem_cache_alloc_node+0x347/0x710 [ 380.730988] copy_process+0x847/0x8860 [ 380.734886] ? find_held_lock+0x35/0x120 [ 380.738959] ? try_to_wake_up+0xf9/0x1480 [ 380.743137] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 380.748259] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 380.753373] ? preempt_schedule+0x4b/0x60 [ 380.757541] ? preempt_schedule_common+0x4f/0xe0 [ 380.762315] ? __cleanup_sighand+0x70/0x70 [ 380.766578] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 380.771687] ? try_to_wake_up+0xf9/0x1480 [ 380.775851] ? migrate_swap_stop+0x920/0x920 [ 380.780265] ? futex_wake+0x62c/0x7b0 [ 380.784070] ? lock_acquire+0x1db/0x570 [ 380.788073] ? kasan_check_read+0x11/0x20 [ 380.792229] ? do_raw_spin_unlock+0xa0/0x330 [ 380.796645] ? do_raw_spin_trylock+0x270/0x270 [ 380.801256] ? print_usage_bug+0xd0/0xd0 [ 380.805346] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 380.810543] ? drop_futex_key_refs.isra.0+0x6f/0xf0 [ 380.815569] ? __lock_acquire+0x572/0x4a30 [ 380.819811] ? get_futex_key+0x2050/0x2050 [ 380.824063] ? mark_held_locks+0x100/0x100 [ 380.828309] ? do_futex+0x1b0/0x2910 [ 380.832035] ? save_stack+0xa9/0xd0 [ 380.835669] ? save_stack+0x45/0xd0 [ 380.839301] ? __kasan_slab_free+0x102/0x150 [ 380.843715] ? add_lock_to_list.isra.0+0x450/0x450 [ 380.848650] ? add_lock_to_list.isra.0+0x450/0x450 [ 380.853593] ? exit_robust_list+0x290/0x290 [ 380.857925] ? __might_fault+0x12b/0x1e0 [ 380.861993] ? find_held_lock+0x35/0x120 [ 380.866058] ? __might_fault+0x12b/0x1e0 [ 380.870144] ? lock_acquire+0x1db/0x570 [ 380.874146] ? lock_downgrade+0x910/0x910 [ 380.878309] ? lock_release+0xc40/0xc40 [ 380.882292] ? trace_hardirqs_off_caller+0x300/0x300 [ 380.887407] _do_fork+0x1a9/0x1170 [ 380.890963] ? fork_idle+0x1d0/0x1d0 [ 380.894688] ? kasan_check_read+0x11/0x20 [ 380.898839] ? _copy_to_user+0xc9/0x120 [ 380.902821] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 380.908363] ? put_timespec64+0x115/0x1b0 [ 380.912516] ? nsecs_to_jiffies+0x30/0x30 [ 380.916671] ? do_syscall_64+0x8c/0x800 [ 380.920648] ? do_syscall_64+0x8c/0x800 [ 380.924630] ? lockdep_hardirqs_on+0x415/0x5d0 [ 380.929231] ? trace_hardirqs_on+0xbd/0x310 [ 380.933557] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 380.939101] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 380.944481] ? trace_hardirqs_off_caller+0x300/0x300 [ 380.949611] __x64_sys_clone+0xbf/0x150 [ 380.953600] do_syscall_64+0x1a3/0x800 [ 380.957495] ? syscall_return_slowpath+0x5f0/0x5f0 [ 380.962446] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 380.967474] ? __switch_to_asm+0x34/0x70 [ 380.971557] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 380.976411] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 380.981602] RIP: 0033:0x458099 [ 380.984810] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 381.003714] RSP: 002b:00007fe2862d6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 381.011440] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000458099 [ 381.018704] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0020002102001fff [ 381.025972] RBP: 000000000073bf00 R08: ffffffffffffffff R09: 0000000000000000 [ 381.033269] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2862d76d4 [ 381.040538] R13: 00000000004be480 R14: 00000000004cea40 R15: 00000000ffffffff [ 381.050511] memory: usage 307200kB, limit 307200kB, failcnt 256 [ 381.058032] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 381.065042] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 381.071370] Memory cgroup stats for /syz2: cache:0KB rss:268704KB rss_huge:251904KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:268688KB inactive_file:0KB active_file:0KB unevictable:0KB [ 381.092325] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor2,pid=9772,uid=0 [ 381.106945] Memory cgroup out of memory: Kill process 9772 (syz-executor2) score 1113 or sacrifice child [ 381.116892] Killed process 9772 (syz-executor2) total-vm:72576kB, anon-rss:2192kB, file-rss:35788kB, shmem-rss:0kB [ 381.155709] syz-executor2 invoked oom-killer: gfp_mask=0x7080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 381.174294] CPU: 0 PID: 14418 Comm: syz-executor2 Not tainted 5.0.0-rc4 #49 [ 381.181400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 381.190785] Call Trace: [ 381.193384] dump_stack+0x1db/0x2d0 [ 381.197016] ? dump_stack_print_info.cold+0x20/0x20 [ 381.202040] dump_header+0x1e6/0x116c [ 381.202058] ? add_lock_to_list.isra.0+0x450/0x450 [ 381.202074] ? print_usage_bug+0xd0/0xd0 [ 381.202091] ? pagefault_out_of_memory+0x1a1/0x1a1 [ 381.202112] ? ___ratelimit+0x37c/0x686 [ 381.223735] ? mark_held_locks+0xb1/0x100 [ 381.227897] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 381.233002] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 381.238113] ? lockdep_hardirqs_on+0x415/0x5d0 [ 381.242719] ? trace_hardirqs_on+0xbd/0x310 [ 381.247052] ? kasan_check_read+0x11/0x20 [ 381.251204] ? ___ratelimit+0x37c/0x686 [ 381.251221] ? trace_hardirqs_off_caller+0x300/0x300 [ 381.251237] ? do_raw_spin_trylock+0x270/0x270 [ 381.251251] ? trace_hardirqs_on_caller+0x310/0x310 [ 381.251265] ? lock_acquire+0x1db/0x570 [ 381.251287] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 381.251303] ? ___ratelimit+0xac/0x686 [ 381.260376] ? idr_get_free+0xee0/0xee0 [ 381.260392] ? lockdep_hardirqs_on+0x415/0x5d0 [ 381.260418] oom_kill_process.cold+0x10/0x9d4 [ 381.260435] ? cgroup_procs_next+0x70/0x70 [ 381.300183] ? _raw_spin_unlock_irq+0x5e/0x90 [ 381.304732] ? oom_badness+0xa50/0xa50 [ 381.308622] ? oom_evaluate_task+0x540/0x540 [ 381.313075] ? mem_cgroup_iter_break+0x30/0x30 [ 381.317677] ? mutex_trylock+0x2d0/0x2d0 [ 381.321744] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 381.327302] ? rcu_read_unlock_special+0x380/0x380 [ 381.332243] out_of_memory+0x885/0x1420 [ 381.336222] ? mem_cgroup_iter+0x508/0xf30 [ 381.340456] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 381.345581] ? oom_killer_disable+0x340/0x340 [ 381.350087] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 17:55:26 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x500) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000140)={0x1}) ioctl$SIOCAX25NOUID(r2, 0x89e3, &(0x7f0000000280)=0x1) socket$kcm(0x29, 0x5, 0x0) write$FUSE_LSEEK(r2, &(0x7f0000000180)={0x18, 0xfffffffffffffffe, 0x2, {0x7fffffff}}, 0x18) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r3, 0x8905, &(0x7f0000000080)) read(r0, &(0x7f0000000040)=""/6, 0xe) 17:55:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\xfa', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:55:26 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a06000000000000", 0x1d, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:55:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008903, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$P9_RAUTH(r1, &(0x7f0000000080)={0x14, 0x67, 0x0, {0x0, 0x0, 0x1}}, 0x14) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x11, r1, 0x0) ioctl$FS_IOC_GETFLAGS(r1, 0xc020660b, &(0x7f0000000000)) 17:55:26 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x0, &(0x7f0000000100)) [ 381.355192] ? lock_acquire+0x1db/0x570 [ 381.359193] mem_cgroup_out_of_memory+0x160/0x210 [ 381.364039] ? do_raw_spin_unlock+0xa0/0x330 [ 381.368455] ? memcg_memory_event+0x40/0x40 [ 381.372782] ? do_raw_spin_trylock+0x270/0x270 [ 381.377396] ? _raw_spin_unlock+0x2d/0x50 [ 381.381551] try_charge+0xd44/0x19b0 [ 381.385287] ? lock_downgrade+0x910/0x910 [ 381.389443] ? kasan_check_read+0x11/0x20 [ 381.393606] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 381.398453] ? get_mem_cgroup_from_mm+0x1cd/0x420 [ 381.403298] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 381.408843] ? lock_downgrade+0x910/0x910 [ 381.412998] ? kasan_check_read+0x11/0x20 [ 381.417175] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 381.422460] ? rcu_read_unlock_special+0x380/0x380 [ 381.427406] ? get_mem_cgroup_from_mm+0x1ea/0x420 [ 381.432261] memcg_kmem_charge_memcg+0x7c/0x130 [ 381.432279] ? memcg_kmem_put_cache+0xb0/0xb0 [ 381.432292] ? lock_release+0xc40/0xc40 [ 381.432317] memcg_kmem_charge+0x13b/0x340 [ 381.432342] __alloc_pages_nodemask+0x7b8/0xdc0 [ 381.445467] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 381.445482] ? rcu_pm_notify+0xd0/0xd0 [ 381.445509] ? rcu_read_lock_sched_held+0x110/0x130 [ 381.445529] ? kmem_cache_alloc_node+0x347/0x710 [ 381.468288] ? print_usage_bug+0xd0/0xd0 [ 381.468347] copy_process+0x847/0x8860 [ 381.468366] ? print_usage_bug+0xd0/0xd0 [ 381.468387] ? rcu_read_unlock+0x16/0x60 [ 381.468407] ? __lock_acquire+0x572/0x4a30 [ 381.493408] ? mark_held_locks+0x100/0x100 [ 381.493437] ? __cleanup_sighand+0x70/0x70 [ 381.493456] ? mark_held_locks+0x100/0x100 [ 381.493471] ? find_held_lock+0x35/0x120 [ 381.493494] ? mark_held_locks+0x100/0x100 [ 381.493514] ? delayacct_end+0xc9/0x100 [ 381.501960] ? add_lock_to_list.isra.0+0x450/0x450 [ 381.501993] ? lock_acquire+0x1db/0x570 [ 381.502027] ? add_lock_to_list.isra.0+0x450/0x450 [ 381.502055] ? find_held_lock+0x35/0x120 [ 381.502070] ? print_usage_bug+0xd0/0xd0 [ 381.502091] ? psi_memstall_leave+0x1f8/0x280 [ 381.502104] ? find_held_lock+0x35/0x120 [ 381.502121] ? __lock_acquire+0x572/0x4a30 [ 381.502153] ? _raw_spin_unlock_irq+0x28/0x90 [ 381.514644] ? _raw_spin_unlock_irq+0x28/0x90 [ 381.514660] ? lockdep_hardirqs_on+0x415/0x5d0 [ 381.514677] ? trace_hardirqs_on+0xbd/0x310 [ 381.514698] ? mark_held_locks+0x100/0x100 [ 381.514715] ? check_preemption_disabled+0x48/0x290 [ 381.514736] ? rcu_lockdep_current_cpu_online+0x1aa/0x220 [ 381.523620] ? rcu_pm_notify+0xd0/0xd0 [ 381.540620] ? add_lock_to_list.isra.0+0x450/0x450 [ 381.540634] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 381.540649] ? try_to_free_mem_cgroup_pages+0x597/0xcd0 [ 381.540661] ? lockdep_hardirqs_on+0x415/0x5d0 [ 381.540679] ? try_to_free_pages+0xb70/0xb70 [ 381.540693] ? percpu_ref_put_many+0x129/0x270 [ 381.540716] ? blkcg_maybe_throttle_current+0x75e/0x1400 [ 381.540746] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 381.540765] _do_fork+0x1a9/0x1170 [ 381.540783] ? fork_idle+0x1d0/0x1d0 [ 381.549324] ? trace_hardirqs_off+0xb8/0x310 [ 381.549338] ? get_mctgt_type_thp.isra.0+0x4c0/0x4c0 [ 381.549356] ? prepare_exit_to_usermode+0x32e/0x3b0 [ 381.549371] ? do_syscall_64+0x8c/0x800 [ 381.549387] ? do_syscall_64+0x8c/0x800 [ 381.549402] ? lockdep_hardirqs_on+0x415/0x5d0 [ 381.549418] ? trace_hardirqs_on+0xbd/0x310 [ 381.562623] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 381.575715] ? trace_hardirqs_off_caller+0x300/0x300 [ 381.575739] __x64_sys_clone+0xbf/0x150 [ 381.575760] do_syscall_64+0x1a3/0x800 [ 381.575779] ? syscall_return_slowpath+0x5f0/0x5f0 [ 381.575797] ? prepare_exit_to_usermode+0x232/0x3b0 [ 381.575819] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 381.575842] entry_SYSCALL_64_after_hwframe+0x49/0xbe 17:55:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$P9_RAUTH(r1, &(0x7f0000000080)={0x14, 0x67, 0x0, {0x0, 0x0, 0x1}}, 0x14) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x11, r1, 0x0) ioctl$FS_IOC_GETFLAGS(r1, 0xc020660b, &(0x7f0000000000)) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f00000005c0)={0x6, &(0x7f0000000240)=[{}, {}, {}, {}, {}, {}]}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f, 0x7}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000200)={0x1, 0x10, 0xfa00, {&(0x7f00000000c0), r2}}, 0x18) 17:55:26 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x0, &(0x7f0000000100)) [ 381.600689] RIP: 0033:0x45aa69 [ 381.600705] Code: ff 48 85 f6 0f 84 97 8d fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c 6e 8d fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 381.600714] RSP: 002b:00007fff32860c38 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 381.600729] RAX: ffffffffffffffda RBX: 00007fe286295700 RCX: 000000000045aa69 [ 381.600739] RDX: 00007fe2862959d0 RSI: 00007fe286294db0 RDI: 00000000003d0f00 17:55:26 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a060000000000000000", 0x1f, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 381.600748] RBP: 00007fff32860e40 R08: 00007fe286295700 R09: 00007fe286295700 [ 381.600757] R10: 00007fe2862959d0 R11: 0000000000000202 R12: 0000000000000000 [ 381.600769] R13: 00007fff32860cef R14: 00007fe2862959c0 R15: 0000000000000002 [ 381.777652] memory: usage 304828kB, limit 307200kB, failcnt 256 [ 381.789506] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 381.804882] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 381.824514] Memory cgroup stats for /syz2: cache:0KB rss:266640KB rss_huge:249856KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:266532KB inactive_file:0KB active_file:0KB unevictable:0KB [ 381.890683] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor2,pid=9839,uid=0 [ 381.921406] Memory cgroup out of memory: Kill process 9839 (syz-executor2) score 1113 or sacrifice child [ 381.944089] Killed process 9839 (syz-executor2) total-vm:72576kB, anon-rss:2192kB, file-rss:35788kB, shmem-rss:0kB 17:55:26 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000409000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:55:26 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045700, 0x0) 17:55:26 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a060000000000000000", 0x1f, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:55:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$P9_RAUTH(r1, &(0x7f0000000080)={0x14, 0x67, 0x0, {0x0, 0x0, 0x1}}, 0x14) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x11, r1, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r1, 0x4008af14, &(0x7f00000000c0)={0x0, 0x9}) ioctl$FS_IOC_GETFLAGS(r1, 0xc020660b, &(0x7f0000000000)) [ 382.100418] SELinux: security policydb version 15 (MLS) not backwards compatible [ 382.129635] sel_write_load: 18 callbacks suppressed [ 382.129648] SELinux: failed to load policy [ 382.147702] SELinux: security policydb version 15 (MLS) not backwards compatible [ 382.156947] SELinux: failed to load policy 17:55:27 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045700, 0x0) 17:55:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:55:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$P9_RAUTH(r1, &(0x7f0000000080)={0x14, 0x67, 0x0, {0x0, 0x0, 0x1}}, 0x14) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x11, r0, 0x0) 17:55:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a060000000000000000", 0x1f, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:55:27 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x500) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000140)={0x1}) ioctl$SIOCAX25NOUID(r2, 0x89e3, &(0x7f0000000280)=0x1) r3 = socket$kcm(0x29, 0x5, 0x0) write$FUSE_LSEEK(r2, &(0x7f0000000180)={0x18, 0xfffffffffffffffe, 0x2, {0x7fffffff}}, 0x18) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) 17:55:27 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000509000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:55:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a06000000000000000000", 0x20, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 382.335765] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:27 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045700, 0x0) 17:55:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) writev(r0, &(0x7f0000000580)=[{&(0x7f0000000540)="6084b5fd92aaf3f2e077ffd579fe590008853bc55bed2863ac6c5d51bb572a374aee03a19f53", 0x26}], 0x1) write$P9_RAUTH(r1, &(0x7f0000000080)={0x14, 0x67, 0x0, {0x0, 0x0, 0x1}}, 0x14) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000200)={0x5454, {{0x2, 0x4e20, @multicast1}}, 0x0, 0x4, [{{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {{0x2, 0x4e22, @multicast2}}, {{0x2, 0x4e21, @rand_addr=0x7f}}, {{0x2, 0x4e22, @remote}}]}, 0x290) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f00000000c0)={&(0x7f0000000000/0x4000)=nil, 0x2, 0x0, 0x76, &(0x7f0000002000/0x1000)=nil, 0xb18}) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x7fffff, 0x11, r1, 0x0) pwrite64(r1, &(0x7f00000007c0)="50cca12f19ce4bb878fa0907c8993dc51f8dfc343a94387ebdfaccd0bc82fc48dcfccf586b9a35f10efb86957ccd95f0ee4fe5e307b8e57f6ac50c9619e8f27c161b1773dd123f0e47cd63f9809740966e882c7e85811676e33cad74d06eb9be538a69c5312a7f4b51acc9be225fc9aaf354d7169ee66223d0e8311d8565c5f24a890ede6756e7", 0x87, 0x0) r2 = accept4$inet(r1, &(0x7f00000004c0)={0x2, 0x0, @dev}, &(0x7f0000000500)=0x10, 0x800) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f00000005c0)=""/200, &(0x7f00000006c0)=0x5bdcff85b70b2a42) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0xc) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000700)='/dev/cachefiles\x00', 0x8040, 0x0) getpriority(0x2, r3) accept4$inet(r2, &(0x7f0000000740)={0x2, 0x0, @loopback}, &(0x7f0000000780)=0x10, 0x0) ioctl$FS_IOC_GETFLAGS(r1, 0xc020660b, &(0x7f0000000000)) [ 382.390462] SELinux: failed to load policy [ 382.408353] SELinux: security policydb version 15 (MLS) not backwards compatible [ 382.431433] device nr0 entered promiscuous mode 17:55:27 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000609000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 382.449710] SELinux: failed to load policy [ 382.477054] XFS (loop4): Invalid superblock magic number [ 382.550237] syz-executor2 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 382.579983] CPU: 0 PID: 14502 Comm: syz-executor2 Not tainted 5.0.0-rc4 #49 [ 382.587092] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 382.596453] Call Trace: [ 382.599049] dump_stack+0x1db/0x2d0 [ 382.602700] ? dump_stack_print_info.cold+0x20/0x20 [ 382.607741] dump_header+0x1e6/0x116c [ 382.611551] ? add_lock_to_list.isra.0+0x450/0x450 [ 382.616485] ? print_usage_bug+0xd0/0xd0 [ 382.620561] ? pagefault_out_of_memory+0x1a1/0x1a1 [ 382.625496] ? ___ratelimit+0x37c/0x686 [ 382.629486] ? mark_held_locks+0xb1/0x100 [ 382.633641] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 382.638746] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 382.643858] ? lockdep_hardirqs_on+0x415/0x5d0 [ 382.648444] ? trace_hardirqs_on+0xbd/0x310 [ 382.652773] ? kasan_check_read+0x11/0x20 [ 382.656929] ? ___ratelimit+0x37c/0x686 [ 382.660907] ? trace_hardirqs_off_caller+0x300/0x300 [ 382.666014] ? do_raw_spin_trylock+0x270/0x270 [ 382.670604] ? trace_hardirqs_on_caller+0x310/0x310 [ 382.675620] ? lock_acquire+0x1db/0x570 [ 382.679610] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 382.684980] ? ___ratelimit+0xac/0x686 [ 382.688881] ? idr_get_free+0xee0/0xee0 [ 382.692865] ? lockdep_hardirqs_on+0x415/0x5d0 [ 382.697480] oom_kill_process.cold+0x10/0x9d4 [ 382.701982] ? cgroup_procs_next+0x70/0x70 [ 382.706225] ? _raw_spin_unlock_irq+0x5e/0x90 [ 382.710730] ? oom_badness+0xa50/0xa50 [ 382.714640] ? oom_evaluate_task+0x540/0x540 [ 382.719072] ? mem_cgroup_iter_break+0x30/0x30 [ 382.723660] ? mutex_trylock+0x2d0/0x2d0 [ 382.727728] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 382.733284] ? rcu_read_unlock_special+0x380/0x380 [ 382.738227] out_of_memory+0x885/0x1420 [ 382.742211] ? mem_cgroup_iter+0x508/0xf30 [ 382.746458] ? oom_killer_disable+0x340/0x340 [ 382.750961] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 382.756073] ? lock_acquire+0x1db/0x570 [ 382.760070] mem_cgroup_out_of_memory+0x160/0x210 [ 382.764913] ? do_raw_spin_unlock+0xa0/0x330 [ 382.769333] ? memcg_memory_event+0x40/0x40 [ 382.773664] ? do_raw_spin_trylock+0x270/0x270 [ 382.778263] ? _raw_spin_unlock+0x2d/0x50 [ 382.782418] try_charge+0x12a9/0x19b0 [ 382.786229] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 382.791785] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 382.796638] ? rcu_read_unlock_special+0x380/0x380 [ 382.801597] ? get_mem_cgroup_from_mm+0x1ea/0x420 [ 382.806462] ? get_mem_cgroup_from_page+0x190/0x190 [ 382.811496] ? rcu_read_lock_sched_held+0x110/0x130 [ 382.816539] mem_cgroup_try_charge+0x43a/0xdb0 [ 382.821148] ? mem_cgroup_protected+0xa10/0xa10 [ 382.825831] ? kasan_check_read+0x11/0x20 [ 382.829996] ? do_raw_spin_unlock+0xa0/0x330 [ 382.834426] ? do_raw_spin_trylock+0x270/0x270 [ 382.839016] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 382.844556] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 382.850103] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 382.855062] __handle_mm_fault+0x2594/0x55a0 [ 382.859492] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 382.864342] ? check_preemption_disabled+0x48/0x290 [ 382.869370] ? handle_mm_fault+0x3cc/0xc80 [ 382.873629] ? lock_downgrade+0x910/0x910 [ 382.877802] ? kasan_check_read+0x11/0x20 [ 382.881968] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 382.887252] ? rcu_read_unlock_special+0x380/0x380 [ 382.892190] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 382.897736] ? check_preemption_disabled+0x48/0x290 [ 382.902765] handle_mm_fault+0x4ec/0xc80 [ 382.906837] ? __handle_mm_fault+0x55a0/0x55a0 [ 382.911429] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 382.916970] ? vmacache_update+0x114/0x140 [ 382.921222] __do_page_fault+0x5da/0xd60 [ 382.925304] do_page_fault+0xe6/0x7d8 [ 382.929112] ? trace_hardirqs_on_caller+0xc0/0x310 [ 382.934063] ? vmalloc_sync_all+0x30/0x30 [ 382.938216] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 382.943673] ? syscall_return_slowpath+0x5f0/0x5f0 [ 382.948607] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 382.954169] ? prepare_exit_to_usermode+0x232/0x3b0 [ 382.959195] ? page_fault+0x8/0x30 [ 382.962742] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 382.967598] ? page_fault+0x8/0x30 [ 382.971165] page_fault+0x1e/0x30 [ 382.974627] RIP: 0033:0x43f3a1 [ 382.977823] Code: 2e 0f 1f 84 00 00 00 00 00 48 83 fa 20 48 89 f8 73 77 f6 c2 01 74 0b 0f b6 0e 88 0f 48 ff c6 48 ff c7 f6 c2 02 74 12 0f b7 0e <66> 89 0f 48 83 c6 02 48 83 c7 02 0f 1f 40 00 f6 c2 04 74 0c 8b 0e [ 382.996725] RSP: 002b:00007fff32860d68 EFLAGS: 00010202 [ 383.002087] RAX: 0000000020000080 RBX: 0000000000000003 RCX: 000000000000732f [ 383.009359] RDX: 000000000000000e RSI: 0000000000740020 RDI: 0000000020000080 [ 383.016630] RBP: fffffffffffffffe R08: 0000000000000000 R09: 0000000000000004 [ 383.023913] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000000 [ 383.031185] R13: 0000000000000001 R14: 00000000000000fa R15: 0000000000000002 [ 383.041694] memory: usage 307200kB, limit 307200kB, failcnt 291 [ 383.049215] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 383.070841] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 383.091724] Memory cgroup stats for /syz2: cache:0KB rss:268396KB rss_huge:251904KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:268596KB inactive_file:0KB active_file:0KB unevictable:0KB [ 383.125478] XFS (loop4): Invalid superblock magic number 17:55:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413", 0x11, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:55:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$P9_RAUTH(r1, &(0x7f0000000080)={0x14, 0x67, 0x0, {0x0, 0x0, 0x1}}, 0x14) r2 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl(r2, 0xffffffffffffffb8, &(0x7f0000000480)="29689d84333bba4883df8d4319983aeddd") mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x11, r1, 0x0) ioctl$FS_IOC_GETFLAGS(r1, 0xc020660b, &(0x7f0000000000)) fcntl$setstatus(r2, 0x4, 0x800) [ 383.139307] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor2,pid=9889,uid=0 [ 383.170828] Memory cgroup out of memory: Kill process 9889 (syz-executor2) score 1113 or sacrifice child [ 383.183801] Killed process 9889 (syz-executor2) total-vm:72576kB, anon-rss:2192kB, file-rss:35788kB, shmem-rss:0kB 17:55:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:55:28 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x500) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000140)={0x1}) ioctl$SIOCAX25NOUID(r2, 0x89e3, &(0x7f0000000280)=0x1) r3 = socket$kcm(0x29, 0x5, 0x0) write$FUSE_LSEEK(r2, &(0x7f0000000180)={0x18, 0xfffffffffffffffe, 0x2, {0x7fffffff}}, 0x18) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000200)=0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) 17:55:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a06000000000000000000", 0x20, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:55:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413", 0x11, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:55:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$P9_RAUTH(r1, &(0x7f0000000080)={0x14, 0x67, 0x0, {0x0, 0x0, 0x1}}, 0x14) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x8, 0x10, r1, 0x0) ioctl$FS_IOC_GETFLAGS(r1, 0xc020660b, &(0x7f0000000280)) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000180)={{0x2, 0x4e21, @loopback}, {0x306, @broadcast}, 0x10, {0x2, 0x4e24, @loopback}, 'bcsf0\x00'}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000001ac0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f00000003c0)=0x14) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000480)={r2, 0x81}, 0x8) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f00000002c0)={0x0, 0x5, 0x1000, 0x7ff, 0x4, 0x8, 0x0, 0xfda4, {0x0, @in={{0x2, 0x4e23, @remote}}, 0x9, 0x5bb, 0x2, 0x91, 0x6e}}, &(0x7f0000000380)=0xb0) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000440)={r3, 0x401, 0xc2, 0x8}, &(0x7f0000000400)=0x10) ioctl$DRM_IOCTL_MODE_GETCRTC(r1, 0xc06864a1, &(0x7f00000019c0)={&(0x7f0000001980)=[0x9], 0x1, 0x3, 0x8, 0x2, 0xfffffffffffffffa, 0xc4dd, {0x5, 0x3, 0x8, 0x100000000, 0x7, 0x0, 0xfffffffeffffffff, 0xc4e, 0x8, 0x7, 0xff, 0x100000000, 0x7, 0xcf7, "496d8280a14d9ffbf95207b530560deb361cc913f6ca4062bbc92743c0e434f7"}}) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)) pwritev(r1, &(0x7f00000018c0)=[{&(0x7f00000004c0)="1ec7ac1a2d68c095c4ef01cdadb71a98be3b7a44e6200d6c1ab64652e8ad1e0f54c6fde349c17a14eba145f8913beb71908fbd111b93a4c1f92da20d8611d11999cc6aca5771a4f67f5422c557", 0x4d}, {&(0x7f0000000540)="8e104a0626193c5a0fa2de81c55d", 0xe}, {&(0x7f0000000580)="d5eb6fbdfb6fab9bbba96f15d68c67199151aeb9c7cfd869a6e1bbcc0bf1d2a2188725070c5e2db8e9f2a8fc8b1afb4193453f56ff986c9e84266b557470a8e38a46a5feb865e4f151dcb46759a8aae2114c47fd6f6fd8a9d71e5171fa0fe86a19d9c7", 0x63}, {&(0x7f0000000600)="e49f54e94723edd1aaa0922d96343b2c41c5a3666c4ea5590cfd570271c2b66d6765b3d83ec847a5211b7712da82b9da3af21fdf681d2adbe03de537679befd65d0720c2eacec4fd1b9d4cea52f168088d39152a9c197bcc29fb1ff84d4c8d590207293bf8547a48fea6b51dde171e8da3306c7df31632d10337291d5716d179dec637028d4988547b79beddbb9942be4c0458ef519c176f3a20117119e0cb9d485011ec71ebc5c9d685b205da38d16f62825cdcf559ed8471896792789f907d6a796290b7f36b", 0xc7}, {&(0x7f0000000700)="e2ab15055aef5261c4445f557992da79a68a45ad6456c3501642bb68f41227065513088172d662939395f7bdd22a5dffc172a87ba0e707bfde0dae75afac3920a93ddd6cef7145123bba5a7a2cb24ed4c8754f1c62cb699acdff5a45b7f274ca76d835549031db086ca56178b86b63e4f8af501fdb1760ad79d2b7183cea01662e76d2481d6b595d1d262a55b27345be25a3bd284b480d105ee97a5d409e9715e00ec96b7a9517ad9fcb6c9e48ed5bdd129073194cfbe006104847c9977fd3784f7f021c52d14e1c6c152c0b49d5734225", 0xd1}, {&(0x7f0000000800)="59d8823b06269d08b6b02e759b55573aed38b7fe9663d41e0ad41e9c82964e9cb3e65a", 0x23}, {&(0x7f0000000840)="6e30445f14014679ae0b435276981b6f17c8c58448823cad0386aa516ea7848a9ca37d8720eac3acb05ee9be66662e970719fed176fcf1c5d103f01e711e3d02aacd493944ee516f2c704b7850aea099daba6781", 0x54}, {&(0x7f00000008c0)="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", 0x1000}], 0x8, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000200)=@assoc_id=r4, &(0x7f0000000240)=0x4) ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f0000000000)={0x2, 0x8, 0x2, 0x2c80, 0x8}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000001940)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) [ 383.352527] SELinux: security policydb version 15 (MLS) not backwards compatible [ 383.361374] device nr0 entered promiscuous mode [ 383.387927] SELinux: failed to load policy 17:55:28 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000709000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 383.411316] SELinux: security policydb version 15 (MLS) not backwards compatible [ 383.419769] SELinux: failed to load policy [ 383.424950] XFS (loop4): Invalid superblock magic number [ 383.482115] SELinux: security policydb version 15 (MLS) not backwards compatible [ 383.502108] syz-executor2 invoked oom-killer: gfp_mask=0x7080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 383.519299] SELinux: failed to load policy [ 383.527310] CPU: 1 PID: 14543 Comm: syz-executor2 Not tainted 5.0.0-rc4 #49 [ 383.534421] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 383.534428] Call Trace: [ 383.534450] dump_stack+0x1db/0x2d0 [ 383.534469] ? dump_stack_print_info.cold+0x20/0x20 [ 383.534497] dump_header+0x1e6/0x116c [ 383.558822] ? add_lock_to_list.isra.0+0x450/0x450 [ 383.558842] ? print_usage_bug+0xd0/0xd0 [ 383.558862] ? pagefault_out_of_memory+0x1a1/0x1a1 [ 383.558879] ? ___ratelimit+0x37c/0x686 [ 383.576770] ? mark_held_locks+0xb1/0x100 [ 383.580956] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 383.586066] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 383.591175] ? lockdep_hardirqs_on+0x415/0x5d0 [ 383.595776] ? trace_hardirqs_on+0xbd/0x310 [ 383.600114] ? kasan_check_read+0x11/0x20 [ 383.604270] ? ___ratelimit+0x37c/0x686 [ 383.608244] ? trace_hardirqs_off_caller+0x300/0x300 [ 383.613350] ? do_raw_spin_trylock+0x270/0x270 [ 383.618102] ? trace_hardirqs_on_caller+0x310/0x310 [ 383.623154] ? lock_acquire+0x1db/0x570 [ 383.627162] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 383.632275] ? ___ratelimit+0xac/0x686 [ 383.636180] ? idr_get_free+0xee0/0xee0 [ 383.640166] ? lockdep_hardirqs_on+0x415/0x5d0 [ 383.644764] oom_kill_process.cold+0x10/0x9d4 [ 383.649268] ? cgroup_procs_next+0x70/0x70 [ 383.653518] ? _raw_spin_unlock_irq+0x5e/0x90 [ 383.658019] ? oom_badness+0xa50/0xa50 [ 383.661919] ? oom_evaluate_task+0x540/0x540 [ 383.666332] ? mem_cgroup_iter_break+0x30/0x30 [ 383.670915] ? mutex_trylock+0x2d0/0x2d0 [ 383.674978] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 383.680532] ? rcu_read_unlock_special+0x380/0x380 [ 383.685471] out_of_memory+0x885/0x1420 [ 383.689453] ? mem_cgroup_iter+0x508/0xf30 [ 383.693701] ? oom_killer_disable+0x340/0x340 [ 383.698216] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 383.703325] ? lock_acquire+0x1db/0x570 [ 383.707314] mem_cgroup_out_of_memory+0x160/0x210 [ 383.712167] ? do_raw_spin_unlock+0xa0/0x330 [ 383.716582] ? memcg_memory_event+0x40/0x40 [ 383.720908] ? do_raw_spin_trylock+0x270/0x270 [ 383.725504] ? _raw_spin_unlock+0x2d/0x50 [ 383.729664] try_charge+0x12a9/0x19b0 [ 383.733465] ? lock_downgrade+0x910/0x910 [ 383.737615] ? kasan_check_read+0x11/0x20 [ 383.741793] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 383.746672] ? get_mem_cgroup_from_mm+0x1cd/0x420 [ 383.751519] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 383.757063] ? lock_downgrade+0x910/0x910 [ 383.761212] ? kasan_check_read+0x11/0x20 [ 383.765360] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 383.770664] ? rcu_read_unlock_special+0x380/0x380 [ 383.775608] ? get_mem_cgroup_from_mm+0x1ea/0x420 [ 383.780467] memcg_kmem_charge_memcg+0x7c/0x130 [ 383.785149] ? memcg_kmem_put_cache+0xb0/0xb0 [ 383.789652] ? lock_release+0xc40/0xc40 [ 383.793649] memcg_kmem_charge+0x13b/0x340 [ 383.797891] __alloc_pages_nodemask+0x7b8/0xdc0 [ 383.802571] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 383.807588] ? rcu_pm_notify+0xd0/0xd0 [ 383.811489] ? rcu_read_lock_sched_held+0x110/0x130 [ 383.816509] ? kmem_cache_alloc_node+0x347/0x710 [ 383.821271] ? print_usage_bug+0xd0/0xd0 [ 383.825349] copy_process+0x847/0x8860 [ 383.829242] ? print_usage_bug+0xd0/0xd0 [ 383.833315] ? rcu_read_unlock+0x16/0x60 [ 383.837389] ? __lock_acquire+0x572/0x4a30 [ 383.841628] ? mark_held_locks+0x100/0x100 [ 383.845883] ? __cleanup_sighand+0x70/0x70 [ 383.850125] ? mark_held_locks+0x100/0x100 [ 383.854378] ? find_held_lock+0x35/0x120 [ 383.858452] ? mark_held_locks+0x100/0x100 [ 383.862698] ? delayacct_end+0xc9/0x100 [ 383.866677] ? add_lock_to_list.isra.0+0x450/0x450 [ 383.871615] ? lock_acquire+0x1db/0x570 [ 383.875605] ? add_lock_to_list.isra.0+0x450/0x450 [ 383.880531] ? find_held_lock+0x35/0x120 [ 383.884595] ? print_usage_bug+0xd0/0xd0 [ 383.888688] ? psi_memstall_leave+0x1f8/0x280 [ 383.893189] ? find_held_lock+0x35/0x120 [ 383.897257] ? __lock_acquire+0x572/0x4a30 [ 383.901494] ? _raw_spin_unlock_irq+0x28/0x90 [ 383.905994] ? _raw_spin_unlock_irq+0x28/0x90 [ 383.910496] ? lockdep_hardirqs_on+0x415/0x5d0 [ 383.915082] ? trace_hardirqs_on+0xbd/0x310 [ 383.919413] ? mark_held_locks+0x100/0x100 [ 383.923663] ? check_preemption_disabled+0x48/0x290 [ 383.928689] ? rcu_lockdep_current_cpu_online+0x1aa/0x220 [ 383.934253] ? rcu_pm_notify+0xd0/0xd0 [ 383.938162] ? add_lock_to_list.isra.0+0x450/0x450 [ 383.943100] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 383.948659] ? try_to_free_mem_cgroup_pages+0x597/0xcd0 [ 383.954023] ? lockdep_hardirqs_on+0x415/0x5d0 [ 383.958666] ? try_to_free_pages+0xb70/0xb70 [ 383.963088] ? percpu_ref_put_many+0x129/0x270 [ 383.967736] ? blkcg_maybe_throttle_current+0x75e/0x1400 [ 383.973205] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 383.978771] _do_fork+0x1a9/0x1170 [ 383.982330] ? fork_idle+0x1d0/0x1d0 [ 383.986058] ? trace_hardirqs_off+0xb8/0x310 [ 383.990467] ? get_mctgt_type_thp.isra.0+0x4c0/0x4c0 [ 383.995576] ? prepare_exit_to_usermode+0x32e/0x3b0 [ 384.000599] ? do_syscall_64+0x8c/0x800 [ 384.004580] ? do_syscall_64+0x8c/0x800 [ 384.008559] ? lockdep_hardirqs_on+0x415/0x5d0 [ 384.013151] ? trace_hardirqs_on+0xbd/0x310 [ 384.017484] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 384.022853] ? trace_hardirqs_off_caller+0x300/0x300 [ 384.028163] __x64_sys_clone+0xbf/0x150 [ 384.032172] do_syscall_64+0x1a3/0x800 [ 384.036071] ? syscall_return_slowpath+0x5f0/0x5f0 [ 384.041007] ? prepare_exit_to_usermode+0x232/0x3b0 [ 384.046037] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 384.050887] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 384.056088] RIP: 0033:0x45aa69 [ 384.059288] Code: ff 48 85 f6 0f 84 97 8d fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c 6e 8d fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 384.078216] RSP: 002b:00007fff32860c38 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 384.085922] RAX: ffffffffffffffda RBX: 00007fe2862b6700 RCX: 000000000045aa69 [ 384.093191] RDX: 00007fe2862b69d0 RSI: 00007fe2862b5db0 RDI: 00000000003d0f00 [ 384.100475] RBP: 00007fff32860e40 R08: 00007fe2862b6700 R09: 00007fe2862b6700 [ 384.107745] R10: 00007fe2862b69d0 R11: 0000000000000202 R12: 0000000000000000 [ 384.115014] R13: 00007fff32860cef R14: 00007fe2862b69c0 R15: 0000000000000001 17:55:29 executing program 0 (fault-call:4 fault-nth:0): r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045700, &(0x7f0000000100)) [ 384.131441] memory: usage 307200kB, limit 307200kB, failcnt 313 [ 384.145757] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 384.163534] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 17:55:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$P9_RAUTH(r1, &(0x7f0000000080)={0x14, 0x67, 0x0, {0x0, 0x0, 0x1}}, 0x14) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x11, r1, 0x0) ioctl$FS_IOC_GETFLAGS(r1, 0xc020660b, &(0x7f0000000000)) 17:55:29 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x500) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000140)={0x1}) ioctl$SIOCAX25NOUID(r2, 0x89e3, &(0x7f0000000280)=0x1) r3 = socket$kcm(0x29, 0x5, 0x0) write$FUSE_LSEEK(r2, &(0x7f0000000180)={0x18, 0xfffffffffffffffe, 0x2, {0x7fffffff}}, 0x18) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000200)=0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) 17:55:29 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a06000000000000000000", 0x20, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:55:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) [ 384.214544] Memory cgroup stats for /syz2: cache:0KB rss:268392KB rss_huge:251904KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:268540KB inactive_file:0KB active_file:0KB unevictable:0KB [ 384.281960] FAULT_INJECTION: forcing a failure. [ 384.281960] name failslab, interval 1, probability 0, space 0, times 0 [ 384.331589] device nr0 entered promiscuous mode [ 384.332206] CPU: 0 PID: 14557 Comm: syz-executor0 Not tainted 5.0.0-rc4 #49 [ 384.343471] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 384.352822] Call Trace: [ 384.355421] dump_stack+0x1db/0x2d0 [ 384.358866] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor2,pid=10030,uid=0 [ 384.359062] ? dump_stack_print_info.cold+0x20/0x20 [ 384.359091] should_fail.cold+0xa/0x15 [ 384.359111] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 384.359152] ? ___might_sleep+0x1e7/0x310 [ 384.374071] Memory cgroup out of memory: Kill process 10030 (syz-executor2) score 1113 or sacrifice child [ 384.378636] ? arch_local_save_flags+0x50/0x50 [ 384.378664] __should_failslab+0x121/0x190 [ 384.378685] should_failslab+0x9/0x14 [ 384.378701] kmem_cache_alloc+0x2be/0x710 [ 384.378721] ? __might_sleep+0x95/0x190 [ 384.378758] __anon_vma_prepare+0xc2/0x760 [ 384.384115] Killed process 10030 (syz-executor2) total-vm:72576kB, anon-rss:2192kB, file-rss:35788kB, shmem-rss:0kB [ 384.387730] ? anon_vma_fork+0x880/0x880 [ 384.387753] ? mark_held_locks+0xb1/0x100 [ 384.387775] do_huge_pmd_anonymous_page+0x1170/0x17f0 [ 384.387791] ? trace_hardirqs_on+0xbd/0x310 [ 384.387805] ? kasan_check_read+0x11/0x20 [ 384.387822] ? rcu_preempt_deferred_qs_irqrestore+0x6ee/0xfd0 [ 384.387840] ? __thp_get_unmapped_area+0x190/0x190 [ 384.414258] ? rcu_force_quiescent_state+0x10/0x10 [ 384.414285] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 384.414303] ? pud_val+0x85/0x100 [ 384.414318] ? pmd_val+0x100/0x100 [ 384.414343] __handle_mm_fault+0x385a/0x55a0 [ 384.414367] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 384.422467] ? handle_mm_fault+0x3cc/0xc80 [ 384.422500] ? lock_downgrade+0x910/0x910 [ 384.422522] ? rcu_read_unlock_special+0x380/0x380 [ 384.422539] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 384.422557] ? check_preemption_disabled+0x48/0x290 [ 384.422578] handle_mm_fault+0x4ec/0xc80 17:55:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$P9_RAUTH(r1, &(0x7f0000000080)={0x14, 0x67, 0x0, {0x0, 0x0, 0x1}}, 0x14) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x11, r1, 0x0) gettid() ioctl$VIDIOC_SUBDEV_S_SELECTION(r1, 0xc040563e, &(0x7f00000000c0)={0x1, 0x0, 0x100, 0x5, {0xd54, 0xfffffffffffffff7, 0x81, 0xfffffffffffffffe}}) ioctl$FS_IOC_GETFLAGS(r1, 0xc020660b, &(0x7f0000000000)) 17:55:29 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000001009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 384.435207] syz-executor2 invoked oom-killer: gfp_mask=0x7080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 384.437367] ? __handle_mm_fault+0x55a0/0x55a0 [ 384.437384] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 384.437398] ? vmacache_update+0x114/0x140 [ 384.437426] __do_page_fault+0x5da/0xd60 [ 384.437440] ? lock_downgrade+0x910/0x910 [ 384.437465] do_page_fault+0xe6/0x7d8 [ 384.451441] SELinux: security policydb version 15 (MLS) not backwards compatible [ 384.455152] ? vmalloc_sync_all+0x30/0x30 [ 384.455168] ? find_held_lock+0x35/0x120 [ 384.455185] ? __might_fault+0x12b/0x1e0 [ 384.455210] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 384.455236] page_fault+0x1e/0x30 [ 384.455253] RIP: 0010:__put_user_4+0x1c/0x30 [ 384.455273] Code: 1f 00 c3 90 66 2e 0f 1f 84 00 00 00 00 00 65 48 8b 1c 25 40 ee 01 00 48 8b 9b 18 14 00 00 48 83 eb 03 48 39 d9 73 3c 0f 1f 00 <89> 01 31 c0 0f 1f 00 c3 66 90 66 2e 0f 1f 84 00 00 00 00 00 65 48 [ 384.466103] SELinux: failed to load policy [ 384.470196] RSP: 0018:ffff88804f2afb30 EFLAGS: 00010297 [ 384.470209] RAX: 0000000000020000 RBX: 00007fffffffeffd RCX: 0000000020000100 [ 384.470219] RDX: 0000000000000073 RSI: ffffffff81b4f373 RDI: 0000000000000282 [ 384.470229] RBP: ffff88804f2afc60 R08: ffff8880910765c0 R09: 0000000000000001 [ 384.470238] R10: 0000000000000000 R11: 0000000000000001 R12: 1ffff11009e55f67 [ 384.470248] R13: 0000000020000100 R14: 0000000000020000 R15: 0000000000000057 [ 384.470276] ? __might_fault+0x1a3/0x1e0 [ 384.470408] ? snd_rawmidi_ioctl+0x12f/0x800 [ 384.470425] ? snd_rawmidi_output_params+0x180/0x180 [ 384.509947] ? ___might_sleep+0x1e7/0x310 [ 384.509965] ? arch_local_save_flags+0x50/0x50 17:55:29 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000002009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 384.509981] ? __fget+0x499/0x710 [ 384.510005] ? __might_sleep+0x95/0x190 [ 384.510024] ? snd_rawmidi_output_params+0x180/0x180 [ 384.510040] do_vfs_ioctl+0x107b/0x17d0 [ 384.510058] ? selinux_file_ioctl+0x511/0x720 [ 384.510071] ? selinux_file_ioctl+0x125/0x720 [ 384.510086] ? ioctl_preallocate+0x2f0/0x2f0 [ 384.510114] ? selinux_file_mprotect+0x620/0x620 [ 384.510138] ? __fget_light+0x2db/0x420 [ 384.510182] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 384.510196] ? fput+0x128/0x1a0 17:55:29 executing program 0 (fault-call:4 fault-nth:1): r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045700, &(0x7f0000000100)) [ 384.510225] ? do_syscall_64+0x8c/0x800 [ 384.510245] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 384.510263] ? security_file_ioctl+0x93/0xc0 [ 384.510282] ksys_ioctl+0xab/0xd0 [ 384.510301] __x64_sys_ioctl+0x73/0xb0 [ 384.510334] do_syscall_64+0x1a3/0x800 [ 384.510353] ? syscall_return_slowpath+0x5f0/0x5f0 [ 384.510370] ? prepare_exit_to_usermode+0x232/0x3b0 [ 384.520931] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 384.520956] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 384.520969] RIP: 0033:0x458099 [ 384.520984] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 384.520991] RSP: 002b:00007fec28d70c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 384.521008] RAX: ffffffffffffffda RBX: 00007fec28d70c90 RCX: 0000000000458099 [ 384.536309] RDX: 0000000020000100 RSI: 2000000880045700 RDI: 0000000000000003 [ 384.536318] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 384.536328] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fec28d716d4 [ 384.536337] R13: 00000000004c33b1 R14: 00000000004d5e98 R15: 0000000000000006 [ 384.552302] CPU: 0 PID: 14545 Comm: syz-executor2 Not tainted 5.0.0-rc4 #49 [ 384.581089] SELinux: security policydb version 15 (MLS) not backwards compatible [ 384.582757] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 384.582763] Call Trace: [ 384.582781] dump_stack+0x1db/0x2d0 [ 384.582801] ? dump_stack_print_info.cold+0x20/0x20 [ 384.582831] dump_header+0x1e6/0x116c 17:55:29 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000003f09000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 384.588049] SELinux: failed to load policy [ 384.591115] ? add_lock_to_list.isra.0+0x450/0x450 [ 384.591151] ? print_usage_bug+0xd0/0xd0 [ 384.591172] ? pagefault_out_of_memory+0x1a1/0x1a1 [ 384.591189] ? ___ratelimit+0x37c/0x686 [ 384.591210] ? mark_held_locks+0xb1/0x100 [ 384.591228] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 384.591245] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 384.614538] ? lockdep_hardirqs_on+0x415/0x5d0 [ 384.614556] ? trace_hardirqs_on+0xbd/0x310 [ 384.614571] ? kasan_check_read+0x11/0x20 [ 384.614587] ? ___ratelimit+0x37c/0x686 [ 384.614602] ? trace_hardirqs_off_caller+0x300/0x300 [ 384.614618] ? do_raw_spin_trylock+0x270/0x270 [ 384.614633] ? trace_hardirqs_on_caller+0x310/0x310 [ 384.627847] SELinux: security policydb version 15 (MLS) not backwards compatible [ 384.631471] ? lock_acquire+0x1db/0x570 [ 384.631495] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 384.631513] ? ___ratelimit+0xac/0x686 [ 384.631532] ? idr_get_free+0xee0/0xee0 [ 384.631547] ? lockdep_hardirqs_on+0x415/0x5d0 [ 384.631573] oom_kill_process.cold+0x10/0x9d4 [ 384.631592] ? cgroup_procs_next+0x70/0x70 [ 384.631611] ? _raw_spin_unlock_irq+0x5e/0x90 [ 384.639436] SELinux: failed to load policy [ 384.646155] ? oom_badness+0xa50/0xa50 [ 384.646177] ? oom_evaluate_task+0x540/0x540 [ 384.646194] ? mem_cgroup_iter_break+0x30/0x30 [ 384.646208] ? mutex_trylock+0x2d0/0x2d0 [ 384.646223] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 384.646251] ? rcu_read_unlock_special+0x380/0x380 [ 384.646273] out_of_memory+0x885/0x1420 [ 384.646290] ? mem_cgroup_iter+0x508/0xf30 [ 384.646305] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 384.646324] ? oom_killer_disable+0x340/0x340 [ 384.683070] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 384.683087] ? lock_acquire+0x1db/0x570 [ 384.683115] mem_cgroup_out_of_memory+0x160/0x210 [ 384.683139] ? do_raw_spin_unlock+0xa0/0x330 [ 384.683162] ? memcg_memory_event+0x40/0x40 [ 384.690568] ? do_raw_spin_trylock+0x270/0x270 [ 384.690594] ? _raw_spin_unlock+0x2d/0x50 [ 384.690628] try_charge+0xd44/0x19b0 [ 384.690670] ? lock_downgrade+0x910/0x910 [ 384.690683] ? kasan_check_read+0x11/0x20 [ 384.690704] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 384.690717] ? get_mem_cgroup_from_mm+0x1cd/0x420 [ 384.690735] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 384.706705] XFS (loop4): Invalid superblock magic number [ 384.708781] ? lock_downgrade+0x910/0x910 [ 384.708795] ? kasan_check_read+0x11/0x20 [ 384.708813] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 384.760683] ? rcu_read_unlock_special+0x380/0x380 [ 384.760710] ? get_mem_cgroup_from_mm+0x1ea/0x420 [ 384.760730] memcg_kmem_charge_memcg+0x7c/0x130 [ 384.760745] ? memcg_kmem_put_cache+0xb0/0xb0 [ 384.760758] ? lock_release+0xc40/0xc40 [ 384.760780] memcg_kmem_charge+0x13b/0x340 [ 384.770644] __alloc_pages_nodemask+0x7b8/0xdc0 [ 384.778564] SELinux: security policydb version 15 (MLS) not backwards compatible [ 384.779015] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 384.843097] SELinux: security policydb version 15 (MLS) not backwards compatible [ 384.848996] ? rcu_pm_notify+0xd0/0xd0 [ 384.849024] ? rcu_read_lock_sched_held+0x110/0x130 [ 384.849040] ? kmem_cache_alloc_node+0x347/0x710 [ 384.849070] copy_process+0x847/0x8860 [ 384.865783] FAULT_INJECTION: forcing a failure. [ 384.865783] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 384.865949] ? find_held_lock+0x35/0x120 [ 385.202849] ? try_to_wake_up+0xf9/0x1480 [ 385.207008] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 385.212118] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 385.217246] ? preempt_schedule+0x4b/0x60 [ 385.221398] ? preempt_schedule_common+0x4f/0xe0 [ 385.226189] ? __cleanup_sighand+0x70/0x70 [ 385.230431] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 385.235543] ? try_to_wake_up+0xf9/0x1480 [ 385.239707] ? migrate_swap_stop+0x920/0x920 [ 385.244125] ? futex_wake+0x62c/0x7b0 [ 385.247948] ? lock_acquire+0x1db/0x570 [ 385.251935] ? kasan_check_read+0x11/0x20 [ 385.256088] ? do_raw_spin_unlock+0xa0/0x330 [ 385.260500] ? do_raw_spin_trylock+0x270/0x270 [ 385.265090] ? print_usage_bug+0xd0/0xd0 [ 385.269188] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 385.274398] ? drop_futex_key_refs.isra.0+0x6f/0xf0 [ 385.279423] ? __lock_acquire+0x572/0x4a30 [ 385.283664] ? get_futex_key+0x2050/0x2050 [ 385.287940] ? mark_held_locks+0x100/0x100 [ 385.292187] ? do_futex+0x1b0/0x2910 [ 385.295912] ? save_stack+0xa9/0xd0 [ 385.299543] ? save_stack+0x45/0xd0 [ 385.303196] ? __kasan_slab_free+0x102/0x150 [ 385.307620] ? add_lock_to_list.isra.0+0x450/0x450 [ 385.312572] ? add_lock_to_list.isra.0+0x450/0x450 [ 385.317536] ? exit_robust_list+0x290/0x290 [ 385.321861] ? __might_fault+0x12b/0x1e0 [ 385.325919] ? find_held_lock+0x35/0x120 [ 385.329986] ? __might_fault+0x12b/0x1e0 [ 385.334066] ? lock_acquire+0x1db/0x570 [ 385.338063] ? lock_downgrade+0x910/0x910 [ 385.342230] ? lock_release+0xc40/0xc40 [ 385.346221] ? trace_hardirqs_off_caller+0x300/0x300 [ 385.351344] _do_fork+0x1a9/0x1170 [ 385.354914] ? fork_idle+0x1d0/0x1d0 [ 385.358644] ? kasan_check_read+0x11/0x20 [ 385.362809] ? _copy_to_user+0xc9/0x120 [ 385.366793] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 385.372341] ? put_timespec64+0x115/0x1b0 [ 385.376500] ? nsecs_to_jiffies+0x30/0x30 [ 385.380657] ? do_syscall_64+0x8c/0x800 [ 385.384633] ? do_syscall_64+0x8c/0x800 [ 385.388613] ? lockdep_hardirqs_on+0x415/0x5d0 [ 385.393203] ? trace_hardirqs_on+0xbd/0x310 [ 385.397536] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 385.403077] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 385.408446] ? trace_hardirqs_off_caller+0x300/0x300 [ 385.413565] __x64_sys_clone+0xbf/0x150 [ 385.417561] do_syscall_64+0x1a3/0x800 [ 385.421455] ? syscall_return_slowpath+0x5f0/0x5f0 [ 385.426391] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 385.431408] ? __switch_to_asm+0x34/0x70 [ 385.435479] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 385.440336] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 385.445526] RIP: 0033:0x458099 [ 385.448717] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 385.467616] RSP: 002b:00007fe2862d6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 385.475327] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000458099 [ 385.482596] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0020002102001fff [ 385.489862] RBP: 000000000073bf00 R08: ffffffffffffffff R09: 0000000000000000 [ 385.497166] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2862d76d4 [ 385.504440] R13: 00000000004be480 R14: 00000000004cea40 R15: 00000000ffffffff [ 385.518241] CPU: 0 PID: 14591 Comm: syz-executor0 Not tainted 5.0.0-rc4 #49 [ 385.521140] memory: usage 305580kB, limit 307200kB, failcnt 315 [ 385.525354] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 385.525360] Call Trace: [ 385.525379] dump_stack+0x1db/0x2d0 [ 385.525398] ? dump_stack_print_info.cold+0x20/0x20 [ 385.551988] ? do_huge_pmd_anonymous_page+0x1170/0x17f0 [ 385.557371] ? __handle_mm_fault+0x385a/0x55a0 [ 385.561963] ? __put_user_4+0x1c/0x30 [ 385.562257] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 385.565771] should_fail.cold+0xa/0x15 [ 385.565792] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 385.565806] ? find_held_lock+0x35/0x120 [ 385.565823] ? __anon_vma_prepare+0x368/0x760 [ 385.590086] ? lock_downgrade+0x910/0x910 [ 385.594240] ? __anon_vma_prepare+0x33e/0x760 [ 385.598745] should_fail_alloc_page+0x50/0x60 [ 385.603251] __alloc_pages_nodemask+0x323/0xdc0 [ 385.607943] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 385.612970] ? down_write_nested+0x130/0x130 [ 385.616420] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 385.617390] ? __anon_vma_prepare+0x36d/0x760 [ 385.628022] ? anon_vma_fork+0x880/0x880 [ 385.632085] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 385.637639] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 385.643186] alloc_pages_vma+0x39a/0x540 [ 385.646673] Memory cgroup stats for /syz2: cache:0KB rss:266444KB rss_huge:249856KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:266620KB inactive_file:0KB active_file:8KB unevictable:0KB [ 385.647258] do_huge_pmd_anonymous_page+0x53a/0x17f0 [ 385.647292] ? __thp_get_unmapped_area+0x190/0x190 [ 385.677934] ? mark_held_locks+0x100/0x100 [ 385.682184] ? mark_held_locks+0x100/0x100 [ 385.686424] ? print_usage_bug+0xd0/0xd0 [ 385.690493] ? pud_val+0x85/0x100 [ 385.693950] ? pmd_val+0x100/0x100 [ 385.697579] ? process_measurement+0x268/0x1be0 [ 385.702275] __handle_mm_fault+0x385a/0x55a0 [ 385.706704] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 385.711551] ? check_preemption_disabled+0x48/0x290 [ 385.716576] ? handle_mm_fault+0x3cc/0xc80 [ 385.720833] ? lock_downgrade+0x910/0x910 [ 385.724983] ? kasan_check_read+0x11/0x20 [ 385.729152] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 385.734464] ? rcu_read_unlock_special+0x380/0x380 [ 385.738047] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor2,pid=10064,uid=0 [ 385.739403] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 385.739421] ? check_preemption_disabled+0x48/0x290 [ 385.739443] handle_mm_fault+0x4ec/0xc80 [ 385.768499] ? __handle_mm_fault+0x55a0/0x55a0 [ 385.773087] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 385.778632] ? vmacache_update+0x114/0x140 [ 385.782923] __do_page_fault+0x5da/0xd60 [ 385.787003] ? lock_downgrade+0x910/0x910 [ 385.791181] do_page_fault+0xe6/0x7d8 [ 385.794996] ? vmalloc_sync_all+0x30/0x30 [ 385.799162] ? find_held_lock+0x35/0x120 [ 385.803231] ? __might_fault+0x12b/0x1e0 [ 385.807306] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 385.807660] Memory cgroup out of memory: Kill process 10064 (syz-executor2) score 1113 or sacrifice child [ 385.812183] page_fault+0x1e/0x30 [ 385.812201] RIP: 0010:__put_user_4+0x1c/0x30 [ 385.812224] Code: 1f 00 c3 90 66 2e 0f 1f 84 00 00 00 00 00 65 48 8b 1c 25 40 ee 01 00 48 8b 9b 18 14 00 00 48 83 eb 03 48 39 d9 73 3c 0f 1f 00 <89> 01 31 c0 0f 1f 00 c3 66 90 66 2e 0f 1f 84 00 00 00 00 00 65 48 [ 385.812236] RSP: 0018:ffff8880964e7b30 EFLAGS: 00010297 [ 385.812249] RAX: 0000000000020000 RBX: 00007fffffffeffd RCX: 0000000020000100 [ 385.812262] RDX: 0000000000000073 RSI: ffffffff81b4f373 RDI: 0000000000000282 [ 385.812276] RBP: ffff8880964e7c60 R08: ffff88804a2f6280 R09: 0000000000000001 [ 385.812289] R10: 0000000000000000 R11: 0000000000000001 R12: 1ffff11012c9cf67 [ 385.812297] R13: 0000000020000100 R14: 0000000000020000 R15: 0000000000000057 [ 385.812333] ? __might_fault+0x1a3/0x1e0 [ 385.871827] Killed process 10064 (syz-executor2) total-vm:72576kB, anon-rss:2192kB, file-rss:35788kB, shmem-rss:0kB [ 385.875920] ? snd_rawmidi_ioctl+0x12f/0x800 [ 385.875936] ? snd_rawmidi_output_params+0x180/0x180 [ 385.875971] ? ___might_sleep+0x1e7/0x310 [ 385.875987] ? arch_local_save_flags+0x50/0x50 [ 385.923364] ? __fget+0x499/0x710 [ 385.926832] ? __might_sleep+0x95/0x190 [ 385.930823] ? snd_rawmidi_output_params+0x180/0x180 [ 385.935655] oom_reaper: reaped process 10064 (syz-executor2), now anon-rss:0kB, file-rss:34828kB, shmem-rss:0kB [ 385.935934] do_vfs_ioctl+0x107b/0x17d0 [ 385.950148] ? selinux_file_ioctl+0x511/0x720 [ 385.954653] ? selinux_file_ioctl+0x125/0x720 [ 385.959169] ? ioctl_preallocate+0x2f0/0x2f0 [ 385.963582] ? selinux_file_mprotect+0x620/0x620 [ 385.968343] ? __fget_light+0x2db/0x420 [ 385.972329] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 385.977876] ? fput+0x128/0x1a0 [ 385.981180] ? do_syscall_64+0x8c/0x800 [ 385.985183] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 385.990728] ? security_file_ioctl+0x93/0xc0 [ 385.995166] ksys_ioctl+0xab/0xd0 [ 385.998634] __x64_sys_ioctl+0x73/0xb0 [ 386.002539] do_syscall_64+0x1a3/0x800 [ 386.006440] ? syscall_return_slowpath+0x5f0/0x5f0 [ 386.011380] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 386.016405] ? __switch_to_asm+0x34/0x70 [ 386.020480] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 386.025824] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 386.031016] RIP: 0033:0x458099 [ 386.034212] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 386.053112] RSP: 002b:00007fec28d4fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 386.060838] RAX: ffffffffffffffda RBX: 00007fec28d4fc90 RCX: 0000000000458099 [ 386.068108] RDX: 0000000020000100 RSI: 2000000880045700 RDI: 0000000000000003 [ 386.075390] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 17:55:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 386.082666] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fec28d506d4 [ 386.089934] R13: 00000000004c33b1 R14: 00000000004d5e98 R15: 0000000000000006 17:55:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:55:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x3, 0x100) r2 = openat$cgroup_ro(r1, &(0x7f00000002c0)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\x02\x00\x00\x00\x00\x00\x00\x00\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000180)=0xffffffffffffffff, 0x4) socketpair$unix(0x1, 0x400000002, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x61fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = getpid() rt_tgsigqueueinfo(r4, r4, 0x10000000016, &(0x7f00000000c0)) ptrace(0x10, r4) ptrace$poke(0x11, r4, &(0x7f0000000000), 0x0) write$P9_RAUTH(r2, &(0x7f0000000080)={0x14, 0x67, 0x0, {0x0, 0x0, 0x1}}, 0x14) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x11, r2, 0x0) getresgid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000240)=0x0) r6 = getegid() r7 = getegid() r8 = getegid() getgroups(0x4, &(0x7f0000000280)=[r5, r6, r7, r8]) ioctl$FS_IOC_GETFLAGS(r3, 0xc020660b, &(0x7f0000000200)) 17:55:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:55:31 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x500) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000140)={0x1}) ioctl$SIOCAX25NOUID(r2, 0x89e3, &(0x7f0000000280)=0x1) r3 = socket$kcm(0x29, 0x5, 0x0) write$FUSE_LSEEK(r2, &(0x7f0000000180)={0x18, 0xfffffffffffffffe, 0x2, {0x7fffffff}}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) 17:55:31 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045700, &(0x7f0000000100)) [ 386.338346] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:55:31 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000004809000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:55:31 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000800000002, &(0x7f0000000100)) [ 386.390369] SELinux: security policydb version 15 (MLS) not backwards compatible [ 386.397412] device nr0 entered promiscuous mode [ 386.416082] XFS (loop4): Invalid superblock magic number 17:55:31 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000004c09000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 386.508540] SELinux: security policydb version 15 (MLS) not backwards compatible [ 386.544960] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:31 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000006009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 386.678329] SELinux: security policydb version 15 (MLS) not backwards compatible [ 386.718060] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:31 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000006809000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 386.823072] SELinux: security policydb version 15 (MLS) not backwards compatible [ 386.854325] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:55:31 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000800004b47, &(0x7f0000000100)) [ 386.911635] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$P9_RAUTH(r1, &(0x7f0000000080)={0x14, 0x67, 0x0, {0x0, 0x0, 0x1}}, 0x14) ioctl$FS_IOC_GETFLAGS(r1, 0xc020660b, &(0x7f0000000000)) 17:55:32 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000006c09000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:55:32 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:55:32 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x500) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000140)={0x1}) ioctl$SIOCAX25NOUID(r2, 0x89e3, &(0x7f0000000280)=0x1) r3 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) 17:55:32 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000800004b49, &(0x7f0000000100)) [ 387.054817] XFS (loop4): Invalid superblock magic number [ 387.145784] device nr0 entered promiscuous mode 17:55:32 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:55:32 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x200000080000541b, &(0x7f0000000100)) [ 387.181119] SELinux: security policydb version 15 (MLS) not backwards compatible [ 387.238180] syz-executor2 invoked oom-killer: gfp_mask=0x6040c0(GFP_KERNEL|__GFP_COMP), order=1, oom_score_adj=1000 17:55:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) [ 387.285022] sel_write_load: 11 callbacks suppressed [ 387.285027] SELinux: failed to load policy [ 387.307216] CPU: 1 PID: 14683 Comm: syz-executor2 Not tainted 5.0.0-rc4 #49 [ 387.307782] SELinux: security policydb version 15 (MLS) not backwards compatible [ 387.314328] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 387.314335] Call Trace: [ 387.314356] dump_stack+0x1db/0x2d0 [ 387.314375] ? dump_stack_print_info.cold+0x20/0x20 [ 387.314405] dump_header+0x1e6/0x116c [ 387.314423] ? add_lock_to_list.isra.0+0x450/0x450 [ 387.351203] ? print_usage_bug+0xd0/0xd0 [ 387.355278] ? pagefault_out_of_memory+0x1a1/0x1a1 [ 387.360220] ? ___ratelimit+0x37c/0x686 [ 387.364206] ? mark_held_locks+0xb1/0x100 [ 387.368363] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 387.373475] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 387.375732] SELinux: failed to load policy [ 387.378576] ? lockdep_hardirqs_on+0x415/0x5d0 [ 387.378592] ? trace_hardirqs_on+0xbd/0x310 [ 387.378609] ? kasan_check_read+0x11/0x20 [ 387.395841] ? ___ratelimit+0x37c/0x686 [ 387.399825] ? trace_hardirqs_off_caller+0x300/0x300 [ 387.404931] ? do_raw_spin_trylock+0x270/0x270 [ 387.409516] ? trace_hardirqs_on_caller+0x310/0x310 [ 387.414553] ? lock_acquire+0x1db/0x570 [ 387.418539] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 387.423661] ? ___ratelimit+0xac/0x686 [ 387.427556] ? idr_get_free+0xee0/0xee0 [ 387.431537] ? lockdep_hardirqs_on+0x415/0x5d0 [ 387.436146] oom_kill_process.cold+0x10/0x9d4 [ 387.440660] ? cgroup_procs_next+0x70/0x70 [ 387.444923] ? _raw_spin_unlock_irq+0x5e/0x90 [ 387.449442] ? oom_badness+0xa50/0xa50 [ 387.453340] ? oom_evaluate_task+0x540/0x540 [ 387.457753] ? mem_cgroup_iter_break+0x30/0x30 [ 387.462339] ? mutex_trylock+0x2d0/0x2d0 [ 387.466419] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 387.471988] ? rcu_read_unlock_special+0x380/0x380 [ 387.476930] out_of_memory+0x885/0x1420 [ 387.480907] ? mem_cgroup_iter+0x508/0xf30 [ 387.485180] ? oom_killer_disable+0x340/0x340 [ 387.489690] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 387.494796] ? lock_acquire+0x1db/0x570 [ 387.498812] mem_cgroup_out_of_memory+0x160/0x210 [ 387.503664] ? do_raw_spin_unlock+0xa0/0x330 [ 387.508079] ? memcg_memory_event+0x40/0x40 [ 387.512403] ? do_raw_spin_trylock+0x270/0x270 [ 387.516995] ? _raw_spin_unlock+0x2d/0x50 [ 387.521167] try_charge+0x12a9/0x19b0 [ 387.525000] ? check_preemption_disabled+0x48/0x290 [ 387.530026] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 387.534881] ? rcu_read_lock_sched_held+0x110/0x130 [ 387.539903] ? __alloc_pages_nodemask+0xaca/0xdc0 [ 387.544770] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 387.549791] ? ____cache_alloc_node+0x1be/0x1e0 [ 387.554495] ? cache_grow_begin+0x599/0x8c0 [ 387.558818] ? cache_grow_begin+0x599/0x8c0 [ 387.563176] memcg_kmem_charge_memcg+0x7c/0x130 [ 387.567861] ? memcg_kmem_put_cache+0xb0/0xb0 [ 387.572362] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 387.577908] ? __cpuset_node_allowed+0x19f/0x640 [ 387.582692] cache_grow_begin+0x25f/0x8c0 [ 387.586843] ? kasan_check_read+0x11/0x20 [ 387.590996] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 387.596555] ? mempolicy_slab_node+0x139/0x390 [ 387.601149] fallback_alloc+0x1fd/0x2d0 [ 387.605148] ____cache_alloc_node+0x1be/0x1e0 [ 387.609663] kmem_cache_alloc_node+0xe3/0x710 [ 387.614178] ? pci_mmcfg_check_reserved+0x170/0x170 [ 387.619214] copy_process+0x405b/0x8860 [ 387.623204] ? ___might_sleep+0x1e7/0x310 [ 387.627357] ? arch_local_save_flags+0x50/0x50 [ 387.631947] ? __schedule+0x1e60/0x1e60 [ 387.635928] ? do_raw_spin_trylock+0x270/0x270 [ 387.640527] ? __cleanup_sighand+0x70/0x70 [ 387.644783] ? futex_wait_queue_me+0x539/0x810 [ 387.649374] ? refill_pi_state_cache.part.0+0x310/0x310 [ 387.654743] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 387.659768] ? handle_futex_death+0x230/0x230 [ 387.664269] ? lock_acquire+0x1db/0x570 [ 387.668254] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 387.673449] ? drop_futex_key_refs.isra.0+0x6f/0xf0 [ 387.678472] ? futex_wait+0x6e6/0xa40 [ 387.682283] ? print_usage_bug+0xd0/0xd0 [ 387.686349] ? futex_wait_setup+0x430/0x430 [ 387.690693] ? drop_futex_key_refs.isra.0+0x6f/0xf0 [ 387.695715] ? __lock_acquire+0x572/0x4a30 [ 387.699986] ? mark_held_locks+0x100/0x100 [ 387.704231] ? do_futex+0x1b0/0x2910 [ 387.707979] ? save_stack+0xa9/0xd0 [ 387.711613] ? save_stack+0x45/0xd0 [ 387.715263] ? __kasan_slab_free+0x102/0x150 [ 387.719691] ? add_lock_to_list.isra.0+0x450/0x450 [ 387.724640] ? add_lock_to_list.isra.0+0x450/0x450 [ 387.729585] ? exit_robust_list+0x290/0x290 [ 387.733917] ? __might_fault+0x12b/0x1e0 [ 387.737985] ? find_held_lock+0x35/0x120 [ 387.742061] ? __might_fault+0x12b/0x1e0 [ 387.746123] ? lock_acquire+0x1db/0x570 [ 387.750155] ? lock_downgrade+0x910/0x910 [ 387.754308] ? lock_release+0xc40/0xc40 [ 387.758287] ? trace_hardirqs_off_caller+0x300/0x300 [ 387.763400] _do_fork+0x1a9/0x1170 [ 387.766968] ? fork_idle+0x1d0/0x1d0 [ 387.770699] ? kasan_check_read+0x11/0x20 [ 387.774868] ? _copy_to_user+0xc9/0x120 [ 387.778850] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 387.784400] ? put_timespec64+0x115/0x1b0 [ 387.788557] ? nsecs_to_jiffies+0x30/0x30 [ 387.792715] ? do_syscall_64+0x8c/0x800 [ 387.796695] ? do_syscall_64+0x8c/0x800 [ 387.800676] ? lockdep_hardirqs_on+0x415/0x5d0 [ 387.805264] ? trace_hardirqs_on+0xbd/0x310 [ 387.809589] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 387.815140] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 387.820508] ? trace_hardirqs_off_caller+0x300/0x300 [ 387.825620] __x64_sys_clone+0xbf/0x150 [ 387.829622] do_syscall_64+0x1a3/0x800 [ 387.833583] ? syscall_return_slowpath+0x5f0/0x5f0 [ 387.838518] ? prepare_exit_to_usermode+0x232/0x3b0 [ 387.843547] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 387.848407] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 387.853610] RIP: 0033:0x458099 [ 387.856812] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 387.875730] RSP: 002b:00007fe2862d6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 387.883450] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000458099 [ 387.890733] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0020002102001fff [ 387.898003] RBP: 000000000073bf00 R08: ffffffffffffffff R09: 0000000000000000 [ 387.905271] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2862d76d4 [ 387.912576] R13: 00000000004be480 R14: 00000000004cea40 R15: 00000000ffffffff [ 388.063378] memory: usage 307200kB, limit 307200kB, failcnt 354 [ 388.076313] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 388.090460] XFS (loop4): Invalid superblock magic number [ 388.107040] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 388.127490] Memory cgroup stats for /syz2: cache:0KB rss:266912KB rss_huge:249856KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:267036KB inactive_file:0KB active_file:0KB unevictable:0KB 17:55:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x4000, 0x0) bind$vsock_dgram(r1, &(0x7f0000000280)={0x28, 0x0, 0x0, @reserved}, 0x10) ioctl(r0, 0x1000008913, &(0x7f00000001c0)="0adc1f123c123f3188b070") r2 = fanotify_init(0x8, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x2200, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000500)={'ip_vti0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1f}}}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2, 0x0) ioctl$VIDIOC_G_STD(r3, 0x80085617, &(0x7f0000000200)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$P9_RAUTH(r4, &(0x7f0000000080)={0x14}, 0x14) io_setup(0x2, &(0x7f00000002c0)=0x0) io_submit(r5, 0x2, &(0x7f00000004c0)=[&(0x7f0000000380)={0x0, 0x0, 0x0, 0x8, 0x3, r1, &(0x7f0000000300)="3fe286a3bfbdc039c51f56675505404156fa7b2a7aed3ef4ae6715cfa74db2bd364d50c7a5d81a8cb9a1e9e32b584eb8552ee8ae4ffb4831c1a3f2f4c66023ed770a", 0x42, 0x10001, 0x0, 0x3, r4}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x8, 0x7, r1, &(0x7f00000003c0)="8da841c6b0fd4854356471ca3178b60e9751068f181080e9ad81ea6148220f875244212e8909210e8cb664679d506d9d74b91938dfd9bddedb6c7750e1179d9c624f48c8a3116f988896d7afc4b986729154f8350e8d561f79d3448b45132bae8038591b14d46db8a4293bf0f8c71abfc3d8bcf055defdfbf39ba2508cbfff55f6b56f1a098611be038cae87299ef77057e7385116537726ba4acc4b1eb3e1f8e6d57b4066cf5a279e1daf49b101249c8a", 0xb1, 0x4, 0x0, 0x1, r1}]) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x7fffff, 0x2050, r4, 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f00000000c0)=0x3, 0x4) fremovexattr(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="0d000000049200eeff57010106000000"]) ioctl$FS_IOC_GETFLAGS(r4, 0xc020660b, &(0x7f0000000000)) 17:55:33 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 388.231896] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor2,pid=10165,uid=0 17:55:33 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000800005421, &(0x7f0000000100)) 17:55:33 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x500) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000140)={0x1}) ioctl$SIOCAX25NOUID(r2, 0x89e3, &(0x7f0000000280)=0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) [ 388.288087] Memory cgroup out of memory: Kill process 10165 (syz-executor2) score 1113 or sacrifice child [ 388.307768] Killed process 10165 (syz-executor2) total-vm:72576kB, anon-rss:2192kB, file-rss:35788kB, shmem-rss:0kB 17:55:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) [ 388.405783] syz-executor2 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 388.447112] CPU: 1 PID: 14670 Comm: syz-executor2 Not tainted 5.0.0-rc4 #49 [ 388.454237] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 388.463628] Call Trace: [ 388.466245] dump_stack+0x1db/0x2d0 [ 388.466265] ? dump_stack_print_info.cold+0x20/0x20 [ 388.466292] dump_header+0x1e6/0x116c [ 388.478696] ? add_lock_to_list.isra.0+0x450/0x450 [ 388.483631] ? print_usage_bug+0xd0/0xd0 [ 388.487708] ? pagefault_out_of_memory+0x1a1/0x1a1 [ 388.492655] ? ___ratelimit+0x37c/0x686 [ 388.496640] ? mark_held_locks+0xb1/0x100 [ 388.500818] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 388.505931] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 388.505947] ? lockdep_hardirqs_on+0x415/0x5d0 [ 388.505964] ? trace_hardirqs_on+0xbd/0x310 [ 388.505983] ? kasan_check_read+0x11/0x20 [ 388.515652] ? ___ratelimit+0x37c/0x686 [ 388.515683] ? trace_hardirqs_off_caller+0x300/0x300 [ 388.515699] ? do_raw_spin_trylock+0x270/0x270 [ 388.537849] ? trace_hardirqs_on_caller+0x310/0x310 [ 388.542895] ? lock_acquire+0x1db/0x570 [ 388.546902] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 388.552018] ? ___ratelimit+0xac/0x686 [ 388.555916] ? idr_get_free+0xee0/0xee0 [ 388.559896] ? lockdep_hardirqs_on+0x415/0x5d0 [ 388.564522] oom_kill_process.cold+0x10/0x9d4 [ 388.569042] ? cgroup_procs_next+0x70/0x70 [ 388.573290] ? _raw_spin_unlock_irq+0x5e/0x90 [ 388.577788] ? oom_badness+0xa50/0xa50 [ 388.581690] ? oom_evaluate_task+0x540/0x540 [ 388.586108] ? mem_cgroup_iter_break+0x30/0x30 [ 388.590735] ? mutex_trylock+0x2d0/0x2d0 [ 388.594812] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 388.600370] ? rcu_read_unlock_special+0x380/0x380 [ 388.605309] out_of_memory+0x885/0x1420 [ 388.609318] ? mem_cgroup_iter+0x508/0xf30 [ 388.613564] ? oom_killer_disable+0x340/0x340 [ 388.618076] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 388.623193] ? lock_acquire+0x1db/0x570 [ 388.627193] mem_cgroup_out_of_memory+0x160/0x210 [ 388.632039] ? do_raw_spin_unlock+0xa0/0x330 [ 388.636454] ? memcg_memory_event+0x40/0x40 [ 388.640780] ? do_raw_spin_trylock+0x270/0x270 [ 388.645374] ? _raw_spin_unlock+0x2d/0x50 [ 388.649527] try_charge+0xd44/0x19b0 [ 388.653248] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 388.658795] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 388.663655] ? rcu_read_unlock_special+0x380/0x380 [ 388.668600] ? get_mem_cgroup_from_mm+0x1ea/0x420 [ 388.673449] ? get_mem_cgroup_from_page+0x190/0x190 [ 388.678479] ? rcu_read_lock_sched_held+0x110/0x130 [ 388.683505] mem_cgroup_try_charge+0x43a/0xdb0 [ 388.688103] ? mem_cgroup_protected+0xa10/0xa10 [ 388.692794] ? __anon_vma_prepare+0x36d/0x760 [ 388.697296] ? anon_vma_fork+0x880/0x880 [ 388.701359] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 388.706896] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 388.712449] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 388.717388] __handle_mm_fault+0x2594/0x55a0 [ 388.721811] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 388.726667] ? check_preemption_disabled+0x48/0x290 [ 388.731686] ? handle_mm_fault+0x3cc/0xc80 [ 388.735940] ? lock_downgrade+0x910/0x910 [ 388.740092] ? kasan_check_read+0x11/0x20 [ 388.744259] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 388.749561] ? rcu_read_unlock_special+0x380/0x380 [ 388.754522] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 388.760068] ? check_preemption_disabled+0x48/0x290 [ 388.765096] handle_mm_fault+0x4ec/0xc80 [ 388.769182] ? __handle_mm_fault+0x55a0/0x55a0 [ 388.773765] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 388.779303] ? vmacache_update+0x114/0x140 [ 388.783553] __do_page_fault+0x5da/0xd60 [ 388.787618] ? do_futex+0x2910/0x2910 [ 388.791448] do_page_fault+0xe6/0x7d8 [ 388.795250] ? trace_hardirqs_on_caller+0xc0/0x310 [ 388.800183] ? vmalloc_sync_all+0x30/0x30 [ 388.804345] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 388.809801] ? syscall_return_slowpath+0x5f0/0x5f0 [ 388.814734] ? prepare_exit_to_usermode+0x232/0x3b0 [ 388.819767] ? page_fault+0x8/0x30 [ 388.823311] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 388.828168] ? page_fault+0x8/0x30 [ 388.831718] page_fault+0x1e/0x30 [ 388.835175] RIP: 0033:0x40fabf [ 388.838372] Code: 0f 84 c8 02 00 00 48 83 bd 78 ff ff ff 00 0f 84 f9 04 00 00 48 8b 95 68 ff ff ff 44 89 95 38 ff ff ff 4c 8d ac 10 00 f7 ff ff <49> 89 85 90 06 00 00 49 8d 85 10 03 00 00 49 89 95 98 06 00 00 41 [ 388.857273] RSP: 002b:00007fff32860c80 EFLAGS: 00010206 [ 388.862636] RAX: 00007fe286275000 RBX: 0000000000020000 RCX: 00000000004580ea [ 388.869909] RDX: 0000000000021000 RSI: 0000000000021000 RDI: 0000000000000000 [ 388.877175] RBP: 00007fff32860d60 R08: ffffffffffffffff R09: 0000000000000000 [ 388.884447] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fff32860e40 [ 388.891717] R13: 00007fe286295700 R14: 0000000000000004 R15: 0000000000000002 [ 388.908457] memory: usage 304856kB, limit 307200kB, failcnt 354 [ 388.916429] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 388.923960] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 388.930894] Memory cgroup stats for /syz2: cache:0KB rss:264836KB rss_huge:247808KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:264880KB inactive_file:0KB active_file:0KB unevictable:0KB [ 388.953272] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor2,pid=10379,uid=0 [ 388.969354] Memory cgroup out of memory: Kill process 10379 (syz-executor2) score 1113 or sacrifice child [ 388.981969] Killed process 10379 (syz-executor2) total-vm:72576kB, anon-rss:2192kB, file-rss:35788kB, shmem-rss:0kB [ 388.994042] XFS (loop4): Invalid superblock magic number 17:55:33 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000007409000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:55:33 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 389.096297] SELinux: security policydb version 15 (MLS) not backwards compatible [ 389.121257] SELinux: failed to load policy [ 389.131899] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:34 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000007a09000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 389.152097] SELinux: failed to load policy 17:55:34 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000800005450, &(0x7f0000000100)) 17:55:34 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 389.211107] SELinux: security policydb version 15 (MLS) not backwards compatible [ 389.249704] SELinux: failed to load policy 17:55:34 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x500) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000140)={0x1}) ioctl$SIOCAX25NOUID(r2, 0x89e3, &(0x7f0000000280)=0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) 17:55:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) [ 389.291756] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r1, 0xc008551a, &(0x7f00000000c0)={0x7eaee1c7, 0x14, [0x4, 0x3, 0x9, 0x7, 0x101]}) write$P9_RAUTH(r1, &(0x7f0000000080)={0x14, 0x67, 0x0, {0x0, 0x0, 0x1}}, 0x14) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x5, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x11, r1, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffff9c, 0xc020660b, &(0x7f0000000200)) [ 389.339396] SELinux: failed to load policy 17:55:34 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000800005451, &(0x7f0000000100)) 17:55:34 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000200000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:55:34 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:55:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:55:34 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000800005452, &(0x7f0000000100)) [ 389.488529] SELinux: security policydb version 15 (MLS) not backwards compatible [ 389.516297] SELinux: failed to load policy 17:55:34 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140), 0x0, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 389.547265] XFS (loop4): Invalid superblock magic number [ 389.551578] syz-executor2 invoked oom-killer: gfp_mask=0x7080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 389.593355] CPU: 1 PID: 14778 Comm: syz-executor2 Not tainted 5.0.0-rc4 #49 [ 389.600468] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 389.609827] Call Trace: [ 389.612451] dump_stack+0x1db/0x2d0 [ 389.616124] ? dump_stack_print_info.cold+0x20/0x20 [ 389.621175] dump_header+0x1e6/0x116c [ 389.624985] ? add_lock_to_list.isra.0+0x450/0x450 [ 389.629922] ? print_usage_bug+0xd0/0xd0 [ 389.633992] ? pagefault_out_of_memory+0x1a1/0x1a1 [ 389.638926] ? ___ratelimit+0x37c/0x686 [ 389.642910] ? mark_held_locks+0xb1/0x100 [ 389.647069] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 389.652179] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 389.657302] ? lockdep_hardirqs_on+0x415/0x5d0 [ 389.661903] ? trace_hardirqs_on+0xbd/0x310 [ 389.666250] ? kasan_check_read+0x11/0x20 [ 389.670409] ? ___ratelimit+0x37c/0x686 [ 389.674410] ? trace_hardirqs_off_caller+0x300/0x300 [ 389.679515] ? do_raw_spin_trylock+0x270/0x270 [ 389.684102] ? trace_hardirqs_on_caller+0x310/0x310 [ 389.689140] ? lock_acquire+0x1db/0x570 [ 389.693167] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 389.698279] ? ___ratelimit+0xac/0x686 [ 389.702182] ? idr_get_free+0xee0/0xee0 [ 389.706174] ? lockdep_hardirqs_on+0x415/0x5d0 [ 389.710801] oom_kill_process.cold+0x10/0x9d4 [ 389.715327] ? cgroup_procs_next+0x70/0x70 [ 389.719576] ? _raw_spin_unlock_irq+0x5e/0x90 [ 389.724079] ? oom_badness+0xa50/0xa50 [ 389.727982] ? oom_evaluate_task+0x540/0x540 [ 389.732399] ? mem_cgroup_iter_break+0x30/0x30 [ 389.736984] ? mutex_trylock+0x2d0/0x2d0 [ 389.741057] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 389.746616] ? rcu_read_unlock_special+0x380/0x380 [ 389.751566] out_of_memory+0x885/0x1420 [ 389.755552] ? mem_cgroup_iter+0x508/0xf30 [ 389.759804] ? oom_killer_disable+0x340/0x340 [ 389.764312] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 389.769424] ? lock_acquire+0x1db/0x570 [ 389.773423] mem_cgroup_out_of_memory+0x160/0x210 [ 389.778296] ? do_raw_spin_unlock+0xa0/0x330 [ 389.782710] ? memcg_memory_event+0x40/0x40 [ 389.787046] ? do_raw_spin_trylock+0x270/0x270 [ 389.791649] ? _raw_spin_unlock+0x2d/0x50 [ 389.795806] try_charge+0x12a9/0x19b0 [ 389.799607] ? lock_downgrade+0x910/0x910 [ 389.803762] ? kasan_check_read+0x11/0x20 [ 389.807953] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 389.812797] ? get_mem_cgroup_from_mm+0x1cd/0x420 [ 389.817682] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 389.823243] ? lock_downgrade+0x910/0x910 [ 389.827398] ? kasan_check_read+0x11/0x20 [ 389.831560] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 389.836846] ? rcu_read_unlock_special+0x380/0x380 [ 389.841795] ? get_mem_cgroup_from_mm+0x1ea/0x420 [ 389.846658] memcg_kmem_charge_memcg+0x7c/0x130 [ 389.851379] ? memcg_kmem_put_cache+0xb0/0xb0 [ 389.855885] ? lock_release+0xc40/0xc40 [ 389.859884] memcg_kmem_charge+0x13b/0x340 [ 389.864144] __alloc_pages_nodemask+0x7b8/0xdc0 [ 389.868843] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 389.873867] ? rcu_pm_notify+0xd0/0xd0 [ 389.877769] ? rcu_read_lock_sched_held+0x110/0x130 [ 389.882794] ? kmem_cache_alloc_node+0x347/0x710 [ 389.887559] ? pci_mmcfg_check_reserved+0x170/0x170 [ 389.892589] copy_process+0x847/0x8860 [ 389.896494] ? ___might_sleep+0x1e7/0x310 [ 389.900659] ? arch_local_save_flags+0x50/0x50 [ 389.905254] ? __schedule+0x1e60/0x1e60 [ 389.909233] ? do_raw_spin_trylock+0x270/0x270 [ 389.913835] ? __cleanup_sighand+0x70/0x70 [ 389.918077] ? futex_wait_queue_me+0x539/0x810 [ 389.922670] ? refill_pi_state_cache.part.0+0x310/0x310 [ 389.928043] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 389.933079] ? handle_futex_death+0x230/0x230 [ 389.937580] ? lock_acquire+0x1db/0x570 [ 389.941561] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 389.946761] ? drop_futex_key_refs.isra.0+0x6f/0xf0 [ 389.951787] ? futex_wait+0x6e6/0xa40 [ 389.955599] ? print_usage_bug+0xd0/0xd0 [ 389.959689] ? futex_wait_setup+0x430/0x430 [ 389.964022] ? drop_futex_key_refs.isra.0+0x6f/0xf0 [ 389.969051] ? __lock_acquire+0x572/0x4a30 [ 389.973308] ? mark_held_locks+0x100/0x100 [ 389.977563] ? do_futex+0x1b0/0x2910 [ 389.981284] ? save_stack+0xa9/0xd0 [ 389.984918] ? save_stack+0x45/0xd0 [ 389.988552] ? __kasan_slab_free+0x102/0x150 [ 389.992967] ? add_lock_to_list.isra.0+0x450/0x450 [ 389.997902] ? add_lock_to_list.isra.0+0x450/0x450 [ 390.002841] ? exit_robust_list+0x290/0x290 [ 390.007178] ? __might_fault+0x12b/0x1e0 [ 390.011247] ? find_held_lock+0x35/0x120 [ 390.015314] ? __might_fault+0x12b/0x1e0 [ 390.019382] ? lock_acquire+0x1db/0x570 [ 390.023372] ? lock_downgrade+0x910/0x910 [ 390.027680] ? lock_release+0xc40/0xc40 [ 390.031666] ? trace_hardirqs_off_caller+0x300/0x300 [ 390.036782] _do_fork+0x1a9/0x1170 [ 390.040335] ? fork_idle+0x1d0/0x1d0 [ 390.044054] ? kasan_check_read+0x11/0x20 [ 390.048214] ? _copy_to_user+0xc9/0x120 [ 390.052198] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 390.057742] ? put_timespec64+0x115/0x1b0 [ 390.061898] ? nsecs_to_jiffies+0x30/0x30 [ 390.066059] ? do_syscall_64+0x8c/0x800 [ 390.070043] ? do_syscall_64+0x8c/0x800 [ 390.074025] ? lockdep_hardirqs_on+0x415/0x5d0 [ 390.078616] ? trace_hardirqs_on+0xbd/0x310 [ 390.082950] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 390.088500] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 390.093871] ? trace_hardirqs_off_caller+0x300/0x300 [ 390.098991] __x64_sys_clone+0xbf/0x150 [ 390.102980] do_syscall_64+0x1a3/0x800 [ 390.106878] ? syscall_return_slowpath+0x5f0/0x5f0 [ 390.111813] ? prepare_exit_to_usermode+0x232/0x3b0 [ 390.116845] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 390.121704] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 390.126902] RIP: 0033:0x458099 [ 390.130102] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 390.149018] RSP: 002b:00007fe2862d6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 390.157241] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000458099 [ 390.164516] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0020002102001fff [ 390.171791] RBP: 000000000073bf00 R08: ffffffffffffffff R09: 0000000000000000 [ 390.179066] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2862d76d4 [ 390.186343] R13: 00000000004be480 R14: 00000000004cea40 R15: 00000000ffffffff 17:55:35 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000800005460, &(0x7f0000000100)) [ 390.211205] memory: usage 307192kB, limit 307200kB, failcnt 385 [ 390.223006] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 390.230357] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 390.239427] Memory cgroup stats for /syz2: cache:0KB rss:266964KB rss_huge:249856KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:266932KB inactive_file:0KB active_file:0KB unevictable:0KB 17:55:35 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140), 0x0, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:55:35 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x500) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000140)={0x1}) ioctl$SIOCAX25NOUID(r2, 0x89e3, &(0x7f0000000280)=0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) [ 390.280628] XFS (loop5): Invalid superblock magic number [ 390.288544] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor2,pid=10406,uid=0 17:55:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:55:35 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000840045730, &(0x7f0000000100)) [ 390.356933] Memory cgroup out of memory: Kill process 10406 (syz-executor2) score 1113 or sacrifice child 17:55:35 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140), 0x0, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:55:35 executing program 5: syz_mount_image$ntfs(&(0x7f0000000400)='ntfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6c6c732c6e6f6e652c4f001b1c65cd58d7d300"]) [ 390.400050] Killed process 10406 (syz-executor2) total-vm:72576kB, anon-rss:2192kB, file-rss:35788kB, shmem-rss:0kB [ 390.488707] syz-executor2 invoked oom-killer: gfp_mask=0x7080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 390.508070] ntfs: (device loop5): parse_options(): Unrecognized mount option lls. [ 390.521233] CPU: 1 PID: 14776 Comm: syz-executor2 Not tainted 5.0.0-rc4 #49 [ 390.528356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 390.537707] Call Trace: [ 390.540301] dump_stack+0x1db/0x2d0 [ 390.540322] ? dump_stack_print_info.cold+0x20/0x20 [ 390.540352] dump_header+0x1e6/0x116c [ 390.540370] ? add_lock_to_list.isra.0+0x450/0x450 [ 390.540387] ? print_usage_bug+0xd0/0xd0 [ 390.549017] ? pagefault_out_of_memory+0x1a1/0x1a1 [ 390.549037] ? ___ratelimit+0x37c/0x686 [ 390.549058] ? mark_held_locks+0xb1/0x100 [ 390.549077] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 390.579923] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 390.585037] ? lockdep_hardirqs_on+0x415/0x5d0 [ 390.589630] ? trace_hardirqs_on+0xbd/0x310 [ 390.593964] ? kasan_check_read+0x11/0x20 [ 390.598119] ? ___ratelimit+0x37c/0x686 [ 390.602112] ? trace_hardirqs_off_caller+0x300/0x300 [ 390.607232] ? do_raw_spin_trylock+0x270/0x270 [ 390.611819] ? trace_hardirqs_on_caller+0x310/0x310 [ 390.616850] ? lock_acquire+0x1db/0x570 [ 390.620847] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 390.625966] ? ___ratelimit+0xac/0x686 [ 390.629866] ? idr_get_free+0xee0/0xee0 [ 390.633855] ? lockdep_hardirqs_on+0x415/0x5d0 [ 390.638457] oom_kill_process.cold+0x10/0x9d4 [ 390.642963] ? cgroup_procs_next+0x70/0x70 [ 390.647208] ? _raw_spin_unlock_irq+0x5e/0x90 [ 390.651710] ? oom_badness+0xa50/0xa50 [ 390.655607] ? oom_evaluate_task+0x540/0x540 [ 390.660033] ? mem_cgroup_iter_break+0x30/0x30 [ 390.664620] ? mutex_trylock+0x2d0/0x2d0 [ 390.668690] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 390.674250] ? rcu_read_unlock_special+0x380/0x380 [ 390.679198] out_of_memory+0x885/0x1420 [ 390.683185] ? mem_cgroup_iter+0x508/0xf30 [ 390.687426] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 390.692544] ? oom_killer_disable+0x340/0x340 [ 390.697049] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 390.702165] ? lock_acquire+0x1db/0x570 [ 390.706163] mem_cgroup_out_of_memory+0x160/0x210 [ 390.711016] ? do_raw_spin_unlock+0xa0/0x330 [ 390.715429] ? memcg_memory_event+0x40/0x40 [ 390.719757] ? do_raw_spin_trylock+0x270/0x270 [ 390.724350] ? _raw_spin_unlock+0x2d/0x50 [ 390.728509] try_charge+0xd44/0x19b0 [ 390.732228] ? lock_downgrade+0x910/0x910 [ 390.736387] ? kasan_check_read+0x11/0x20 [ 390.740551] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 390.745396] ? get_mem_cgroup_from_mm+0x1cd/0x420 [ 390.750250] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 390.755796] ? lock_downgrade+0x910/0x910 [ 390.759947] ? kasan_check_read+0x11/0x20 [ 390.764101] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 390.769392] ? rcu_read_unlock_special+0x380/0x380 [ 390.774338] ? get_mem_cgroup_from_mm+0x1ea/0x420 [ 390.779190] memcg_kmem_charge_memcg+0x7c/0x130 [ 390.783859] ? memcg_kmem_put_cache+0xb0/0xb0 [ 390.788367] ? lock_release+0xc40/0xc40 [ 390.792356] memcg_kmem_charge+0x13b/0x340 [ 390.796601] __alloc_pages_nodemask+0x7b8/0xdc0 [ 390.801279] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 390.806294] ? rcu_pm_notify+0xd0/0xd0 [ 390.810212] ? rcu_read_lock_sched_held+0x110/0x130 [ 390.815232] ? kmem_cache_alloc_node+0x347/0x710 [ 390.819989] ? print_usage_bug+0xd0/0xd0 [ 390.824064] copy_process+0x847/0x8860 [ 390.827960] ? print_usage_bug+0xd0/0xd0 [ 390.832031] ? rcu_read_unlock+0x16/0x60 [ 390.836107] ? __lock_acquire+0x572/0x4a30 [ 390.840349] ? mark_held_locks+0x100/0x100 [ 390.844600] ? __cleanup_sighand+0x70/0x70 [ 390.848861] ? mark_held_locks+0x100/0x100 [ 390.853100] ? find_held_lock+0x35/0x120 [ 390.857187] ? mark_held_locks+0x100/0x100 [ 390.861431] ? delayacct_end+0xc9/0x100 [ 390.865439] ? add_lock_to_list.isra.0+0x450/0x450 [ 390.870377] ? lock_acquire+0x1db/0x570 [ 390.874364] ? add_lock_to_list.isra.0+0x450/0x450 [ 390.879296] ? find_held_lock+0x35/0x120 [ 390.883367] ? print_usage_bug+0xd0/0xd0 [ 390.887457] ? psi_memstall_leave+0x1f8/0x280 [ 390.891974] ? find_held_lock+0x35/0x120 [ 390.896045] ? __lock_acquire+0x572/0x4a30 [ 390.900302] ? _raw_spin_unlock_irq+0x28/0x90 [ 390.904799] ? _raw_spin_unlock_irq+0x28/0x90 [ 390.909301] ? lockdep_hardirqs_on+0x415/0x5d0 [ 390.913887] ? trace_hardirqs_on+0xbd/0x310 [ 390.918218] ? mark_held_locks+0x100/0x100 [ 390.922457] ? check_preemption_disabled+0x48/0x290 [ 390.927487] ? rcu_lockdep_current_cpu_online+0x1aa/0x220 [ 390.933041] ? rcu_pm_notify+0xd0/0xd0 [ 390.936942] ? add_lock_to_list.isra.0+0x450/0x450 [ 390.941890] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 390.947436] ? try_to_free_mem_cgroup_pages+0x597/0xcd0 [ 390.952804] ? lockdep_hardirqs_on+0x415/0x5d0 [ 390.957400] ? try_to_free_pages+0xb70/0xb70 [ 390.961816] ? percpu_ref_put_many+0x129/0x270 [ 390.966411] ? blkcg_maybe_throttle_current+0x75e/0x1400 [ 390.971870] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 390.977421] _do_fork+0x1a9/0x1170 [ 390.980975] ? fork_idle+0x1d0/0x1d0 [ 390.984707] ? trace_hardirqs_off+0xb8/0x310 [ 390.989118] ? get_mctgt_type_thp.isra.0+0x4c0/0x4c0 [ 390.994234] ? prepare_exit_to_usermode+0x32e/0x3b0 [ 390.999255] ? do_syscall_64+0x8c/0x800 [ 391.003248] ? do_syscall_64+0x8c/0x800 [ 391.007226] ? lockdep_hardirqs_on+0x415/0x5d0 [ 391.011814] ? trace_hardirqs_on+0xbd/0x310 [ 391.016153] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 391.021523] ? trace_hardirqs_off_caller+0x300/0x300 [ 391.026639] __x64_sys_clone+0xbf/0x150 [ 391.030632] do_syscall_64+0x1a3/0x800 [ 391.034540] ? syscall_return_slowpath+0x5f0/0x5f0 [ 391.039478] ? prepare_exit_to_usermode+0x232/0x3b0 [ 391.044508] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 391.049367] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 391.054557] RIP: 0033:0x45aa69 [ 391.057754] Code: ff 48 85 f6 0f 84 97 8d fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c 6e 8d fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 391.076660] RSP: 002b:00007fff32860c38 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 391.084370] RAX: ffffffffffffffda RBX: 00007fe2862b6700 RCX: 000000000045aa69 [ 391.091649] RDX: 00007fe2862b69d0 RSI: 00007fe2862b5db0 RDI: 00000000003d0f00 [ 391.098922] RBP: 00007fff32860e40 R08: 00007fe2862b6700 R09: 00007fe2862b6700 [ 391.106190] R10: 00007fe2862b69d0 R11: 0000000000000202 R12: 0000000000000000 [ 391.113461] R13: 00007fff32860cef R14: 00007fe2862b69c0 R15: 0000000000000001 [ 391.127828] ntfs: (device loop5): parse_options(): Unrecognized mount option none. [ 391.141774] ntfs: (device loop5): parse_options(): Unrecognized mount option O. [ 391.150438] memory: usage 304860kB, limit 307200kB, failcnt 385 [ 391.156757] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 391.164215] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 391.170685] XFS (loop4): Invalid superblock magic number [ 391.177187] Memory cgroup stats for /syz2: cache:0KB rss:264732KB rss_huge:247808KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:264764KB inactive_file:0KB active_file:0KB unevictable:0KB [ 391.199346] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor2,pid=10432,uid=0 [ 391.217374] Memory cgroup out of memory: Kill process 10432 (syz-executor2) score 1113 or sacrifice child [ 391.233049] Killed process 10432 (syz-executor2) total-vm:72576kB, anon-rss:2192kB, file-rss:35788kB, shmem-rss:0kB [ 391.245617] oom_reaper: reaped process 10432 (syz-executor2), now anon-rss:0kB, file-rss:34828kB, shmem-rss:0kB [ 391.257721] SELinux: security policydb version 15 (MLS) not backwards compatible [ 391.277080] SELinux: failed to load policy 17:55:36 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000400000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:55:36 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000840045731, &(0x7f0000000100)) 17:55:36 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{0x0, 0x0, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x1000}, {&(0x7f0000001600)=""/129, 0x81}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:55:36 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x500) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000140)={0x1}) r3 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) 17:55:36 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000180)={0x1, @pix={0x40000000000, 0x100000000, 0x33775f59, 0x0, 0x1, 0xfff, 0x5, 0x81, 0x1, 0x0, 0x3, 0x5}}) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000280)={0x80000000, 0x100, "68a4caa4474c295d4605b96af625e0eaa6a8ee17f6eb963ca01ba974cf71d8df", 0x5, 0x4, 0x9, 0x8, 0x80000000, 0x40, 0x5, 0x9, [0x9, 0x4, 0xa17f, 0x300000000000]}) futimesat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={{}, {0x0, 0x7530}}) 17:55:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x18', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:55:36 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$inet(r0, &(0x7f0000000080)={0x2, 0x0, @broadcast}, &(0x7f00000000c0)=0x10) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000180)={'nat\x00', 0x0, 0x0, 0x0, [], 0x3, &(0x7f0000000100)=[{}, {}, {}, {}], 0x0, [{}, {}, {}]}, 0xa8) preadv(0xffffffffffffffff, &(0x7f0000001580)=[{&(0x7f0000000340)=""/4096, 0xc}], 0x1, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f0000001340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000004}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r2, 0x100, 0x70bd2d, 0x25dfdbfb, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8040}, 0x48000) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x2, 0x0, {0x4, 0x100000000, 0x7fff}}, 0x28) 17:55:36 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{0x0, 0x0, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x1000}, {&(0x7f0000001600)=""/129, 0x81}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:55:36 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000840049409, &(0x7f0000000100)) [ 391.433514] device nr0 entered promiscuous mode [ 391.453255] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:36 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000001000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 391.511487] SELinux: failed to load policy 17:55:36 executing program 5: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f00000000c0), 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r2 = socket$inet(0x10, 0xe, 0xaf) sendmsg(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000080)="24000000010907041dfffd946fa2830020200a0009000200001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) [ 391.601565] SELinux: security policydb version 15 (MLS) not backwards compatible [ 391.636696] SELinux: failed to load policy 17:55:36 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000002000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 391.656423] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:36 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000003000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 391.739438] SELinux: security policydb version 15 (MLS) not backwards compatible [ 391.768432] SELinux: security policydb version 15 (MLS) not backwards compatible [ 391.897070] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:36 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000004000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:55:36 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000840086602, &(0x7f0000000100)) [ 391.957868] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:36 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x500) pipe(&(0x7f00000000c0)) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) 17:55:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs ', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:55:36 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x6, 0xffffffffffffff99, 0x3e8, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x400000000, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffffc, 0x0, 0x0, 0x200, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x6}, 0x0, 0xc, r0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000340)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\xf2\xbch\x00', 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x800000000000, 0x4000000000, 0x0, 0x0, 0x0, 0x7f, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfd, 0x0, 0x0, 0xfb3, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0x5}}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) r3 = shmget$private(0x0, 0x1000, 0x1171, &(0x7f0000c9e000/0x1000)=nil) shmctl$IPC_STAT(r3, 0x2, &(0x7f0000000200)=""/19) r4 = socket$inet(0x2, 0x3, 0x3) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x2, 0x0) ioctl$KVM_SET_TSC_KHZ(r5, 0xaea2, 0x2) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2000000, 0x43130, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x20100, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r2, 0x10e, 0x3, &(0x7f0000000440)=0xfbe, 0x4) getsockname(r6, &(0x7f0000000140)=@ipx, &(0x7f00000001c0)=0x80) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r6, 0x28, 0x0, &(0x7f0000000100)=0x1, 0x8) setsockopt$inet_int(r4, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) openat$md(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/md0\x00', 0x40000, 0x0) dup2(r2, r2) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x3e7, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000240)) perf_event_open(&(0x7f00000000c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0xb8b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0xb5e, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r8, 0x0, 0x60, &(0x7f0000000080), 0x0) r9 = fcntl$getown(r7, 0x9) syz_open_procfs(r9, &(0x7f00000001c0)='clear_refs\x00') 17:55:36 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{0x0, 0x0, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x1000}, {&(0x7f0000001600)=""/129, 0x81}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 392.056200] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:37 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000005000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 392.102770] device nr0 entered promiscuous mode 17:55:37 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000840087602, &(0x7f0000000100)) 17:55:37 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, 0x0, 0x0, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:55:37 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x400000, 0x0) ioctl$UI_BEGIN_FF_ERASE(r0, 0xc00c55ca, &(0x7f0000000300)={0xf, 0x7fff, 0xfffffffffffffffe}) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x400, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r1, 0x40405514, &(0x7f0000000200)={0x3, 0x0, 0xfffffffffffffff9, 0xffffffffffffffc1, 'syz1\x00', 0x7ff}) r2 = memfd_create(&(0x7f0000000340)='nodev\'ppp1!nodev/wlan1Yeth1em0eth0\x00', 0xfffffffffffffffd) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r2, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x60000, 0x0) getsockname$packet(r3, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) setsockopt$inet6_MCAST_JOIN_GROUP(r3, 0x29, 0x2a, &(0x7f0000000240)={0x0, {{0xa, 0x4e24, 0x80000000, @mcast2}}}, 0x88) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {}, 0x0, 0x0}, 0x0, 0x8, &(0x7f00005eaff8)) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/4\x00') getsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f00000000c0), 0x10) ioctl$TIOCGSID(r5, 0x5429, &(0x7f00000003c0)) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000400)=0x0) r7 = syz_open_procfs(r6, &(0x7f0000000040)='m_score\x06\xe1\xe60\x00\x00\x00') ioctl$sock_inet6_SIOCDIFADDR(r7, 0x8936, &(0x7f0000000380)={@mcast1, 0x33, r4}) [ 392.232731] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:37 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000006000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:55:37 executing program 5: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @local, 'bond0\x00'}}, 0x1e) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000540)={&(0x7f00000000c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000400)=[{&(0x7f00000001c0)=""/82, 0x52}, {&(0x7f0000000240)=""/179, 0xb3}, {&(0x7f0000000300)=""/233, 0xe9}, {&(0x7f0000000140)=""/57, 0x39}], 0x4, &(0x7f0000000440)=""/230, 0xe6}, 0x40012000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000580)={0x0, 0x1}, &(0x7f00000005c0)=0x8) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000600)={r2, @in6={{0xa, 0x4e21, 0x3, @remote, 0x80000001}}}, 0x84) r3 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r3, &(0x7f0000000040)={0x18, 0x0, {0x1, @dev={[], 0xd}, 'ip6gretap0\x00'}}, 0x1e) connect$pppoe(r3, &(0x7f0000000180)={0x18, 0x0, {0x6, @dev={[], 0x14}, 'dummy0\x00'}}, 0x1e) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000700)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f00000008c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000880)={&(0x7f0000000740)=ANY=[@ANYBLOB="35ffff00", @ANYRES16=r4, @ANYBLOB="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"], 0x134}, 0x1, 0x0, 0x0, 0x80}, 0x40004) syz_emit_ethernet(0x1c, &(0x7f0000000080)={@random="889313252650", @local, [{[{0x9100, 0x9d, 0x3}], {0x8100, 0x6, 0xfffffffeffffffff, 0x2}}], {@generic={0x8864, "42a703000000"}}}, 0x0) [ 392.288253] SELinux: security policydb version 15 (MLS) not backwards compatible [ 392.319427] sel_write_load: 7 callbacks suppressed [ 392.319433] SELinux: failed to load policy 17:55:37 executing program 5: r0 = semget(0x2, 0x2, 0x100) semctl$SEM_STAT(r0, 0x4, 0x12, &(0x7f0000000880)=""/4096) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x3, 0x2) write$P9_RLINK(r1, &(0x7f0000000100)={0x7, 0x47, 0x1}, 0x7) ioperm(0xe3, 0x1, 0xdd9) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) r2 = socket$inet(0x2, 0x1, 0x0) dup(r2) connect$inet(r2, &(0x7f0000000780)={0x2, 0x4e23}, 0x10) write$selinux_create(r1, &(0x7f0000000240)=@objname={'system_u:object_r:udev_helper_exec_t:s0', 0x20, 'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023', 0x20, 0x0, 0x20, './file0\x00'}, 0x73) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}], [], 0xfcfdffff00000000}) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)=0x0) move_pages(r3, 0x1, &(0x7f00000001c0)=[&(0x7f0000ffc000/0x4000)=nil], &(0x7f0000000300)=[0x100, 0x1, 0xd0, 0x8, 0x80000001], &(0x7f0000000340)=[0x0], 0x4) 17:55:37 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000007000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 392.440828] SELinux: security policydb version 15 (MLS) not backwards compatible [ 392.472916] SELinux: failed to load policy [ 392.624280] syz-executor2 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 392.656927] CPU: 0 PID: 14926 Comm: syz-executor2 Not tainted 5.0.0-rc4 #49 [ 392.664038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 392.673388] Call Trace: [ 392.675982] dump_stack+0x1db/0x2d0 [ 392.679636] ? dump_stack_print_info.cold+0x20/0x20 [ 392.684687] dump_header+0x1e6/0x116c [ 392.688502] ? add_lock_to_list.isra.0+0x450/0x450 [ 392.693443] ? print_usage_bug+0xd0/0xd0 [ 392.697513] ? pagefault_out_of_memory+0x1a1/0x1a1 [ 392.702452] ? ___ratelimit+0x37c/0x686 [ 392.706440] ? mark_held_locks+0xb1/0x100 [ 392.710595] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 392.715701] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 392.720812] ? lockdep_hardirqs_on+0x415/0x5d0 [ 392.725408] ? trace_hardirqs_on+0xbd/0x310 [ 392.729738] ? kasan_check_read+0x11/0x20 [ 392.733901] ? ___ratelimit+0x37c/0x686 [ 392.737883] ? trace_hardirqs_off_caller+0x300/0x300 [ 392.742998] ? do_raw_spin_trylock+0x270/0x270 [ 392.747589] ? trace_hardirqs_on_caller+0x310/0x310 [ 392.752607] ? lock_acquire+0x1db/0x570 [ 392.756599] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 392.761712] ? ___ratelimit+0xac/0x686 [ 392.765613] ? idr_get_free+0xee0/0xee0 [ 392.769593] ? lockdep_hardirqs_on+0x415/0x5d0 [ 392.774222] oom_kill_process.cold+0x10/0x9d4 [ 392.778739] ? cgroup_procs_next+0x70/0x70 [ 392.782988] ? _raw_spin_unlock_irq+0x5e/0x90 [ 392.787489] ? oom_badness+0xa50/0xa50 [ 392.791387] ? oom_evaluate_task+0x540/0x540 [ 392.795802] ? mem_cgroup_iter_break+0x30/0x30 [ 392.800393] ? mutex_trylock+0x2d0/0x2d0 [ 392.804463] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 392.810024] ? rcu_read_unlock_special+0x380/0x380 [ 392.814964] out_of_memory+0x885/0x1420 [ 392.818952] ? mem_cgroup_iter+0x508/0xf30 [ 392.823197] ? oom_killer_disable+0x340/0x340 [ 392.827708] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 392.832823] ? lock_acquire+0x1db/0x570 [ 392.836810] mem_cgroup_out_of_memory+0x160/0x210 [ 392.841658] ? do_raw_spin_unlock+0xa0/0x330 [ 392.846089] ? memcg_memory_event+0x40/0x40 [ 392.850417] ? do_raw_spin_trylock+0x270/0x270 [ 392.855017] ? _raw_spin_unlock+0x2d/0x50 [ 392.859189] try_charge+0x12a9/0x19b0 [ 392.862998] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 392.868548] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 392.873404] ? rcu_read_unlock_special+0x380/0x380 [ 392.878352] ? get_mem_cgroup_from_mm+0x1ea/0x420 [ 392.883241] ? get_mem_cgroup_from_page+0x190/0x190 [ 392.888269] ? rcu_read_lock_sched_held+0x110/0x130 [ 392.893300] mem_cgroup_try_charge+0x43a/0xdb0 [ 392.897898] ? mem_cgroup_protected+0xa10/0xa10 [ 392.902590] ? lock_downgrade+0x910/0x910 [ 392.906769] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 392.912312] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 392.917868] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 392.922811] wp_page_copy+0x45a/0x1c30 [ 392.926705] ? mark_held_locks+0x100/0x100 [ 392.930950] ? delayacct_end+0xc9/0x100 [ 392.934937] ? pmd_pfn+0x1d0/0x1d0 [ 392.938502] ? find_held_lock+0x35/0x120 [ 392.942581] ? do_wp_page+0x70d/0x16b0 [ 392.946489] ? kasan_check_read+0x11/0x20 [ 392.950644] ? do_raw_spin_unlock+0xa0/0x330 [ 392.955085] ? _vm_normal_page+0x15d/0x3d0 [ 392.959337] ? do_raw_spin_trylock+0x270/0x270 [ 392.963930] ? __lock_acquire+0x572/0x4a30 [ 392.968183] do_wp_page+0x715/0x16b0 [ 392.971900] ? lock_acquire+0x1db/0x570 [ 392.975884] ? finish_mkwrite_fault+0x540/0x540 [ 392.980589] ? kasan_check_read+0x11/0x20 [ 392.984756] ? do_raw_spin_lock+0x156/0x360 [ 392.989076] ? lock_release+0xc40/0xc40 [ 392.993058] ? rwlock_bug.part.0+0x90/0x90 [ 392.997303] ? pmd_devmap_trans_unstable+0x1d0/0x1d0 [ 393.002413] ? add_mm_counter_fast.part.0+0x40/0x40 [ 393.007443] __handle_mm_fault+0x2c8e/0x55a0 [ 393.011868] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 393.016718] ? check_preemption_disabled+0x48/0x290 [ 393.021742] ? handle_mm_fault+0x3cc/0xc80 [ 393.026445] ? lock_downgrade+0x910/0x910 [ 393.030597] ? kasan_check_read+0x11/0x20 [ 393.034752] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 393.040053] ? rcu_read_unlock_special+0x380/0x380 [ 393.044991] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 393.050537] ? check_preemption_disabled+0x48/0x290 [ 393.055569] handle_mm_fault+0x4ec/0xc80 [ 393.059644] ? __handle_mm_fault+0x55a0/0x55a0 [ 393.064250] __do_page_fault+0x5da/0xd60 [ 393.068330] do_page_fault+0xe6/0x7d8 [ 393.072150] ? trace_hardirqs_on_caller+0xc0/0x310 [ 393.077086] ? vmalloc_sync_all+0x30/0x30 [ 393.081241] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 393.086704] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 393.092249] ? prepare_exit_to_usermode+0x232/0x3b0 [ 393.097273] ? page_fault+0x8/0x30 [ 393.100824] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 393.105674] ? page_fault+0x8/0x30 [ 393.109242] page_fault+0x1e/0x30 [ 393.112693] RIP: 0033:0x40d318 [ 393.115888] Code: 8b 34 c6 4a 8d 04 2e 48 3d ff ff ff 7e 0f 86 77 ff ff ff bf 40 d7 4b 00 31 c0 e8 63 46 ff ff 31 ff e8 9c 42 ff ff 0f 1f 40 00 <89> 3c b5 00 00 73 00 eb b6 31 ed 0f 1f 44 00 00 80 3d 4e 31 64 00 [ 393.134791] RSP: 002b:00007fff32860ca0 EFLAGS: 00010246 [ 393.140170] RAX: 000000009e0429a4 RBX: 00000000c60e25c0 RCX: 0000001b32c20000 [ 393.147442] RDX: 0000000000000000 RSI: 00000000000009a4 RDI: ffffffff9e0429a4 [ 393.154714] RBP: 0000000000000002 R08: 000000009e0429a4 R09: 000000009e0429a8 [ 393.161982] R10: 00007fff32860e30 R11: 0000000000000246 R12: 000000000073bf88 [ 393.169255] R13: 0000000080000000 R14: 00007fe2882d8008 R15: 0000000000000002 [ 393.209683] memory: usage 307200kB, limit 307200kB, failcnt 406 [ 393.217596] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 393.229687] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 393.236705] Memory cgroup stats for /syz2: cache:0KB rss:265280KB rss_huge:247808KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:265380KB inactive_file:4KB active_file:4KB unevictable:0KB [ 393.275332] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor2,pid=10481,uid=0 17:55:38 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x500) pipe(&(0x7f00000000c0)) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) 17:55:38 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x200000084020940d, &(0x7f0000000100)) 17:55:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:55:38 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, 0x0, 0x0, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 393.350755] Memory cgroup out of memory: Kill process 10481 (syz-executor2) score 1113 or sacrifice child [ 393.392612] Killed process 10481 (syz-executor2) total-vm:72576kB, anon-rss:2192kB, file-rss:35788kB, shmem-rss:0kB 17:55:38 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045702, &(0x7f0000000100)) [ 393.437826] oom_reaper: reaped process 10481 (syz-executor2), now anon-rss:0kB, file-rss:34828kB, shmem-rss:0kB [ 393.440587] SELinux: security policydb version 15 (MLS) not backwards compatible [ 393.456034] device nr0 entered promiscuous mode [ 393.462700] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 393.467157] SELinux: failed to load policy [ 393.488381] SELinux: security policydb version 15 (MLS) not backwards compatible [ 393.509001] SELinux: failed to load policy 17:55:38 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000008000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:55:38 executing program 5: socket$rds(0x15, 0x5, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pipe2$9p(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/snmp\x00') preadv(r1, &(0x7f0000000480), 0x2000000000000113, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000000c0)={0x0, 0x401, 0x81, 0xfffffffffffffc00}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f00000001c0)={r3, 0x9, 0x8}, &(0x7f0000000200)=0x8) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x2c, 0x35, 0x829, 0x0, 0x0, {0x2802, 0x1000000}, [@nested={0x18, 0x0, [@typed={0x12, 0x1, @ipv6=@loopback={0xffffffff00000000}}]}]}, 0x2c}}, 0x0) [ 393.647184] SELinux: security policydb version 15 (MLS) not backwards compatible [ 393.678680] SELinux: failed to load policy [ 393.695379] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:38 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0002000009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 393.743112] SELinux: failed to load policy [ 393.774789] XFS (loop4): Invalid superblock magic number [ 393.797663] net_ratelimit: 4 callbacks suppressed [ 393.797683] netlink: del zone limit has 4 unknown bytes [ 393.894164] SELinux: security policydb version 15 (MLS) not backwards compatible [ 393.927102] SELinux: failed to load policy [ 393.946054] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:38 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0003000009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 394.030374] SELinux: failed to load policy [ 394.181033] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:39 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, 0x0, 0x0, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:55:39 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045703, &(0x7f0000000100)) [ 394.268257] SELinux: failed to load policy 17:55:39 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x500) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) 17:55:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:55:39 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0004000009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 394.322050] SELinux: security policydb version 15 (MLS) not backwards compatible [ 394.352018] SELinux: failed to load policy 17:55:39 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045704, &(0x7f0000000100)) [ 394.465817] device nr0 entered promiscuous mode 17:55:39 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x1000}], 0x1, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 394.517693] netlink: del zone limit has 4 unknown bytes [ 394.542319] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:39 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0005000009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 394.600273] XFS (loop4): Invalid superblock magic number [ 394.613073] SELinux: security policydb version 15 (MLS) not backwards compatible [ 394.727961] SELinux: security policydb version 15 (MLS) not backwards compatible [ 394.773391] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:39 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0006000009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 394.938564] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:39 executing program 5: socket$rds(0x15, 0x5, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pipe2$9p(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/snmp\x00') preadv(r1, &(0x7f0000000480), 0x2000000000000113, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000000c0)={0x0, 0x401, 0x81, 0xfffffffffffffc00}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f00000001c0)={r3, 0x9, 0x8}, &(0x7f0000000200)=0x8) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x2c, 0x35, 0x829, 0x0, 0x0, {0x2802, 0x1000000}, [@nested={0x18, 0x0, [@typed={0x12, 0x1, @ipv6=@loopback={0xffffffff00000000}}]}]}, 0x2c}}, 0x0) [ 395.003790] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:40 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x1000}], 0x1, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:55:40 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0007000009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:55:40 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045705, &(0x7f0000000100)) 17:55:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x0f', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:55:40 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) [ 395.183587] netlink: del zone limit has 4 unknown bytes [ 395.208406] SELinux: security policydb version 15 (MLS) not backwards compatible [ 395.261630] device nr0 entered promiscuous mode 17:55:40 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045706, &(0x7f0000000100)) 17:55:40 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x1000}], 0x1, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:55:40 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0010000009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 395.284168] SELinux: security policydb version 15 (MLS) not backwards compatible [ 395.435628] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:40 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0048000009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 395.635334] syz-executor2 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 395.680045] CPU: 1 PID: 15055 Comm: syz-executor2 Not tainted 5.0.0-rc4 #49 [ 395.687216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 395.696569] Call Trace: [ 395.699176] dump_stack+0x1db/0x2d0 [ 395.702813] ? dump_stack_print_info.cold+0x20/0x20 [ 395.707849] dump_header+0x1e6/0x116c [ 395.711667] ? add_lock_to_list.isra.0+0x450/0x450 [ 395.716609] ? print_usage_bug+0xd0/0xd0 [ 395.720688] ? pagefault_out_of_memory+0x1a1/0x1a1 [ 395.725631] ? ___ratelimit+0x37c/0x686 [ 395.729627] ? mark_held_locks+0xb1/0x100 [ 395.733791] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 395.738901] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 395.744016] ? lockdep_hardirqs_on+0x415/0x5d0 [ 395.748607] ? trace_hardirqs_on+0xbd/0x310 [ 395.752935] ? kasan_check_read+0x11/0x20 [ 395.757093] ? ___ratelimit+0x37c/0x686 [ 395.761075] ? trace_hardirqs_off_caller+0x300/0x300 [ 395.766181] ? do_raw_spin_trylock+0x270/0x270 [ 395.770770] ? trace_hardirqs_on_caller+0x310/0x310 [ 395.775790] ? lock_acquire+0x1db/0x570 [ 395.779780] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 395.784893] ? ___ratelimit+0xac/0x686 [ 395.788803] ? idr_get_free+0xee0/0xee0 [ 395.792787] ? lockdep_hardirqs_on+0x415/0x5d0 [ 395.797384] oom_kill_process.cold+0x10/0x9d4 [ 395.801891] ? cgroup_procs_next+0x70/0x70 [ 395.806149] ? _raw_spin_unlock_irq+0x5e/0x90 [ 395.810659] ? oom_badness+0xa50/0xa50 [ 395.814562] ? oom_evaluate_task+0x540/0x540 [ 395.818976] ? mem_cgroup_iter_break+0x30/0x30 [ 395.823577] ? mutex_trylock+0x2d0/0x2d0 [ 395.827650] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 395.833210] ? rcu_read_unlock_special+0x380/0x380 [ 395.838161] out_of_memory+0x885/0x1420 [ 395.842154] ? mem_cgroup_iter+0x508/0xf30 [ 395.846400] ? oom_killer_disable+0x340/0x340 [ 395.850904] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 395.856015] ? lock_acquire+0x1db/0x570 [ 395.860008] mem_cgroup_out_of_memory+0x160/0x210 [ 395.864862] ? do_raw_spin_unlock+0xa0/0x330 [ 395.869279] ? memcg_memory_event+0x40/0x40 [ 395.873606] ? do_raw_spin_trylock+0x270/0x270 [ 395.878214] ? _raw_spin_unlock+0x2d/0x50 [ 395.882374] try_charge+0x12a9/0x19b0 [ 395.886185] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 395.891736] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 395.896585] ? rcu_read_unlock_special+0x380/0x380 [ 395.901537] ? get_mem_cgroup_from_mm+0x1ea/0x420 [ 395.906390] ? get_mem_cgroup_from_page+0x190/0x190 [ 395.911422] ? rcu_read_lock_sched_held+0x110/0x130 [ 395.916452] mem_cgroup_try_charge+0x43a/0xdb0 [ 395.921048] ? mem_cgroup_protected+0xa10/0xa10 [ 395.925732] ? lock_downgrade+0x910/0x910 [ 395.929895] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 395.935436] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 395.940987] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 395.945928] wp_page_copy+0x45a/0x1c30 [ 395.949827] ? mark_held_locks+0x100/0x100 [ 395.954071] ? delayacct_end+0xc9/0x100 [ 395.958056] ? pmd_pfn+0x1d0/0x1d0 [ 395.961600] ? find_held_lock+0x35/0x120 [ 395.965672] ? do_wp_page+0x70d/0x16b0 [ 395.969579] ? kasan_check_read+0x11/0x20 [ 395.973731] ? do_raw_spin_unlock+0xa0/0x330 [ 395.978149] ? _vm_normal_page+0x15d/0x3d0 [ 395.982396] ? do_raw_spin_trylock+0x270/0x270 [ 395.986984] ? __lock_acquire+0x572/0x4a30 [ 395.991231] do_wp_page+0x715/0x16b0 [ 395.994953] ? lock_acquire+0x1db/0x570 [ 395.998935] ? finish_mkwrite_fault+0x540/0x540 [ 396.003613] ? kasan_check_read+0x11/0x20 [ 396.007780] ? do_raw_spin_lock+0x156/0x360 [ 396.012107] ? lock_release+0xc40/0xc40 [ 396.016101] ? rwlock_bug.part.0+0x90/0x90 [ 396.020351] ? pmd_devmap_trans_unstable+0x1d0/0x1d0 [ 396.025809] ? add_mm_counter_fast.part.0+0x40/0x40 [ 396.030841] __handle_mm_fault+0x2c8e/0x55a0 [ 396.035267] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 396.040114] ? check_preemption_disabled+0x48/0x290 [ 396.045154] ? handle_mm_fault+0x3cc/0xc80 [ 396.049413] ? lock_downgrade+0x910/0x910 [ 396.053587] ? kasan_check_read+0x11/0x20 [ 396.057744] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 396.063033] ? rcu_read_unlock_special+0x380/0x380 [ 396.067973] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 396.073518] ? check_preemption_disabled+0x48/0x290 [ 396.078548] handle_mm_fault+0x4ec/0xc80 [ 396.082624] ? __handle_mm_fault+0x55a0/0x55a0 [ 396.087231] __do_page_fault+0x5da/0xd60 [ 396.091314] do_page_fault+0xe6/0x7d8 [ 396.095122] ? trace_hardirqs_on_caller+0xc0/0x310 [ 396.100075] ? vmalloc_sync_all+0x30/0x30 [ 396.104229] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 396.109688] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 396.115237] ? prepare_exit_to_usermode+0x232/0x3b0 [ 396.120265] ? page_fault+0x8/0x30 [ 396.123819] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 396.128681] ? page_fault+0x8/0x30 [ 396.132231] page_fault+0x1e/0x30 [ 396.135685] RIP: 0033:0x40d318 [ 396.138884] Code: 8b 34 c6 4a 8d 04 2e 48 3d ff ff ff 7e 0f 86 77 ff ff ff bf 40 d7 4b 00 31 c0 e8 63 46 ff ff 31 ff e8 9c 42 ff ff 0f 1f 40 00 <89> 3c b5 00 00 73 00 eb b6 31 ed 0f 1f 44 00 00 80 3d 4e 31 64 00 [ 396.158279] RSP: 002b:00007fff32860ca0 EFLAGS: 00010246 [ 396.163650] RAX: 000000009e0429a4 RBX: 00000000c60e25c0 RCX: 0000001b32c20000 [ 396.170920] RDX: 0000000000000000 RSI: 00000000000009a4 RDI: ffffffff9e0429a4 [ 396.178194] RBP: 0000000000000002 R08: 000000009e0429a4 R09: 000000009e0429a8 [ 396.185468] R10: 00007fff32860e30 R11: 0000000000000246 R12: 000000000073bf88 [ 396.192742] R13: 0000000080000000 R14: 00007fe2882d8008 R15: 0000000000000002 17:55:41 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045707, &(0x7f0000000100)) 17:55:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:55:41 executing program 5: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000005c0)=0x0) r1 = getpgid(r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}, 0x2020}, 0x0, 0xffffffffffffffff, r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000300)=0x4, 0x272) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'batadv0\x00', 0x2}, 0x18) ioctl(r3, 0x800000000008982, &(0x7f0000000080)) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r4, &(0x7f00000003c0)=ANY=[@ANYRES16=r1], 0x231) mount(&(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x4000000000002, 0x0) ioctl$TIOCNXCL(r2, 0x540d) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000a80)=ANY=[], &(0x7f0000000100)) ioctl$SG_GET_PACK_ID(r2, 0x227c, &(0x7f0000000400)) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x22) memfd_create(&(0x7f0000000140)='cgroup2\x00u\xb56\xe0\x8f\x97\xe1\fB\x89\xe2\x96F/<\x8f\xc6\xa4\x18\"\x80\'\xbfMu\x93\x1e#\x8bA\xcfU\xaf\xcf}\xd2(Eg\xedZs\x8f3\x82\xaa\xe64\x9e\x103j\xdfhd\x99\xeb\x1d\x93y\xeb(', 0x0) syz_open_dev$usbmon(&(0x7f0000000840)='/dev/usbmon#\x00', 0x0, 0x400880) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$vsock_stream(0x28, 0x1, 0x0) accept4$vsock_stream(r6, &(0x7f0000001cc0)={0x28, 0x0, 0xffffffff, @hyper}, 0x10, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x10100, 0x0) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) set_mempolicy(0x0, 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x1) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/229) socket$inet_tcp(0x2, 0x1, 0x0) 17:55:41 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x1000}, {0x0}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:55:41 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) [ 396.340360] memory: usage 307200kB, limit 307200kB, failcnt 439 [ 396.346584] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 396.390498] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 396.408330] Memory cgroup stats for /syz2: cache:0KB rss:263884KB rss_huge:245760KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:263908KB inactive_file:8KB active_file:8KB unevictable:0KB 17:55:41 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045708, &(0x7f0000000100)) 17:55:41 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x1000}, {0x0}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 396.440291] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor2,pid=10539,uid=0 [ 396.494414] Memory cgroup out of memory: Kill process 10539 (syz-executor2) score 1113 or sacrifice child [ 396.534598] Killed process 10539 (syz-executor2) total-vm:72576kB, anon-rss:2192kB, file-rss:35788kB, shmem-rss:0kB [ 396.557457] oom_reaper: reaped process 10539 (syz-executor2), now anon-rss:0kB, file-rss:34828kB, shmem-rss:0kB [ 396.558575] SELinux: security policydb version 15 (MLS) not backwards compatible [ 396.581249] XFS (loop4): Invalid superblock magic number 17:55:41 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c004c000009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 396.608706] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:41 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) 17:55:41 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x1000}, {0x0}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:55:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:55:41 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045709, &(0x7f0000000100)) [ 396.802795] SELinux: security policydb version 15 (MLS) not backwards compatible [ 396.911286] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:41 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000001600)=""/129, 0x81}], 0x1, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:55:41 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x200000088004570a, &(0x7f0000000100)) [ 397.035640] XFS (loop4): Invalid superblock magic number 17:55:42 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) 17:55:42 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0060000009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:55:42 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000001600)=""/129, 0x81}], 0x1, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:55:42 executing program 5: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000005c0)=0x0) r1 = getpgid(r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}, 0x2020}, 0x0, 0xffffffffffffffff, r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000300)=0x4, 0x272) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'batadv0\x00', 0x2}, 0x18) ioctl(r3, 0x800000000008982, &(0x7f0000000080)) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r4, &(0x7f00000003c0)=ANY=[@ANYRES16=r1], 0x231) mount(&(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x4000000000002, 0x0) ioctl$TIOCNXCL(r2, 0x540d) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000a80)=ANY=[], &(0x7f0000000100)) ioctl$SG_GET_PACK_ID(r2, 0x227c, &(0x7f0000000400)) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x22) memfd_create(&(0x7f0000000140)='cgroup2\x00u\xb56\xe0\x8f\x97\xe1\fB\x89\xe2\x96F/<\x8f\xc6\xa4\x18\"\x80\'\xbfMu\x93\x1e#\x8bA\xcfU\xaf\xcf}\xd2(Eg\xedZs\x8f3\x82\xaa\xe64\x9e\x103j\xdfhd\x99\xeb\x1d\x93y\xeb(', 0x0) syz_open_dev$usbmon(&(0x7f0000000840)='/dev/usbmon#\x00', 0x0, 0x400880) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$vsock_stream(0x28, 0x1, 0x0) accept4$vsock_stream(r6, &(0x7f0000001cc0)={0x28, 0x0, 0xffffffff, @hyper}, 0x10, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x10100, 0x0) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) set_mempolicy(0x0, 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x1) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/229) socket$inet_tcp(0x2, 0x1, 0x0) 17:55:42 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x200000088004570b, &(0x7f0000000100)) 17:55:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x10', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) [ 397.221898] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:42 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000001600)=""/129, 0x81}], 0x1, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:55:42 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x200000088004570c, &(0x7f0000000100)) [ 397.288762] SELinux: security policydb version 15 (MLS) not backwards compatible [ 397.325853] sel_write_load: 14 callbacks suppressed [ 397.325859] SELinux: failed to load policy 17:55:42 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) 17:55:42 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0068000009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:55:42 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{0x0}, {&(0x7f0000001600)=""/129, 0x81}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:55:42 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x200000088004570d, &(0x7f0000000100)) [ 397.584383] device nr0 entered promiscuous mode 17:55:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:55:42 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{0x0}, {&(0x7f0000001600)=""/129, 0x81}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:55:42 executing program 5: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000005c0)=0x0) r1 = getpgid(r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}, 0x2020}, 0x0, 0xffffffffffffffff, r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000300)=0x4, 0x272) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'batadv0\x00', 0x2}, 0x18) ioctl(r3, 0x800000000008982, &(0x7f0000000080)) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r4, &(0x7f00000003c0)=ANY=[@ANYRES16=r1], 0x231) mount(&(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x4000000000002, 0x0) ioctl$TIOCNXCL(r2, 0x540d) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000a80)=ANY=[], &(0x7f0000000100)) ioctl$SG_GET_PACK_ID(r2, 0x227c, &(0x7f0000000400)) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x22) memfd_create(&(0x7f0000000140)='cgroup2\x00u\xb56\xe0\x8f\x97\xe1\fB\x89\xe2\x96F/<\x8f\xc6\xa4\x18\"\x80\'\xbfMu\x93\x1e#\x8bA\xcfU\xaf\xcf}\xd2(Eg\xedZs\x8f3\x82\xaa\xe64\x9e\x103j\xdfhd\x99\xeb\x1d\x93y\xeb(', 0x0) syz_open_dev$usbmon(&(0x7f0000000840)='/dev/usbmon#\x00', 0x0, 0x400880) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$vsock_stream(0x28, 0x1, 0x0) accept4$vsock_stream(r6, &(0x7f0000001cc0)={0x28, 0x0, 0xffffffff, @hyper}, 0x10, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x10100, 0x0) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) set_mempolicy(0x0, 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x1) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/229) socket$inet_tcp(0x2, 0x1, 0x0) 17:55:42 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x200000088004570e, &(0x7f0000000100)) [ 397.627926] SELinux: security policydb version 15 (MLS) not backwards compatible [ 397.682192] SELinux: failed to load policy [ 397.687266] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:42 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c006c000009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 397.730526] SELinux: failed to load policy [ 397.848933] XFS (loop4): Invalid superblock magic number [ 397.860470] SELinux: security policydb version 15 (MLS) not backwards compatible [ 397.904043] SELinux: failed to load policy 17:55:42 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0074000009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 397.926381] SELinux: security policydb version 15 (MLS) not backwards compatible [ 397.960068] SELinux: failed to load policy [ 398.124265] SELinux: security policydb version 15 (MLS) not backwards compatible [ 398.174857] SELinux: failed to load policy 17:55:43 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x200000088004570f, &(0x7f0000000100)) 17:55:43 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{0x0}, {&(0x7f0000001600)=""/129, 0x81}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 398.200750] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:43 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) [ 398.241897] SELinux: failed to load policy 17:55:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:55:43 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c007a000009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:55:43 executing program 5: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000005c0)=0x0) r1 = getpgid(r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}, 0x2020}, 0x0, 0xffffffffffffffff, r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000300)=0x4, 0x272) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'batadv0\x00', 0x2}, 0x18) ioctl(r3, 0x800000000008982, &(0x7f0000000080)) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r4, &(0x7f00000003c0)=ANY=[@ANYRES16=r1], 0x231) mount(&(0x7f0000000b80)=ANY=[@ANYBLOB="cb2b4d8d30ea9b5255175d43fca389e342de5ec740fe96132329bdfbaa11c5521288697c83a9f28c7ee9d8df70f2c6849d443d5bc274a1f1576385a885b764dc4babfdf01646fa85765072f75f3267f1ced252e7419523d2075fb98f5696f4bf38817b25525ef2a46b39c1d223d17b505512d51acb6fea0a1e53f8e26cded92ba381b83d2692b7fa7ffd3f81026e3e999bc357521a8e9799fe114e204db050bf9a50c94d3d01f8a436ccaf26a8bd4cd371f401cff939fa559e71ce024fc3c4540465cd73fd53aa2a73fdb229d7b8fbcad172ee88d3a2c1108134b2e349048cb3fd136752e22ad37130a3014904c8afeb6943fc0d38cea7e868b819004d05a190fcb27e1b682765f16ba1733cc86ddf9b7cbfc1cea713a927999c129c37652b78963ed3d352daa19eb5b567f8156ef8661d30269dacb35b9eb5efb6ed7a40f42386c06e90c13ede70e584d826126e0acc8d9d6c446b45fa4912d4c3f59995b4cd7c7313a0c375fc672a4905617dbefd2030c5593984e80b4932fdd35a0864cad3db9d9b14c550c89efb9d79987bd170f9f580ef8fe820fffb7aff479d3d0b77cbfab7c263b06b28e41bcf9beb1232ca4a6e129cd719b48d5b28c6ae0db6028873d9ef9a2d85679395f05b4fa857f333aca961427cba61ef75b215861b2bb8ce0545af9ccaca0c2d87524f6b23c17997f988e42f22fa55ae0e44309601f3a30e9557099661d3f982869fc3b6b96f4c88b901a2da76a358b8d68b1c31880e8e177700c6f32a8dab9eb2b917516734badbf94fe95b76f375f1dee7b85c1d95a7896742b513d057ab4e7ff42a897957768533baea66650d9a220ec6b8b18d1d9126c0bf93f6cee9d2f850e2815e0195402eef1d568e2b49ba818af39715783b43c92a1b0a7788f5c10c6ed644a13e44a54bccbb8aa4d49aa32877e6918df26bac2714fe4ae716914f82ff6bb0fd768984dd3d42b5a8f5a0437aaa29578b331aa71b1b7cad15be885293d50ed8abb5ab5982de19056c7d05aa0e0276130000000000c6b0b523ea1a67dfe447c9dbc4909185ec314bf87fe42f8b06b985c6633f8b8a7f10d453498a9b21122751832784fc0f28dd1326e2137dcd57974f959e53a570a53048f8b14dafa095db2c710e63f41ad38763d148887aa6985a830deb4a84fe59301a57f20ee54a5d7d52c750d866196003f486694c817fc90747cbd3f946512fcc2cc718cced99c6e9ed6c718fce295a856012e9d85d214432e5a17735cdca4eab1846415c65a356c1f40822e747ed27967330fb23ea97f9b08b05b98b25cd26d968f39bf1ce189164c39e2f99d86b029b49b72fec8d355053d54824dc58874f83fb83346aac655edf1f5075787be8efcc4ad797790e41db30403dca5e92d5630721e032e1d6ff31a15e78696b55f58486244b3cdb548a196b6bd75419c15387bfa28984e3fbcda0363dcec289a681ab51de9cccc13cfcbc901d3ac548af8ee8701cc745f2dffec2543f3e6c215a3da6ba729e6da33b5c1685fbd7428cf30e03d67af4b75c3511d98ae3792136a79fbcdd38080016c988e01e7d4928f4003fd297d288fd3c80f459b13c015039bb269c09b6f63463bc97189cc5d00b7b80b05284004ad8621e1101ce526bc783374a3fb8bd17c5b9d5ef41c3c2a2e6d79bbb8174ae68cc04ef319cb16a8445c842110679d011faac4705e480dd15cb3aa7ae5efe6158ae3e17800c704c867a45a6a76a539ab841eedb90e0d7604c0ef186a6ba00"], 0x0, 0x0, 0x4000000000002, 0x0) ioctl$TIOCNXCL(r2, 0x540d) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000a80)=ANY=[], &(0x7f0000000100)) ioctl$SG_GET_PACK_ID(r2, 0x227c, &(0x7f0000000400)) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x22) memfd_create(&(0x7f0000000140)='cgroup2\x00u\xb56\xe0\x8f\x97\xe1\fB\x89\xe2\x96F/<\x8f\xc6\xa4\x18\"\x80\'\xbfMu\x93\x1e#\x8bA\xcfU\xaf\xcf}\xd2(Eg\xedZs\x8f3\x82\xaa\xe64\x9e\x103j\xdfhd\x99\xeb\x1d\x93y\xeb(', 0x0) syz_open_dev$usbmon(&(0x7f0000000840)='/dev/usbmon#\x00', 0x0, 0x400880) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$vsock_stream(0x28, 0x1, 0x0) accept4$vsock_stream(r6, &(0x7f0000001cc0)={0x28, 0x0, 0xffffffff, @hyper}, 0x10, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x10100, 0x0) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) set_mempolicy(0x0, 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x1) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/229) socket$inet_tcp(0x2, 0x1, 0x0) 17:55:43 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045710, &(0x7f0000000100)) [ 398.366163] device nr0 entered promiscuous mode [ 398.371560] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:43 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x1000}, {&(0x7f0000001600)=""/129, 0x81}], 0x2}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:55:43 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000030009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 398.431166] SELinux: failed to load policy [ 398.441691] SELinux: security policydb version 15 (MLS) not backwards compatible [ 398.449630] SELinux: failed to load policy [ 398.589773] SELinux: security policydb version 15 (MLS) not backwards compatible [ 398.599395] XFS (loop4): Invalid superblock magic number [ 398.606688] SELinux: failed to load policy [ 398.612826] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:43 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000050009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 398.744964] SELinux: security policydb version 15 (MLS) not backwards compatible [ 398.809005] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:43 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000060009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:55:43 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045711, &(0x7f0000000100)) 17:55:43 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x1000}, {&(0x7f0000001600)=""/129, 0x81}], 0x2}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:55:43 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) 17:55:43 executing program 5: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000005c0)=0x0) r1 = getpgid(r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}, 0x2020}, 0x0, 0xffffffffffffffff, r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000300)=0x4, 0x272) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'batadv0\x00', 0x2}, 0x18) ioctl(r3, 0x800000000008982, &(0x7f0000000080)) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r4, &(0x7f00000003c0)=ANY=[@ANYRES16=r1], 0x231) mount(&(0x7f0000000b80)=ANY=[@ANYBLOB="cb2b4d8d30ea9b5255175d43fca389e342de5ec740fe96132329bdfbaa11c5521288697c83a9f28c7ee9d8df70f2c6849d443d5bc274a1f1576385a885b764dc4babfdf01646fa85765072f75f3267f1ced252e7419523d2075fb98f5696f4bf38817b25525ef2a46b39c1d223d17b505512d51acb6fea0a1e53f8e26cded92ba381b83d2692b7fa7ffd3f81026e3e999bc357521a8e9799fe114e204db050bf9a50c94d3d01f8a436ccaf26a8bd4cd371f401cff939fa559e71ce024fc3c4540465cd73fd53aa2a73fdb229d7b8fbcad172ee88d3a2c1108134b2e349048cb3fd136752e22ad37130a3014904c8afeb6943fc0d38cea7e868b819004d05a190fcb27e1b682765f16ba1733cc86ddf9b7cbfc1cea713a927999c129c37652b78963ed3d352daa19eb5b567f8156ef8661d30269dacb35b9eb5efb6ed7a40f42386c06e90c13ede70e584d826126e0acc8d9d6c446b45fa4912d4c3f59995b4cd7c7313a0c375fc672a4905617dbefd2030c5593984e80b4932fdd35a0864cad3db9d9b14c550c89efb9d79987bd170f9f580ef8fe820fffb7aff479d3d0b77cbfab7c263b06b28e41bcf9beb1232ca4a6e129cd719b48d5b28c6ae0db6028873d9ef9a2d85679395f05b4fa857f333aca961427cba61ef75b215861b2bb8ce0545af9ccaca0c2d87524f6b23c17997f988e42f22fa55ae0e44309601f3a30e9557099661d3f982869fc3b6b96f4c88b901a2da76a358b8d68b1c31880e8e177700c6f32a8dab9eb2b917516734badbf94fe95b76f375f1dee7b85c1d95a7896742b513d057ab4e7ff42a897957768533baea66650d9a220ec6b8b18d1d9126c0bf93f6cee9d2f850e2815e0195402eef1d568e2b49ba818af39715783b43c92a1b0a7788f5c10c6ed644a13e44a54bccbb8aa4d49aa32877e6918df26bac2714fe4ae716914f82ff6bb0fd768984dd3d42b5a8f5a0437aaa29578b331aa71b1b7cad15be885293d50ed8abb5ab5982de19056c7d05aa0e0276130000000000c6b0b523ea1a67dfe447c9dbc4909185ec314bf87fe42f8b06b985c6633f8b8a7f10d453498a9b21122751832784fc0f28dd1326e2137dcd57974f959e53a570a53048f8b14dafa095db2c710e63f41ad38763d148887aa6985a830deb4a84fe59301a57f20ee54a5d7d52c750d866196003f486694c817fc90747cbd3f946512fcc2cc718cced99c6e9ed6c718fce295a856012e9d85d214432e5a17735cdca4eab1846415c65a356c1f40822e747ed27967330fb23ea97f9b08b05b98b25cd26d968f39bf1ce189164c39e2f99d86b029b49b72fec8d355053d54824dc58874f83fb83346aac655edf1f5075787be8efcc4ad797790e41db30403dca5e92d5630721e032e1d6ff31a15e78696b55f58486244b3cdb548a196b6bd75419c15387bfa28984e3fbcda0363dcec289a681ab51de9cccc13cfcbc901d3ac548af8ee8701cc745f2dffec2543f3e6c215a3da6ba729e6da33b5c1685fbd7428cf30e03d67af4b75c3511d98ae3792136a79fbcdd38080016c988e01e7d4928f4003fd297d288fd3c80f459b13c015039bb269c09b6f63463bc97189cc5d00b7b80b05284004ad8621e1101ce526bc783374a3fb8bd17c5b9d5ef41c3c2a2e6d79bbb8174ae68cc04ef319cb16a8445c842110679d011faac4705e480dd15cb3aa7ae5efe6158ae3e17800c704c867a45a6a76a539ab841eedb90e0d7604c0ef186a6ba00"], 0x0, 0x0, 0x4000000000002, 0x0) ioctl$TIOCNXCL(r2, 0x540d) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000a80)=ANY=[], &(0x7f0000000100)) ioctl$SG_GET_PACK_ID(r2, 0x227c, &(0x7f0000000400)) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x22) memfd_create(&(0x7f0000000140)='cgroup2\x00u\xb56\xe0\x8f\x97\xe1\fB\x89\xe2\x96F/<\x8f\xc6\xa4\x18\"\x80\'\xbfMu\x93\x1e#\x8bA\xcfU\xaf\xcf}\xd2(Eg\xedZs\x8f3\x82\xaa\xe64\x9e\x103j\xdfhd\x99\xeb\x1d\x93y\xeb(', 0x0) syz_open_dev$usbmon(&(0x7f0000000840)='/dev/usbmon#\x00', 0x0, 0x400880) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$vsock_stream(0x28, 0x1, 0x0) accept4$vsock_stream(r6, &(0x7f0000001cc0)={0x28, 0x0, 0xffffffff, @hyper}, 0x10, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x10100, 0x0) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) set_mempolicy(0x0, 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x1) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/229) socket$inet_tcp(0x2, 0x1, 0x0) 17:55:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) [ 399.094855] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:44 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045712, &(0x7f0000000100)) [ 399.188191] device nr0 entered promiscuous mode [ 399.189359] syz-executor2 invoked oom-killer: gfp_mask=0x7080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 17:55:44 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x1000}, {&(0x7f0000001600)=""/129, 0x81}], 0x2}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 399.273289] CPU: 0 PID: 15260 Comm: syz-executor2 Not tainted 5.0.0-rc4 #49 [ 399.280427] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 399.289782] Call Trace: [ 399.292377] dump_stack+0x1db/0x2d0 [ 399.296021] ? dump_stack_print_info.cold+0x20/0x20 [ 399.301062] dump_header+0x1e6/0x116c [ 399.304878] ? add_lock_to_list.isra.0+0x450/0x450 [ 399.309820] ? print_usage_bug+0xd0/0xd0 [ 399.313893] ? pagefault_out_of_memory+0x1a1/0x1a1 [ 399.318834] ? ___ratelimit+0x37c/0x686 [ 399.322822] ? mark_held_locks+0xb1/0x100 [ 399.326983] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 399.332088] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 399.337200] ? lockdep_hardirqs_on+0x415/0x5d0 [ 399.341789] ? trace_hardirqs_on+0xbd/0x310 [ 399.346114] ? kasan_check_read+0x11/0x20 [ 399.350288] ? ___ratelimit+0x37c/0x686 [ 399.354270] ? trace_hardirqs_off_caller+0x300/0x300 [ 399.359376] ? do_raw_spin_trylock+0x270/0x270 [ 399.363965] ? trace_hardirqs_on_caller+0x310/0x310 [ 399.368986] ? lock_acquire+0x1db/0x570 [ 399.372972] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 399.378088] ? ___ratelimit+0xac/0x686 [ 399.381987] ? idr_get_free+0xee0/0xee0 [ 399.385963] ? lockdep_hardirqs_on+0x415/0x5d0 [ 399.390565] oom_kill_process.cold+0x10/0x9d4 [ 399.395069] ? cgroup_procs_next+0x70/0x70 [ 399.399315] ? _raw_spin_unlock_irq+0x5e/0x90 [ 399.403814] ? oom_badness+0xa50/0xa50 [ 399.407721] ? oom_evaluate_task+0x540/0x540 [ 399.412153] ? mem_cgroup_iter_break+0x30/0x30 [ 399.416740] ? mutex_trylock+0x2d0/0x2d0 [ 399.420806] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 399.426360] ? rcu_read_unlock_special+0x380/0x380 [ 399.431301] out_of_memory+0x885/0x1420 [ 399.435285] ? mem_cgroup_iter+0x508/0xf30 [ 399.439531] ? oom_killer_disable+0x340/0x340 [ 399.444039] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 399.449167] ? lock_acquire+0x1db/0x570 [ 399.453179] mem_cgroup_out_of_memory+0x160/0x210 [ 399.458027] ? do_raw_spin_unlock+0xa0/0x330 [ 399.462446] ? memcg_memory_event+0x40/0x40 [ 399.466771] ? do_raw_spin_trylock+0x270/0x270 [ 399.471373] ? _raw_spin_unlock+0x2d/0x50 [ 399.475530] try_charge+0x12a9/0x19b0 [ 399.479342] ? lock_downgrade+0x910/0x910 [ 399.483493] ? kasan_check_read+0x11/0x20 [ 399.487658] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 399.492506] ? get_mem_cgroup_from_mm+0x1cd/0x420 [ 399.497357] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 399.502903] ? lock_downgrade+0x910/0x910 [ 399.507061] ? kasan_check_read+0x11/0x20 [ 399.511222] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 399.516505] ? rcu_read_unlock_special+0x380/0x380 [ 399.521450] ? get_mem_cgroup_from_mm+0x1ea/0x420 [ 399.526304] memcg_kmem_charge_memcg+0x7c/0x130 [ 399.530980] ? memcg_kmem_put_cache+0xb0/0xb0 [ 399.535482] ? lock_release+0xc40/0xc40 [ 399.539470] memcg_kmem_charge+0x13b/0x340 [ 399.543716] __alloc_pages_nodemask+0x7b8/0xdc0 [ 399.548400] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 399.553421] ? rcu_pm_notify+0xd0/0xd0 [ 399.557325] ? rcu_read_lock_sched_held+0x110/0x130 [ 399.562354] ? kmem_cache_alloc_node+0x347/0x710 [ 399.567113] ? print_usage_bug+0xd0/0xd0 [ 399.571206] copy_process+0x847/0x8860 [ 399.575100] ? print_usage_bug+0xd0/0xd0 [ 399.579193] ? rcu_read_unlock+0x16/0x60 [ 399.583268] ? __lock_acquire+0x572/0x4a30 [ 399.587506] ? mark_held_locks+0x100/0x100 [ 399.591756] ? __cleanup_sighand+0x70/0x70 [ 399.596002] ? mark_held_locks+0x100/0x100 [ 399.600243] ? find_held_lock+0x35/0x120 [ 399.604321] ? mark_held_locks+0x100/0x100 [ 399.608567] ? delayacct_end+0xc9/0x100 [ 399.612548] ? add_lock_to_list.isra.0+0x450/0x450 [ 399.617483] ? lock_acquire+0x1db/0x570 [ 399.621467] ? add_lock_to_list.isra.0+0x450/0x450 [ 399.626403] ? find_held_lock+0x35/0x120 [ 399.630474] ? print_usage_bug+0xd0/0xd0 [ 399.634548] ? psi_memstall_leave+0x1f8/0x280 [ 399.639045] ? find_held_lock+0x35/0x120 [ 399.643119] ? __lock_acquire+0x572/0x4a30 [ 399.647381] ? _raw_spin_unlock_irq+0x28/0x90 [ 399.651879] ? _raw_spin_unlock_irq+0x28/0x90 [ 399.656383] ? lockdep_hardirqs_on+0x415/0x5d0 [ 399.660989] ? trace_hardirqs_on+0xbd/0x310 [ 399.665324] ? mark_held_locks+0x100/0x100 [ 399.669565] ? check_preemption_disabled+0x48/0x290 [ 399.674595] ? rcu_lockdep_current_cpu_online+0x1aa/0x220 [ 399.680152] ? rcu_pm_notify+0xd0/0xd0 [ 399.684054] ? add_lock_to_list.isra.0+0x450/0x450 [ 399.688990] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 399.694531] ? try_to_free_mem_cgroup_pages+0x597/0xcd0 [ 399.699899] ? lockdep_hardirqs_on+0x415/0x5d0 [ 399.704493] ? try_to_free_pages+0xb70/0xb70 [ 399.708906] ? percpu_ref_put_many+0x129/0x270 [ 399.713504] ? blkcg_maybe_throttle_current+0x75e/0x1400 [ 399.718965] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 399.724511] _do_fork+0x1a9/0x1170 [ 399.728068] ? fork_idle+0x1d0/0x1d0 [ 399.731798] ? trace_hardirqs_off+0xb8/0x310 [ 399.736214] ? get_mctgt_type_thp.isra.0+0x4c0/0x4c0 [ 399.741328] ? prepare_exit_to_usermode+0x32e/0x3b0 [ 399.746364] ? do_syscall_64+0x8c/0x800 [ 399.750342] ? do_syscall_64+0x8c/0x800 [ 399.754323] ? lockdep_hardirqs_on+0x415/0x5d0 [ 399.758914] ? trace_hardirqs_on+0xbd/0x310 [ 399.763244] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 399.768614] ? trace_hardirqs_off_caller+0x300/0x300 [ 399.773727] __x64_sys_clone+0xbf/0x150 [ 399.777713] do_syscall_64+0x1a3/0x800 [ 399.781614] ? syscall_return_slowpath+0x5f0/0x5f0 [ 399.786554] ? prepare_exit_to_usermode+0x232/0x3b0 [ 399.791584] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 399.796441] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 399.801652] RIP: 0033:0x45aa69 [ 399.804851] Code: ff 48 85 f6 0f 84 97 8d fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c 6e 8d fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 399.823752] RSP: 002b:00007fff32860c38 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 399.831461] RAX: ffffffffffffffda RBX: 00007fe2862b6700 RCX: 000000000045aa69 [ 399.838729] RDX: 00007fe2862b69d0 RSI: 00007fe2862b5db0 RDI: 00000000003d0f00 [ 399.846001] RBP: 00007fff32860e40 R08: 00007fe2862b6700 R09: 00007fe2862b6700 [ 399.853269] R10: 00007fe2862b69d0 R11: 0000000000000202 R12: 0000000000000000 [ 399.860547] R13: 00007fff32860cef R14: 00007fe2862b69c0 R15: 0000000000000001 17:55:44 executing program 5: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000140)=""/65, 0x41) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @broadcast}, &(0x7f0000000040)=0xc) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f00000001c0)={0x800, 0x0, 'client0\x00', 0x1, "ff205e9c9eae9e97", "8328a7fa6f07ecc1a07e426d584b780625f36659758bb4b3a075d8b38af7ee47", 0x8, 0x5}) ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f00000000c0)=""/39) [ 399.910890] XFS (loop4): Invalid superblock magic number [ 399.933957] memory: usage 307160kB, limit 307200kB, failcnt 469 [ 399.941289] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 399.948243] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 399.954565] Memory cgroup stats for /syz2: cache:0KB rss:262432KB rss_huge:243712KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:262468KB inactive_file:16KB active_file:20KB unevictable:0KB [ 399.977206] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor2,pid=10699,uid=0 [ 400.000001] Memory cgroup out of memory: Kill process 10699 (syz-executor2) score 1113 or sacrifice child 17:55:44 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045713, &(0x7f0000000100)) 17:55:44 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x1000}, {&(0x7f0000001600)=""/129, 0x81}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, 0x0) [ 400.009790] Killed process 10699 (syz-executor2) total-vm:72576kB, anon-rss:2192kB, file-rss:35788kB, shmem-rss:0kB 17:55:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x03', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:55:45 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000070009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:55:45 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) 17:55:45 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) close(r1) socket$packet(0x11, 0x2, 0x300) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)={0x0, r1}) r2 = semget(0x3, 0x7, 0x414) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000000)=""/127) 17:55:45 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x1000}, {&(0x7f0000001600)=""/129, 0x81}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, 0x0) 17:55:45 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045714, &(0x7f0000000100)) [ 400.219810] device nr0 entered promiscuous mode [ 400.332959] SELinux: security policydb version 15 (MLS) not backwards compatible [ 400.391918] syz-executor2 invoked oom-killer: gfp_mask=0x7080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 400.410514] CPU: 0 PID: 15317 Comm: syz-executor2 Not tainted 5.0.0-rc4 #49 [ 400.417631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 400.426985] Call Trace: [ 400.429612] dump_stack+0x1db/0x2d0 [ 400.433275] ? dump_stack_print_info.cold+0x20/0x20 [ 400.438313] dump_header+0x1e6/0x116c [ 400.442121] ? add_lock_to_list.isra.0+0x450/0x450 [ 400.447073] ? print_usage_bug+0xd0/0xd0 [ 400.451158] ? pagefault_out_of_memory+0x1a1/0x1a1 [ 400.456101] ? ___ratelimit+0x37c/0x686 [ 400.460084] ? mark_held_locks+0xb1/0x100 [ 400.464237] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 400.469352] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 400.474462] ? lockdep_hardirqs_on+0x415/0x5d0 [ 400.479049] ? trace_hardirqs_on+0xbd/0x310 [ 400.483376] ? kasan_check_read+0x11/0x20 [ 400.487527] ? ___ratelimit+0x37c/0x686 [ 400.491506] ? trace_hardirqs_off_caller+0x300/0x300 [ 400.496614] ? do_raw_spin_trylock+0x270/0x270 [ 400.501200] ? trace_hardirqs_on_caller+0x310/0x310 [ 400.506223] ? lock_acquire+0x1db/0x570 [ 400.510210] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 400.515319] ? ___ratelimit+0xac/0x686 [ 400.519218] ? idr_get_free+0xee0/0xee0 [ 400.523194] ? lockdep_hardirqs_on+0x415/0x5d0 [ 400.527791] oom_kill_process.cold+0x10/0x9d4 [ 400.532300] ? cgroup_procs_next+0x70/0x70 [ 400.536548] ? _raw_spin_unlock_irq+0x5e/0x90 [ 400.541054] ? oom_badness+0xa50/0xa50 [ 400.544950] ? oom_evaluate_task+0x540/0x540 [ 400.549372] ? mem_cgroup_iter_break+0x30/0x30 [ 400.553962] ? mutex_trylock+0x2d0/0x2d0 [ 400.558030] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 400.563589] ? rcu_read_unlock_special+0x380/0x380 [ 400.568536] out_of_memory+0x885/0x1420 [ 400.572525] ? mem_cgroup_iter+0x508/0xf30 [ 400.576770] ? oom_killer_disable+0x340/0x340 [ 400.581271] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 400.586380] ? lock_acquire+0x1db/0x570 [ 400.590369] mem_cgroup_out_of_memory+0x160/0x210 [ 400.595218] ? do_raw_spin_unlock+0xa0/0x330 [ 400.599633] ? memcg_memory_event+0x40/0x40 [ 400.603974] ? do_raw_spin_trylock+0x270/0x270 [ 400.608591] ? _raw_spin_unlock+0x2d/0x50 [ 400.612751] try_charge+0x12a9/0x19b0 [ 400.616553] ? lock_downgrade+0x910/0x910 [ 400.620712] ? kasan_check_read+0x11/0x20 [ 400.624871] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 400.629721] ? get_mem_cgroup_from_mm+0x1cd/0x420 [ 400.634569] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 400.640113] ? lock_downgrade+0x910/0x910 [ 400.644281] ? kasan_check_read+0x11/0x20 [ 400.648447] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 400.653728] ? rcu_read_unlock_special+0x380/0x380 [ 400.658674] ? get_mem_cgroup_from_mm+0x1ea/0x420 [ 400.663587] memcg_kmem_charge_memcg+0x7c/0x130 [ 400.668260] ? memcg_kmem_put_cache+0xb0/0xb0 [ 400.672759] ? lock_release+0xc40/0xc40 [ 400.676743] memcg_kmem_charge+0x13b/0x340 [ 400.681000] __alloc_pages_nodemask+0x7b8/0xdc0 [ 400.685682] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 400.690718] ? rcu_pm_notify+0xd0/0xd0 [ 400.694624] ? rcu_read_lock_sched_held+0x110/0x130 [ 400.699650] ? kmem_cache_alloc_node+0x347/0x710 [ 400.704415] ? pci_mmcfg_check_reserved+0x170/0x170 [ 400.709453] copy_process+0x847/0x8860 [ 400.713362] ? ___might_sleep+0x1e7/0x310 [ 400.717515] ? arch_local_save_flags+0x50/0x50 [ 400.722110] ? __schedule+0x1e60/0x1e60 [ 400.726107] ? do_raw_spin_trylock+0x270/0x270 [ 400.730721] ? __cleanup_sighand+0x70/0x70 [ 400.734966] ? futex_wait_queue_me+0x539/0x810 [ 400.739553] ? refill_pi_state_cache.part.0+0x310/0x310 [ 400.744923] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 400.749950] ? handle_futex_death+0x230/0x230 [ 400.754465] ? lock_acquire+0x1db/0x570 [ 400.758460] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 400.763668] ? drop_futex_key_refs.isra.0+0x6f/0xf0 [ 400.768694] ? futex_wait+0x6e6/0xa40 [ 400.772512] ? print_usage_bug+0xd0/0xd0 [ 400.776582] ? futex_wait_setup+0x430/0x430 [ 400.780911] ? drop_futex_key_refs.isra.0+0x6f/0xf0 [ 400.785940] ? __lock_acquire+0x572/0x4a30 [ 400.790202] ? mark_held_locks+0x100/0x100 [ 400.794448] ? do_futex+0x1b0/0x2910 [ 400.798183] ? save_stack+0xa9/0xd0 [ 400.801817] ? save_stack+0x45/0xd0 [ 400.805447] ? __kasan_slab_free+0x102/0x150 [ 400.809863] ? add_lock_to_list.isra.0+0x450/0x450 [ 400.814806] ? add_lock_to_list.isra.0+0x450/0x450 [ 400.819751] ? exit_robust_list+0x290/0x290 [ 400.824088] ? __might_fault+0x12b/0x1e0 [ 400.828169] ? find_held_lock+0x35/0x120 [ 400.832244] ? __might_fault+0x12b/0x1e0 [ 400.836312] ? lock_acquire+0x1db/0x570 [ 400.840297] ? lock_downgrade+0x910/0x910 [ 400.844452] ? lock_release+0xc40/0xc40 [ 400.848432] ? trace_hardirqs_off_caller+0x300/0x300 [ 400.853546] _do_fork+0x1a9/0x1170 [ 400.857096] ? fork_idle+0x1d0/0x1d0 [ 400.860815] ? kasan_check_read+0x11/0x20 [ 400.864973] ? _copy_to_user+0xc9/0x120 [ 400.868960] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 400.874500] ? put_timespec64+0x115/0x1b0 [ 400.878651] ? nsecs_to_jiffies+0x30/0x30 [ 400.882813] ? do_syscall_64+0x8c/0x800 [ 400.886798] ? do_syscall_64+0x8c/0x800 [ 400.890780] ? lockdep_hardirqs_on+0x415/0x5d0 [ 400.895373] ? trace_hardirqs_on+0xbd/0x310 [ 400.899696] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 400.905240] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 400.910609] ? trace_hardirqs_off_caller+0x300/0x300 [ 400.915725] __x64_sys_clone+0xbf/0x150 [ 400.919708] do_syscall_64+0x1a3/0x800 [ 400.923610] ? syscall_return_slowpath+0x5f0/0x5f0 [ 400.928544] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 400.933569] ? __switch_to_asm+0x34/0x70 [ 400.937639] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 400.942498] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 400.947689] RIP: 0033:0x458099 [ 400.950891] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 400.969794] RSP: 002b:00007fe2862d6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 400.977505] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000458099 [ 400.984775] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0020002102001fff 17:55:45 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ecryptfs\x00', 0x0, &(0x7f0000000100)) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x4000, 0x0) ioctl$UI_BEGIN_FF_ERASE(r0, 0xc00c55ca, &(0x7f0000000040)={0xa, 0x8, 0x5}) [ 400.992046] RBP: 000000000073bf00 R08: ffffffffffffffff R09: 0000000000000000 [ 400.999313] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2862d76d4 [ 401.006586] R13: 00000000004be480 R14: 00000000004cea40 R15: 00000000ffffffff [ 401.019779] memory: usage 307192kB, limit 307200kB, failcnt 499 [ 401.029447] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 401.039436] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 401.048924] Memory cgroup stats for /syz2: cache:0KB rss:262424KB rss_huge:243712KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:262464KB inactive_file:16KB active_file:20KB unevictable:0KB [ 401.078261] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor2,pid=10723,uid=0 [ 401.106241] Memory cgroup out of memory: Kill process 10723 (syz-executor2) score 1113 or sacrifice child [ 401.123260] Killed process 10723 (syz-executor2) total-vm:72576kB, anon-rss:2192kB, file-rss:35788kB, shmem-rss:0kB [ 401.135998] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 401.159178] oom_reaper: reaped process 10723 (syz-executor2), now anon-rss:0kB, file-rss:34828kB, shmem-rss:0kB [ 401.161494] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 401.180564] Error parsing options; rc = [-22] 17:55:46 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x1000}, {&(0x7f0000001600)=""/129, 0x81}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, 0x0) 17:55:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) [ 401.208907] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:46 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045715, &(0x7f0000000100)) 17:55:46 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) 17:55:46 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000140)={'mangle\x00'}, &(0x7f0000000000)=0x54) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x0, 0x0) setsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f00000000c0)=0xb8, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f00000001c0), &(0x7f0000000200)=0x8) [ 401.276905] Error parsing options; rc = [-22] 17:55:46 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000200009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:55:46 executing program 3 (fault-call:7 fault-nth:0): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:55:46 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045716, &(0x7f0000000100)) [ 401.425825] device nr0 entered promiscuous mode [ 401.432601] FAULT_INJECTION: forcing a failure. [ 401.432601] name failslab, interval 1, probability 0, space 0, times 0 [ 401.444993] SELinux: security policydb version 15 (MLS) not backwards compatible [ 401.465301] XFS (loop4): Invalid superblock magic number [ 401.491712] SELinux: security policydb version 15 (MLS) not backwards compatible [ 401.498500] CPU: 0 PID: 15349 Comm: syz-executor3 Not tainted 5.0.0-rc4 #49 [ 401.506372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 401.515729] Call Trace: [ 401.518339] dump_stack+0x1db/0x2d0 [ 401.521979] ? dump_stack_print_info.cold+0x20/0x20 [ 401.527016] should_fail.cold+0xa/0x15 [ 401.530924] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 401.536056] ? ___might_sleep+0x1e7/0x310 [ 401.540229] ? arch_local_save_flags+0x50/0x50 [ 401.544830] __should_failslab+0x121/0x190 [ 401.549080] should_failslab+0x9/0x14 [ 401.552887] __kmalloc+0x2dc/0x740 [ 401.556435] ? lock_sock_nested+0xac/0x120 [ 401.560683] ? sock_kmalloc+0x166/0x200 [ 401.564667] sock_kmalloc+0x166/0x200 [ 401.568546] ? __local_bh_enable_ip+0x15a/0x270 [ 401.573226] ? __sk_mem_schedule+0xe0/0xe0 [ 401.577472] ? lock_sock_nested+0xe2/0x120 [ 401.581715] ? trace_hardirqs_off_caller+0x300/0x300 [ 401.586884] af_alg_alloc_areq+0x7c/0x300 [ 401.591048] ? alg_accept+0x60/0x60 [ 401.594682] ? __local_bh_enable_ip+0x15a/0x270 [ 401.599366] skcipher_recvmsg+0x2ec/0x1260 [ 401.603642] ? skcipher_bind+0x30/0x30 [ 401.607552] skcipher_recvmsg_nokey+0x67/0x90 [ 401.612055] ? skcipher_sendpage_nokey+0xa0/0xa0 [ 401.616865] sock_recvmsg+0xd0/0x110 [ 401.620590] ? __sock_recv_ts_and_drops+0x410/0x410 [ 401.625657] ___sys_recvmsg+0x2a8/0x680 [ 401.629663] ? ___sys_sendmsg+0x910/0x910 [ 401.633859] ? kvm_clock_read+0x18/0x30 [ 401.637841] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 401.643382] ? ktime_get_ts64+0x38d/0x4f0 [ 401.647546] ? __fget_light+0x2db/0x420 [ 401.651617] ? fget_raw+0x20/0x20 [ 401.655095] ? poll_select_set_timeout+0x154/0x240 [ 401.660034] ? __fdget+0x1b/0x20 [ 401.663402] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 401.668953] do_recvmmsg+0x2f8/0xc40 [ 401.672688] ? ___sys_recvmsg+0x680/0x680 [ 401.676860] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 401.682405] ? _copy_from_user+0xdd/0x150 [ 401.686576] __sys_recvmmsg+0xe5/0x270 [ 401.690469] ? __ia32_sys_recvmsg+0xb0/0xb0 [ 401.694793] ? trace_hardirqs_on+0xbd/0x310 [ 401.699127] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 401.704511] ? trace_hardirqs_off_caller+0x300/0x300 [ 401.709621] __x64_sys_recvmmsg+0xe6/0x140 [ 401.713869] do_syscall_64+0x1a3/0x800 [ 401.717766] ? syscall_return_slowpath+0x5f0/0x5f0 [ 401.722709] ? prepare_exit_to_usermode+0x232/0x3b0 [ 401.727736] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 401.732594] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 401.737801] RIP: 0033:0x458099 [ 401.741018] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 401.759918] RSP: 002b:00007fc1126dac78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 401.767628] RAX: ffffffffffffffda RBX: 00007fc1126dac90 RCX: 0000000000458099 [ 401.774899] RDX: 0000000000000001 RSI: 0000000020009140 RDI: 0000000000000004 [ 401.782179] RBP: 000000000073bf00 R08: 0000000020009340 R09: 0000000000000000 17:55:46 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c00003f0009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 401.789449] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc1126db6d4 [ 401.796724] R13: 00000000004c4d72 R14: 00000000004d8718 R15: 0000000000000006 17:55:46 executing program 3 (fault-call:7 fault-nth:1): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 401.944878] syz-executor2 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 401.980195] CPU: 1 PID: 15358 Comm: syz-executor2 Not tainted 5.0.0-rc4 #49 [ 401.987334] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 401.996689] Call Trace: [ 401.999292] dump_stack+0x1db/0x2d0 [ 402.002925] ? dump_stack_print_info.cold+0x20/0x20 [ 402.007960] dump_header+0x1e6/0x116c [ 402.011768] ? add_lock_to_list.isra.0+0x450/0x450 [ 402.016705] ? print_usage_bug+0xd0/0xd0 [ 402.020773] ? pagefault_out_of_memory+0x1a1/0x1a1 [ 402.025840] ? ___ratelimit+0x37c/0x686 [ 402.029827] ? mark_held_locks+0xb1/0x100 [ 402.033984] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 402.039098] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 402.044206] ? lockdep_hardirqs_on+0x415/0x5d0 [ 402.048794] ? trace_hardirqs_on+0xbd/0x310 [ 402.053120] ? kasan_check_read+0x11/0x20 [ 402.057281] ? ___ratelimit+0x37c/0x686 [ 402.061264] ? trace_hardirqs_off_caller+0x300/0x300 [ 402.066375] ? do_raw_spin_trylock+0x270/0x270 [ 402.070963] ? trace_hardirqs_on_caller+0x310/0x310 [ 402.075980] ? lock_acquire+0x1db/0x570 [ 402.079969] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 402.085080] ? ___ratelimit+0xac/0x686 [ 402.088981] ? idr_get_free+0xee0/0xee0 [ 402.092963] ? lockdep_hardirqs_on+0x415/0x5d0 [ 402.097559] oom_kill_process.cold+0x10/0x9d4 [ 402.102066] ? cgroup_procs_next+0x70/0x70 [ 402.106312] ? _raw_spin_unlock_irq+0x5e/0x90 [ 402.110811] ? oom_badness+0xa50/0xa50 [ 402.114712] ? oom_evaluate_task+0x540/0x540 [ 402.119147] ? mem_cgroup_iter_break+0x30/0x30 [ 402.123738] ? mutex_trylock+0x2d0/0x2d0 [ 402.127807] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 402.133362] ? rcu_read_unlock_special+0x380/0x380 [ 402.138306] out_of_memory+0x885/0x1420 [ 402.142292] ? mem_cgroup_iter+0x508/0xf30 [ 402.146538] ? oom_killer_disable+0x340/0x340 [ 402.151042] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 402.156160] ? lock_acquire+0x1db/0x570 [ 402.160672] mem_cgroup_out_of_memory+0x160/0x210 [ 402.165521] ? do_raw_spin_unlock+0xa0/0x330 [ 402.169940] ? memcg_memory_event+0x40/0x40 [ 402.174266] ? do_raw_spin_trylock+0x270/0x270 [ 402.178867] ? _raw_spin_unlock+0x2d/0x50 [ 402.183028] try_charge+0x12a9/0x19b0 [ 402.186870] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 402.192424] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 402.197280] ? rcu_read_unlock_special+0x380/0x380 [ 402.202224] ? get_mem_cgroup_from_mm+0x1ea/0x420 [ 402.207076] ? get_mem_cgroup_from_page+0x190/0x190 [ 402.212102] ? rcu_read_lock_sched_held+0x110/0x130 [ 402.217149] mem_cgroup_try_charge+0x43a/0xdb0 [ 402.221745] ? mem_cgroup_protected+0xa10/0xa10 [ 402.226426] ? lock_downgrade+0x910/0x910 [ 402.230588] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 402.236126] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 402.241697] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 402.246638] wp_page_copy+0x45a/0x1c30 [ 402.250539] ? mark_held_locks+0x100/0x100 [ 402.254775] ? delayacct_end+0xc9/0x100 [ 402.258761] ? pmd_pfn+0x1d0/0x1d0 [ 402.262318] ? find_held_lock+0x35/0x120 [ 402.266383] ? do_wp_page+0x70d/0x16b0 [ 402.270290] ? kasan_check_read+0x11/0x20 [ 402.274443] ? do_raw_spin_unlock+0xa0/0x330 [ 402.278858] ? _vm_normal_page+0x15d/0x3d0 [ 402.283100] ? do_raw_spin_trylock+0x270/0x270 [ 402.287700] ? __lock_acquire+0x572/0x4a30 [ 402.291949] do_wp_page+0x715/0x16b0 [ 402.295670] ? lock_acquire+0x1db/0x570 [ 402.299670] ? finish_mkwrite_fault+0x540/0x540 [ 402.304348] ? kasan_check_read+0x11/0x20 [ 402.308504] ? do_raw_spin_lock+0x156/0x360 [ 402.312827] ? lock_release+0xc40/0xc40 [ 402.316811] ? rwlock_bug.part.0+0x90/0x90 [ 402.321053] ? pmd_devmap_trans_unstable+0x1d0/0x1d0 [ 402.326168] ? add_mm_counter_fast.part.0+0x40/0x40 [ 402.331203] __handle_mm_fault+0x2c8e/0x55a0 [ 402.335632] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 402.340488] ? check_preemption_disabled+0x48/0x290 [ 402.345511] ? handle_mm_fault+0x3cc/0xc80 [ 402.349771] ? lock_downgrade+0x910/0x910 [ 402.353926] ? kasan_check_read+0x11/0x20 [ 402.358084] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 402.363367] ? rcu_read_unlock_special+0x380/0x380 [ 402.368299] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 402.373842] ? check_preemption_disabled+0x48/0x290 [ 402.378874] handle_mm_fault+0x4ec/0xc80 [ 402.382943] ? __handle_mm_fault+0x55a0/0x55a0 [ 402.387540] __do_page_fault+0x5da/0xd60 [ 402.391621] do_page_fault+0xe6/0x7d8 [ 402.395436] ? trace_hardirqs_on_caller+0xc0/0x310 [ 402.400693] ? vmalloc_sync_all+0x30/0x30 [ 402.404846] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 402.410307] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 402.415855] ? prepare_exit_to_usermode+0x232/0x3b0 [ 402.420879] ? page_fault+0x8/0x30 [ 402.424427] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 402.429279] ? page_fault+0x8/0x30 [ 402.432827] page_fault+0x1e/0x30 [ 402.436280] RIP: 0033:0x40d318 [ 402.439476] Code: 8b 34 c6 4a 8d 04 2e 48 3d ff ff ff 7e 0f 86 77 ff ff ff bf 40 d7 4b 00 31 c0 e8 63 46 ff ff 31 ff e8 9c 42 ff ff 0f 1f 40 00 <89> 3c b5 00 00 73 00 eb b6 31 ed 0f 1f 44 00 00 80 3d 4e 31 64 00 [ 402.458385] RSP: 002b:00007fff32860ca0 EFLAGS: 00010246 [ 402.463764] RAX: 00000000bc01120f RBX: 00000000c3d18ed8 RCX: 0000001b32c20000 [ 402.471032] RDX: 0000000000000000 RSI: 000000000000120f RDI: ffffffffbc01120f [ 402.478303] RBP: 0000000000000008 R08: 00000000bc01120f R09: 00000000bc011213 [ 402.485576] R10: 00007fff32860e30 R11: 0000000000000246 R12: 000000000073bf88 [ 402.492849] R13: 0000000080000000 R14: 00007fe2882d8008 R15: 0000000000000008 [ 402.507318] memory: usage 307200kB, limit 307200kB, failcnt 510 [ 402.517747] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 402.526689] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 17:55:47 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x580, 0x0) ioctl$RTC_VL_READ(r1, 0x80047013, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/238) 17:55:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) [ 402.533413] Memory cgroup stats for /syz2: cache:0KB rss:262332KB rss_huge:243712KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:262448KB inactive_file:20KB active_file:16KB unevictable:0KB [ 402.565490] FAULT_INJECTION: forcing a failure. [ 402.565490] name failslab, interval 1, probability 0, space 0, times 0 [ 402.613819] CPU: 1 PID: 15370 Comm: syz-executor3 Not tainted 5.0.0-rc4 #49 [ 402.620947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 402.630298] Call Trace: [ 402.632903] dump_stack+0x1db/0x2d0 [ 402.636548] ? dump_stack_print_info.cold+0x20/0x20 [ 402.641587] ? __get_user_pages_fast+0x3f0/0x3f0 [ 402.646363] should_fail.cold+0xa/0x15 [ 402.650265] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 402.655393] ? ___might_sleep+0x1e7/0x310 [ 402.659552] ? arch_local_save_flags+0x50/0x50 [ 402.664155] ? add_lock_to_list.isra.0+0x450/0x450 [ 402.669187] __should_failslab+0x121/0x190 [ 402.673435] should_failslab+0x9/0x14 [ 402.677245] __kmalloc+0x2dc/0x740 [ 402.680850] ? sg_init_table+0x23/0x70 [ 402.684749] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 402.689772] ? sock_kmalloc+0x166/0x200 [ 402.693757] sock_kmalloc+0x166/0x200 [ 402.697564] ? __sk_mem_schedule+0xe0/0xe0 [ 402.701807] ? sock_kmalloc+0x166/0x200 [ 402.705795] af_alg_get_rsgl+0x15d/0x900 [ 402.709875] ? af_alg_make_sg+0x4b0/0x4b0 [ 402.714051] ? alg_accept+0x60/0x60 [ 402.717701] ? __local_bh_enable_ip+0x15a/0x270 [ 402.722396] skcipher_recvmsg+0x336/0x1260 [ 402.726664] ? skcipher_bind+0x30/0x30 [ 402.730574] skcipher_recvmsg_nokey+0x67/0x90 [ 402.735105] ? skcipher_sendpage_nokey+0xa0/0xa0 [ 402.739906] sock_recvmsg+0xd0/0x110 [ 402.743663] ? __sock_recv_ts_and_drops+0x410/0x410 [ 402.748688] ___sys_recvmsg+0x2a8/0x680 [ 402.752683] ? ___sys_sendmsg+0x910/0x910 [ 402.756864] ? kvm_clock_read+0x18/0x30 [ 402.760847] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 402.766386] ? ktime_get_ts64+0x38d/0x4f0 [ 402.770552] ? __fget_light+0x2db/0x420 [ 402.774536] ? fget_raw+0x20/0x20 [ 402.778011] ? poll_select_set_timeout+0x154/0x240 [ 402.782954] ? __fdget+0x1b/0x20 [ 402.786325] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 402.791875] do_recvmmsg+0x2f8/0xc40 [ 402.795611] ? ___sys_recvmsg+0x680/0x680 [ 402.799782] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 402.805326] ? _copy_from_user+0xdd/0x150 [ 402.809505] __sys_recvmmsg+0xe5/0x270 [ 402.813396] ? __ia32_sys_recvmsg+0xb0/0xb0 [ 402.817724] ? trace_hardirqs_on+0xbd/0x310 [ 402.822057] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 402.827430] ? trace_hardirqs_off_caller+0x300/0x300 [ 402.832545] __x64_sys_recvmmsg+0xe6/0x140 [ 402.836791] do_syscall_64+0x1a3/0x800 [ 402.840695] ? syscall_return_slowpath+0x5f0/0x5f0 [ 402.845630] ? prepare_exit_to_usermode+0x232/0x3b0 [ 402.850670] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 402.855530] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 402.860720] RIP: 0033:0x458099 [ 402.863918] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 402.882826] RSP: 002b:00007fc1126dac78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 402.890536] RAX: ffffffffffffffda RBX: 00007fc1126dac90 RCX: 0000000000458099 [ 402.897807] RDX: 0000000000000001 RSI: 0000000020009140 RDI: 0000000000000004 [ 402.905080] RBP: 000000000073bf00 R08: 0000000020009340 R09: 0000000000000000 17:55:47 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045717, &(0x7f0000000100)) 17:55:47 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) [ 402.912349] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc1126db6d4 [ 402.919618] R13: 00000000004c4d72 R14: 00000000004d8718 R15: 0000000000000006 [ 402.941068] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor2,pid=10739,uid=0 17:55:47 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x3fff, 0x0) ioctl$TCSETAW(r0, 0x5435, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x800, 0x0) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000080)={0x2151bd36, 0x8, 0x4, 0x400000, {0x77359400}, {0x7, 0x2, 0xffffffffffffff01, 0x0, 0x4, 0x3, "c5d22cde"}, 0x61a2e4c4, 0x4, @offset, 0x4}) sendto$llc(r1, &(0x7f0000000100)="4a9e0e22905b657c28a53f00b36206a497559110b741c5fb00fb6dae043f846243d2fcf5ec2a0f7dced5a5e8873edd2836e319dc750cd05ff16e6770513d842e5f0410ee5a43001abc4023666138df1f5c238f4c9bbfa06407b9a92dc88b7414f8f62a593be95609721e6b72bb4e400751625c2077a76dab09c544", 0x7b, 0x881, 0x0, 0x0) [ 402.972779] Memory cgroup out of memory: Kill process 10739 (syz-executor2) score 1113 or sacrifice child [ 403.012119] Killed process 10739 (syz-executor2) total-vm:72576kB, anon-rss:2192kB, file-rss:35788kB, shmem-rss:0kB [ 403.068722] device nr0 entered promiscuous mode 17:55:48 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045718, &(0x7f0000000100)) [ 403.097999] XFS (loop4): Invalid superblock magic number [ 403.098564] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:48 executing program 5: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r0, 0x10f, 0x84, &(0x7f0000000040), &(0x7f0000000080)=0x4) r1 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)="2e0000003000815fe45ae087185082cf0300b0eba06ec4000023000000000800000000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 403.175409] sel_write_load: 8 callbacks suppressed [ 403.175414] SELinux: failed to load policy [ 403.205972] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:48 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000480009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 403.230840] SELinux: failed to load policy 17:55:48 executing program 3 (fault-call:7 fault-nth:2): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:55:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioprio_set$pid(0x2, 0x0, 0x7c3a) clone(0x200085fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) write$smack_current(r0, &(0x7f0000000040)='\x00', 0x1) ioctl$VIDIOC_ENUMAUDIO(r0, 0xc0345641, &(0x7f0000000140)={0x304a, "ee344139952d492dff6dd5ab5ee0d92a13f62dbf8f2a55284ffa201d5f7a38cf", 0x1}) sendmsg$nl_crypto(r0, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)=@get={0x120, 0x13, 0x8, 0x70bd28, 0x25dfdbfe, {{'cbc-camellia-aesni\x00'}, [], [], 0x400, 0x2000}, [{0x8}, {0x8, 0x1, 0x1ff}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x4}, {0x8, 0x1, 0x8}, {0x8, 0x1, 0x9}, {0x8, 0x1, 0xff}, {0x8, 0x1, 0x6}]}, 0x120}, 0x1, 0x0, 0x0, 0x40}, 0x40000) [ 403.328235] SELinux: security policydb version 15 (MLS) not backwards compatible [ 403.350212] SELinux: failed to load policy [ 403.366374] SELinux: security policydb version 15 (MLS) not backwards compatible [ 403.383568] SELinux: failed to load policy [ 403.412699] FAULT_INJECTION: forcing a failure. [ 403.412699] name failslab, interval 1, probability 0, space 0, times 0 [ 403.442872] CPU: 0 PID: 15412 Comm: syz-executor3 Not tainted 5.0.0-rc4 #49 [ 403.449998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 403.459349] Call Trace: [ 403.461952] dump_stack+0x1db/0x2d0 [ 403.465601] ? dump_stack_print_info.cold+0x20/0x20 [ 403.470634] ? __get_user_pages_fast+0x3f0/0x3f0 [ 403.475409] should_fail.cold+0xa/0x15 [ 403.479307] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 403.484429] ? ___might_sleep+0x1e7/0x310 [ 403.488588] ? arch_local_save_flags+0x50/0x50 [ 403.493198] __should_failslab+0x121/0x190 [ 403.497443] should_failslab+0x9/0x14 [ 403.501255] __kmalloc+0x2dc/0x740 [ 403.504808] ? sg_init_table+0x23/0x70 [ 403.508701] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 403.513723] ? sock_kmalloc+0x166/0x200 [ 403.517706] sock_kmalloc+0x166/0x200 [ 403.521518] ? __sk_mem_schedule+0xe0/0xe0 [ 403.525764] ? sock_kmalloc+0x166/0x200 [ 403.529752] af_alg_get_rsgl+0x15d/0x900 [ 403.533840] ? af_alg_make_sg+0x4b0/0x4b0 [ 403.538000] ? alg_accept+0x60/0x60 [ 403.541638] ? __local_bh_enable_ip+0x15a/0x270 [ 403.546327] skcipher_recvmsg+0x336/0x1260 [ 403.550590] ? skcipher_bind+0x30/0x30 [ 403.554502] skcipher_recvmsg_nokey+0x67/0x90 [ 403.559003] ? skcipher_sendpage_nokey+0xa0/0xa0 [ 403.563771] sock_recvmsg+0xd0/0x110 [ 403.567494] ? __sock_recv_ts_and_drops+0x410/0x410 [ 403.572524] ___sys_recvmsg+0x2a8/0x680 [ 403.576518] ? ___sys_sendmsg+0x910/0x910 [ 403.580678] ? kvm_clock_read+0x18/0x30 [ 403.584665] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 403.590208] ? ktime_get_ts64+0x38d/0x4f0 [ 403.594373] ? __fget_light+0x2db/0x420 [ 403.598356] ? fget_raw+0x20/0x20 [ 403.601827] ? poll_select_set_timeout+0x154/0x240 [ 403.606776] ? __fdget+0x1b/0x20 [ 403.610161] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 403.615718] do_recvmmsg+0x2f8/0xc40 [ 403.619461] ? ___sys_recvmsg+0x680/0x680 [ 403.623629] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 403.629187] ? _copy_from_user+0xdd/0x150 [ 403.633380] __sys_recvmmsg+0xe5/0x270 [ 403.637282] ? __ia32_sys_recvmsg+0xb0/0xb0 [ 403.641612] ? trace_hardirqs_on+0xbd/0x310 [ 403.645946] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 403.651324] ? trace_hardirqs_off_caller+0x300/0x300 [ 403.656441] __x64_sys_recvmmsg+0xe6/0x140 [ 403.660692] do_syscall_64+0x1a3/0x800 [ 403.664596] ? syscall_return_slowpath+0x5f0/0x5f0 [ 403.669532] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 403.674553] ? __switch_to_asm+0x34/0x70 [ 403.678631] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 403.683493] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 403.688716] RIP: 0033:0x458099 [ 403.691911] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 17:55:48 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c00004c0009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 403.710814] RSP: 002b:00007fc1126b9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 403.718528] RAX: ffffffffffffffda RBX: 00007fc1126b9c90 RCX: 0000000000458099 [ 403.725797] RDX: 0000000000000001 RSI: 0000000020009140 RDI: 0000000000000004 [ 403.733073] RBP: 000000000073bfa0 R08: 0000000020009340 R09: 0000000000000000 [ 403.740344] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc1126ba6d4 [ 403.747647] R13: 00000000004c4d72 R14: 00000000004d8718 R15: 0000000000000006 17:55:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:55:48 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045719, &(0x7f0000000100)) 17:55:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(0xffffffffffffffff, &(0x7f0000000040)=""/6, 0xe) [ 403.842412] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:48 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x80, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0xa, 0x1, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) ioctl$EXT4_IOC_RESIZE_FS(r2, 0x40086610, &(0x7f0000000100)=0x3) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f00000002c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r0, 0x1, 0x2b, &(0x7f0000000080)=0x200002, 0x4) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000040)) 17:55:48 executing program 3 (fault-call:7 fault-nth:3): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:55:48 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x200000088004571a, &(0x7f0000000100)) [ 403.883607] SELinux: failed to load policy [ 403.901528] SELinux: security policydb version 15 (MLS) not backwards compatible [ 403.909400] SELinux: failed to load policy 17:55:48 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000600009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 404.039953] FAULT_INJECTION: forcing a failure. [ 404.039953] name failslab, interval 1, probability 0, space 0, times 0 [ 404.103799] CPU: 1 PID: 15435 Comm: syz-executor3 Not tainted 5.0.0-rc4 #49 [ 404.110955] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 404.120306] Call Trace: [ 404.122915] dump_stack+0x1db/0x2d0 [ 404.126558] ? dump_stack_print_info.cold+0x20/0x20 [ 404.131587] ? __get_user_pages_fast+0x3f0/0x3f0 [ 404.136363] should_fail.cold+0xa/0x15 [ 404.140267] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 404.145386] ? ___might_sleep+0x1e7/0x310 [ 404.149542] ? arch_local_save_flags+0x50/0x50 [ 404.154154] __should_failslab+0x121/0x190 [ 404.158900] should_failslab+0x9/0x14 [ 404.162711] __kmalloc+0x2dc/0x740 [ 404.166264] ? sg_init_table+0x23/0x70 [ 404.170169] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 404.175192] ? sock_kmalloc+0x166/0x200 [ 404.179185] sock_kmalloc+0x166/0x200 [ 404.183000] ? __sk_mem_schedule+0xe0/0xe0 [ 404.187246] ? sock_kmalloc+0x166/0x200 [ 404.191231] af_alg_get_rsgl+0x15d/0x900 [ 404.195316] ? af_alg_make_sg+0x4b0/0x4b0 [ 404.199473] ? alg_accept+0x60/0x60 [ 404.203107] ? __local_bh_enable_ip+0x15a/0x270 [ 404.207799] skcipher_recvmsg+0x336/0x1260 [ 404.212056] ? skcipher_bind+0x30/0x30 [ 404.215960] skcipher_recvmsg_nokey+0x67/0x90 [ 404.220461] ? skcipher_sendpage_nokey+0xa0/0xa0 [ 404.225229] sock_recvmsg+0xd0/0x110 [ 404.228949] ? __sock_recv_ts_and_drops+0x410/0x410 [ 404.233978] ___sys_recvmsg+0x2a8/0x680 [ 404.237969] ? ___sys_sendmsg+0x910/0x910 [ 404.242128] ? kvm_clock_read+0x18/0x30 [ 404.246122] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 404.251677] ? ktime_get_ts64+0x38d/0x4f0 [ 404.255838] ? __fget_light+0x2db/0x420 [ 404.259817] ? fget_raw+0x20/0x20 [ 404.263293] ? poll_select_set_timeout+0x154/0x240 [ 404.268235] ? __fdget+0x1b/0x20 [ 404.271610] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 404.277174] do_recvmmsg+0x2f8/0xc40 [ 404.280912] ? ___sys_recvmsg+0x680/0x680 [ 404.285076] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 404.290621] ? _copy_from_user+0xdd/0x150 [ 404.294817] __sys_recvmmsg+0xe5/0x270 [ 404.298714] ? __ia32_sys_recvmsg+0xb0/0xb0 [ 404.303038] ? trace_hardirqs_on+0xbd/0x310 [ 404.307375] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 404.312743] ? trace_hardirqs_off_caller+0x300/0x300 [ 404.317854] __x64_sys_recvmmsg+0xe6/0x140 [ 404.322105] do_syscall_64+0x1a3/0x800 [ 404.326008] ? syscall_return_slowpath+0x5f0/0x5f0 [ 404.330946] ? prepare_exit_to_usermode+0x232/0x3b0 [ 404.335975] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 404.340835] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 404.346030] RIP: 0033:0x458099 [ 404.349228] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 404.368128] RSP: 002b:00007fc1126dac78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 404.375851] RAX: ffffffffffffffda RBX: 00007fc1126dac90 RCX: 0000000000458099 [ 404.383120] RDX: 0000000000000001 RSI: 0000000020009140 RDI: 0000000000000004 [ 404.390401] RBP: 000000000073bf00 R08: 0000000020009340 R09: 0000000000000000 [ 404.397674] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc1126db6d4 17:55:49 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) 17:55:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(0xffffffffffffffff, &(0x7f0000000040)=""/6, 0xe) 17:55:49 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x200000088004571b, &(0x7f0000000100)) [ 404.404948] R13: 00000000004c4d72 R14: 00000000004d8718 R15: 0000000000000006 [ 404.429039] XFS (loop4): Invalid superblock magic number 17:55:49 executing program 3 (fault-call:7 fault-nth:4): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 404.464170] SELinux: security policydb version 15 (MLS) not backwards compatible [ 404.507476] SELinux: failed to load policy 17:55:49 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000680009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 404.534998] SELinux: security policydb version 15 (MLS) not backwards compatible [ 404.553019] SELinux: failed to load policy [ 404.567560] FAULT_INJECTION: forcing a failure. [ 404.567560] name failslab, interval 1, probability 0, space 0, times 0 [ 404.598062] CPU: 0 PID: 15467 Comm: syz-executor3 Not tainted 5.0.0-rc4 #49 [ 404.605190] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 404.614543] Call Trace: [ 404.617163] dump_stack+0x1db/0x2d0 [ 404.620817] ? dump_stack_print_info.cold+0x20/0x20 [ 404.625847] ? __get_user_pages_fast+0x3f0/0x3f0 [ 404.630620] should_fail.cold+0xa/0x15 [ 404.634516] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 404.639634] ? ___might_sleep+0x1e7/0x310 [ 404.643794] ? arch_local_save_flags+0x50/0x50 [ 404.648400] __should_failslab+0x121/0x190 [ 404.652647] should_failslab+0x9/0x14 [ 404.656459] __kmalloc+0x2dc/0x740 [ 404.660009] ? sg_init_table+0x23/0x70 [ 404.660027] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 404.660043] ? sock_kmalloc+0x166/0x200 [ 404.660061] sock_kmalloc+0x166/0x200 [ 404.660080] ? __sk_mem_schedule+0xe0/0xe0 [ 404.660097] ? sock_kmalloc+0x166/0x200 [ 404.668992] af_alg_get_rsgl+0x15d/0x900 [ 404.669023] ? af_alg_make_sg+0x4b0/0x4b0 [ 404.669042] ? alg_accept+0x60/0x60 [ 404.696787] ? __local_bh_enable_ip+0x15a/0x270 [ 404.701474] skcipher_recvmsg+0x336/0x1260 [ 404.705735] ? skcipher_bind+0x30/0x30 [ 404.709642] skcipher_recvmsg_nokey+0x67/0x90 [ 404.714161] ? skcipher_sendpage_nokey+0xa0/0xa0 [ 404.718927] sock_recvmsg+0xd0/0x110 [ 404.722653] ? __sock_recv_ts_and_drops+0x410/0x410 [ 404.727682] ___sys_recvmsg+0x2a8/0x680 [ 404.731672] ? ___sys_sendmsg+0x910/0x910 [ 404.735832] ? kvm_clock_read+0x18/0x30 [ 404.739812] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 404.745354] ? ktime_get_ts64+0x38d/0x4f0 [ 404.749513] ? __fget_light+0x2db/0x420 [ 404.753497] ? fget_raw+0x20/0x20 [ 404.756963] ? poll_select_set_timeout+0x154/0x240 [ 404.761908] ? __fdget+0x1b/0x20 [ 404.765279] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 404.770830] do_recvmmsg+0x2f8/0xc40 [ 404.774578] ? ___sys_recvmsg+0x680/0x680 [ 404.778749] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 404.784295] ? _copy_from_user+0xdd/0x150 [ 404.788475] __sys_recvmmsg+0xe5/0x270 [ 404.792374] ? __ia32_sys_recvmsg+0xb0/0xb0 [ 404.796705] ? trace_hardirqs_on+0xbd/0x310 [ 404.801038] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 404.806410] ? trace_hardirqs_off_caller+0x300/0x300 [ 404.811527] __x64_sys_recvmmsg+0xe6/0x140 [ 404.815776] do_syscall_64+0x1a3/0x800 [ 404.815797] ? syscall_return_slowpath+0x5f0/0x5f0 [ 404.815815] ? prepare_exit_to_usermode+0x232/0x3b0 [ 404.815838] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 404.815863] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 404.815879] RIP: 0033:0x458099 17:55:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:55:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") sysfs$1(0xffffff1f, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x0, 0x0) r2 = socket(0x7, 0x80002, 0x8dc) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000340)={r0}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xc}, 0x6}}, [0x400, 0x5, 0x70, 0x80, 0xedf2, 0x1c0000000, 0x7fff, 0xb6, 0xb535, 0x3a2c, 0xffffffffffffffc1, 0x8, 0x7, 0x4, 0x89]}, &(0x7f0000000180)=0x100) ioctl$KVM_SET_NR_MMU_PAGES(r1, 0xae44, 0x7ff) setsockopt$inet_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000240), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000280)={r4, 0x3}, &(0x7f0000000200)=0x8) 17:55:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(0xffffffffffffffff, &(0x7f0000000040)=""/6, 0xe) 17:55:49 executing program 3 (fault-call:7 fault-nth:5): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:55:49 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x200000088004571c, &(0x7f0000000100)) [ 404.824686] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 404.824695] RSP: 002b:00007fc1126dac78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 404.824711] RAX: ffffffffffffffda RBX: 00007fc1126dac90 RCX: 0000000000458099 [ 404.824720] RDX: 0000000000000001 RSI: 0000000020009140 RDI: 0000000000000004 [ 404.824729] RBP: 000000000073bf00 R08: 0000000020009340 R09: 0000000000000000 [ 404.824738] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc1126db6d4 [ 404.824748] R13: 00000000004c4d72 R14: 00000000004d8718 R15: 0000000000000006 [ 405.007953] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:50 executing program 1: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) [ 405.056672] SELinux: failed to load policy 17:55:50 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x200000088004571d, &(0x7f0000000100)) 17:55:50 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c00006c0009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 405.097300] SELinux: security policydb version 15 (MLS) not backwards compatible [ 405.131092] SELinux: failed to load policy 17:55:50 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x45, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) [ 405.150874] XFS (loop4): Invalid superblock magic number [ 405.154933] FAULT_INJECTION: forcing a failure. [ 405.154933] name failslab, interval 1, probability 0, space 0, times 0 [ 405.189274] CPU: 0 PID: 15501 Comm: syz-executor3 Not tainted 5.0.0-rc4 #49 [ 405.196403] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 405.205756] Call Trace: [ 405.208354] dump_stack+0x1db/0x2d0 [ 405.211997] ? dump_stack_print_info.cold+0x20/0x20 [ 405.217015] ? __lock_is_held+0xb6/0x140 [ 405.221092] should_fail.cold+0xa/0x15 [ 405.224996] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 405.230116] ? ___might_sleep+0x1e7/0x310 [ 405.234295] ? arch_local_save_flags+0x50/0x50 [ 405.238893] __should_failslab+0x121/0x190 [ 405.243158] should_failslab+0x9/0x14 [ 405.246982] __kmalloc+0x2dc/0x740 [ 405.250541] ? sock_kmalloc+0x166/0x200 [ 405.254525] sock_kmalloc+0x166/0x200 [ 405.258341] ? __sk_mem_schedule+0xe0/0xe0 [ 405.262587] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 405.267610] ? af_alg_count_tsgl+0x1b9/0x250 [ 405.272037] skcipher_recvmsg+0x499/0x1260 [ 405.276302] ? skcipher_bind+0x30/0x30 [ 405.280208] skcipher_recvmsg_nokey+0x67/0x90 [ 405.284709] ? skcipher_sendpage_nokey+0xa0/0xa0 [ 405.289475] sock_recvmsg+0xd0/0x110 [ 405.293196] ? __sock_recv_ts_and_drops+0x410/0x410 [ 405.298227] ___sys_recvmsg+0x2a8/0x680 [ 405.302227] ? ___sys_sendmsg+0x910/0x910 [ 405.306384] ? kvm_clock_read+0x18/0x30 [ 405.310363] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 405.315903] ? ktime_get_ts64+0x38d/0x4f0 [ 405.320068] ? __fget_light+0x2db/0x420 [ 405.324049] ? fget_raw+0x20/0x20 [ 405.327528] ? poll_select_set_timeout+0x154/0x240 [ 405.332467] ? __fdget+0x1b/0x20 [ 405.335836] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 405.341387] do_recvmmsg+0x2f8/0xc40 [ 405.345124] ? ___sys_recvmsg+0x680/0x680 [ 405.349308] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 405.354851] ? _copy_from_user+0xdd/0x150 [ 405.359019] __sys_recvmmsg+0xe5/0x270 [ 405.362922] ? __ia32_sys_recvmsg+0xb0/0xb0 [ 405.367253] ? trace_hardirqs_on+0xbd/0x310 [ 405.371584] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 405.376952] ? trace_hardirqs_off_caller+0x300/0x300 [ 405.382064] __x64_sys_recvmmsg+0xe6/0x140 [ 405.386312] do_syscall_64+0x1a3/0x800 [ 405.390209] ? syscall_return_slowpath+0x5f0/0x5f0 [ 405.395158] ? prepare_exit_to_usermode+0x232/0x3b0 [ 405.400197] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 405.405056] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 405.410247] RIP: 0033:0x458099 [ 405.413448] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 405.432357] RSP: 002b:00007fc1126dac78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 405.440072] RAX: ffffffffffffffda RBX: 00007fc1126dac90 RCX: 0000000000458099 [ 405.447341] RDX: 0000000000000001 RSI: 0000000020009140 RDI: 0000000000000004 [ 405.454612] RBP: 000000000073bf00 R08: 0000000020009340 R09: 0000000000000000 [ 405.461885] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc1126db6d4 [ 405.469167] R13: 00000000004c4d72 R14: 00000000004d8718 R15: 0000000000000006 17:55:50 executing program 3 (fault-call:7 fault-nth:6): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:55:50 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x200000088004571e, &(0x7f0000000100)) 17:55:50 executing program 1: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) [ 405.579549] SELinux: security policydb version 15 (MLS) not backwards compatible [ 405.591907] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:55:50 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000740009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:55:50 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045721, &(0x7f0000000100)) [ 405.703271] FAULT_INJECTION: forcing a failure. [ 405.703271] name failslab, interval 1, probability 0, space 0, times 0 [ 405.737167] CPU: 1 PID: 15524 Comm: syz-executor3 Not tainted 5.0.0-rc4 #49 [ 405.744309] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 405.753668] Call Trace: [ 405.756269] dump_stack+0x1db/0x2d0 [ 405.759909] ? dump_stack_print_info.cold+0x20/0x20 [ 405.764945] should_fail.cold+0xa/0x15 [ 405.768842] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 405.773959] ? ___might_sleep+0x1e7/0x310 [ 405.778111] ? arch_local_save_flags+0x50/0x50 [ 405.782718] __should_failslab+0x121/0x190 [ 405.786958] should_failslab+0x9/0x14 [ 405.790764] __kmalloc+0x2dc/0x740 [ 405.794312] ? unwind_get_return_address+0x61/0xa0 [ 405.799253] ? add_lock_to_list.isra.0+0x450/0x450 [ 405.804189] ? skcipher_walk_next+0x7d3/0x1820 [ 405.808779] skcipher_walk_next+0x7d3/0x1820 [ 405.813204] ? skcipher_walk_done+0xd00/0xd00 [ 405.817706] ? ___sys_recvmsg+0x2a8/0x680 [ 405.821860] ? ___might_sleep+0x1e7/0x310 [ 405.826019] skcipher_walk_first+0xfb/0x3a0 [ 405.830353] skcipher_walk_skcipher+0x546/0x700 [ 405.835030] skcipher_walk_virt+0xa6/0x150 [ 405.839364] xor_tweak+0x171/0x4b0 [ 405.842924] ? af_alg_pull_tsgl+0x786/0xd50 [ 405.847253] ? decrypt+0x140/0x140 [ 405.850815] ? tnepres_decrypt+0x510/0x510 [ 405.855067] ? tnepres_decrypt+0x510/0x510 [ 405.859313] decrypt+0x2b0/0x490 [ 405.862693] skcipher_recvmsg+0xcbd/0x1260 [ 405.866946] ? skcipher_bind+0x30/0x30 [ 405.870854] skcipher_recvmsg_nokey+0x67/0x90 [ 405.875351] ? skcipher_sendpage_nokey+0xa0/0xa0 [ 405.880111] sock_recvmsg+0xd0/0x110 [ 405.883851] ? __sock_recv_ts_and_drops+0x410/0x410 [ 405.888871] ___sys_recvmsg+0x2a8/0x680 [ 405.892862] ? ___sys_sendmsg+0x910/0x910 [ 405.897018] ? kvm_clock_read+0x18/0x30 [ 405.900994] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 405.906532] ? ktime_get_ts64+0x38d/0x4f0 [ 405.910690] ? __fget_light+0x2db/0x420 [ 405.914673] ? fget_raw+0x20/0x20 [ 405.918144] ? poll_select_set_timeout+0x154/0x240 [ 405.923079] ? __fdget+0x1b/0x20 [ 405.926448] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 405.931993] do_recvmmsg+0x2f8/0xc40 [ 405.935721] ? ___sys_recvmsg+0x680/0x680 [ 405.939883] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 405.945422] ? _copy_from_user+0xdd/0x150 [ 405.949591] __sys_recvmmsg+0xe5/0x270 [ 405.953478] ? __ia32_sys_recvmsg+0xb0/0xb0 [ 405.957796] ? trace_hardirqs_on+0xbd/0x310 [ 405.962120] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 405.967488] ? trace_hardirqs_off_caller+0x300/0x300 [ 405.972596] __x64_sys_recvmmsg+0xe6/0x140 [ 405.976834] do_syscall_64+0x1a3/0x800 [ 405.980732] ? syscall_return_slowpath+0x5f0/0x5f0 [ 405.985671] ? prepare_exit_to_usermode+0x232/0x3b0 [ 405.990695] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 405.995548] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 406.000736] RIP: 0033:0x458099 [ 406.003932] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 406.022828] RSP: 002b:00007fc1126dac78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 406.030676] RAX: ffffffffffffffda RBX: 00007fc1126dac90 RCX: 0000000000458099 [ 406.037942] RDX: 0000000000000001 RSI: 0000000020009140 RDI: 0000000000000004 [ 406.045207] RBP: 000000000073bf00 R08: 0000000020009340 R09: 0000000000000000 [ 406.052476] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc1126db6d4 [ 406.059741] R13: 00000000004c4d72 R14: 00000000004d8718 R15: 0000000000000006 17:55:51 executing program 1: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) [ 406.167242] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:51 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045722, &(0x7f0000000100)) [ 406.208502] XFS (loop4): Invalid superblock magic number [ 406.247466] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:51 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) 17:55:51 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c00007a0009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:55:51 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045723, &(0x7f0000000100)) 17:55:51 executing program 5: r0 = socket(0xe, 0x5, 0x3) write(r0, &(0x7f0000000440)="24000000190001f0008c0077171cff640a000000000036bee84a05b0bb0006000000cc08", 0x24) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x400000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000000c0)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000100)=0x14) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4200220}, 0xc, &(0x7f00000003c0)={&(0x7f0000000200)={0x19c, r3, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_BEARER={0x1c, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfc1}]}, @TIPC_NLA_NODE={0x40, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfffe0000000000}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}]}, @TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x80000001}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}]}, @TIPC_NLA_MEDIA={0x98, 0x5, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfca}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xca9f}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_NET={0x50, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x10001}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x444}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x34d}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3}]}, @TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x19c}, 0x1, 0x0, 0x0, 0x45}, 0x1) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000140)=r2, 0x4) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000080)={0x7}) 17:55:51 executing program 3 (fault-call:7 fault-nth:7): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:55:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) [ 406.422822] SELinux: security policydb version 15 (MLS) not backwards compatible [ 406.430711] device nr0 entered promiscuous mode [ 406.466984] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:51 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c000000000a000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 406.621254] FAULT_INJECTION: forcing a failure. [ 406.621254] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 406.624992] XFS (loop4): Invalid superblock magic number [ 406.634950] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f0000000080)=0x200000000) ioctl$int_in(r1, 0x40000000af01, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000540)=[{&(0x7f0000000400)=""/243, 0x48}], 0x1, 0x0) write$P9_RRENAMEAT(r0, &(0x7f00000000c0)={0x7, 0x4b, 0x1}, 0x7) close(r2) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r2, 0x4008af30, &(0x7f0000000180)={0xfffffffffffffffc, r2}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f00000001c0)={0x9, 0x3, 0x4, 'queue0\x00', 0xffff}) [ 406.687065] SELinux: security policydb version 15 (MLS) not backwards compatible [ 406.687653] CPU: 0 PID: 15586 Comm: syz-executor3 Not tainted 5.0.0-rc4 #49 [ 406.701744] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 406.711103] Call Trace: [ 406.713708] dump_stack+0x1db/0x2d0 [ 406.717344] ? dump_stack_print_info.cold+0x20/0x20 [ 406.722379] ? save_stack+0xa9/0xd0 [ 406.726020] should_fail.cold+0xa/0x15 [ 406.729918] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 406.735038] ? arch_local_save_flags+0x50/0x50 [ 406.739625] ? lock_release+0xc40/0xc40 [ 406.743622] should_fail_alloc_page+0x50/0x60 [ 406.748124] __alloc_pages_nodemask+0x323/0xdc0 [ 406.752826] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 406.757858] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 406.762881] ? scatterwalk_copychunks+0x57a/0x6a0 [ 406.767735] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 406.773290] alloc_pages_current+0x107/0x210 [ 406.777709] __get_free_pages+0xc/0x40 [ 406.781611] skcipher_walk_next+0xab5/0x1820 [ 406.786037] ? skcipher_walk_done+0xd00/0xd00 [ 406.790539] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 406.795565] ? scatterwalk_copychunks+0x57a/0x6a0 [ 406.800428] skcipher_walk_done+0x405/0xd00 [ 406.804760] xor_tweak+0x35e/0x4b0 [ 406.808319] ? decrypt+0x140/0x140 [ 406.811878] ? tnepres_decrypt+0x510/0x510 [ 406.816128] ? tnepres_decrypt+0x510/0x510 [ 406.820394] decrypt+0x2b0/0x490 [ 406.823777] skcipher_recvmsg+0xcbd/0x1260 [ 406.828032] ? skcipher_bind+0x30/0x30 [ 406.831939] skcipher_recvmsg_nokey+0x67/0x90 [ 406.836438] ? skcipher_sendpage_nokey+0xa0/0xa0 [ 406.841202] sock_recvmsg+0xd0/0x110 [ 406.844925] ? __sock_recv_ts_and_drops+0x410/0x410 [ 406.849958] ___sys_recvmsg+0x2a8/0x680 [ 406.853953] ? ___sys_sendmsg+0x910/0x910 [ 406.858112] ? kvm_clock_read+0x18/0x30 [ 406.862112] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 406.867667] ? ktime_get_ts64+0x38d/0x4f0 [ 406.871835] ? __fget_light+0x2db/0x420 [ 406.875817] ? fget_raw+0x20/0x20 [ 406.879286] ? poll_select_set_timeout+0x154/0x240 [ 406.884224] ? __fdget+0x1b/0x20 [ 406.887600] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 406.893168] do_recvmmsg+0x2f8/0xc40 [ 406.896907] ? ___sys_recvmsg+0x680/0x680 [ 406.901071] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 406.906613] ? _copy_from_user+0xdd/0x150 [ 406.910789] __sys_recvmmsg+0xe5/0x270 [ 406.914682] ? __ia32_sys_recvmsg+0xb0/0xb0 [ 406.919005] ? trace_hardirqs_on+0xbd/0x310 [ 406.923336] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 406.928705] ? trace_hardirqs_off_caller+0x300/0x300 [ 406.933820] __x64_sys_recvmmsg+0xe6/0x140 [ 406.938065] do_syscall_64+0x1a3/0x800 [ 406.941962] ? syscall_return_slowpath+0x5f0/0x5f0 [ 406.946898] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 406.951924] ? __switch_to_asm+0x34/0x70 [ 406.955995] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 406.960855] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 406.966045] RIP: 0033:0x458099 [ 406.969244] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 17:55:51 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c000000000b000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 406.988162] RSP: 002b:00007fc1126b9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 406.995876] RAX: ffffffffffffffda RBX: 00007fc1126b9c90 RCX: 0000000000458099 [ 407.003160] RDX: 0000000000000001 RSI: 0000000020009140 RDI: 0000000000000004 [ 407.010433] RBP: 000000000073bfa0 R08: 0000000020009340 R09: 0000000000000000 [ 407.017704] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc1126ba6d4 [ 407.025452] R13: 00000000004c4d72 R14: 00000000004d8718 R15: 0000000000000006 [ 407.122684] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:52 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c000000000c000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 407.164689] SELinux: security policydb version 15 (MLS) not backwards compatible [ 407.304119] SELinux: security policydb version 15 (MLS) not backwards compatible [ 407.332091] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:52 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045724, &(0x7f0000000100)) 17:55:52 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c000000000d000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:55:52 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) 17:55:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:55:52 executing program 3 (fault-call:7 fault-nth:8): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:55:52 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045725, &(0x7f0000000100)) [ 407.515488] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:52 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c000000000e000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 407.579091] SELinux: security policydb version 15 (MLS) not backwards compatible [ 407.600972] device nr0 entered promiscuous mode 17:55:52 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045726, &(0x7f0000000100)) [ 407.735765] SELinux: security policydb version 15 (MLS) not backwards compatible [ 407.737104] FAULT_INJECTION: forcing a failure. [ 407.737104] name failslab, interval 1, probability 0, space 0, times 0 [ 407.765581] CPU: 1 PID: 15640 Comm: syz-executor3 Not tainted 5.0.0-rc4 #49 [ 407.772695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 407.782048] Call Trace: [ 407.784664] dump_stack+0x1db/0x2d0 [ 407.788303] ? dump_stack_print_info.cold+0x20/0x20 [ 407.793332] ? lockdep_hardirqs_on+0x415/0x5d0 [ 407.797929] should_fail.cold+0xa/0x15 [ 407.801826] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 407.806939] ? free_unref_page+0x69e/0x940 [ 407.811180] ? free_unref_page+0x69e/0x940 [ 407.815418] ? lockdep_hardirqs_on+0x415/0x5d0 [ 407.820010] ? trace_hardirqs_on+0xbd/0x310 [ 407.824342] ? free_compound_page+0x90/0x90 [ 407.828671] ? __free_pages+0x10c/0x190 [ 407.832661] __should_failslab+0x121/0x190 [ 407.836910] should_failslab+0x9/0x14 [ 407.840715] __kmalloc+0x71/0x740 [ 407.844180] ? mark_free_pages+0x3c0/0x3c0 [ 407.848423] ? blkcipher_walk_next+0xef2/0x1340 [ 407.853102] blkcipher_walk_next+0xef2/0x1340 [ 407.857598] ? mark_held_locks+0xb1/0x100 [ 407.861767] blkcipher_walk_first+0x294/0x520 [ 407.866279] blkcipher_walk_virt+0x221/0x2a0 [ 407.870699] crypto_ecb_crypt+0x8a/0x230 [ 407.874770] ? free_pages+0x46/0x50 [ 407.878402] ? serpent_decrypt+0x30/0x30 [ 407.882469] crypto_ecb_decrypt+0x186/0x250 [ 407.886810] ? crypto_ecb_crypt+0x230/0x230 [ 407.891165] ? crypto_ecb_crypt+0x230/0x230 [ 407.895494] skcipher_decrypt_blkcipher+0x231/0x350 [ 407.900532] ? skcipher_encrypt_blkcipher+0x350/0x350 [ 407.905736] ? tnepres_decrypt+0x510/0x510 [ 407.909979] decrypt+0x354/0x490 [ 407.913355] skcipher_recvmsg+0xcbd/0x1260 [ 407.917606] ? skcipher_bind+0x30/0x30 [ 407.921514] skcipher_recvmsg_nokey+0x67/0x90 [ 407.926055] ? skcipher_sendpage_nokey+0xa0/0xa0 [ 407.930817] sock_recvmsg+0xd0/0x110 [ 407.934530] ? __sock_recv_ts_and_drops+0x410/0x410 [ 407.939550] ___sys_recvmsg+0x2a8/0x680 [ 407.943533] ? ___sys_sendmsg+0x910/0x910 [ 407.947702] ? kvm_clock_read+0x18/0x30 [ 407.951708] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 407.957254] ? ktime_get_ts64+0x38d/0x4f0 [ 407.961429] ? __fget_light+0x2db/0x420 [ 407.965410] ? fget_raw+0x20/0x20 [ 407.968905] ? poll_select_set_timeout+0x154/0x240 [ 407.973859] ? __fdget+0x1b/0x20 [ 407.977228] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 407.982775] do_recvmmsg+0x2f8/0xc40 [ 407.986507] ? ___sys_recvmsg+0x680/0x680 [ 407.990673] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 407.996213] ? _copy_from_user+0xdd/0x150 [ 408.000384] __sys_recvmmsg+0xe5/0x270 [ 408.004279] ? __ia32_sys_recvmsg+0xb0/0xb0 [ 408.008626] ? trace_hardirqs_on+0xbd/0x310 [ 408.012991] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 408.018371] ? trace_hardirqs_off_caller+0x300/0x300 [ 408.023487] __x64_sys_recvmmsg+0xe6/0x140 [ 408.027897] do_syscall_64+0x1a3/0x800 [ 408.031791] ? syscall_return_slowpath+0x5f0/0x5f0 [ 408.036777] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 408.041793] ? __switch_to_asm+0x34/0x70 [ 408.045863] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 408.050717] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 408.055905] RIP: 0033:0x458099 [ 408.059112] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 408.078024] RSP: 002b:00007fc1126b9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b 17:55:53 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000010000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 408.085751] RAX: ffffffffffffffda RBX: 00007fc1126b9c90 RCX: 0000000000458099 [ 408.093019] RDX: 0000000000000001 RSI: 0000000020009140 RDI: 0000000000000004 [ 408.100287] RBP: 000000000073bfa0 R08: 0000000020009340 R09: 0000000000000000 [ 408.107584] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc1126ba6d4 [ 408.114852] R13: 00000000004c4d72 R14: 00000000004d8718 R15: 0000000000000006 [ 408.122980] protocol 88fb is buggy, dev hsr_slave_0 [ 408.128070] protocol 88fb is buggy, dev hsr_slave_1 [ 408.130053] protocol 88fb is buggy, dev hsr_slave_0 [ 408.138167] protocol 88fb is buggy, dev hsr_slave_1 [ 408.140510] XFS (loop4): Invalid superblock magic number [ 408.143365] protocol 88fb is buggy, dev hsr_slave_0 [ 408.153857] protocol 88fb is buggy, dev hsr_slave_1 [ 408.271638] SELinux: security policydb version 15 (MLS) not backwards compatible [ 408.292874] sel_write_load: 15 callbacks suppressed [ 408.292879] SELinux: failed to load policy 17:55:53 executing program 5: socketpair$unix(0x1, 0x808000000000002, 0x0, &(0x7f0000000100)) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xa9d, 0x109000) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x42, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4001fd) r1 = socket$pppoe(0x18, 0x1, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e) dup2(r2, r1) connect$pppoe(r1, &(0x7f0000000140)={0x18, 0x0, {0x0, @local, 'sit0\x00'}}, 0x1e) 17:55:53 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045727, &(0x7f0000000100)) 17:55:53 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) 17:55:53 executing program 3 (fault-call:7 fault-nth:9): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:55:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x03', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:55:53 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000011000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 408.334685] SELinux: security policydb version 15 (MLS) not backwards compatible [ 408.355209] SELinux: failed to load policy [ 408.468448] FAULT_INJECTION: forcing a failure. [ 408.468448] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 408.469035] device nr0 entered promiscuous mode [ 408.487993] CPU: 1 PID: 15658 Comm: syz-executor3 Not tainted 5.0.0-rc4 #49 [ 408.495122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 408.504508] Call Trace: [ 408.507119] dump_stack+0x1db/0x2d0 [ 408.510943] ? dump_stack_print_info.cold+0x20/0x20 [ 408.515978] should_fail.cold+0xa/0x15 [ 408.519878] ? save_stack+0x45/0xd0 [ 408.523523] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 408.528631] ? crypto_ecb_crypt+0x8a/0x230 [ 408.532873] ? crypto_ecb_decrypt+0x186/0x250 [ 408.537376] ? skcipher_decrypt_blkcipher+0x231/0x350 [ 408.542573] ? skcipher_recvmsg+0xcbd/0x1260 [ 408.546986] ? sock_recvmsg+0xd0/0x110 [ 408.550874] ? ___sys_recvmsg+0x2a8/0x680 [ 408.555023] ? do_recvmmsg+0x2f8/0xc40 [ 408.558913] ? __sys_recvmmsg+0xe5/0x270 [ 408.562978] ? __x64_sys_recvmmsg+0xe6/0x140 [ 408.567398] ? do_syscall_64+0x1a3/0x800 [ 408.571469] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 408.576837] ? print_usage_bug+0xd0/0xd0 [ 408.580905] ? print_usage_bug+0xd0/0xd0 [ 408.584973] ? debug_check_no_obj_freed+0x2f8/0x588 [ 408.589998] ? trace_hardirqs_off_caller+0x300/0x300 [ 408.595108] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 408.600660] ? should_fail+0x1e6/0xd22 [ 408.604552] should_fail_alloc_page+0x50/0x60 [ 408.609051] __alloc_pages_nodemask+0x323/0xdc0 [ 408.613721] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 408.619264] ? check_preemption_disabled+0x48/0x290 [ 408.624296] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 408.629335] ? __lock_is_held+0xb6/0x140 [ 408.633416] ? memcpy+0x46/0x50 [ 408.636703] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 408.641742] ? scatterwalk_copychunks+0x57a/0x6a0 [ 408.646600] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 408.652157] alloc_pages_current+0x107/0x210 [ 408.656579] __get_free_pages+0xc/0x40 [ 408.660474] blkcipher_walk_next+0xc22/0x1340 [ 408.664975] ? scatterwalk_copychunks+0x57a/0x6a0 [ 408.669835] blkcipher_walk_done+0x521/0xd20 [ 408.674257] crypto_ecb_crypt+0x188/0x230 [ 408.678418] ? serpent_decrypt+0x30/0x30 [ 408.682491] crypto_ecb_decrypt+0x186/0x250 [ 408.686819] ? crypto_ecb_crypt+0x230/0x230 [ 408.691175] ? crypto_ecb_crypt+0x230/0x230 [ 408.695504] skcipher_decrypt_blkcipher+0x231/0x350 [ 408.700528] ? skcipher_encrypt_blkcipher+0x350/0x350 [ 408.705735] ? tnepres_decrypt+0x510/0x510 [ 408.709977] decrypt+0x354/0x490 [ 408.713370] skcipher_recvmsg+0xcbd/0x1260 [ 408.717637] ? skcipher_bind+0x30/0x30 [ 408.721546] skcipher_recvmsg_nokey+0x67/0x90 [ 408.726049] ? skcipher_sendpage_nokey+0xa0/0xa0 [ 408.730812] sock_recvmsg+0xd0/0x110 [ 408.734532] ? __sock_recv_ts_and_drops+0x410/0x410 [ 408.739571] ___sys_recvmsg+0x2a8/0x680 [ 408.743577] ? ___sys_sendmsg+0x910/0x910 [ 408.747737] ? kvm_clock_read+0x18/0x30 [ 408.751716] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 408.757274] ? ktime_get_ts64+0x38d/0x4f0 [ 408.761430] ? __fget_light+0x2db/0x420 [ 408.765417] ? fget_raw+0x20/0x20 [ 408.768890] ? poll_select_set_timeout+0x154/0x240 [ 408.773829] ? __fdget+0x1b/0x20 [ 408.777201] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 408.782760] do_recvmmsg+0x2f8/0xc40 [ 408.786493] ? ___sys_recvmsg+0x680/0x680 [ 408.790662] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 408.796203] ? _copy_from_user+0xdd/0x150 [ 408.800381] __sys_recvmmsg+0xe5/0x270 [ 408.804293] ? __ia32_sys_recvmsg+0xb0/0xb0 [ 408.808632] ? trace_hardirqs_on+0xbd/0x310 [ 408.812964] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 408.818330] ? trace_hardirqs_off_caller+0x300/0x300 [ 408.823442] __x64_sys_recvmmsg+0xe6/0x140 [ 408.827706] do_syscall_64+0x1a3/0x800 [ 408.831602] ? syscall_return_slowpath+0x5f0/0x5f0 [ 408.836538] ? prepare_exit_to_usermode+0x232/0x3b0 [ 408.841564] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 408.846420] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 408.851638] RIP: 0033:0x458099 17:55:53 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045728, &(0x7f0000000100)) [ 408.854837] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 408.873756] RSP: 002b:00007fc1126dac78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 408.881469] RAX: ffffffffffffffda RBX: 00007fc1126dac90 RCX: 0000000000458099 [ 408.888740] RDX: 0000000000000001 RSI: 0000000020009140 RDI: 0000000000000004 [ 408.896025] RBP: 000000000073bf00 R08: 0000000020009340 R09: 0000000000000000 [ 408.903313] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc1126db6d4 [ 408.910585] R13: 00000000004c4d72 R14: 00000000004d8718 R15: 0000000000000006 [ 408.981326] syz-executor2 invoked oom-killer: gfp_mask=0x7080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 17:55:53 executing program 3 (fault-call:7 fault-nth:10): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:55:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000018c0)={0x0, 0xf, &(0x7f0000001880)={&(0x7f00000004c0)=ANY=[@ANYBLOB="040000001301000000000000000000000000", @ANYRES32=r1, @ANYBLOB="000000000000000050002b004c00010000000081000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x70}}, 0x0) [ 409.029918] CPU: 0 PID: 15660 Comm: syz-executor2 Not tainted 5.0.0-rc4 #49 [ 409.037040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 409.046391] Call Trace: [ 409.048984] dump_stack+0x1db/0x2d0 [ 409.052619] ? dump_stack_print_info.cold+0x20/0x20 [ 409.057668] dump_header+0x1e6/0x116c [ 409.061484] ? add_lock_to_list.isra.0+0x450/0x450 [ 409.066424] ? print_usage_bug+0xd0/0xd0 [ 409.070500] ? pagefault_out_of_memory+0x1a1/0x1a1 [ 409.075441] ? ___ratelimit+0x37c/0x686 [ 409.079425] ? mark_held_locks+0xb1/0x100 [ 409.083585] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 409.088710] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 409.093821] ? lockdep_hardirqs_on+0x415/0x5d0 [ 409.098414] ? trace_hardirqs_on+0xbd/0x310 [ 409.102745] ? kasan_check_read+0x11/0x20 [ 409.106900] ? ___ratelimit+0x37c/0x686 [ 409.110882] ? trace_hardirqs_off_caller+0x300/0x300 [ 409.116007] ? do_raw_spin_trylock+0x270/0x270 [ 409.120604] ? trace_hardirqs_on_caller+0x310/0x310 [ 409.125632] ? lock_acquire+0x1db/0x570 [ 409.129632] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 409.134745] ? ___ratelimit+0xac/0x686 [ 409.138689] ? idr_get_free+0xee0/0xee0 [ 409.142688] ? lockdep_hardirqs_on+0x415/0x5d0 [ 409.147289] oom_kill_process.cold+0x10/0x9d4 [ 409.151793] ? cgroup_procs_next+0x70/0x70 [ 409.156054] ? _raw_spin_unlock_irq+0x5e/0x90 [ 409.160553] ? oom_badness+0xa50/0xa50 [ 409.164458] ? oom_evaluate_task+0x540/0x540 [ 409.168871] ? mem_cgroup_iter_break+0x30/0x30 [ 409.173460] ? mutex_trylock+0x2d0/0x2d0 [ 409.177525] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 409.183183] ? rcu_read_unlock_special+0x380/0x380 [ 409.188127] out_of_memory+0x885/0x1420 [ 409.192121] ? mem_cgroup_iter+0x508/0xf30 [ 409.196383] ? oom_killer_disable+0x340/0x340 [ 409.200903] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 409.200921] ? lock_acquire+0x1db/0x570 [ 409.200949] mem_cgroup_out_of_memory+0x160/0x210 [ 409.200964] ? do_raw_spin_unlock+0xa0/0x330 [ 409.200982] ? memcg_memory_event+0x40/0x40 [ 409.200996] ? do_raw_spin_trylock+0x270/0x270 [ 409.201021] ? _raw_spin_unlock+0x2d/0x50 [ 409.201040] try_charge+0x12a9/0x19b0 [ 409.201054] ? lock_downgrade+0x910/0x910 [ 409.201069] ? kasan_check_read+0x11/0x20 [ 409.201090] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 409.214985] ? get_mem_cgroup_from_mm+0x1cd/0x420 [ 409.254115] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 409.259684] ? lock_downgrade+0x910/0x910 [ 409.263835] ? kasan_check_read+0x11/0x20 [ 409.267990] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 409.273278] ? rcu_read_unlock_special+0x380/0x380 [ 409.278222] ? get_mem_cgroup_from_mm+0x1ea/0x420 [ 409.283076] memcg_kmem_charge_memcg+0x7c/0x130 [ 409.287753] ? memcg_kmem_put_cache+0xb0/0xb0 [ 409.292264] ? lock_release+0xc40/0xc40 [ 409.296253] memcg_kmem_charge+0x13b/0x340 [ 409.300498] __alloc_pages_nodemask+0x7b8/0xdc0 [ 409.305205] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 409.310230] ? rcu_pm_notify+0xd0/0xd0 [ 409.314136] ? rcu_read_lock_sched_held+0x110/0x130 [ 409.319185] ? kmem_cache_alloc_node+0x347/0x710 [ 409.323948] ? print_usage_bug+0xd0/0xd0 [ 409.328040] copy_process+0x847/0x8860 [ 409.331938] ? print_usage_bug+0xd0/0xd0 [ 409.336011] ? rcu_read_unlock+0x16/0x60 [ 409.340091] ? __lock_acquire+0x572/0x4a30 [ 409.344332] ? mark_held_locks+0x100/0x100 [ 409.348585] ? __cleanup_sighand+0x70/0x70 [ 409.352840] ? mark_held_locks+0x100/0x100 [ 409.357075] ? find_held_lock+0x35/0x120 [ 409.361154] ? mark_held_locks+0x100/0x100 [ 409.365397] ? delayacct_end+0xc9/0x100 [ 409.369375] ? add_lock_to_list.isra.0+0x450/0x450 [ 409.374314] ? lock_acquire+0x1db/0x570 [ 409.378312] ? add_lock_to_list.isra.0+0x450/0x450 [ 409.383243] ? find_held_lock+0x35/0x120 [ 409.387310] ? print_usage_bug+0xd0/0xd0 [ 409.391378] ? psi_memstall_leave+0x1f8/0x280 [ 409.395885] ? find_held_lock+0x35/0x120 [ 409.399986] ? __lock_acquire+0x572/0x4a30 [ 409.404232] ? _raw_spin_unlock_irq+0x28/0x90 [ 409.408744] ? _raw_spin_unlock_irq+0x28/0x90 [ 409.413257] ? lockdep_hardirqs_on+0x415/0x5d0 [ 409.417844] ? trace_hardirqs_on+0xbd/0x310 [ 409.422189] ? mark_held_locks+0x100/0x100 [ 409.426448] ? check_preemption_disabled+0x48/0x290 [ 409.431476] ? rcu_lockdep_current_cpu_online+0x1aa/0x220 [ 409.437015] ? rcu_pm_notify+0xd0/0xd0 [ 409.441007] ? add_lock_to_list.isra.0+0x450/0x450 [ 409.445939] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 409.451507] ? try_to_free_mem_cgroup_pages+0x597/0xcd0 [ 409.456875] ? lockdep_hardirqs_on+0x415/0x5d0 [ 409.461463] ? try_to_free_pages+0xb70/0xb70 [ 409.465879] ? percpu_ref_put_many+0x129/0x270 [ 409.470477] ? blkcg_maybe_throttle_current+0x75e/0x1400 [ 409.475931] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 409.481488] _do_fork+0x1a9/0x1170 [ 409.485091] ? fork_idle+0x1d0/0x1d0 [ 409.488817] ? trace_hardirqs_off+0xb8/0x310 [ 409.493231] ? get_mctgt_type_thp.isra.0+0x4c0/0x4c0 [ 409.498354] ? prepare_exit_to_usermode+0x32e/0x3b0 [ 409.503376] ? do_syscall_64+0x8c/0x800 [ 409.507360] ? do_syscall_64+0x8c/0x800 [ 409.511341] ? lockdep_hardirqs_on+0x415/0x5d0 [ 409.515931] ? trace_hardirqs_on+0xbd/0x310 [ 409.520291] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 409.525703] ? trace_hardirqs_off_caller+0x300/0x300 [ 409.530841] __x64_sys_clone+0xbf/0x150 [ 409.534833] do_syscall_64+0x1a3/0x800 [ 409.538745] ? syscall_return_slowpath+0x5f0/0x5f0 [ 409.543696] ? prepare_exit_to_usermode+0x232/0x3b0 [ 409.548727] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 409.553580] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 409.558768] RIP: 0033:0x45aa69 [ 409.561966] Code: ff 48 85 f6 0f 84 97 8d fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c 6e 8d fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 409.580866] RSP: 002b:00007fff32860c38 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 409.588578] RAX: ffffffffffffffda RBX: 00007fe2862d7700 RCX: 000000000045aa69 [ 409.595851] RDX: 00007fe2862d79d0 RSI: 00007fe2862d6db0 RDI: 00000000003d0f00 [ 409.603133] RBP: 00007fff32860e40 R08: 00007fe2862d7700 R09: 00007fe2862d7700 [ 409.610438] R10: 00007fe2862d79d0 R11: 0000000000000202 R12: 0000000000000000 [ 409.617705] R13: 00007fff32860cef R14: 00007fe2862d79c0 R15: 0000000000000000 [ 409.738374] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=275 sclass=netlink_route_socket pig=15683 comm=syz-executor5 [ 409.770056] memory: usage 307176kB, limit 307200kB, failcnt 566 [ 409.781511] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 17:55:54 executing program 5: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x101009, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf64(r0, &(0x7f0000000240)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 409.792692] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=275 sclass=netlink_route_socket pig=15684 comm=syz-executor5 [ 409.824118] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 409.860045] Memory cgroup stats for /syz2: cache:0KB rss:260908KB rss_huge:241664KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:261044KB inactive_file:28KB active_file:32KB unevictable:0KB 17:55:54 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:55:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:55:54 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045729, &(0x7f0000000100)) 17:55:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2cf1c2130b1c204c554c1fae32316", 0x10) 17:55:54 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) 17:55:55 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 410.170313] device nr0 entered promiscuous mode 17:55:55 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x200000088004572a, &(0x7f0000000100)) [ 410.236512] XFS (loop4): Invalid superblock magic number [ 410.429905] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor2,pid=10784,uid=0 [ 410.499905] Memory cgroup out of memory: Kill process 10784 (syz-executor2) score 1113 or sacrifice child [ 410.814823] Killed process 10784 (syz-executor2) total-vm:72576kB, anon-rss:2192kB, file-rss:35788kB, shmem-rss:0kB 17:55:55 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000012000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:55:55 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendto(r1, &(0x7f0000000040)="0000000000daa1afa738fc78c81b11a7bc6ee28097bba4eea3ce71855f9a8cfa", 0x20, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008cc0)=[{{0x0, 0x0, &(0x7f0000003a40)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 17:55:55 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x200000088004572b, &(0x7f0000000100)) 17:55:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:55:55 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:55:55 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) [ 410.868606] SELinux: security policydb version 15 (MLS) not backwards compatible [ 410.877255] SELinux: failed to load policy [ 410.991875] device nr0 entered promiscuous mode 17:55:55 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x200000088004572c, &(0x7f0000000100)) 17:55:55 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 411.037693] SELinux: security policydb version 15 (MLS) not backwards compatible [ 411.061629] XFS (loop4): Invalid superblock magic number [ 411.070283] SELinux: failed to load policy 17:55:56 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000020000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 411.082425] SELinux: security policydb version 15 (MLS) not backwards compatible [ 411.105943] SELinux: failed to load policy 17:55:56 executing program 5: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x4000001, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) sendfile(r0, r0, 0x0, 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) [ 411.251625] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:56 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c000000002e000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 411.293988] SELinux: failed to load policy [ 411.313447] SELinux: security policydb version 15 (MLS) not backwards compatible [ 411.336293] SELinux: failed to load policy [ 411.451281] SELinux: security policydb version 15 (MLS) not backwards compatible [ 411.491668] SELinux: failed to load policy 17:55:56 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000054000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 411.514411] SELinux: security policydb version 15 (MLS) not backwards compatible [ 411.530483] SELinux: failed to load policy 17:55:56 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000020009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 411.625762] SELinux: security policydb version 15 (MLS) not backwards compatible [ 411.643794] SELinux: failed to load policy [ 411.648722] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x03', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:55:56 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x200000088004572d, &(0x7f0000000100)) 17:55:56 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:55:56 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000030009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:55:56 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) [ 411.758968] SELinux: security policydb version 15 (MLS) not backwards compatible [ 411.787324] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:56 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@broute={'brout%\x00\x00\a\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}, {0x0, '\x00', 0x1}]}, 0x108) 17:55:56 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x200000088004572e, &(0x7f0000000100)) [ 411.897847] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:56 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000040009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:55:56 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_PIT2(0xffffffffffffffff, 0x4070aea0, &(0x7f0000000200)={[{0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x2, 0x0, 0x20, 0x1, 0x1000}, {0x7, 0xfffffffffffff801, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4}, {0x0, 0x4, 0x0, 0x99, 0x9, 0x6, 0x0, 0x0, 0x0, 0x400, 0x0, 0x5}]}) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-avx\x00'}, 0x74) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 17:55:56 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 411.941344] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 411.985134] device nr0 entered promiscuous mode 17:55:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) [ 412.093758] syz-executor2 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 412.122536] CPU: 0 PID: 15817 Comm: syz-executor2 Not tainted 5.0.0-rc4 #49 [ 412.129649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 412.139010] Call Trace: [ 412.139034] dump_stack+0x1db/0x2d0 [ 412.139053] ? dump_stack_print_info.cold+0x20/0x20 [ 412.139081] dump_header+0x1e6/0x116c [ 412.154057] ? add_lock_to_list.isra.0+0x450/0x450 [ 412.159171] ? print_usage_bug+0xd0/0xd0 [ 412.159198] ? pagefault_out_of_memory+0x1a1/0x1a1 [ 412.159224] ? ___ratelimit+0x37c/0x686 [ 412.172185] ? mark_held_locks+0xb1/0x100 [ 412.176347] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 412.181457] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 412.186593] ? lockdep_hardirqs_on+0x415/0x5d0 [ 412.191197] ? trace_hardirqs_on+0xbd/0x310 [ 412.195526] ? kasan_check_read+0x11/0x20 [ 412.199719] ? ___ratelimit+0x37c/0x686 [ 412.203719] ? trace_hardirqs_off_caller+0x300/0x300 [ 412.208828] ? do_raw_spin_trylock+0x270/0x270 [ 412.213417] ? trace_hardirqs_on_caller+0x310/0x310 [ 412.218441] ? lock_acquire+0x1db/0x570 [ 412.222432] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 412.227547] ? ___ratelimit+0xac/0x686 [ 412.231457] ? idr_get_free+0xee0/0xee0 [ 412.235439] ? lockdep_hardirqs_on+0x415/0x5d0 [ 412.240037] oom_kill_process.cold+0x10/0x9d4 [ 412.244542] ? cgroup_procs_next+0x70/0x70 [ 412.248787] ? _raw_spin_unlock_irq+0x5e/0x90 [ 412.253287] ? oom_badness+0xa50/0xa50 [ 412.257197] ? oom_evaluate_task+0x540/0x540 [ 412.261624] ? mem_cgroup_iter_break+0x30/0x30 [ 412.266223] ? mutex_trylock+0x2d0/0x2d0 [ 412.270299] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 412.275872] ? rcu_read_unlock_special+0x380/0x380 [ 412.280836] out_of_memory+0x885/0x1420 [ 412.284813] ? mem_cgroup_iter+0x508/0xf30 [ 412.284836] ? oom_killer_disable+0x340/0x340 [ 412.284854] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 412.284870] ? lock_acquire+0x1db/0x570 [ 412.284896] mem_cgroup_out_of_memory+0x160/0x210 [ 412.284911] ? do_raw_spin_unlock+0xa0/0x330 [ 412.284928] ? memcg_memory_event+0x40/0x40 [ 412.284942] ? do_raw_spin_trylock+0x270/0x270 [ 412.284965] ? _raw_spin_unlock+0x2d/0x50 [ 412.298783] try_charge+0x12a9/0x19b0 [ 412.298801] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 412.298825] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 412.298843] ? rcu_read_unlock_special+0x380/0x380 [ 412.298876] ? get_mem_cgroup_from_mm+0x1ea/0x420 [ 412.348949] ? get_mem_cgroup_from_page+0x190/0x190 [ 412.353979] ? rcu_read_lock_sched_held+0x110/0x130 [ 412.359020] mem_cgroup_try_charge+0x43a/0xdb0 [ 412.363654] ? mem_cgroup_protected+0xa10/0xa10 [ 412.368354] ? __anon_vma_prepare+0x36d/0x760 [ 412.372860] ? anon_vma_fork+0x880/0x880 [ 412.376928] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 412.382474] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 412.388025] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 412.392964] __handle_mm_fault+0x2594/0x55a0 [ 412.397391] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 412.402251] ? check_preemption_disabled+0x48/0x290 [ 412.407277] ? handle_mm_fault+0x3cc/0xc80 [ 412.411567] ? lock_downgrade+0x910/0x910 [ 412.415720] ? kasan_check_read+0x11/0x20 [ 412.419876] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 412.425185] ? rcu_read_unlock_special+0x380/0x380 [ 412.430118] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 412.435680] ? check_preemption_disabled+0x48/0x290 [ 412.440714] handle_mm_fault+0x4ec/0xc80 [ 412.444803] ? __handle_mm_fault+0x55a0/0x55a0 [ 412.449389] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 412.454934] ? vmacache_update+0x114/0x140 [ 412.459191] __do_page_fault+0x5da/0xd60 [ 412.463256] ? do_futex+0x2910/0x2910 [ 412.467081] do_page_fault+0xe6/0x7d8 [ 412.470902] ? trace_hardirqs_on_caller+0xc0/0x310 [ 412.475867] ? vmalloc_sync_all+0x30/0x30 [ 412.480030] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 412.485493] ? syscall_return_slowpath+0x5f0/0x5f0 [ 412.490440] ? prepare_exit_to_usermode+0x232/0x3b0 [ 412.495463] ? page_fault+0x8/0x30 [ 412.499010] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 412.503867] ? page_fault+0x8/0x30 [ 412.507437] page_fault+0x1e/0x30 [ 412.510897] RIP: 0033:0x40fabf [ 412.514097] Code: 0f 84 c8 02 00 00 48 83 bd 78 ff ff ff 00 0f 84 f9 04 00 00 48 8b 95 68 ff ff ff 44 89 95 38 ff ff ff 4c 8d ac 10 00 f7 ff ff <49> 89 85 90 06 00 00 49 8d 85 10 03 00 00 49 89 95 98 06 00 00 41 [ 412.533000] RSP: 002b:00007fff32860c80 EFLAGS: 00010206 [ 412.538373] RAX: 00007fe2862b7000 RBX: 0000000000020000 RCX: 00000000004580ea [ 412.545640] RDX: 0000000000021000 RSI: 0000000000021000 RDI: 0000000000000000 [ 412.552912] RBP: 00007fff32860d60 R08: ffffffffffffffff R09: 0000000000000000 [ 412.560182] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fff32860e40 [ 412.567457] R13: 00007fe2862d7700 R14: 0000000000000004 R15: 0000000000000000 [ 412.583122] memory: usage 307200kB, limit 307200kB, failcnt 610 [ 412.591056] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 412.601093] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 412.607440] Memory cgroup stats for /syz2: cache:0KB rss:259512KB rss_huge:239616KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:259652KB inactive_file:40KB active_file:44KB unevictable:0KB [ 412.630750] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor2,pid=10802,uid=0 [ 412.645540] Memory cgroup out of memory: Kill process 10802 (syz-executor2) score 1113 or sacrifice child [ 412.658857] Killed process 10802 (syz-executor2) total-vm:72576kB, anon-rss:2192kB, file-rss:35788kB, shmem-rss:0kB 17:55:57 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000050009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 412.694375] SELinux: security policydb version 15 (MLS) not backwards compatible [ 412.722710] SELinux: security policydb version 15 (MLS) not backwards compatible [ 412.778695] XFS (loop4): Invalid superblock magic number 17:55:57 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:55:57 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x200000088004572f, &(0x7f0000000100)) [ 412.847776] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:57 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) 17:55:57 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000060009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:55:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = dup(r1) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PPPIOCSDEBUG(r3, 0x40047440, 0x0) bind$bt_rfcomm(r3, &(0x7f00000001c0)={0x1f, {0xffffffffffffffff, 0x1ff, 0x3}}, 0xa) 17:55:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x03', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:55:57 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045730, &(0x7f0000000100)) 17:55:58 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 413.043111] SELinux: security policydb version 15 (MLS) not backwards compatible [ 413.052037] device nr0 entered promiscuous mode 17:55:58 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) close(r0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) poll(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000000), 0x4) [ 413.106326] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:58 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000070009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:55:58 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f00000000c0)=0x61) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000080)=""/11, 0xb) r1 = syz_open_pts(r0, 0x0) ioctl$TCFLSH(r1, 0x540b, 0x0) [ 413.309067] SELinux: security policydb version 15 (MLS) not backwards compatible [ 413.332823] sel_write_load: 9 callbacks suppressed [ 413.332828] SELinux: failed to load policy 17:55:58 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000100009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 413.361766] SELinux: security policydb version 15 (MLS) not backwards compatible [ 413.392250] SELinux: failed to load policy 17:55:58 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000480009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 413.509407] SELinux: security policydb version 15 (MLS) not backwards compatible [ 413.520186] SELinux: failed to load policy [ 413.545745] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:58 executing program 5: r0 = syz_open_procfs(0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000000)=0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x200096dc) getdents(r0, 0x0, 0x0) [ 413.587691] SELinux: failed to load policy 17:55:58 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) 17:55:58 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045731, &(0x7f0000000100)) 17:55:58 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 413.763708] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x03', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) [ 413.833239] SELinux: failed to load policy [ 413.840732] SELinux: security policydb version 15 (MLS) not backwards compatible [ 413.885214] SELinux: failed to load policy 17:55:58 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c00004c0009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:55:58 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045732, &(0x7f0000000100)) [ 413.911437] device nr0 entered promiscuous mode 17:55:58 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:55:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = dup(r1) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PPPIOCSDEBUG(r3, 0x40047440, 0x0) bind$bt_rfcomm(r3, &(0x7f00000001c0)={0x1f, {0xffffffffffffffff, 0x1ff}}, 0xa) [ 414.038902] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:59 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000600009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 414.120721] SELinux: failed to load policy [ 414.126112] SELinux: security policydb version 15 (MLS) not backwards compatible [ 414.147855] SELinux: failed to load policy [ 414.257375] SELinux: security policydb version 15 (MLS) not backwards compatible [ 414.269596] SELinux: failed to load policy [ 414.287959] SELinux: security policydb version 15 (MLS) not backwards compatible 17:55:59 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000680009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 414.307837] SELinux: failed to load policy [ 414.471336] syz-executor2 invoked oom-killer: gfp_mask=0x7080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 414.492710] CPU: 0 PID: 15939 Comm: syz-executor2 Not tainted 5.0.0-rc4 #49 [ 414.499819] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 414.509212] Call Trace: [ 414.511807] dump_stack+0x1db/0x2d0 [ 414.515445] ? dump_stack_print_info.cold+0x20/0x20 [ 414.520480] dump_header+0x1e6/0x116c [ 414.524289] ? add_lock_to_list.isra.0+0x450/0x450 [ 414.529234] ? print_usage_bug+0xd0/0xd0 [ 414.533305] ? pagefault_out_of_memory+0x1a1/0x1a1 [ 414.538247] ? ___ratelimit+0x37c/0x686 [ 414.542235] ? mark_held_locks+0xb1/0x100 [ 414.546407] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 414.551510] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 414.556614] ? lockdep_hardirqs_on+0x415/0x5d0 [ 414.561204] ? trace_hardirqs_on+0xbd/0x310 [ 414.565544] ? kasan_check_read+0x11/0x20 [ 414.569699] ? ___ratelimit+0x37c/0x686 [ 414.573676] ? trace_hardirqs_off_caller+0x300/0x300 [ 414.578782] ? do_raw_spin_trylock+0x270/0x270 [ 414.583371] ? trace_hardirqs_on_caller+0x310/0x310 [ 414.588393] ? lock_acquire+0x1db/0x570 [ 414.592381] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 414.597493] ? ___ratelimit+0xac/0x686 [ 414.601385] ? idr_get_free+0xee0/0xee0 [ 414.605380] ? lockdep_hardirqs_on+0x415/0x5d0 [ 414.609980] oom_kill_process.cold+0x10/0x9d4 [ 414.614499] ? cgroup_procs_next+0x70/0x70 [ 414.618736] ? _raw_spin_unlock_irq+0x5e/0x90 [ 414.623256] ? oom_badness+0xa50/0xa50 [ 414.627168] ? oom_evaluate_task+0x540/0x540 [ 414.631587] ? mem_cgroup_iter_break+0x30/0x30 [ 414.636184] ? mutex_trylock+0x2d0/0x2d0 [ 414.640252] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 414.645811] ? rcu_read_unlock_special+0x380/0x380 [ 414.650754] out_of_memory+0x885/0x1420 [ 414.654740] ? mem_cgroup_iter+0x508/0xf30 [ 414.658989] ? oom_killer_disable+0x340/0x340 [ 414.663494] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 414.668604] ? lock_acquire+0x1db/0x570 [ 414.672594] mem_cgroup_out_of_memory+0x160/0x210 [ 414.677440] ? do_raw_spin_unlock+0xa0/0x330 [ 414.681856] ? memcg_memory_event+0x40/0x40 [ 414.686209] ? do_raw_spin_trylock+0x270/0x270 [ 414.690804] ? _raw_spin_unlock+0x2d/0x50 [ 414.694959] try_charge+0x12a9/0x19b0 [ 414.698766] ? lock_downgrade+0x910/0x910 [ 414.702917] ? kasan_check_read+0x11/0x20 [ 414.707084] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 414.711928] ? get_mem_cgroup_from_mm+0x1cd/0x420 [ 414.716778] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 414.722327] ? lock_downgrade+0x910/0x910 [ 414.726477] ? kasan_check_read+0x11/0x20 [ 414.730635] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 414.735919] ? rcu_read_unlock_special+0x380/0x380 [ 414.740868] ? get_mem_cgroup_from_mm+0x1ea/0x420 [ 414.745724] memcg_kmem_charge_memcg+0x7c/0x130 [ 414.750413] ? memcg_kmem_put_cache+0xb0/0xb0 [ 414.754924] ? lock_release+0xc40/0xc40 [ 414.758915] memcg_kmem_charge+0x13b/0x340 [ 414.763250] __alloc_pages_nodemask+0x7b8/0xdc0 [ 414.767937] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 414.772959] ? rcu_pm_notify+0xd0/0xd0 [ 414.776867] ? rcu_read_lock_sched_held+0x110/0x130 [ 414.781890] ? kmem_cache_alloc_node+0x347/0x710 [ 414.786661] copy_process+0x847/0x8860 [ 414.790556] ? pmd_devmap_trans_unstable+0x1d0/0x1d0 [ 414.795663] ? add_lock_to_list.isra.0+0x450/0x450 [ 414.800606] ? reacquire_held_locks+0xfb/0x520 [ 414.805196] ? alloc_set_pte+0x134a/0x1df0 [ 414.809444] ? find_held_lock+0x60/0x120 [ 414.813525] ? __cleanup_sighand+0x70/0x70 [ 414.817764] ? lock_downgrade+0x910/0x910 [ 414.821937] ? kasan_check_read+0x11/0x20 [ 414.826102] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 414.831391] ? rcu_read_unlock_special+0x380/0x380 [ 414.836337] ? filemap_map_pages+0xe14/0x1cb0 [ 414.840857] ? print_usage_bug+0xd0/0xd0 [ 414.844924] ? print_usage_bug+0xd0/0xd0 [ 414.848993] ? drop_futex_key_refs.isra.0+0x6f/0xf0 [ 414.854022] ? __lock_acquire+0x572/0x4a30 [ 414.858270] ? __handle_mm_fault+0x3fde/0x55a0 [ 414.862871] ? mark_held_locks+0x100/0x100 [ 414.867122] ? kasan_check_read+0x11/0x20 [ 414.871295] ? do_raw_spin_unlock+0xa0/0x330 [ 414.875711] ? do_raw_spin_trylock+0x270/0x270 [ 414.880298] ? add_mm_counter_fast.part.0+0x40/0x40 [ 414.885317] ? save_stack+0x45/0xd0 [ 414.888949] ? add_lock_to_list.isra.0+0x450/0x450 [ 414.893882] ? add_lock_to_list.isra.0+0x450/0x450 [ 414.898822] ? __handle_mm_fault+0x955/0x55a0 [ 414.903333] ? __might_fault+0x12b/0x1e0 [ 414.907403] ? find_held_lock+0x35/0x120 [ 414.911474] ? __might_fault+0x12b/0x1e0 [ 414.915545] ? lock_acquire+0x1db/0x570 [ 414.919530] ? lock_downgrade+0x910/0x910 [ 414.923712] ? lock_release+0xc40/0xc40 [ 414.927693] ? trace_hardirqs_off_caller+0x300/0x300 [ 414.932806] _do_fork+0x1a9/0x1170 [ 414.936373] ? fork_idle+0x1d0/0x1d0 [ 414.940090] ? kasan_check_read+0x11/0x20 [ 414.944245] ? _copy_to_user+0xc9/0x120 [ 414.948229] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 414.953771] ? put_timespec64+0x115/0x1b0 [ 414.957926] ? nsecs_to_jiffies+0x30/0x30 [ 414.962083] ? do_syscall_64+0x8c/0x800 [ 414.966064] ? do_syscall_64+0x8c/0x800 [ 414.970050] ? lockdep_hardirqs_on+0x415/0x5d0 [ 414.974637] ? trace_hardirqs_on+0xbd/0x310 [ 414.978967] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 414.984513] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 414.989885] ? trace_hardirqs_off_caller+0x300/0x300 [ 414.995004] __x64_sys_clone+0xbf/0x150 [ 414.999019] do_syscall_64+0x1a3/0x800 [ 415.002913] ? syscall_return_slowpath+0x5f0/0x5f0 [ 415.007860] ? prepare_exit_to_usermode+0x232/0x3b0 [ 415.012888] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 415.017743] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 415.022948] RIP: 0033:0x458099 [ 415.026161] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 415.045080] RSP: 002b:00007fe2862d6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 415.052806] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000458099 [ 415.060078] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0020002102001fff [ 415.067345] RBP: 000000000073bf00 R08: ffffffffffffffff R09: 0000000000000000 [ 415.074621] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2862d76d4 [ 415.081894] R13: 00000000004be480 R14: 00000000004cea40 R15: 00000000ffffffff 17:56:00 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:56:00 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="14001200040001006970367674690000040002009f5465ab6d339ee9c94fedda4416b902a8343dde88d34e626abd8dcddc0c7f4878a7e16925195ff4db4afe3f0a6e850218aa2d6e7e221d33d7248025beae923c2315551c871c8d32abd4ff1ce272bacb17b37260be543b940b8469e31441f39d745c3644dfd9a6bca29d9f55da1cd5d5634352315fc5af3349cc9d130b030939d5ab56"], 0x1}}, 0x0) [ 415.159671] memory: usage 307200kB, limit 307200kB, failcnt 658 [ 415.177760] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 415.187352] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 17:56:00 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) 17:56:00 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045733, &(0x7f0000000100)) 17:56:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) [ 415.207848] Memory cgroup stats for /syz2: cache:0KB rss:258248KB rss_huge:237568KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:258324KB inactive_file:0KB active_file:8KB unevictable:0KB 17:56:00 executing program 5: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fsetxattr$security_ima(r0, &(0x7f0000000080)='security.ima\x00', &(0x7f0000000040)=@ng={0x4, 0xc}, 0x2, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f00000000c0)={0x6, {{0xa, 0x4e23, 0x5, @loopback, 0x4}}, 0x1, 0x6, [{{0xa, 0x4e24, 0x9, @remote, 0xf73}}, {{0xa, 0x4e23, 0x0, @remote, 0xffffffff}}, {{0xa, 0x4e23, 0x4daf, @remote, 0xffff}}, {{0xa, 0x4e21, 0x80000001, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}}, {{0xa, 0x4e23, 0x3, @mcast1, 0x4}}, {{0xa, 0x4e22, 0x400, @dev={0xfe, 0x80, [], 0x29}, 0x7}}]}, 0x390) open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) [ 415.300267] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor2,pid=10821,uid=0 [ 415.353338] device nr0 entered promiscuous mode [ 415.362986] Memory cgroup out of memory: Kill process 10821 (syz-executor2) score 1113 or sacrifice child 17:56:00 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:56:00 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045734, &(0x7f0000000100)) [ 415.397657] audit: type=1804 audit(1548698160.298:88): pid=15961 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir103046459/syzkaller.0k5Fj6/258/bus" dev="sda1" ino=16869 res=1 [ 415.405286] Killed process 10821 (syz-executor2) total-vm:72576kB, anon-rss:2192kB, file-rss:35788kB, shmem-rss:0kB [ 415.438821] oom_reaper: reaped process 10821 (syz-executor2), now anon-rss:0kB, file-rss:34828kB, shmem-rss:0kB 17:56:00 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c00006c0009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 415.472048] SELinux: security policydb version 15 (MLS) not backwards compatible [ 415.496898] SELinux: security policydb version 15 (MLS) not backwards compatible 17:56:00 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x4000, 0x0) setsockopt$inet6_int(r1, 0x29, 0xd0, &(0x7f0000000040)=0x5, 0x4) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0xc) [ 415.532536] XFS (loop4): Invalid superblock magic number [ 415.557702] audit: type=1804 audit(1548698160.298:89): pid=15961 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor5" name="/root/syzkaller-testdir103046459/syzkaller.0k5Fj6/258/bus" dev="sda1" ino=16869 res=1 [ 415.599174] SELinux: security policydb version 15 (MLS) not backwards compatible [ 415.624316] SELinux: security policydb version 15 (MLS) not backwards compatible 17:56:00 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000740009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:56:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000600)={{0xa, 0x4e24, 0xffff, @loopback, 0x8001}, {0xa, 0x4e22, 0x0, @remote}, 0x9, [0x6, 0x4, 0x800, 0x1, 0x5, 0x0, 0x6]}, 0x5c) r0 = syz_open_dev$sndpcmc(&(0x7f0000000800)='/dev/snd/pcmC#D#c\x00', 0x81, 0x1) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f0000000840)=0x9) clock_gettime(0x0, 0x0) clock_gettime(0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 415.780453] SELinux: security policydb version 15 (MLS) not backwards compatible 17:56:00 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c00007a0009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:56:00 executing program 5: r0 = socket$unix(0x1, 0x3, 0x0) r1 = socket$unix(0x1, 0x3, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000007c0)='./\x81cp\x00s[\x8bd%zQ\x9d\x18\x99\x00\x00\xf9T\x8b(z\xf8 \x1at\x12n\\\xe6\xdc\xd8_\xf0\xf5\xdfla\x9a\xd4H\x85Q\x03\x93\x93\xaa}\xcb7?\v\x9f\nG\r\xe9l\x9e\x82R6\x92\xd9\xd3PEJy\xc4\xc7t\x16\xb4w\xe9\x92B\xc1\x8a>\'/', 0x200002, 0x0) fchdir(r2) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000280)='./file1\x00', 0xffffffffffffffff) setsockopt$inet_group_source_req(r3, 0x0, 0x2c, &(0x7f0000000600)={0x47, {{0x2, 0x4e24}}, {{0x2, 0x4e21, @multicast2}}}, 0x7a) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f00000000c0)={0x53e4, 0x5, 0x7f, 0x457766d2}, 0xffffffffffffff23) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f0000000140)={0x1f, 0x6, 0x4, 0x7, 0xadb, 0x0, 0x7, 0xfff, 0x3, 0x10000, 0x1000, 0x101}) r4 = open(&(0x7f0000000000)='./file2\x00', 0x0, 0x8) r5 = accept4(r1, &(0x7f0000000040)=@ax25, &(0x7f0000000100)=0x80, 0x80800) r6 = openat$cgroup_procs(r4, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) rmdir(&(0x7f00000000c0)='./file0\x00') r7 = dup2(r4, r6) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x2}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$unix(r1, &(0x7f0000000580)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) socket$nl_crypto(0x10, 0x3, 0x15) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r1) syncfs(r7) syz_genetlink_get_family_id$ipvs(&(0x7f00000009c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f0000000780)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4000a002}, 0xc, &(0x7f0000000480)={&(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x10}, 0x0) lstat(&(0x7f0000000740)='./file0/file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000380)={0x0, r8, r9}, 0xc) creat(&(0x7f0000000400)='./file1\x00', 0x8) connect(r0, &(0x7f0000987ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) epoll_ctl$EPOLL_CTL_ADD(r7, 0x1, r7, &(0x7f0000000240)={0x4}) [ 415.960791] syz-executor2 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 415.995337] CPU: 0 PID: 15999 Comm: syz-executor2 Not tainted 5.0.0-rc4 #49 [ 416.002454] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 416.011808] Call Trace: [ 416.014418] dump_stack+0x1db/0x2d0 [ 416.018078] ? dump_stack_print_info.cold+0x20/0x20 [ 416.023113] dump_header+0x1e6/0x116c [ 416.027413] ? add_lock_to_list.isra.0+0x450/0x450 [ 416.032351] ? print_usage_bug+0xd0/0xd0 [ 416.036419] ? pagefault_out_of_memory+0x1a1/0x1a1 [ 416.041354] ? ___ratelimit+0x37c/0x686 [ 416.045335] ? mark_held_locks+0xb1/0x100 [ 416.049497] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 416.054602] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 416.059722] ? lockdep_hardirqs_on+0x415/0x5d0 [ 416.064311] ? trace_hardirqs_on+0xbd/0x310 [ 416.068636] ? kasan_check_read+0x11/0x20 [ 416.072790] ? ___ratelimit+0x37c/0x686 [ 416.076767] ? trace_hardirqs_off_caller+0x300/0x300 [ 416.081892] ? do_raw_spin_trylock+0x270/0x270 [ 416.086478] ? trace_hardirqs_on_caller+0x310/0x310 [ 416.091496] ? lock_acquire+0x1db/0x570 [ 416.095497] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 416.100603] ? ___ratelimit+0xac/0x686 [ 416.104496] ? idr_get_free+0xee0/0xee0 [ 416.108476] ? lockdep_hardirqs_on+0x415/0x5d0 [ 416.113075] oom_kill_process.cold+0x10/0x9d4 [ 416.117576] ? cgroup_procs_next+0x70/0x70 [ 416.121825] ? _raw_spin_unlock_irq+0x5e/0x90 [ 416.126326] ? oom_badness+0xa50/0xa50 [ 416.130222] ? oom_evaluate_task+0x540/0x540 [ 416.134635] ? mem_cgroup_iter_break+0x30/0x30 [ 416.139225] ? mutex_trylock+0x2d0/0x2d0 [ 416.143291] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 416.148866] ? rcu_read_unlock_special+0x380/0x380 [ 416.153807] out_of_memory+0x885/0x1420 [ 416.157921] ? mem_cgroup_iter+0x508/0xf30 [ 416.162203] ? oom_killer_disable+0x340/0x340 [ 416.166706] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 416.171818] ? lock_acquire+0x1db/0x570 [ 416.175809] mem_cgroup_out_of_memory+0x160/0x210 [ 416.180652] ? do_raw_spin_unlock+0xa0/0x330 [ 416.185079] ? memcg_memory_event+0x40/0x40 [ 416.189406] ? do_raw_spin_trylock+0x270/0x270 [ 416.194006] ? _raw_spin_unlock+0x2d/0x50 [ 416.198198] try_charge+0x12a9/0x19b0 [ 416.202036] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 416.207585] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 416.212435] ? rcu_read_unlock_special+0x380/0x380 [ 416.217383] ? get_mem_cgroup_from_mm+0x1ea/0x420 [ 416.222235] ? get_mem_cgroup_from_page+0x190/0x190 [ 416.227263] ? rcu_read_lock_sched_held+0x110/0x130 [ 416.232289] mem_cgroup_try_charge+0x43a/0xdb0 [ 416.236884] ? mem_cgroup_protected+0xa10/0xa10 [ 416.241615] ? lock_downgrade+0x910/0x910 [ 416.245783] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 416.251323] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 416.256867] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 416.261806] wp_page_copy+0x45a/0x1c30 [ 416.265712] ? swp_swapcount+0x540/0x540 [ 416.269788] ? pmd_pfn+0x1d0/0x1d0 [ 416.273346] ? find_held_lock+0x35/0x120 [ 416.277412] ? do_wp_page+0x70d/0x16b0 [ 416.281314] ? kasan_check_read+0x11/0x20 [ 416.285463] ? do_raw_spin_unlock+0xa0/0x330 [ 416.289877] ? do_raw_spin_trylock+0x270/0x270 [ 416.294468] ? __lock_acquire+0x572/0x4a30 [ 416.298711] do_wp_page+0x715/0x16b0 [ 416.302454] ? finish_mkwrite_fault+0x540/0x540 [ 416.307167] ? kasan_check_read+0x11/0x20 [ 416.311333] ? do_raw_spin_lock+0x156/0x360 [ 416.315660] ? rwlock_bug.part.0+0x90/0x90 [ 416.319901] ? pmd_devmap_trans_unstable+0x1d0/0x1d0 [ 416.325019] __handle_mm_fault+0x2c8e/0x55a0 [ 416.329442] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 416.334294] ? check_preemption_disabled+0x48/0x290 [ 416.339321] ? handle_mm_fault+0x3cc/0xc80 [ 416.343579] ? lock_downgrade+0x910/0x910 [ 416.347730] ? kasan_check_read+0x11/0x20 [ 416.351887] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 416.357191] ? rcu_read_unlock_special+0x380/0x380 [ 416.362128] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 416.367708] ? check_preemption_disabled+0x48/0x290 [ 416.372750] handle_mm_fault+0x4ec/0xc80 [ 416.376830] ? __handle_mm_fault+0x55a0/0x55a0 [ 416.381417] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 416.386972] ? vmacache_update+0x114/0x140 [ 416.391232] __do_page_fault+0x5da/0xd60 [ 416.395320] do_page_fault+0xe6/0x7d8 [ 416.399128] ? trace_hardirqs_on_caller+0xc0/0x310 [ 416.404084] ? vmalloc_sync_all+0x30/0x30 [ 416.408238] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 416.413705] ? prepare_exit_to_usermode+0x232/0x3b0 [ 416.418727] ? page_fault+0x8/0x30 [ 416.422279] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 416.427128] ? page_fault+0x8/0x30 [ 416.430688] page_fault+0x1e/0x30 [ 416.434156] RIP: 0033:0x42f226 [ 416.437366] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 16 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 3c 5d 62 00 85 c0 0f 84 [ 416.456274] RSP: 002b:00007fff32860b60 EFLAGS: 00010206 [ 416.461640] RAX: 00000000000205b1 RBX: 0000000000711640 RCX: 0000000000000121 [ 416.468906] RDX: 000000000126d930 RSI: 000000000126da50 RDI: 0000000000000000 [ 416.476183] RBP: 0000000000000121 R08: ffffffffffffffff R09: 0000000000000000 [ 416.483450] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000711698 [ 416.490721] R13: 0000000000711698 R14: 0000000000000004 R15: 0000000000002710 [ 416.499032] memory: usage 307180kB, limit 307200kB, failcnt 694 [ 416.505339] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 416.512315] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 416.518590] Memory cgroup stats for /syz2: cache:0KB rss:258116KB rss_huge:237568KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:258272KB inactive_file:4KB active_file:4KB unevictable:0KB [ 416.539707] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor2,pid=10843,uid=0 [ 416.554676] Memory cgroup out of memory: Kill process 10843 (syz-executor2) score 1113 or sacrifice child [ 416.564659] Killed process 10843 (syz-executor2) total-vm:72576kB, anon-rss:2192kB, file-rss:35788kB, shmem-rss:0kB [ 416.577514] oom_reaper: reaped process 10843 (syz-executor2), now anon-rss:0kB, file-rss:34828kB, shmem-rss:0kB [ 416.578526] SELinux: security policydb version 15 (MLS) not backwards compatible [ 416.600931] SELinux: security policydb version 15 (MLS) not backwards compatible 17:56:01 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) 17:56:01 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000309000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 416.686694] audit: type=1400 audit(1548698161.588:90): avc: denied { create } for pid=16007 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=1 17:56:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:56:01 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045735, &(0x7f0000000100)) 17:56:01 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:56:01 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000509000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:56:01 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x3000000000000000, 0x4000) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) r1 = socket$pptp(0x18, 0x1, 0x2) ioctl$PPPIOCSFLAGS(r1, 0x40047459, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) pread64(r0, 0x0, 0x0, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x102002700) [ 416.823740] SELinux: security policydb version 15 (MLS) not backwards compatible [ 416.842317] SELinux: security policydb version 15 (MLS) not backwards compatible 17:56:01 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045736, &(0x7f0000000100)) [ 416.914826] SELinux: security policydb version 15 (MLS) not backwards compatible [ 416.936861] device nr0 entered promiscuous mode 17:56:01 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:56:01 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000609000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 416.986700] SELinux: security policydb version 15 (MLS) not backwards compatible [ 417.091558] XFS (loop4): Invalid superblock magic number [ 417.133830] SELinux: security policydb version 15 (MLS) not backwards compatible 17:56:02 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000709000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 417.178752] SELinux: security policydb version 15 (MLS) not backwards compatible [ 417.279271] SELinux: security policydb version 15 (MLS) not backwards compatible [ 417.344090] SELinux: security policydb version 15 (MLS) not backwards compatible 17:56:02 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000002009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 417.530037] SELinux: security policydb version 15 (MLS) not backwards compatible [ 417.587730] SELinux: security policydb version 15 (MLS) not backwards compatible 17:56:02 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) 17:56:02 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045737, &(0x7f0000000100)) 17:56:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:56:02 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:56:02 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000003f09000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:56:02 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045738, &(0x7f0000000100)) 17:56:02 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x3000000000000000, 0x4000) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) r1 = socket$pptp(0x18, 0x1, 0x2) ioctl$PPPIOCSFLAGS(r1, 0x40047459, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) pread64(r0, 0x0, 0x0, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x102002700) 17:56:02 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 417.810906] device nr0 entered promiscuous mode [ 417.820909] SELinux: security policydb version 15 (MLS) not backwards compatible [ 417.838555] XFS (loop4): Invalid superblock magic number 17:56:02 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045739, &(0x7f0000000100)) [ 417.876974] SELinux: security policydb version 15 (MLS) not backwards compatible 17:56:02 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000004809000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:56:03 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000004c09000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 418.029415] SELinux: security policydb version 15 (MLS) not backwards compatible [ 418.057669] SELinux: security policydb version 15 (MLS) not backwards compatible [ 418.149618] SELinux: security policydb version 15 (MLS) not backwards compatible [ 418.185561] syz-executor2 invoked oom-killer: gfp_mask=0x7080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 418.198293] CPU: 1 PID: 16116 Comm: syz-executor2 Not tainted 5.0.0-rc4 #49 [ 418.205398] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 418.214745] Call Trace: [ 418.217341] dump_stack+0x1db/0x2d0 [ 418.220997] ? dump_stack_print_info.cold+0x20/0x20 [ 418.226033] dump_header+0x1e6/0x116c [ 418.229864] ? add_lock_to_list.isra.0+0x450/0x450 [ 418.234817] ? print_usage_bug+0xd0/0xd0 [ 418.238892] ? pagefault_out_of_memory+0x1a1/0x1a1 [ 418.243830] ? ___ratelimit+0x37c/0x686 [ 418.247811] ? mark_held_locks+0xb1/0x100 [ 418.251992] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 418.257096] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 418.262247] ? lockdep_hardirqs_on+0x415/0x5d0 [ 418.266850] ? trace_hardirqs_on+0xbd/0x310 [ 418.271205] ? kasan_check_read+0x11/0x20 [ 418.275380] ? ___ratelimit+0x37c/0x686 [ 418.279362] ? trace_hardirqs_off_caller+0x300/0x300 [ 418.284468] ? do_raw_spin_trylock+0x270/0x270 [ 418.289071] ? trace_hardirqs_on_caller+0x310/0x310 [ 418.294116] ? lock_acquire+0x1db/0x570 [ 418.298126] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 418.303243] ? ___ratelimit+0xac/0x686 [ 418.307155] ? idr_get_free+0xee0/0xee0 [ 418.311135] ? lockdep_hardirqs_on+0x415/0x5d0 [ 418.315748] oom_kill_process.cold+0x10/0x9d4 [ 418.320254] ? cgroup_procs_next+0x70/0x70 [ 418.324499] ? _raw_spin_unlock_irq+0x5e/0x90 [ 418.329011] ? oom_badness+0xa50/0xa50 [ 418.332925] ? oom_evaluate_task+0x540/0x540 [ 418.337365] ? mem_cgroup_iter_break+0x30/0x30 [ 418.341955] ? mutex_trylock+0x2d0/0x2d0 [ 418.346036] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 418.351598] ? rcu_read_unlock_special+0x380/0x380 [ 418.356539] out_of_memory+0x885/0x1420 [ 418.360524] ? mem_cgroup_iter+0x508/0xf30 [ 418.364773] ? oom_killer_disable+0x340/0x340 [ 418.369272] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 418.374379] ? lock_acquire+0x1db/0x570 [ 418.378384] mem_cgroup_out_of_memory+0x160/0x210 [ 418.383244] ? do_raw_spin_unlock+0xa0/0x330 [ 418.387663] ? memcg_memory_event+0x40/0x40 [ 418.391988] ? do_raw_spin_trylock+0x270/0x270 [ 418.396589] ? _raw_spin_unlock+0x2d/0x50 [ 418.400758] try_charge+0x12a9/0x19b0 [ 418.404566] ? lock_downgrade+0x910/0x910 [ 418.408719] ? kasan_check_read+0x11/0x20 [ 418.412875] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 418.417724] ? get_mem_cgroup_from_mm+0x1cd/0x420 [ 418.422575] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 418.428133] ? lock_downgrade+0x910/0x910 [ 418.432307] ? kasan_check_read+0x11/0x20 [ 418.436467] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 418.441753] ? rcu_read_unlock_special+0x380/0x380 [ 418.446716] ? get_mem_cgroup_from_mm+0x1ea/0x420 [ 418.451579] memcg_kmem_charge_memcg+0x7c/0x130 [ 418.456257] ? memcg_kmem_put_cache+0xb0/0xb0 [ 418.460757] ? lock_release+0xc40/0xc40 [ 418.464747] memcg_kmem_charge+0x13b/0x340 [ 418.469020] __alloc_pages_nodemask+0x7b8/0xdc0 [ 418.473704] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 418.478739] ? rcu_pm_notify+0xd0/0xd0 [ 418.482636] ? rcu_read_lock_sched_held+0x110/0x130 [ 418.487696] ? kmem_cache_alloc_node+0x347/0x710 [ 418.492468] ? print_usage_bug+0xd0/0xd0 [ 418.496553] copy_process+0x847/0x8860 [ 418.500453] ? print_usage_bug+0xd0/0xd0 [ 418.504552] ? rcu_read_unlock+0x16/0x60 [ 418.508625] ? __lock_acquire+0x572/0x4a30 [ 418.512871] ? mark_held_locks+0x100/0x100 [ 418.517132] ? __cleanup_sighand+0x70/0x70 [ 418.521385] ? mark_held_locks+0x100/0x100 [ 418.525622] ? find_held_lock+0x35/0x120 [ 418.529703] ? mark_held_locks+0x100/0x100 [ 418.533950] ? delayacct_end+0xc9/0x100 [ 418.537930] ? add_lock_to_list.isra.0+0x450/0x450 [ 418.542869] ? lock_acquire+0x1db/0x570 [ 418.546855] ? add_lock_to_list.isra.0+0x450/0x450 [ 418.551789] ? find_held_lock+0x35/0x120 [ 418.555854] ? print_usage_bug+0xd0/0xd0 [ 418.559928] ? psi_memstall_leave+0x1f8/0x280 [ 418.564431] ? find_held_lock+0x35/0x120 [ 418.568500] ? __lock_acquire+0x572/0x4a30 [ 418.572745] ? _raw_spin_unlock_irq+0x28/0x90 [ 418.577244] ? _raw_spin_unlock_irq+0x28/0x90 [ 418.581742] ? lockdep_hardirqs_on+0x415/0x5d0 [ 418.586336] ? trace_hardirqs_on+0xbd/0x310 [ 418.590675] ? mark_held_locks+0x100/0x100 [ 418.594913] ? check_preemption_disabled+0x48/0x290 [ 418.599941] ? rcu_lockdep_current_cpu_online+0x1aa/0x220 [ 418.605484] ? rcu_pm_notify+0xd0/0xd0 [ 418.609388] ? add_lock_to_list.isra.0+0x450/0x450 [ 418.614320] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 418.619859] ? try_to_free_mem_cgroup_pages+0x597/0xcd0 [ 418.625227] ? lockdep_hardirqs_on+0x415/0x5d0 [ 418.629830] ? try_to_free_pages+0xb70/0xb70 [ 418.634255] ? percpu_ref_put_many+0x129/0x270 [ 418.638856] ? blkcg_maybe_throttle_current+0x75e/0x1400 [ 418.644315] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 418.649876] _do_fork+0x1a9/0x1170 [ 418.653448] ? fork_idle+0x1d0/0x1d0 [ 418.657191] ? trace_hardirqs_off+0xb8/0x310 [ 418.661610] ? get_mctgt_type_thp.isra.0+0x4c0/0x4c0 [ 418.666737] ? prepare_exit_to_usermode+0x32e/0x3b0 [ 418.671777] ? do_syscall_64+0x8c/0x800 [ 418.675758] ? do_syscall_64+0x8c/0x800 [ 418.679735] ? lockdep_hardirqs_on+0x415/0x5d0 [ 418.684325] ? trace_hardirqs_on+0xbd/0x310 [ 418.688663] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 418.694048] ? trace_hardirqs_off_caller+0x300/0x300 [ 418.699184] __x64_sys_clone+0xbf/0x150 [ 418.703206] do_syscall_64+0x1a3/0x800 [ 418.707140] ? syscall_return_slowpath+0x5f0/0x5f0 [ 418.712087] ? prepare_exit_to_usermode+0x232/0x3b0 [ 418.717133] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 418.722026] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 418.727242] RIP: 0033:0x45aa69 [ 418.730453] Code: ff 48 85 f6 0f 84 97 8d fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c 6e 8d fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 418.749366] RSP: 002b:00007fff32860c38 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 418.757074] RAX: ffffffffffffffda RBX: 00007fe2862b6700 RCX: 000000000045aa69 [ 418.764342] RDX: 00007fe2862b69d0 RSI: 00007fe2862b5db0 RDI: 00000000003d0f00 [ 418.771613] RBP: 00007fff32860e40 R08: 00007fe2862b6700 R09: 00007fe2862b6700 [ 418.778893] R10: 00007fe2862b69d0 R11: 0000000000000202 R12: 0000000000000000 [ 418.786171] R13: 00007fff32860cef R14: 00007fe2862b69c0 R15: 0000000000000001 [ 418.800472] memory: usage 307168kB, limit 307200kB, failcnt 719 17:56:03 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:56:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x03', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:56:03 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) 17:56:03 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x200000088004573a, &(0x7f0000000100)) 17:56:03 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x3000000000000000, 0x4000) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) r1 = socket$pptp(0x18, 0x1, 0x2) ioctl$PPPIOCSFLAGS(r1, 0x40047459, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) pread64(r0, 0x0, 0x0, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x102002700) [ 418.835093] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 418.873546] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 418.913121] Memory cgroup stats for /syz2: cache:0KB rss:256712KB rss_huge:235520KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:256844KB inactive_file:12KB active_file:16KB unevictable:0KB [ 418.944253] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor2,pid=10874,uid=0 [ 418.959619] Memory cgroup out of memory: Kill process 10874 (syz-executor2) score 1113 or sacrifice child [ 418.997962] device nr0 entered promiscuous mode [ 419.003972] Killed process 10874 (syz-executor2) total-vm:72576kB, anon-rss:2192kB, file-rss:35788kB, shmem-rss:0kB 17:56:04 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 419.089774] SELinux: security policydb version 15 (MLS) not backwards compatible [ 419.115758] sel_write_load: 22 callbacks suppressed [ 419.115763] SELinux: failed to load policy 17:56:04 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000006009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:56:04 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000006809000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 419.546325] SELinux: security policydb version 15 (MLS) not backwards compatible [ 419.576475] SELinux: failed to load policy 17:56:04 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x200000088004573b, &(0x7f0000000100)) 17:56:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x01', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:56:04 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) 17:56:04 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:56:04 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x200000088004573c, &(0x7f0000000100)) [ 419.815854] SELinux: security policydb version 15 (MLS) not backwards compatible [ 419.847992] SELinux: failed to load policy 17:56:04 executing program 5: ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000001200)={0x16, 0x36, 0x10, 0x11, 0xb, 0x7ff, 0x0, 0xa0}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f00000012c0)={0x0, 0x80000000000000}, &(0x7f0000001300)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000002480), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000040), 0x1000) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000001100), &(0x7f0000001180)=0xc) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000}}}, 0x90) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000011c0)=0x0) fcntl$setown(r0, 0x8, r1) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000001140), 0x4000) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000100)={0x80033d, 0x20000000209, 0x0, 0xffffffffffffffff}) r4 = dup2(r2, r3) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, 0x0) setsockopt$CAIFSO_REQ_PARAM(r4, 0x116, 0x80, &(0x7f0000001340)="a2115c141cccfeb476be60f5ffdbc02233bd464e8b4d58cc1eb0c159959a02cb4d0f604f0f1ce625846fe967ee4cdada9c21912c72bf2687294736e97a65900c7fc88a4bb7b45677fe271fd8dd9403d926d266002d83f14b91000647487f59a6cc3f716240158228d4dc9dd7091650bbf730342c9877a906f2dcf8b14068ed796939cdc251f9ea", 0x87) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f0000000000)={0x9cf0000008, 0x9}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) [ 419.903851] SELinux: security policydb version 15 (MLS) not backwards compatible [ 419.920860] device nr0 entered promiscuous mode 17:56:04 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 419.962613] SELinux: failed to load policy 17:56:05 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000006c09000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 420.203031] SELinux: security policydb version 15 (MLS) not backwards compatible [ 420.280563] syz-executor2 invoked oom-killer: gfp_mask=0x7080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 420.350250] SELinux: failed to load policy [ 420.358261] CPU: 1 PID: 16178 Comm: syz-executor2 Not tainted 5.0.0-rc4 #49 [ 420.363261] SELinux: security policydb version 15 (MLS) not backwards compatible [ 420.365381] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 420.365387] Call Trace: [ 420.365410] dump_stack+0x1db/0x2d0 [ 420.365429] ? dump_stack_print_info.cold+0x20/0x20 [ 420.365458] dump_header+0x1e6/0x116c [ 420.397336] ? add_lock_to_list.isra.0+0x450/0x450 [ 420.402295] ? print_usage_bug+0xd0/0xd0 [ 420.406365] ? pagefault_out_of_memory+0x1a1/0x1a1 [ 420.411305] ? ___ratelimit+0x37c/0x686 [ 420.415292] ? mark_held_locks+0xb1/0x100 [ 420.419448] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 420.424562] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 420.429703] ? lockdep_hardirqs_on+0x415/0x5d0 [ 420.434291] ? trace_hardirqs_on+0xbd/0x310 [ 420.435576] SELinux: failed to load policy [ 420.438620] ? kasan_check_read+0x11/0x20 [ 420.438637] ? ___ratelimit+0x37c/0x686 [ 420.438660] ? trace_hardirqs_off_caller+0x300/0x300 [ 420.438678] ? do_raw_spin_trylock+0x270/0x270 [ 420.460667] ? trace_hardirqs_on_caller+0x310/0x310 [ 420.465695] ? lock_acquire+0x1db/0x570 [ 420.469688] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 420.474799] ? ___ratelimit+0xac/0x686 [ 420.478713] ? idr_get_free+0xee0/0xee0 [ 420.482694] ? lockdep_hardirqs_on+0x415/0x5d0 [ 420.487294] oom_kill_process.cold+0x10/0x9d4 [ 420.491798] ? cgroup_procs_next+0x70/0x70 [ 420.496044] ? _raw_spin_unlock_irq+0x5e/0x90 [ 420.500562] ? oom_badness+0xa50/0xa50 [ 420.504507] ? oom_evaluate_task+0x540/0x540 [ 420.508929] ? mem_cgroup_iter_break+0x30/0x30 [ 420.513516] ? mutex_trylock+0x2d0/0x2d0 [ 420.517583] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 420.523149] ? rcu_read_unlock_special+0x380/0x380 [ 420.528119] out_of_memory+0x885/0x1420 [ 420.532138] ? mem_cgroup_iter+0x508/0xf30 [ 420.536395] ? oom_killer_disable+0x340/0x340 [ 420.540898] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 420.546008] ? lock_acquire+0x1db/0x570 [ 420.550002] mem_cgroup_out_of_memory+0x160/0x210 [ 420.554850] ? do_raw_spin_unlock+0xa0/0x330 [ 420.559268] ? memcg_memory_event+0x40/0x40 [ 420.563589] ? do_raw_spin_trylock+0x270/0x270 [ 420.568191] ? _raw_spin_unlock+0x2d/0x50 [ 420.572352] try_charge+0x12a9/0x19b0 [ 420.576165] ? lock_downgrade+0x910/0x910 [ 420.580323] ? kasan_check_read+0x11/0x20 [ 420.584485] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 420.589331] ? get_mem_cgroup_from_mm+0x1cd/0x420 [ 420.594183] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 420.599758] ? lock_downgrade+0x910/0x910 [ 420.603908] ? kasan_check_read+0x11/0x20 [ 420.608062] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 420.613343] ? rcu_read_unlock_special+0x380/0x380 [ 420.618302] ? get_mem_cgroup_from_mm+0x1ea/0x420 [ 420.623163] memcg_kmem_charge_memcg+0x7c/0x130 [ 420.627838] ? memcg_kmem_put_cache+0xb0/0xb0 [ 420.632382] ? lock_release+0xc40/0xc40 [ 420.636401] memcg_kmem_charge+0x13b/0x340 [ 420.640638] __alloc_pages_nodemask+0x7b8/0xdc0 [ 420.645337] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 420.650359] ? rcu_pm_notify+0xd0/0xd0 [ 420.654263] ? rcu_read_lock_sched_held+0x110/0x130 [ 420.659281] ? kmem_cache_alloc_node+0x347/0x710 [ 420.664069] copy_process+0x847/0x8860 [ 420.667964] ? find_held_lock+0x35/0x120 [ 420.672031] ? try_to_wake_up+0xf9/0x1480 [ 420.676186] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 420.681295] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 420.686408] ? preempt_schedule+0x4b/0x60 [ 420.690558] ? preempt_schedule_common+0x4f/0xe0 [ 420.695334] ? __cleanup_sighand+0x70/0x70 [ 420.699568] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 420.704706] ? try_to_wake_up+0xf9/0x1480 [ 420.708883] ? migrate_swap_stop+0x920/0x920 [ 420.713295] ? futex_wake+0x62c/0x7b0 [ 420.717098] ? lock_acquire+0x1db/0x570 [ 420.721108] ? kasan_check_read+0x11/0x20 [ 420.725285] ? do_raw_spin_unlock+0xa0/0x330 [ 420.729698] ? do_raw_spin_trylock+0x270/0x270 [ 420.734286] ? print_usage_bug+0xd0/0xd0 [ 420.738357] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 420.743553] ? drop_futex_key_refs.isra.0+0x6f/0xf0 [ 420.748583] ? __lock_acquire+0x572/0x4a30 [ 420.752826] ? get_futex_key+0x2050/0x2050 [ 420.757078] ? mark_held_locks+0x100/0x100 [ 420.761330] ? do_futex+0x1b0/0x2910 [ 420.765052] ? save_stack+0xa9/0xd0 [ 420.768692] ? save_stack+0x45/0xd0 [ 420.772320] ? __kasan_slab_free+0x102/0x150 [ 420.776734] ? add_lock_to_list.isra.0+0x450/0x450 [ 420.781677] ? add_lock_to_list.isra.0+0x450/0x450 [ 420.786618] ? exit_robust_list+0x290/0x290 [ 420.790952] ? __might_fault+0x12b/0x1e0 [ 420.795019] ? find_held_lock+0x35/0x120 [ 420.799086] ? __might_fault+0x12b/0x1e0 [ 420.803159] ? lock_acquire+0x1db/0x570 [ 420.807155] ? lock_downgrade+0x910/0x910 [ 420.811306] ? lock_release+0xc40/0xc40 [ 420.815296] ? trace_hardirqs_off_caller+0x300/0x300 [ 420.820408] _do_fork+0x1a9/0x1170 [ 420.823961] ? fork_idle+0x1d0/0x1d0 [ 420.827685] ? kasan_check_read+0x11/0x20 [ 420.831840] ? _copy_to_user+0xc9/0x120 [ 420.835825] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 420.841395] ? put_timespec64+0x115/0x1b0 [ 420.845546] ? nsecs_to_jiffies+0x30/0x30 [ 420.849700] ? do_syscall_64+0x8c/0x800 [ 420.853687] ? do_syscall_64+0x8c/0x800 [ 420.857684] ? lockdep_hardirqs_on+0x415/0x5d0 [ 420.862273] ? trace_hardirqs_on+0xbd/0x310 [ 420.866599] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 420.872152] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 420.877526] ? trace_hardirqs_off_caller+0x300/0x300 [ 420.882643] __x64_sys_clone+0xbf/0x150 [ 420.886632] do_syscall_64+0x1a3/0x800 [ 420.890537] ? syscall_return_slowpath+0x5f0/0x5f0 [ 420.895471] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 420.900495] ? __switch_to_asm+0x34/0x70 [ 420.904565] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 420.909425] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 420.914618] RIP: 0033:0x458099 [ 420.917837] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 420.936736] RSP: 002b:00007fe2862d6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 420.944443] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000458099 [ 420.951738] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0020002102001fff [ 420.959011] RBP: 000000000073bf00 R08: ffffffffffffffff R09: 0000000000000000 [ 420.966292] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2862d76d4 [ 420.973560] R13: 00000000004be480 R14: 00000000004cea40 R15: 00000000ffffffff 17:56:05 executing program 5: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x80000, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000440)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000a80)={{{@in6=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@initdev}}, &(0x7f0000000700)=0x100000047) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000180)='./file1\x00', 0x7, 0x4, &(0x7f00000003c0)=[{&(0x7f00000001c0)="0c8c886dad998587757d78a8f9", 0xd, 0x7}, {&(0x7f0000000200)="6de45afa27c634c4e0d99f21a18ec5171fc793a27f7c3e0f2da0defa853e5593949f057083e4416914042f5cdabd2c570c8aba164217e34ad927e9f8b94bd0e0bc43bae96a14da9df9d5c24bb83d9eb6d0a59c41dcb154b17ed77723356a550a30c297aebb16b9b28c41de12f5d1137fa85335939f90515a70caf9d64102c58d57cfaedd0bced6d4d68bb7d2914086f7e2a3c04bbfce42", 0x97, 0x3f}, {&(0x7f00000002c0)="d5ec6986d1cd32f406ece10e5ac8f77005b7fbd4636bbb12281a51915adca54b0a92ed3cf8e77145b98abbee8a8fa00a365d77c160044751a24ae382e4674ccbd870695ef12c", 0x46, 0xffffffffffffff65}, {&(0x7f0000000340)="ee7d3bb6c20acc58c5e1a90a7fcbb31096f4cf6e02db0d8427c1a3bf388f023595940332d7bbca0eeab23f9f4e257f11a81fcedaeaffd5e5db6c11403a9bc17e68703ddc7a9a35fd6044385cf451673249e9826c56ab055db312f5ab4ab235", 0x5f, 0x400}], 0x20000, &(0x7f00000007c0)={[{@qnoenforce='qnoenforce'}, {@inode32='inode32'}, {@filestreams='filestreams'}, {@gquota='gquota'}, {@dax='dax'}, {@lazytime='lazytime'}, {@uquota='uquota'}, {@nobarrier='nobarrier'}, {@bsdgroups='bsdgroups'}], [{@euid_gt={'euid>', r1}}, {@hash='hash'}, {@uid_gt={'uid>', r2}}, {@dont_measure='dont_measure'}, {@euid_gt={'euid>'}}]}) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f00000000c0)={0x4, &(0x7f0000000080)=[{0x9, 0x101, 0x80}, {0x4, 0x2, 0x100000001, 0x83}, {0x8, 0xff, 0x5, 0x9}, {0x3f, 0x0, 0x101, 0x6}]}) [ 420.999989] memory: usage 307196kB, limit 307200kB, failcnt 758 [ 421.008444] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 421.038621] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 421.055326] Memory cgroup stats for /syz2: cache:0KB rss:256600KB rss_huge:235520KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:256756KB inactive_file:16KB active_file:16KB unevictable:0KB [ 421.116464] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor2,pid=10894,uid=0 17:56:06 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000300)={0x56aa, 0xd, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000009000/0x1000)=nil, 0x1000, 0x0, 0x6052, r1, 0x0) [ 421.162957] Memory cgroup out of memory: Kill process 10894 (syz-executor2) score 1113 or sacrifice child [ 421.193511] Killed process 10894 (syz-executor2) total-vm:72576kB, anon-rss:2192kB, file-rss:35788kB, shmem-rss:0kB 17:56:06 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x200000088004573d, &(0x7f0000000100)) 17:56:06 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:56:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x02', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) [ 421.306688] x86/PAT: syz-executor5:16193 map pfn RAM range req write-combining for [mem 0x4b55e000-0x4b55efff], got write-back [ 421.332413] syz-executor2 invoked oom-killer: gfp_mask=0x7080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 421.366554] CPU: 1 PID: 16176 Comm: syz-executor2 Not tainted 5.0.0-rc4 #49 [ 421.373674] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 421.383028] Call Trace: [ 421.385619] dump_stack+0x1db/0x2d0 [ 421.389279] ? dump_stack_print_info.cold+0x20/0x20 [ 421.394316] dump_header+0x1e6/0x116c [ 421.398127] ? add_lock_to_list.isra.0+0x450/0x450 [ 421.403071] ? print_usage_bug+0xd0/0xd0 [ 421.407135] ? pagefault_out_of_memory+0x1a1/0x1a1 [ 421.412094] ? ___ratelimit+0x37c/0x686 [ 421.416081] ? mark_held_locks+0xb1/0x100 [ 421.420240] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 421.425350] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 421.430460] ? lockdep_hardirqs_on+0x415/0x5d0 [ 421.435046] ? trace_hardirqs_on+0xbd/0x310 [ 421.439376] ? kasan_check_read+0x11/0x20 [ 421.443527] ? ___ratelimit+0x37c/0x686 [ 421.447510] ? trace_hardirqs_off_caller+0x300/0x300 [ 421.452614] ? do_raw_spin_trylock+0x270/0x270 [ 421.457204] ? trace_hardirqs_on_caller+0x310/0x310 [ 421.462225] ? lock_acquire+0x1db/0x570 [ 421.466230] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 421.471337] ? ___ratelimit+0xac/0x686 [ 421.475233] ? idr_get_free+0xee0/0xee0 [ 421.479205] ? lockdep_hardirqs_on+0x415/0x5d0 [ 421.483799] oom_kill_process.cold+0x10/0x9d4 [ 421.488329] ? cgroup_procs_next+0x70/0x70 [ 421.492576] ? _raw_spin_unlock_irq+0x5e/0x90 [ 421.497075] ? oom_badness+0xa50/0xa50 [ 421.500973] ? oom_evaluate_task+0x540/0x540 [ 421.505385] ? mem_cgroup_iter_break+0x30/0x30 [ 421.509972] ? mutex_trylock+0x2d0/0x2d0 [ 421.514035] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 421.519594] ? rcu_read_unlock_special+0x380/0x380 [ 421.524538] out_of_memory+0x885/0x1420 [ 421.528517] ? mem_cgroup_iter+0x508/0xf30 [ 421.532770] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 421.537886] ? oom_killer_disable+0x340/0x340 [ 421.542393] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 421.547515] ? lock_acquire+0x1db/0x570 [ 421.551535] mem_cgroup_out_of_memory+0x160/0x210 [ 421.556383] ? do_raw_spin_unlock+0xa0/0x330 [ 421.560799] ? memcg_memory_event+0x40/0x40 [ 421.565122] ? do_raw_spin_trylock+0x270/0x270 [ 421.569724] ? _raw_spin_unlock+0x2d/0x50 [ 421.573883] try_charge+0xd44/0x19b0 [ 421.577613] ? lock_downgrade+0x910/0x910 [ 421.581780] ? kasan_check_read+0x11/0x20 [ 421.585966] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 421.590808] ? get_mem_cgroup_from_mm+0x1cd/0x420 [ 421.595658] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 421.601198] ? lock_downgrade+0x910/0x910 [ 421.605343] ? kasan_check_read+0x11/0x20 [ 421.609512] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 421.614794] ? rcu_read_unlock_special+0x380/0x380 [ 421.619755] ? get_mem_cgroup_from_mm+0x1ea/0x420 [ 421.624620] memcg_kmem_charge_memcg+0x7c/0x130 [ 421.629297] ? memcg_kmem_put_cache+0xb0/0xb0 [ 421.633793] ? lock_release+0xc40/0xc40 [ 421.637814] memcg_kmem_charge+0x13b/0x340 [ 421.642062] __alloc_pages_nodemask+0x7b8/0xdc0 [ 421.646769] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 421.651785] ? rcu_pm_notify+0xd0/0xd0 [ 421.655691] ? rcu_read_lock_sched_held+0x110/0x130 [ 421.660718] ? kmem_cache_alloc_node+0x347/0x710 [ 421.665477] ? print_usage_bug+0xd0/0xd0 [ 421.669552] copy_process+0x847/0x8860 [ 421.673446] ? print_usage_bug+0xd0/0xd0 [ 421.677518] ? rcu_read_unlock+0x16/0x60 [ 421.681590] ? __lock_acquire+0x572/0x4a30 [ 421.685826] ? mark_held_locks+0x100/0x100 [ 421.690090] ? __cleanup_sighand+0x70/0x70 [ 421.694334] ? mark_held_locks+0x100/0x100 [ 421.698581] ? find_held_lock+0x35/0x120 [ 421.702678] ? mark_held_locks+0x100/0x100 [ 421.706952] ? delayacct_end+0xc9/0x100 [ 421.710962] ? add_lock_to_list.isra.0+0x450/0x450 [ 421.715899] ? lock_acquire+0x1db/0x570 [ 421.719882] ? add_lock_to_list.isra.0+0x450/0x450 [ 421.724813] ? find_held_lock+0x35/0x120 [ 421.728875] ? print_usage_bug+0xd0/0xd0 [ 421.732960] ? psi_memstall_leave+0x1f8/0x280 [ 421.737457] ? find_held_lock+0x35/0x120 [ 421.741533] ? __lock_acquire+0x572/0x4a30 [ 421.745771] ? _raw_spin_unlock_irq+0x28/0x90 [ 421.750270] ? _raw_spin_unlock_irq+0x28/0x90 [ 421.754767] ? lockdep_hardirqs_on+0x415/0x5d0 [ 421.759358] ? trace_hardirqs_on+0xbd/0x310 [ 421.763704] ? mark_held_locks+0x100/0x100 [ 421.767943] ? check_preemption_disabled+0x48/0x290 [ 421.772978] ? rcu_lockdep_current_cpu_online+0x1aa/0x220 [ 421.778521] ? rcu_pm_notify+0xd0/0xd0 [ 421.782423] ? add_lock_to_list.isra.0+0x450/0x450 [ 421.787353] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 421.792898] ? try_to_free_mem_cgroup_pages+0x597/0xcd0 [ 421.798266] ? lockdep_hardirqs_on+0x415/0x5d0 [ 421.802857] ? try_to_free_pages+0xb70/0xb70 [ 421.807275] ? percpu_ref_put_many+0x129/0x270 [ 421.811872] ? blkcg_maybe_throttle_current+0x75e/0x1400 [ 421.817329] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 421.822879] _do_fork+0x1a9/0x1170 [ 421.826445] ? fork_idle+0x1d0/0x1d0 [ 421.830184] ? trace_hardirqs_off+0xb8/0x310 [ 421.834596] ? get_mctgt_type_thp.isra.0+0x4c0/0x4c0 [ 421.839704] ? prepare_exit_to_usermode+0x32e/0x3b0 [ 421.844727] ? do_syscall_64+0x8c/0x800 [ 421.848708] ? do_syscall_64+0x8c/0x800 [ 421.852692] ? lockdep_hardirqs_on+0x415/0x5d0 [ 421.857279] ? trace_hardirqs_on+0xbd/0x310 [ 421.861606] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 421.866973] ? trace_hardirqs_off_caller+0x300/0x300 [ 421.872090] __x64_sys_clone+0xbf/0x150 [ 421.876072] do_syscall_64+0x1a3/0x800 [ 421.879967] ? syscall_return_slowpath+0x5f0/0x5f0 [ 421.884904] ? prepare_exit_to_usermode+0x232/0x3b0 [ 421.889935] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 421.894794] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 421.899987] RIP: 0033:0x45aa69 [ 421.903201] Code: ff 48 85 f6 0f 84 97 8d fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c 6e 8d fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 421.922106] RSP: 002b:00007fff32860c38 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 421.929825] RAX: ffffffffffffffda RBX: 00007fe286295700 RCX: 000000000045aa69 [ 421.937094] RDX: 00007fe2862959d0 RSI: 00007fe286294db0 RDI: 00000000003d0f00 [ 421.944371] RBP: 00007fff32860e40 R08: 00007fe286295700 R09: 00007fe286295700 [ 421.951642] R10: 00007fe2862959d0 R11: 0000000000000202 R12: 0000000000000000 [ 421.958916] R13: 00007fff32860cef R14: 00007fe2862959c0 R15: 0000000000000002 17:56:06 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) [ 421.968938] x86/PAT: syz-executor5:16195 map pfn RAM range req write-combining for [mem 0x4b55e000-0x4b55efff], got write-back [ 421.980893] memory: usage 304972kB, limit 307200kB, failcnt 758 [ 422.019420] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 422.045567] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 17:56:07 executing program 5: pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) io_setup(0x7, &(0x7f00000000c0)=0x0) io_submit(r2, 0x2, &(0x7f0000000300)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x7, 0xfffffffffffffffa, r1, &(0x7f0000000100)="aa952ef23439526dcd86d55c341c0c2ec2a1bfbc745f81e003fe2b8add4af21382adc5280d6a20aa58d451b86dd51d4102352f6c99015a155d2436ca3fc6f5dae1564a30af74fb9f91f726a58aa938fb645bae65ce3219627c209b28077a51050eaeea230796b8c1fff974afd36fd850670785ff0c9654c3", 0x78, 0x70700000000000, 0x0, 0x3, r0}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x6, 0x3, r1, &(0x7f00000001c0)="c1df18b8af220d6d8c3490423bcff52cd372d3f34d0a6c07069b5089d6be48d1109c8d55099a3d72d3f6537abf19e6ca60593edf374a90f5753f11973d53b8c4c947321809baf675654476b38025717b267e4f77a8ab1326542db1f3ac9e8aa70672f58af43f0091ae223296dc5cfdab01dbe9436b1e25797ed92cad8d54a729de9f80bd05f31f146aa72fc6a5875e7e79cf580f862926f5d718890bc0faf8f0be50ea46f9de47f4cd20ab0169ef701483c212fd8721f4f9ed8aad59f6c9374e75720c1c2afe0acd1e8f103711e123b1f3b558834f43b47d09c802d2db9841a4e7a179dfdd6eee8146168f281d37f6", 0xef, 0x7, 0x0, 0x3, r0}]) ioctl$KDSETMODE(r0, 0x4b3a, 0x7fff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x7, 0x0) write$P9_RREMOVE(r3, &(0x7f0000000000)={0x7, 0x7b, 0x2}, 0xfffffffffffffeab) [ 422.055196] Memory cgroup stats for /syz2: cache:0KB rss:254544KB rss_huge:233472KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:254600KB inactive_file:12KB active_file:20KB unevictable:0KB [ 422.101490] device nr0 entered promiscuous mode 17:56:07 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:56:07 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x200000088004573e, &(0x7f0000000100)) [ 422.142041] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor2,pid=10993,uid=0 [ 422.172459] Memory cgroup out of memory: Kill process 10993 (syz-executor2) score 1113 or sacrifice child [ 422.220056] Killed process 10993 (syz-executor2) total-vm:72576kB, anon-rss:2192kB, file-rss:35788kB, shmem-rss:0kB 17:56:07 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x4) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x101000, 0x0) ioctl$TIOCMGET(r1, 0x5415, &(0x7f0000000100)) ioctl$VIDIOC_S_HW_FREQ_SEEK(r1, 0x40305652, &(0x7f0000000140)={0x1, 0x1, 0x33b4, 0xfee, 0x1, 0x6}) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000000080)={0x3, 0xbff, &(0x7f00000001c0)="0174d5c26d31a057519b219bcf9865d1e0c57d377bee7f475ab0fb8b402d7749fc9f97bdb749ad4c12a987ebc6851a7dcc5fc5a074c50ad7ef2c4d1e2deca7e21e1822c731fde37324c587c1596537e9600120a8be6f2d54b44b7e2fa18ad79a7c2c6440c603f86f4a4d896bd98f598ea543bb43f6e6131a4f8807c74533e41ea96b80ee3a73b004b3ff5ca7d934e163cab1eb1253cb3e179bc20a9e7531b622ec22c3ffc6c44f0cabaa8e194aed9fca", &(0x7f0000000280)="921814df4e3bd1004b97d2f179a51732227d346d935d54769621dfa31eeee017e93e7b5c2d44a6f3d0d27bbac24211c6703bfb6fabb3d667ced104f753aae4b5705969742c21b8e294ba4f3b292387b2b83233d4f05c62ad6c78edf8a9b00e0b2985e3e75e0b1d313996861f18d794718ed66aa77647f437fa506384a84a556d384c58396f2b2a62370dd3f2a7b15da1006f69f2de49c2209b289af4ad7e6fa1f98679cef30fb21a915c96d80be0b47be0c1a53a8dadf22bb57932804cda8ec4a2937fc7c2b77c659325d004bfd21bf73c6968623a999effaf73595a384b5b5e2c8dc41ab677a98a51e7d9c69085fc", 0xb0, 0xef}) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10) accept4$packet(r1, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000003c0)=0x14, 0x80800) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) ioctl$TIOCGLCKTRMIOS(r1, 0x5456, &(0x7f0000000400)={0x0, 0x1, 0x9, 0x0, 0xb, 0x1, 0x5, 0x80000001, 0x400, 0x7, 0xfffffffffffffe00, 0x9a}) 17:56:07 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000007409000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 422.617744] SELinux: security policydb version 15 (MLS) not backwards compatible [ 422.660345] SELinux: failed to load policy [ 422.685713] SELinux: security policydb version 15 (MLS) not backwards compatible [ 422.710670] SELinux: failed to load policy 17:56:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\xc0', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:56:07 executing program 5: r0 = syz_open_dev$usb(0x0, 0x0, 0x20000) futex(0x0, 0x0, 0x2, &(0x7f00000004c0)={0x0, 0x989680}, 0x0, 0x0) uselib(&(0x7f0000000000)='./file0\x00') r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) bind$can_raw(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = syz_open_dev$dri(0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) close(r1) write$eventfd(r0, 0x0, 0x0) flock(r1, 0x0) semget$private(0x0, 0x0, 0x0) timer_delete(0x0) unshare(0x40000000) sendfile(0xffffffffffffffff, r3, &(0x7f0000000180), 0x9) fcntl$getownex(r2, 0x10, 0x0) 17:56:07 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:56:07 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000007a09000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:56:07 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) 17:56:07 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045741, &(0x7f0000000100)) [ 422.906474] IPVS: ftp: loaded support on port[0] = 21 [ 422.919515] SELinux: security policydb version 15 (MLS) not backwards compatible [ 422.933099] device nr0 entered promiscuous mode 17:56:07 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:56:07 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045742, &(0x7f0000000100)) [ 422.954783] SELinux: failed to load policy [ 422.992588] SELinux: security policydb version 15 (MLS) not backwards compatible [ 423.035525] SELinux: failed to load policy 17:56:08 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000200000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:56:08 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000400000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 423.157287] SELinux: security policydb version 15 (MLS) not backwards compatible [ 423.192589] SELinux: security policydb version 15 (MLS) not backwards compatible [ 423.329307] SELinux: security policydb version 15 (MLS) not backwards compatible [ 423.358277] SELinux: security policydb version 15 (MLS) not backwards compatible 17:56:08 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000003000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:56:08 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000005000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 423.532320] SELinux: security policydb version 15 (MLS) not backwards compatible [ 423.552426] SELinux: security policydb version 15 (MLS) not backwards compatible 17:56:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x03', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) [ 423.666132] SELinux: security policydb version 15 (MLS) not backwards compatible [ 423.713072] SELinux: security policydb version 15 (MLS) not backwards compatible 17:56:11 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:56:11 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045743, &(0x7f0000000100)) 17:56:11 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) 17:56:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:56:11 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@orlov='orlov'}]}) 17:56:11 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000006000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 426.765019] SELinux: security policydb version 15 (MLS) not backwards compatible [ 426.793042] sel_write_load: 8 callbacks suppressed [ 426.793047] SELinux: failed to load policy [ 426.805603] device nr0 entered promiscuous mode 17:56:11 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045744, &(0x7f0000000100)) 17:56:11 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 426.828636] SELinux: security policydb version 15 (MLS) not backwards compatible [ 426.854834] EXT4-fs (sda1): Ignoring removed orlov option [ 426.866221] SELinux: failed to load policy [ 426.875689] EXT4-fs (sda1): re-mounted. Opts: orlov, 17:56:11 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000007000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 426.939430] EXT4-fs (sda1): Ignoring removed orlov option [ 426.960339] XFS (loop4): Invalid superblock magic number [ 426.987357] EXT4-fs (sda1): re-mounted. Opts: orlov, [ 426.992370] SELinux: security policydb version 15 (MLS) not backwards compatible [ 427.017804] SELinux: failed to load policy [ 427.030235] SELinux: security policydb version 15 (MLS) not backwards compatible 17:56:11 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000209000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 427.049192] SELinux: failed to load policy 17:56:12 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x200000) write$P9_RSTATFS(r0, &(0x7f0000000340)={0x43, 0x9, 0x1, {0x100000001, 0x273, 0x0, 0xdd6, 0x1, 0xfffffffffffffffb, 0x7, 0x5, 0x5}}, 0x43) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000240)=ANY=[], 0x0, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) r1 = accept$inet(0xffffffffffffff9c, &(0x7f0000000100)={0x2, 0x0, @multicast2}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, 0x0, &(0x7f0000000300)) write$binfmt_misc(r0, &(0x7f00000003c0)={'syz0', "a4bda9a1f47eb6e94556d1da922fbc6bd676082cca9bad9bdc8d48527de211a5c4020973a2b90499f20076f6fa776a0009afdb73e4c949629485f7fb042e7db7f21284dc3ec06ae47148d93f4c42ecc26176b8348875a3cecf6799c6d359aa98d425b0f604ce7675000be8ff2fc0982bd4f451891486"}, 0x7a) r2 = accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000000), &(0x7f00000000c0)=0x60, 0x80800) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r2) socket$inet_smc(0x2b, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000540)) r3 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffb000/0x3000)=nil) shmctl$IPC_INFO(r3, 0x3, &(0x7f0000000580)=""/4096) r4 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x3, 0x2) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f00000001c0)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_GEM_CLOSE(r4, 0x40086409, &(0x7f0000000200)={r5}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x42, 0x0) [ 427.155773] SELinux: security policydb version 15 (MLS) not backwards compatible [ 427.198231] SELinux: failed to load policy 17:56:12 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000309000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 427.240336] SELinux: security policydb version 15 (MLS) not backwards compatible [ 427.278730] SELinux: failed to load policy [ 427.363115] SELinux: security policydb version 15 (MLS) not backwards compatible [ 427.400244] SELinux: failed to load policy 17:56:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x03', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:56:12 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045745, &(0x7f0000000100)) [ 427.423112] SELinux: security policydb version 15 (MLS) not backwards compatible 17:56:12 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) 17:56:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:56:12 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000409000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 427.464923] encrypted_key: insufficient parameters specified [ 427.473860] SELinux: failed to load policy 17:56:12 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r1, 0x4040ae70, &(0x7f0000000040)={0x100, 0x3, 0x100, 0x202}) r2 = eventfd2(0x0, 0x800) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f00000000c0)={0x0, 0x0, 0x0, r2}) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f00000001c0)={0x0, 0x0, 0x0, r2, 0x200000000000005}) socket$nl_generic(0x10, 0x3, 0x10) [ 427.506065] encrypted_key: insufficient parameters specified 17:56:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:56:12 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045746, &(0x7f0000000100)) [ 427.581811] device nr0 entered promiscuous mode [ 427.589760] SELinux: security policydb version 15 (MLS) not backwards compatible [ 427.640567] SELinux: failed to load policy 17:56:12 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000509000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 427.678923] SELinux: security policydb version 15 (MLS) not backwards compatible [ 427.710219] SELinux: failed to load policy 17:56:12 executing program 5: sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000480)={@remote, @broadcast}, 0x8) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) fcntl$getownex(r0, 0x10, 0x0) add_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000500)="73130baafebacd652b1c55a3d650c7c3249fabeb2bb8ef1aa6e60d0a2abd8976f81c7c0e806a3426e6a1366b51009e6752c2488e1a3a7f660c2e69172e66368322735089a920283b9b3c012b7d6b8e6c857275ee877a9614cb38cc548b4df923badf4fbdd7957819808918b2872591c48a38ce6b9b1de6ad6a3485bdc3047e2c29823467ca9699822ef09b", 0x8b, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000640)='keyring\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000600)={'syz', 0x2}, 0x0, 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fsetxattr$security_smack_entry(r2, &(0x7f0000000140)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x1) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) pwritev(r0, &(0x7f0000000c00)=[{&(0x7f0000000b40)="bd89501288fe41871e39bbabfc134308449f62c4bda4d46fb585bc955479485274de7bcdfde82228bf0a054d365146210ed42e03fb5b4d6c7f1c40ab51612b04ede743d9ea8a00a76b91e3276313f3c3df8aa4ad918ad1f9a587d9381cbfee4766109d378613391e0c8dd1d17075964f5ef90fc28302d3402fd541a5f4ebc10728ffde97ce4d70f249c02da6e08e", 0x8e}], 0x1, 0x4f) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x109000, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r3, 0x4c00, r3) syz_genetlink_get_family_id$tipc(0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x5, 0x4, 0x80, 0x0, 0x9, 0x10000, 0x2, 0x7d2, 0x6, 0x4, 0x4, 0x81, 0x23ea, 0x3, 0xffffffff7fffffff, 0x9, 0x3a7e, 0x0, 0x65, 0xfffffffffffffffd, 0x7fff, 0xa3c, 0x0, 0x80000000, 0x1, 0x101, 0x0, 0x2, 0x0, 0x7, 0x5ccd, 0x1f, 0x8001, 0x8, 0xffffffffffffffac, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x8000, 0x2, 0x5a, 0x7, 0xce, 0xffff, 0x4}, 0xffffffffffffffff, 0xd, r0, 0x2) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) 17:56:12 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000609000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 427.776877] SELinux: security policydb version 15 (MLS) not backwards compatible [ 427.794617] SELinux: security policydb version 15 (MLS) not backwards compatible 17:56:12 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000709000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 427.917078] SELinux: security policydb version 15 (MLS) not backwards compatible [ 428.197825] print_req_error: 58 callbacks suppressed [ 428.198016] print_req_error: I/O error, dev loop3, sector 512 flags 80700 [ 428.258464] syz-executor2 invoked oom-killer: gfp_mask=0x7080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 [ 428.282269] print_req_error: I/O error, dev loop3, sector 768 flags 80700 [ 428.283189] print_req_error: I/O error, dev loop3, sector 0 flags 1 [ 428.295985] buffer_io_error: 54 callbacks suppressed [ 428.295995] Buffer I/O error on dev loop3, logical block 0, lost async page write [ 428.322411] CPU: 0 PID: 16385 Comm: syz-executor2 Not tainted 5.0.0-rc4 #49 [ 428.329524] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 428.329530] Call Trace: [ 428.329552] dump_stack+0x1db/0x2d0 [ 428.329571] ? dump_stack_print_info.cold+0x20/0x20 [ 428.329598] dump_header+0x1e6/0x116c [ 428.350119] ? add_lock_to_list.isra.0+0x450/0x450 [ 428.350165] ? print_usage_bug+0xd0/0xd0 [ 428.350199] ? pagefault_out_of_memory+0x1a1/0x1a1 [ 428.350216] ? ___ratelimit+0x37c/0x686 17:56:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x03', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:56:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 428.350236] ? mark_held_locks+0xb1/0x100 [ 428.350253] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 428.350269] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 428.386213] ? lockdep_hardirqs_on+0x415/0x5d0 [ 428.390797] ? trace_hardirqs_on+0xbd/0x310 [ 428.395118] ? kasan_check_read+0x11/0x20 [ 428.399285] ? ___ratelimit+0x37c/0x686 [ 428.403265] ? trace_hardirqs_off_caller+0x300/0x300 [ 428.408375] ? do_raw_spin_trylock+0x270/0x270 [ 428.412997] ? trace_hardirqs_on_caller+0x310/0x310 [ 428.418028] ? lock_acquire+0x1db/0x570 [ 428.422020] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 428.427131] ? ___ratelimit+0xac/0x686 [ 428.431082] ? idr_get_free+0xee0/0xee0 [ 428.435062] ? lockdep_hardirqs_on+0x415/0x5d0 [ 428.439688] oom_kill_process.cold+0x10/0x9d4 [ 428.444198] ? cgroup_procs_next+0x70/0x70 [ 428.448443] ? _raw_spin_unlock_irq+0x5e/0x90 [ 428.452949] ? oom_badness+0xa50/0xa50 [ 428.456849] ? oom_evaluate_task+0x540/0x540 [ 428.461272] ? mem_cgroup_iter_break+0x30/0x30 [ 428.465857] ? mutex_trylock+0x2d0/0x2d0 [ 428.469927] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 428.475483] ? rcu_read_unlock_special+0x380/0x380 [ 428.480421] out_of_memory+0x885/0x1420 [ 428.484404] ? mem_cgroup_iter+0x508/0xf30 [ 428.488649] ? oom_killer_disable+0x340/0x340 [ 428.493177] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 428.498286] ? lock_acquire+0x1db/0x570 [ 428.502278] mem_cgroup_out_of_memory+0x160/0x210 [ 428.507127] ? do_raw_spin_unlock+0xa0/0x330 [ 428.511554] ? memcg_memory_event+0x40/0x40 [ 428.515877] ? do_raw_spin_trylock+0x270/0x270 [ 428.520486] ? _raw_spin_unlock+0x2d/0x50 [ 428.524657] try_charge+0x12a9/0x19b0 [ 428.528462] ? lock_downgrade+0x910/0x910 [ 428.532626] ? kasan_check_read+0x11/0x20 [ 428.536783] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 428.541628] ? get_mem_cgroup_from_mm+0x1cd/0x420 [ 428.546476] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 428.552020] ? lock_downgrade+0x910/0x910 [ 428.556203] ? kasan_check_read+0x11/0x20 [ 428.560355] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 428.565654] ? rcu_read_unlock_special+0x380/0x380 [ 428.570596] ? get_mem_cgroup_from_mm+0x1ea/0x420 [ 428.575450] memcg_kmem_charge_memcg+0x7c/0x130 [ 428.580125] ? memcg_kmem_put_cache+0xb0/0xb0 [ 428.584662] ? lock_release+0xc40/0xc40 [ 428.588649] memcg_kmem_charge+0x13b/0x340 [ 428.592894] __alloc_pages_nodemask+0x7b8/0xdc0 [ 428.597569] ? do_page_fault+0xe6/0x7d8 [ 428.601549] ? page_fault+0x1e/0x30 [ 428.605194] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 428.610221] ? print_usage_bug+0xd0/0xd0 [ 428.614292] ? add_lock_to_list.isra.0+0x450/0x450 [ 428.619225] ? __lock_is_held+0xb6/0x140 [ 428.623300] ? add_lock_to_list.isra.0+0x450/0x450 [ 428.628277] ? __pmd_alloc+0x377/0x460 [ 428.632196] ? find_held_lock+0x35/0x120 [ 428.636268] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 428.641815] alloc_pages_current+0x107/0x210 [ 428.646249] pte_alloc_one+0x1b/0x1a0 [ 428.650050] __do_fault+0x413/0x7b0 [ 428.653685] ? do_raw_spin_unlock+0xa0/0x330 [ 428.658113] ? do_page_mkwrite+0x740/0x740 [ 428.662361] ? lockdep_init_map+0x10c/0x5b0 [ 428.666691] ? _raw_spin_unlock+0x2d/0x50 [ 428.670845] ? __pmd_alloc+0x37c/0x460 [ 428.674769] __handle_mm_fault+0x3500/0x55a0 [ 428.679216] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 428.684063] ? check_preemption_disabled+0x48/0x290 [ 428.689101] ? handle_mm_fault+0x3cc/0xc80 [ 428.693384] ? lock_downgrade+0x910/0x910 [ 428.697536] ? kasan_check_read+0x11/0x20 [ 428.701690] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 428.706975] ? rcu_read_unlock_special+0x380/0x380 [ 428.711912] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 428.717454] ? check_preemption_disabled+0x48/0x290 [ 428.722480] handle_mm_fault+0x4ec/0xc80 [ 428.726567] ? __handle_mm_fault+0x55a0/0x55a0 [ 428.731192] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 428.736750] ? vmacache_update+0x114/0x140 [ 428.741028] __do_page_fault+0x5da/0xd60 [ 428.745107] do_page_fault+0xe6/0x7d8 [ 428.748915] ? trace_hardirqs_on_caller+0xc0/0x310 [ 428.753869] ? vmalloc_sync_all+0x30/0x30 [ 428.758020] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 428.763474] ? syscall_return_slowpath+0x5f0/0x5f0 [ 428.768414] ? prepare_exit_to_usermode+0x232/0x3b0 [ 428.773442] ? page_fault+0x8/0x30 [ 428.777019] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 428.781864] ? page_fault+0x8/0x30 [ 428.785412] page_fault+0x1e/0x30 [ 428.788865] RIP: 0033:0x4016f7 [ 428.792067] Code: 00 00 00 48 83 ec 08 48 8b 15 bd ed 64 00 48 8b 05 ae ed 64 00 48 39 d0 48 8d 8a 00 00 00 01 72 17 48 39 c8 73 12 48 8d 50 04 <89> 38 48 89 15 90 ed 64 00 48 83 c4 08 c3 48 89 c6 bf 80 76 4c 00 [ 428.810966] RSP: 002b:00007fff32860d60 EFLAGS: 00010287 [ 428.816327] RAX: 0000001b31c20000 RBX: 0000000000000003 RCX: 0000001b32c20000 [ 428.823594] RDX: 0000001b31c20004 RSI: 00007fff32860b10 RDI: 0000000000000000 [ 428.830860] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000004 [ 428.838128] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000000 [ 428.845404] R13: 0000000000000001 R14: 000000000000015c R15: 0000000000000002 [ 428.864209] memory: usage 307200kB, limit 307200kB, failcnt 795 17:56:13 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) 17:56:13 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045747, &(0x7f0000000100)) 17:56:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x22) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="a5"], 0x1) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000040)) ioctl$TUNGETFEATURES(r3, 0x800454cf, &(0x7f0000000080)) write$cgroup_subtree(r2, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0xda00) [ 428.890289] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 428.908467] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 428.919490] Memory cgroup stats for /syz2: cache:0KB rss:255148KB rss_huge:233472KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:255280KB inactive_file:4KB active_file:4KB unevictable:0KB [ 428.951916] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor2,pid=11005,uid=0 [ 428.973904] Memory cgroup out of memory: Kill process 11005 (syz-executor2) score 1113 or sacrifice child 17:56:13 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045748, &(0x7f0000000100)) 17:56:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 429.020079] Killed process 11005 (syz-executor2) total-vm:72576kB, anon-rss:2192kB, file-rss:35788kB, shmem-rss:0kB [ 429.058986] device nr0 entered promiscuous mode 17:56:14 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x9}, 0x48) r0 = socket$kcm(0xa, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0xf, 0x3}, 0x14) r1 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x3, 0x2) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f00000000c0)=0x1) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) [ 429.161129] SELinux: security policydb version 15 (MLS) not backwards compatible [ 429.210337] SELinux: security policydb version 15 (MLS) not backwards compatible 17:56:14 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000001009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 429.339692] SELinux: security policydb version 15 (MLS) not backwards compatible [ 429.378618] SELinux: security policydb version 15 (MLS) not backwards compatible 17:56:14 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000004809000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 429.538450] SELinux: security policydb version 15 (MLS) not backwards compatible [ 429.596236] SELinux: security policydb version 15 (MLS) not backwards compatible 17:56:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x03', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:56:14 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x200}], 0x30}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f00000023c0)=""/4096, 0x1037}], 0x1, 0x0, 0x7a}, 0xfffffffffffffffd) 17:56:14 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045749, &(0x7f0000000100)) 17:56:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:56:14 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b0") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) 17:56:14 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000004c09000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 429.794841] device nr0 entered promiscuous mode 17:56:14 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x200000088004574a, &(0x7f0000000100)) 17:56:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 429.823136] syz-executor2 invoked oom-killer: gfp_mask=0x6040c0(GFP_KERNEL|__GFP_COMP), order=1, oom_score_adj=1000 [ 429.872991] CPU: 1 PID: 16441 Comm: syz-executor2 Not tainted 5.0.0-rc4 #49 [ 429.880112] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 429.889474] Call Trace: [ 429.889501] dump_stack+0x1db/0x2d0 [ 429.889525] ? dump_stack_print_info.cold+0x20/0x20 [ 429.889560] dump_header+0x1e6/0x116c [ 429.895739] ? add_lock_to_list.isra.0+0x450/0x450 [ 429.895760] ? print_usage_bug+0xd0/0xd0 [ 429.895780] ? pagefault_out_of_memory+0x1a1/0x1a1 [ 429.895798] ? ___ratelimit+0x37c/0x686 [ 429.904600] ? mark_held_locks+0xb1/0x100 [ 429.904621] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 429.904637] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 429.904653] ? lockdep_hardirqs_on+0x415/0x5d0 [ 429.913622] ? trace_hardirqs_on+0xbd/0x310 [ 429.913639] ? kasan_check_read+0x11/0x20 [ 429.913663] ? ___ratelimit+0x37c/0x686 [ 429.913680] ? trace_hardirqs_off_caller+0x300/0x300 [ 429.913698] ? do_raw_spin_trylock+0x270/0x270 [ 429.926720] ? trace_hardirqs_on_caller+0x310/0x310 [ 429.926736] ? lock_acquire+0x1db/0x570 [ 429.926760] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 429.926777] ? ___ratelimit+0xac/0x686 [ 429.941527] ? idr_get_free+0xee0/0xee0 [ 429.941545] ? lockdep_hardirqs_on+0x415/0x5d0 [ 429.941573] oom_kill_process.cold+0x10/0x9d4 [ 429.941592] ? cgroup_procs_next+0x70/0x70 [ 429.941612] ? _raw_spin_unlock_irq+0x5e/0x90 [ 429.950070] ? oom_badness+0xa50/0xa50 [ 429.950093] ? oom_evaluate_task+0x540/0x540 [ 429.950111] ? mem_cgroup_iter_break+0x30/0x30 [ 429.950125] ? mutex_trylock+0x2d0/0x2d0 [ 429.950140] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 429.950184] ? rcu_read_unlock_special+0x380/0x380 [ 429.959257] out_of_memory+0x885/0x1420 [ 429.959276] ? mem_cgroup_iter+0x508/0xf30 [ 429.959298] ? oom_killer_disable+0x340/0x340 [ 429.959315] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 430.048756] ? lock_acquire+0x1db/0x570 [ 430.052747] mem_cgroup_out_of_memory+0x160/0x210 [ 430.057626] ? do_raw_spin_unlock+0xa0/0x330 [ 430.062046] ? memcg_memory_event+0x40/0x40 [ 430.066372] ? do_raw_spin_trylock+0x270/0x270 [ 430.070975] ? _raw_spin_unlock+0x2d/0x50 [ 430.075130] try_charge+0x12a9/0x19b0 [ 430.078952] ? check_preemption_disabled+0x48/0x290 [ 430.083980] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 430.088843] ? rcu_read_lock_sched_held+0x110/0x130 [ 430.093868] ? __alloc_pages_nodemask+0xaca/0xdc0 [ 430.098725] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 430.103754] ? ____cache_alloc_node+0x1be/0x1e0 [ 430.108433] ? cache_grow_begin+0x599/0x8c0 [ 430.112765] ? cache_grow_begin+0x599/0x8c0 [ 430.117096] memcg_kmem_charge_memcg+0x7c/0x130 [ 430.121816] ? memcg_kmem_put_cache+0xb0/0xb0 [ 430.126347] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 430.131893] ? __cpuset_node_allowed+0x19f/0x640 [ 430.136669] cache_grow_begin+0x25f/0x8c0 [ 430.140822] ? kasan_check_read+0x11/0x20 [ 430.144991] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 430.150548] ? mempolicy_slab_node+0x139/0x390 [ 430.155140] fallback_alloc+0x1fd/0x2d0 [ 430.159597] ____cache_alloc_node+0x1be/0x1e0 [ 430.164108] kmem_cache_alloc+0x1f5/0x710 [ 430.168281] copy_process+0x248f/0x8860 [ 430.172278] ? pmd_devmap_trans_unstable+0x1d0/0x1d0 [ 430.177386] ? add_lock_to_list.isra.0+0x450/0x450 [ 430.182328] ? reacquire_held_locks+0xfb/0x520 [ 430.186920] ? alloc_set_pte+0x134a/0x1df0 [ 430.191198] ? __cleanup_sighand+0x70/0x70 [ 430.195438] ? lock_downgrade+0x910/0x910 [ 430.199620] ? kasan_check_read+0x11/0x20 [ 430.203794] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 430.209077] ? rcu_read_unlock_special+0x380/0x380 [ 430.214026] ? filemap_map_pages+0xe14/0x1cb0 [ 430.218587] ? drop_futex_key_refs.isra.0+0x6f/0xf0 [ 430.223631] ? __lock_acquire+0x572/0x4a30 [ 430.227892] ? __handle_mm_fault+0x3fde/0x55a0 [ 430.232486] ? mark_held_locks+0x100/0x100 [ 430.236731] ? kasan_check_read+0x11/0x20 [ 430.240888] ? do_raw_spin_unlock+0xa0/0x330 [ 430.245308] ? do_raw_spin_trylock+0x270/0x270 [ 430.249901] ? add_mm_counter_fast.part.0+0x40/0x40 [ 430.254920] ? save_stack+0x45/0xd0 [ 430.258549] ? add_lock_to_list.isra.0+0x450/0x450 [ 430.263488] ? add_lock_to_list.isra.0+0x450/0x450 [ 430.268425] ? __handle_mm_fault+0x955/0x55a0 [ 430.272932] ? __might_fault+0x12b/0x1e0 [ 430.277002] ? find_held_lock+0x35/0x120 [ 430.281070] ? __might_fault+0x12b/0x1e0 [ 430.285143] ? lock_acquire+0x1db/0x570 [ 430.289144] ? lock_downgrade+0x910/0x910 [ 430.293311] ? lock_release+0xc40/0xc40 [ 430.297296] ? trace_hardirqs_off_caller+0x300/0x300 [ 430.302411] _do_fork+0x1a9/0x1170 [ 430.305964] ? fork_idle+0x1d0/0x1d0 [ 430.309690] ? kasan_check_read+0x11/0x20 [ 430.313842] ? _copy_to_user+0xc9/0x120 [ 430.317827] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 430.323374] ? put_timespec64+0x115/0x1b0 [ 430.327530] ? nsecs_to_jiffies+0x30/0x30 [ 430.331689] ? do_syscall_64+0x8c/0x800 [ 430.335680] ? do_syscall_64+0x8c/0x800 [ 430.339683] ? lockdep_hardirqs_on+0x415/0x5d0 [ 430.344274] ? trace_hardirqs_on+0xbd/0x310 [ 430.348610] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 430.354165] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 430.359537] ? trace_hardirqs_off_caller+0x300/0x300 [ 430.364649] __x64_sys_clone+0xbf/0x150 [ 430.368642] do_syscall_64+0x1a3/0x800 [ 430.372546] ? syscall_return_slowpath+0x5f0/0x5f0 [ 430.377487] ? prepare_exit_to_usermode+0x232/0x3b0 [ 430.382512] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 430.387365] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 430.392564] RIP: 0033:0x458099 [ 430.395762] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 430.414669] RSP: 002b:00007fe2862d6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 430.422378] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000458099 [ 430.429669] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0020002102001fff [ 430.436944] RBP: 000000000073bf00 R08: ffffffffffffffff R09: 0000000000000000 [ 430.444226] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2862d76d4 [ 430.451497] R13: 00000000004be480 R14: 00000000004cea40 R15: 00000000ffffffff [ 430.471571] memory: usage 307200kB, limit 307200kB, failcnt 850 [ 430.477825] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 430.485127] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 430.491775] Memory cgroup stats for /syz2: cache:0KB rss:255256KB rss_huge:233472KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:255228KB inactive_file:4KB active_file:0KB unevictable:0KB 17:56:15 executing program 5: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x9, 0x80000000) ioctl$VIDIOC_ENUMINPUT(r0, 0xc050561a, &(0x7f0000000200)={0x0, "003b24c7ae6a364a470b7b9abb0e7bf3b774c91ba36911caee0765c172e419d0"}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_buf(r1, 0x1, 0x1f, &(0x7f0000000000)=""/18, &(0x7f0000000040)=0x12) [ 430.513500] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor2,pid=11056,uid=0 [ 430.537395] Memory cgroup out of memory: Kill process 11056 (syz-executor2) score 1113 or sacrifice child [ 430.547549] Killed process 11056 (syz-executor2) total-vm:72576kB, anon-rss:2192kB, file-rss:35788kB, shmem-rss:0kB [ 430.624478] syz-executor2 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 430.649596] CPU: 1 PID: 16440 Comm: syz-executor2 Not tainted 5.0.0-rc4 #49 [ 430.656714] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 430.666065] Call Trace: [ 430.668671] dump_stack+0x1db/0x2d0 [ 430.672319] ? dump_stack_print_info.cold+0x20/0x20 [ 430.677356] dump_header+0x1e6/0x116c [ 430.681178] ? add_lock_to_list.isra.0+0x450/0x450 [ 430.686119] ? print_usage_bug+0xd0/0xd0 [ 430.690201] ? pagefault_out_of_memory+0x1a1/0x1a1 [ 430.695136] ? ___ratelimit+0x37c/0x686 [ 430.699131] ? mark_held_locks+0xb1/0x100 [ 430.703300] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 430.708410] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 430.713522] ? lockdep_hardirqs_on+0x415/0x5d0 [ 430.718117] ? trace_hardirqs_on+0xbd/0x310 [ 430.722453] ? kasan_check_read+0x11/0x20 [ 430.726608] ? ___ratelimit+0x37c/0x686 [ 430.730590] ? trace_hardirqs_off_caller+0x300/0x300 [ 430.735699] ? do_raw_spin_trylock+0x270/0x270 [ 430.740290] ? trace_hardirqs_on_caller+0x310/0x310 [ 430.745313] ? lock_acquire+0x1db/0x570 [ 430.749304] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 430.754415] ? ___ratelimit+0xac/0x686 [ 430.758315] ? idr_get_free+0xee0/0xee0 [ 430.762298] ? lockdep_hardirqs_on+0x415/0x5d0 [ 430.766901] oom_kill_process.cold+0x10/0x9d4 [ 430.771413] ? cgroup_procs_next+0x70/0x70 [ 430.775663] ? _raw_spin_unlock_irq+0x5e/0x90 [ 430.780175] ? oom_badness+0xa50/0xa50 [ 430.784081] ? oom_evaluate_task+0x540/0x540 [ 430.788500] ? mem_cgroup_iter_break+0x30/0x30 [ 430.793116] ? mutex_trylock+0x2d0/0x2d0 [ 430.797208] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 430.802775] ? rcu_read_unlock_special+0x380/0x380 [ 430.807720] out_of_memory+0x885/0x1420 [ 430.811718] ? mem_cgroup_iter+0x508/0xf30 [ 430.815978] ? oom_killer_disable+0x340/0x340 [ 430.820480] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 430.825617] ? lock_acquire+0x1db/0x570 [ 430.829632] mem_cgroup_out_of_memory+0x160/0x210 [ 430.834482] ? do_raw_spin_unlock+0xa0/0x330 [ 430.838895] ? memcg_memory_event+0x40/0x40 [ 430.843217] ? do_raw_spin_trylock+0x270/0x270 [ 430.847825] ? _raw_spin_unlock+0x2d/0x50 [ 430.851989] try_charge+0xd44/0x19b0 [ 430.855708] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 430.861258] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 430.866108] ? rcu_read_unlock_special+0x380/0x380 [ 430.871067] ? get_mem_cgroup_from_mm+0x1ea/0x420 [ 430.875915] ? get_mem_cgroup_from_page+0x190/0x190 [ 430.880949] ? rcu_read_lock_sched_held+0x110/0x130 [ 430.885989] mem_cgroup_try_charge+0x43a/0xdb0 [ 430.890592] ? mem_cgroup_protected+0xa10/0xa10 [ 430.895281] ? __anon_vma_prepare+0x36d/0x760 [ 430.899784] ? anon_vma_fork+0x880/0x880 [ 430.903849] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 430.909391] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 430.914942] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 430.919884] __handle_mm_fault+0x2594/0x55a0 [ 430.924309] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 430.929170] ? check_preemption_disabled+0x48/0x290 [ 430.934202] ? handle_mm_fault+0x3cc/0xc80 [ 430.938462] ? lock_downgrade+0x910/0x910 [ 430.942613] ? kasan_check_read+0x11/0x20 [ 430.946771] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 430.952056] ? rcu_read_unlock_special+0x380/0x380 [ 430.957027] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 430.962568] ? check_preemption_disabled+0x48/0x290 [ 430.967598] handle_mm_fault+0x4ec/0xc80 [ 430.971672] ? __handle_mm_fault+0x55a0/0x55a0 [ 430.976277] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 430.981815] ? vmacache_update+0x114/0x140 [ 430.986071] __do_page_fault+0x5da/0xd60 [ 430.990137] ? do_futex+0x2910/0x2910 [ 430.993969] do_page_fault+0xe6/0x7d8 [ 430.997775] ? trace_hardirqs_on_caller+0xc0/0x310 [ 431.002711] ? vmalloc_sync_all+0x30/0x30 [ 431.006861] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 431.012318] ? syscall_return_slowpath+0x5f0/0x5f0 [ 431.017258] ? prepare_exit_to_usermode+0x232/0x3b0 [ 431.022280] ? page_fault+0x8/0x30 [ 431.025836] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 431.030697] ? page_fault+0x8/0x30 [ 431.034252] page_fault+0x1e/0x30 [ 431.037705] RIP: 0033:0x40fabf [ 431.040905] Code: 0f 84 c8 02 00 00 48 83 bd 78 ff ff ff 00 0f 84 f9 04 00 00 48 8b 95 68 ff ff ff 44 89 95 38 ff ff ff 4c 8d ac 10 00 f7 ff ff <49> 89 85 90 06 00 00 49 8d 85 10 03 00 00 49 89 95 98 06 00 00 41 [ 431.059802] RSP: 002b:00007fff32860c80 EFLAGS: 00010206 [ 431.065173] RAX: 00007fe286296000 RBX: 0000000000020000 RCX: 00000000004580ea [ 431.072448] RDX: 0000000000021000 RSI: 0000000000021000 RDI: 0000000000000000 [ 431.079715] RBP: 00007fff32860d60 R08: ffffffffffffffff R09: 0000000000000000 [ 431.086988] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fff32860e40 [ 431.094261] R13: 00007fe2862b6700 R14: 0000000000000003 R15: 0000000000000001 17:56:16 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) r2 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x0, 0x410000) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000180)={0x5, &(0x7f0000000100)=[{0x400, 0xe27c, 0x3, 0x4}, {0x2000000000000000, 0xdb6, 0xfffffffffffffffd, 0x2}, {0x9, 0xf908, 0x4c34e302, 0x3f}, {0xfffffffffffffffa, 0xfffffffffffffffe, 0x0, 0x8}, {0x67e8, 0x1, 0x2, 0x9}]}) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 431.240056] memory: usage 304852kB, limit 307200kB, failcnt 850 [ 431.253213] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 431.278573] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 431.303395] Memory cgroup stats for /syz2: cache:0KB rss:253040KB rss_huge:231424KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:253072KB inactive_file:4KB active_file:0KB unevictable:0KB 17:56:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x0f', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:56:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 431.397481] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor2,pid=11151,uid=0 17:56:16 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x200000088004574b, &(0x7f0000000100)) [ 431.466469] Memory cgroup out of memory: Kill process 11151 (syz-executor2) score 1113 or sacrifice child 17:56:16 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b0") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) [ 431.513944] Killed process 11151 (syz-executor2) total-vm:72576kB, anon-rss:2192kB, file-rss:35788kB, shmem-rss:0kB 17:56:16 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x200000088004574c, &(0x7f0000000100)) 17:56:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 431.673301] device nr0 entered promiscuous mode [ 431.739118] SELinux: security policydb version 15 (MLS) not backwards compatible 17:56:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) [ 431.785362] SELinux: security policydb version 15 (MLS) not backwards compatible [ 431.854021] sel_write_load: 10 callbacks suppressed [ 431.854026] SELinux: failed to load policy 17:56:16 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000006009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:56:16 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) r2 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x0, 0x410000) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000180)={0x5, &(0x7f0000000100)=[{0x400, 0xe27c, 0x3, 0x4}, {0x2000000000000000, 0xdb6, 0xfffffffffffffffd, 0x2}, {0x9, 0xf908, 0x4c34e302, 0x3f}, {0xfffffffffffffffa, 0xfffffffffffffffe, 0x0, 0x8}, {0x67e8, 0x1, 0x2, 0x9}]}) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 431.983353] XFS (loop4): Invalid superblock magic number [ 432.015956] SELinux: security policydb version 15 (MLS) not backwards compatible [ 432.049023] SELinux: failed to load policy [ 432.083139] SELinux: security policydb version 15 (MLS) not backwards compatible 17:56:17 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000006809000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 432.123955] SELinux: failed to load policy [ 432.270198] SELinux: security policydb version 15 (MLS) not backwards compatible 17:56:17 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000006c09000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 432.330797] SELinux: failed to load policy [ 432.349693] SELinux: security policydb version 15 (MLS) not backwards compatible [ 432.358339] SELinux: failed to load policy 17:56:17 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) r2 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x0, 0x410000) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000180)={0x5, &(0x7f0000000100)=[{0x400, 0xe27c, 0x3, 0x4}, {0x2000000000000000, 0xdb6, 0xfffffffffffffffd, 0x2}, {0x9, 0xf908, 0x4c34e302, 0x3f}, {0xfffffffffffffffa, 0xfffffffffffffffe, 0x0, 0x8}, {0x67e8, 0x1, 0x2, 0x9}]}) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 432.424310] SELinux: security policydb version 15 (MLS) not backwards compatible [ 432.454312] SELinux: failed to load policy [ 432.472640] SELinux: security policydb version 15 (MLS) not backwards compatible [ 432.526510] SELinux: failed to load policy 17:56:17 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000007409000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 432.642018] SELinux: security policydb version 15 (MLS) not backwards compatible 17:56:17 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x200000088004574d, &(0x7f0000000100)) [ 432.693098] SELinux: failed to load policy 17:56:17 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 432.722047] SELinux: security policydb version 15 (MLS) not backwards compatible 17:56:17 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b0") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) 17:56:17 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000007a09000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 432.763919] SELinux: failed to load policy 17:56:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) [ 432.866934] device nr0 entered promiscuous mode 17:56:17 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x200000088004574e, &(0x7f0000000100)) 17:56:17 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 432.910745] SELinux: security policydb version 15 (MLS) not backwards compatible [ 432.969260] SELinux: failed to load policy [ 433.012630] SELinux: security policydb version 15 (MLS) not backwards compatible 17:56:17 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c000000000a000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:56:18 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c000000000b000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:56:18 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) r2 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x0, 0x410000) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000180)={0x5, &(0x7f0000000100)=[{0x400, 0xe27c, 0x3, 0x4}, {0x2000000000000000, 0xdb6, 0xfffffffffffffffd, 0x2}, {0x9, 0xf908, 0x4c34e302, 0x3f}, {0xfffffffffffffffa, 0xfffffffffffffffe, 0x0, 0x8}, {0x67e8, 0x1, 0x2, 0x9}]}) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 433.173773] SELinux: security policydb version 15 (MLS) not backwards compatible [ 433.186075] XFS (loop4): Invalid superblock magic number [ 433.211303] SELinux: security policydb version 15 (MLS) not backwards compatible [ 433.363037] SELinux: security policydb version 15 (MLS) not backwards compatible [ 433.453617] SELinux: security policydb version 15 (MLS) not backwards compatible 17:56:18 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c000000000c000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 433.633516] SELinux: security policydb version 15 (MLS) not backwards compatible 17:56:18 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x200000088004574f, &(0x7f0000000100)) 17:56:18 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:56:18 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c000000000d000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:56:18 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) 17:56:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:56:18 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045750, &(0x7f0000000100)) 17:56:18 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 433.884481] syz-executor2 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 433.936525] CPU: 0 PID: 16581 Comm: syz-executor2 Not tainted 5.0.0-rc4 #49 [ 433.943646] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 433.953108] Call Trace: [ 433.955733] dump_stack+0x1db/0x2d0 [ 433.959371] ? dump_stack_print_info.cold+0x20/0x20 [ 433.964420] dump_header+0x1e6/0x116c [ 433.968242] ? add_lock_to_list.isra.0+0x450/0x450 [ 433.973200] ? print_usage_bug+0xd0/0xd0 [ 433.977275] ? pagefault_out_of_memory+0x1a1/0x1a1 [ 433.982240] ? ___ratelimit+0x37c/0x686 17:56:18 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045751, &(0x7f0000000100)) [ 433.986249] ? mark_held_locks+0xb1/0x100 [ 433.990405] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 433.995519] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 434.000631] ? lockdep_hardirqs_on+0x415/0x5d0 [ 434.005225] ? trace_hardirqs_on+0xbd/0x310 [ 434.009568] ? kasan_check_read+0x11/0x20 [ 434.013735] ? ___ratelimit+0x37c/0x686 [ 434.013752] ? trace_hardirqs_off_caller+0x300/0x300 [ 434.013767] ? do_raw_spin_trylock+0x270/0x270 [ 434.013783] ? trace_hardirqs_on_caller+0x310/0x310 [ 434.013797] ? lock_acquire+0x1db/0x570 [ 434.013819] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 434.013837] ? ___ratelimit+0xac/0x686 [ 434.013855] ? idr_get_free+0xee0/0xee0 [ 434.013872] ? lockdep_hardirqs_on+0x415/0x5d0 [ 434.018420] XFS (loop4): Invalid superblock magic number [ 434.022939] oom_kill_process.cold+0x10/0x9d4 [ 434.022959] ? cgroup_procs_next+0x70/0x70 [ 434.022978] ? _raw_spin_unlock_irq+0x5e/0x90 [ 434.022994] ? oom_badness+0xa50/0xa50 [ 434.023014] ? oom_evaluate_task+0x540/0x540 [ 434.023031] ? mem_cgroup_iter_break+0x30/0x30 17:56:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:56:19 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045752, &(0x7f0000000100)) [ 434.023047] ? mutex_trylock+0x2d0/0x2d0 [ 434.045685] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 434.045715] ? rcu_read_unlock_special+0x380/0x380 [ 434.045739] out_of_memory+0x885/0x1420 [ 434.045756] ? mem_cgroup_iter+0x508/0xf30 [ 434.108444] ? oom_killer_disable+0x340/0x340 [ 434.112957] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 434.118069] ? lock_acquire+0x1db/0x570 [ 434.122065] mem_cgroup_out_of_memory+0x160/0x210 [ 434.126910] ? do_raw_spin_unlock+0xa0/0x330 [ 434.131330] ? memcg_memory_event+0x40/0x40 [ 434.135664] ? do_raw_spin_trylock+0x270/0x270 [ 434.140269] ? _raw_spin_unlock+0x2d/0x50 [ 434.144426] try_charge+0x12a9/0x19b0 [ 434.148237] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 434.153787] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 434.158781] ? rcu_read_unlock_special+0x380/0x380 [ 434.163727] ? get_mem_cgroup_from_mm+0x1ea/0x420 [ 434.168577] ? get_mem_cgroup_from_page+0x190/0x190 [ 434.173606] ? rcu_read_lock_sched_held+0x110/0x130 [ 434.178632] mem_cgroup_try_charge+0x43a/0xdb0 [ 434.183228] ? mem_cgroup_protected+0xa10/0xa10 [ 434.187909] ? lock_downgrade+0x910/0x910 [ 434.192089] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 434.197627] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 434.203187] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 434.208131] wp_page_copy+0x45a/0x1c30 [ 434.212049] ? swp_swapcount+0x540/0x540 [ 434.216121] ? pmd_pfn+0x1d0/0x1d0 [ 434.219687] ? find_held_lock+0x35/0x120 [ 434.223752] ? do_wp_page+0x70d/0x16b0 [ 434.227653] ? kasan_check_read+0x11/0x20 [ 434.231808] ? do_raw_spin_unlock+0xa0/0x330 [ 434.236223] ? do_raw_spin_trylock+0x270/0x270 [ 434.240814] ? __lock_acquire+0x572/0x4a30 [ 434.245060] do_wp_page+0x715/0x16b0 [ 434.248781] ? finish_mkwrite_fault+0x540/0x540 [ 434.253458] ? kasan_check_read+0x11/0x20 [ 434.257612] ? do_raw_spin_lock+0x156/0x360 [ 434.261944] ? rwlock_bug.part.0+0x90/0x90 [ 434.266204] ? pmd_devmap_trans_unstable+0x1d0/0x1d0 [ 434.271323] __handle_mm_fault+0x2c8e/0x55a0 [ 434.275747] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 434.280601] ? check_preemption_disabled+0x48/0x290 [ 434.285621] ? handle_mm_fault+0x3cc/0xc80 [ 434.289872] ? lock_downgrade+0x910/0x910 [ 434.294051] ? kasan_check_read+0x11/0x20 [ 434.298201] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 434.303484] ? rcu_read_unlock_special+0x380/0x380 [ 434.308419] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 434.313960] ? check_preemption_disabled+0x48/0x290 [ 434.318991] handle_mm_fault+0x4ec/0xc80 [ 434.323059] ? __handle_mm_fault+0x55a0/0x55a0 [ 434.327643] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 434.333194] ? vmacache_update+0x114/0x140 [ 434.337444] __do_page_fault+0x5da/0xd60 [ 434.341523] do_page_fault+0xe6/0x7d8 [ 434.345328] ? trace_hardirqs_on_caller+0xc0/0x310 [ 434.350271] ? vmalloc_sync_all+0x30/0x30 [ 434.354421] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 434.359884] ? prepare_exit_to_usermode+0x232/0x3b0 [ 434.364905] ? page_fault+0x8/0x30 [ 434.368450] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 434.373299] ? page_fault+0x8/0x30 [ 434.376847] page_fault+0x1e/0x30 [ 434.380298] RIP: 0033:0x40b6a2 [ 434.383523] Code: c0 0f 85 f0 00 00 00 41 83 c7 01 49 81 c5 a0 00 00 00 41 83 ff 10 0f 84 cf 00 00 00 41 80 7d f8 00 49 8d 5d f4 4d 89 ec 75 d1 <41> c6 45 f8 01 45 89 7d f4 4c 89 ef 41 c6 45 15 00 41 c7 45 fc 00 [ 434.402434] RSP: 002b:00007fff32860d70 EFLAGS: 00010246 [ 434.407797] RAX: 0000000000000000 RBX: 000000000073bf00 RCX: 00007fff32860e18 [ 434.415064] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000000 [ 434.422333] RBP: 0000000000000654 R08: 00007fff32860e20 R09: 00000000007400a8 [ 434.429601] R10: 0000000000000075 R11: 0000000000000246 R12: 000000000073bf0c 17:56:19 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x2}) r1 = memfd_create(&(0x7f0000000040)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae,\x9f9?\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x6) fallocate(r1, 0x0, 0x0, 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000006, 0x11, r1, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x400454d1, &(0x7f0000000080)) 17:56:19 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) [ 434.436870] R13: 000000000073bf0c R14: 0000000000000004 R15: 0000000000000000 [ 434.450378] memory: usage 307200kB, limit 307200kB, failcnt 898 [ 434.456457] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 434.475042] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 434.531352] Memory cgroup stats for /syz2: cache:0KB rss:253640KB rss_huge:231424KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:253788KB inactive_file:4KB active_file:0KB unevictable:0KB 17:56:19 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045753, &(0x7f0000000100)) 17:56:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) [ 434.650465] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor2,pid=11164,uid=0 [ 434.691438] Memory cgroup out of memory: Kill process 11164 (syz-executor2) score 1113 or sacrifice child [ 434.719346] Killed process 11164 (syz-executor2) total-vm:72576kB, anon-rss:2192kB, file-rss:35788kB, shmem-rss:0kB 17:56:19 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c000000000e000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:56:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:56:19 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) 17:56:19 executing program 5: r0 = socket$inet6(0xa, 0xf, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000780)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000840)=""/183, 0xb7}, &(0x7f0000000080), 0x3}, 0xffffffffffffff8c) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, &(0x7f0000000740)={0xfffffffffffffffd, 0x7fff}) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000000)={0x1, 0x1, 0x2, 0x2}) io_setup(0x0, &(0x7f0000000140)) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/loop-control\x00', 0x40000, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x202000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f00000000c0)={r0}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000180)={@local, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x5}, 0x20) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(0xffffffffffffffff, 0x40a45323, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000340)) 17:56:19 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045754, &(0x7f0000000100)) [ 434.754852] oom_reaper: reaped process 11164 (syz-executor2), now anon-rss:0kB, file-rss:34828kB, shmem-rss:0kB [ 434.756118] SELinux: security policydb version 15 (MLS) not backwards compatible 17:56:19 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045755, &(0x7f0000000100)) [ 434.854729] XFS (loop4): Invalid superblock magic number 17:56:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:56:19 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) 17:56:19 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045756, &(0x7f0000000100)) 17:56:19 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045757, &(0x7f0000000100)) 17:56:20 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045758, &(0x7f0000000100)) [ 435.119118] SELinux: security policydb version 15 (MLS) not backwards compatible [ 435.138773] SELinux: security policydb version 15 (MLS) not backwards compatible [ 435.445604] XFS (loop4): Invalid superblock magic number 17:56:20 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045759, &(0x7f0000000100)) 17:56:20 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000011000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:56:20 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:56:20 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) 17:56:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfsk', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:56:20 executing program 5: r0 = socket$inet6(0xa, 0xf, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000780)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000840)=""/183, 0xb7}, &(0x7f0000000080), 0x3}, 0xffffffffffffff8c) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, &(0x7f0000000740)={0xfffffffffffffffd, 0x7fff}) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000000)={0x1, 0x1, 0x2, 0x2}) io_setup(0x0, &(0x7f0000000140)) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/loop-control\x00', 0x40000, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x202000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f00000000c0)={r0}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000180)={@local, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x5}, 0x20) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(0xffffffffffffffff, 0x40a45323, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000340)) [ 435.599948] SELinux: security policydb version 15 (MLS) not backwards compatible 17:56:20 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x200000088004575a, &(0x7f0000000100)) [ 435.659980] SELinux: security policydb version 15 (MLS) not backwards compatible 17:56:20 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000012000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:56:20 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:56:20 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) 17:56:20 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x200000088004575b, &(0x7f0000000100)) [ 435.872600] SELinux: security policydb version 15 (MLS) not backwards compatible 17:56:20 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000004c0)="24000000200007031dfffd946f61050081000f005e00000000000000f1ffffff0400ff7e280000001100ffffba16a0aa1c0900040000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0xfffffffffffffff9, 0x5, 0x2, 0x6, 0x0, 0x3, 0x10, 0xb, 0x80000000, 0x9, 0x80, 0x100, 0x118a, 0x0, 0x6, 0x2, 0x80000000, 0x1000, 0x1f, 0x6, 0x9, 0x3, 0x4, 0x9, 0x4, 0x5, 0x9, 0x9, 0x0, 0x80000001, 0xfc, 0x738f2468, 0x0, 0x20, 0x1, 0x2a2, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000040)}, 0x42a0, 0x1200, 0xd5a, 0x7, 0x100000000, 0xfffffffffffffffb, 0xffffffffffff8000}, r2, 0x4, 0xffffffffffffffff, 0x1) 17:56:20 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000020000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:56:20 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:56:20 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x200000088004575c, &(0x7f0000000100)) 17:56:20 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00'}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) [ 435.999507] SELinux: security policydb version 15 (MLS) not backwards compatible [ 436.032678] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. 17:56:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x80', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:56:21 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x200000088004575d, &(0x7f0000000100)) 17:56:21 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c000000002e000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:56:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 436.056052] SELinux: security policydb version 15 (MLS) not backwards compatible [ 436.094546] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. 17:56:21 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000054000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 436.214913] SELinux: security policydb version 15 (MLS) not backwards compatible [ 436.316877] SELinux: security policydb version 15 (MLS) not backwards compatible [ 436.361523] SELinux: security policydb version 15 (MLS) not backwards compatible 17:56:21 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000002000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 436.533228] SELinux: security policydb version 15 (MLS) not backwards compatible [ 436.573955] SELinux: security policydb version 15 (MLS) not backwards compatible 17:56:21 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000003000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 436.747801] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. [ 436.766024] SELinux: security policydb version 15 (MLS) not backwards compatible [ 436.789182] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. 17:56:21 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000004c0)="24000000200007031dfffd946f61050081000f005e00000000000000f1ffffff0400ff7e280000001100ffffba16a0aa1c0900040000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0xfffffffffffffff9, 0x5, 0x2, 0x6, 0x0, 0x3, 0x10, 0xb, 0x80000000, 0x9, 0x80, 0x100, 0x118a, 0x0, 0x6, 0x2, 0x80000000, 0x1000, 0x1f, 0x6, 0x9, 0x3, 0x4, 0x9, 0x4, 0x5, 0x9, 0x9, 0x0, 0x80000001, 0xfc, 0x738f2468, 0x0, 0x20, 0x1, 0x2a2, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000040)}, 0x42a0, 0x1200, 0xd5a, 0x7, 0x100000000, 0xfffffffffffffffb, 0xffffffffffff8000}, r2, 0x4, 0xffffffffffffffff, 0x1) 17:56:21 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00'}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) 17:56:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:56:21 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x200000088004575e, &(0x7f0000000100)) 17:56:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:56:21 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000004000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:56:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 436.954796] SELinux: security policydb version 15 (MLS) not backwards compatible [ 436.968355] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. 17:56:21 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00'}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) 17:56:21 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x200000088004575f, &(0x7f0000000100)) [ 437.005268] sel_write_load: 20 callbacks suppressed [ 437.005274] SELinux: failed to load policy [ 437.017671] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. [ 437.022234] SELinux: security policydb version 15 (MLS) not backwards compatible [ 437.047949] XFS (loop4): Invalid superblock magic number 17:56:22 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000005000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 437.063817] SELinux: failed to load policy 17:56:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:56:22 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000004c0)="24000000200007031dfffd946f61050081000f005e00000000000000f1ffffff0400ff7e280000001100ffffba16a0aa1c0900040000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0xfffffffffffffff9, 0x5, 0x2, 0x6, 0x0, 0x3, 0x10, 0xb, 0x80000000, 0x9, 0x80, 0x100, 0x118a, 0x0, 0x6, 0x2, 0x80000000, 0x1000, 0x1f, 0x6, 0x9, 0x3, 0x4, 0x9, 0x4, 0x5, 0x9, 0x9, 0x0, 0x80000001, 0xfc, 0x738f2468, 0x0, 0x20, 0x1, 0x2a2, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000040)}, 0x42a0, 0x1200, 0xd5a, 0x7, 0x100000000, 0xfffffffffffffffb, 0xffffffffffff8000}, r2, 0x4, 0xffffffffffffffff, 0x1) 17:56:22 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045760, &(0x7f0000000100)) 17:56:22 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r2 = socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) [ 437.199248] SELinux: security policydb version 15 (MLS) not backwards compatible 17:56:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\xc0', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) [ 437.247077] SELinux: failed to load policy 17:56:22 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045761, &(0x7f0000000100)) 17:56:22 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000006000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:56:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 437.292127] SELinux: security policydb version 15 (MLS) not backwards compatible [ 437.300852] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. [ 437.319402] SELinux: failed to load policy [ 437.331733] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. 17:56:22 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000000001000000d52ac658e24ac5706c0442076579ad3feb16fccba5ae115de2a842354ddfe02ad82e6a717d85f0db630f9b23673dddb98354e16c921026"], 0x8}, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x8, 0x238000) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$KVM_HYPERV_EVENTFD(r0, 0x4018aebd, &(0x7f0000000240)={0x4, r1}) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000180)=""/23) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f00000002c0)) syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x1, 0x2) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x800000000000e6) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000100)={0x3}, 0x4) 17:56:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 437.414528] syz-executor2 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), order=0, oom_score_adj=0 [ 437.470258] CPU: 0 PID: 16840 Comm: syz-executor2 Not tainted 5.0.0-rc4 #49 [ 437.477403] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 437.477409] Call Trace: [ 437.477431] dump_stack+0x1db/0x2d0 [ 437.477450] ? dump_stack_print_info.cold+0x20/0x20 [ 437.477484] dump_header+0x1e6/0x116c [ 437.501795] ? add_lock_to_list.isra.0+0x450/0x450 [ 437.506735] ? print_usage_bug+0xd0/0xd0 [ 437.510807] ? pagefault_out_of_memory+0x1a1/0x1a1 [ 437.510826] ? ___ratelimit+0x37c/0x686 [ 437.510848] ? mark_held_locks+0xb1/0x100 [ 437.510866] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 437.510881] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 437.510896] ? lockdep_hardirqs_on+0x415/0x5d0 [ 437.510914] ? trace_hardirqs_on+0xbd/0x310 [ 437.510928] ? kasan_check_read+0x11/0x20 [ 437.510945] ? ___ratelimit+0x37c/0x686 [ 437.551194] ? trace_hardirqs_off_caller+0x300/0x300 [ 437.556322] ? do_raw_spin_trylock+0x270/0x270 [ 437.560919] ? trace_hardirqs_on_caller+0x310/0x310 [ 437.565955] ? lock_acquire+0x1db/0x570 [ 437.569946] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 437.575062] ? ___ratelimit+0xac/0x686 [ 437.578985] ? idr_get_free+0xee0/0xee0 [ 437.582963] ? lockdep_hardirqs_on+0x415/0x5d0 [ 437.587558] oom_kill_process.cold+0x10/0x9d4 [ 437.592081] ? cgroup_procs_next+0x70/0x70 [ 437.596328] ? _raw_spin_unlock_irq+0x5e/0x90 [ 437.600834] ? oom_badness+0xa50/0xa50 [ 437.604734] ? oom_evaluate_task+0x540/0x540 [ 437.609189] ? mem_cgroup_iter_break+0x30/0x30 [ 437.613806] ? mutex_trylock+0x2d0/0x2d0 [ 437.617869] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 437.623428] ? rcu_read_unlock_special+0x380/0x380 [ 437.628372] out_of_memory+0x885/0x1420 [ 437.632360] ? mem_cgroup_iter+0x508/0xf30 [ 437.636607] ? oom_killer_disable+0x340/0x340 [ 437.641111] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 437.646223] ? lock_acquire+0x1db/0x570 [ 437.650216] mem_cgroup_out_of_memory+0x160/0x210 [ 437.655067] ? do_raw_spin_unlock+0xa0/0x330 [ 437.659749] ? memcg_memory_event+0x40/0x40 [ 437.664076] ? do_raw_spin_trylock+0x270/0x270 [ 437.668674] ? _raw_spin_unlock+0x2d/0x50 [ 437.672841] try_charge+0x12a9/0x19b0 [ 437.676655] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 437.682210] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 437.687076] ? rcu_read_unlock_special+0x380/0x380 [ 437.692014] ? get_mem_cgroup_from_mm+0x1ea/0x420 [ 437.692034] ? get_mem_cgroup_from_page+0x190/0x190 [ 437.692057] ? rcu_read_lock_sched_held+0x110/0x130 [ 437.692077] mem_cgroup_try_charge+0x43a/0xdb0 [ 437.692098] ? mem_cgroup_protected+0xa10/0xa10 [ 437.692120] ? lock_downgrade+0x910/0x910 [ 437.692144] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 437.692175] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 437.692207] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 437.711616] wp_page_copy+0x45a/0x1c30 [ 437.711630] ? swp_swapcount+0x540/0x540 [ 437.711656] ? pmd_pfn+0x1d0/0x1d0 [ 437.711670] ? find_held_lock+0x35/0x120 [ 437.711686] ? do_wp_page+0x70d/0x16b0 [ 437.711712] ? kasan_check_read+0x11/0x20 [ 437.726021] ? do_raw_spin_unlock+0xa0/0x330 [ 437.726054] ? do_raw_spin_trylock+0x270/0x270 [ 437.726070] ? __lock_acquire+0x572/0x4a30 [ 437.726093] do_wp_page+0x715/0x16b0 [ 437.726114] ? finish_mkwrite_fault+0x540/0x540 [ 437.752103] ? kasan_check_read+0x11/0x20 [ 437.752119] ? do_raw_spin_lock+0x156/0x360 [ 437.752129] ? rwlock_bug.part.0+0x90/0x90 [ 437.752143] ? pmd_devmap_trans_unstable+0x1d0/0x1d0 [ 437.752184] __handle_mm_fault+0x2c8e/0x55a0 [ 437.752223] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 437.752252] ? check_preemption_disabled+0x48/0x290 [ 437.813767] ? handle_mm_fault+0x3cc/0xc80 [ 437.818022] ? lock_downgrade+0x910/0x910 [ 437.822188] ? kasan_check_read+0x11/0x20 [ 437.826344] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 437.831629] ? rcu_read_unlock_special+0x380/0x380 [ 437.836570] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 437.842118] ? check_preemption_disabled+0x48/0x290 [ 437.847182] handle_mm_fault+0x4ec/0xc80 [ 437.851259] ? __handle_mm_fault+0x55a0/0x55a0 [ 437.855851] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 437.861404] ? vmacache_update+0x114/0x140 [ 437.865672] __do_page_fault+0x5da/0xd60 [ 437.869757] do_page_fault+0xe6/0x7d8 [ 437.873569] ? trace_hardirqs_on_caller+0xc0/0x310 [ 437.878504] ? vmalloc_sync_all+0x30/0x30 [ 437.882657] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 437.888120] ? prepare_exit_to_usermode+0x232/0x3b0 [ 437.893177] ? page_fault+0x8/0x30 [ 437.896731] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 437.901585] ? page_fault+0x8/0x30 [ 437.905134] page_fault+0x1e/0x30 [ 437.908642] RIP: 0033:0x45669e 17:56:22 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045762, &(0x7f0000000100)) 17:56:22 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000000001000000d52ac658e24ac5706c0442076579ad3feb16fccba5ae115de2a842354ddfe02ad82e6a717d85f0db630f9b23673dddb98354e16c921026"], 0x8}, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x8, 0x238000) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$KVM_HYPERV_EVENTFD(r0, 0x4018aebd, &(0x7f0000000240)={0x4, r1}) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000180)=""/23) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f00000002c0)) syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x1, 0x2) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x800000000000e6) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000100)={0x3}, 0x4) 17:56:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:56:22 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000000001000000d52ac658e24ac5706c0442076579ad3feb16fccba5ae115de2a842354ddfe02ad82e6a717d85f0db630f9b23673dddb98354e16c921026"], 0x8}, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x8, 0x238000) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$KVM_HYPERV_EVENTFD(r0, 0x4018aebd, &(0x7f0000000240)={0x4, r1}) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000180)=""/23) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f00000002c0)) syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x1, 0x2) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x800000000000e6) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000100)={0x3}, 0x4) [ 437.911856] Code: 00 00 85 c0 41 89 c5 0f 85 fc 00 00 00 64 8b 04 25 d0 02 00 00 41 39 c4 0f 84 12 02 00 00 48 8b 05 a7 00 60 00 48 85 c0 74 04 <48> 83 00 04 64 8b 04 25 d0 02 00 00 64 89 04 25 d4 02 00 00 0f 31 [ 437.930772] RSP: 002b:00007fff32860ec0 EFLAGS: 00010206 [ 437.930784] RAX: 0000000000a56248 RBX: 00007fff32860ec0 RCX: 000000000045666a [ 437.930793] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 437.930802] RBP: 00007fff32860f00 R08: 0000000000000001 R09: 000000000126c940 [ 437.930811] R10: 000000000126cc10 R11: 0000000000000246 R12: 0000000000000001 17:56:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 437.930820] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000002 [ 437.968676] memory: usage 307200kB, limit 307200kB, failcnt 938 [ 437.980187] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 437.987435] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 437.993732] Memory cgroup stats for /syz2: cache:0KB rss:252416KB rss_huge:229376KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:252500KB inactive_file:4KB active_file:0KB unevictable:0KB [ 438.033450] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor2,pid=11184,uid=0 17:56:23 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r2 = socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) 17:56:23 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045763, &(0x7f0000000100)) 17:56:23 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000000001000000d52ac658e24ac5706c0442076579ad3feb16fccba5ae115de2a842354ddfe02ad82e6a717d85f0db630f9b23673dddb98354e16c921026"], 0x8}, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x8, 0x238000) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$KVM_HYPERV_EVENTFD(r0, 0x4018aebd, &(0x7f0000000240)={0x4, r1}) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000180)=""/23) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f00000002c0)) syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x1, 0x2) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x800000000000e6) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000100)={0x3}, 0x4) [ 438.081290] Memory cgroup out of memory: Kill process 11184 (syz-executor2) score 1113 or sacrifice child [ 438.099742] Killed process 11184 (syz-executor2) total-vm:72576kB, anon-rss:2192kB, file-rss:35788kB, shmem-rss:0kB [ 438.182327] syz-executor2 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), order=0, oom_score_adj=0 [ 438.233040] CPU: 0 PID: 8545 Comm: syz-executor2 Not tainted 5.0.0-rc4 #49 [ 438.240067] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 438.249415] Call Trace: [ 438.252011] dump_stack+0x1db/0x2d0 [ 438.255649] ? dump_stack_print_info.cold+0x20/0x20 [ 438.260682] dump_header+0x1e6/0x116c [ 438.264494] ? add_lock_to_list.isra.0+0x450/0x450 [ 438.269432] ? print_usage_bug+0xd0/0xd0 [ 438.273514] ? pagefault_out_of_memory+0x1a1/0x1a1 [ 438.278452] ? ___ratelimit+0x37c/0x686 [ 438.282435] ? mark_held_locks+0xb1/0x100 [ 438.286597] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 438.291702] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 438.296812] ? lockdep_hardirqs_on+0x415/0x5d0 [ 438.301425] ? trace_hardirqs_on+0xbd/0x310 [ 438.305763] ? kasan_check_read+0x11/0x20 [ 438.309934] ? ___ratelimit+0x37c/0x686 [ 438.313917] ? trace_hardirqs_off_caller+0x300/0x300 [ 438.319022] ? do_raw_spin_trylock+0x270/0x270 [ 438.323613] ? trace_hardirqs_on_caller+0x310/0x310 [ 438.328636] ? lock_acquire+0x1db/0x570 [ 438.332626] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 438.337736] ? ___ratelimit+0xac/0x686 [ 438.341633] ? idr_get_free+0xee0/0xee0 [ 438.345610] ? lockdep_hardirqs_on+0x415/0x5d0 [ 438.350214] oom_kill_process.cold+0x10/0x9d4 [ 438.354718] ? cgroup_procs_next+0x70/0x70 [ 438.358961] ? _raw_spin_unlock_irq+0x5e/0x90 [ 438.363467] ? oom_badness+0xa50/0xa50 [ 438.367368] ? oom_evaluate_task+0x540/0x540 [ 438.371809] ? mem_cgroup_iter_break+0x30/0x30 [ 438.376394] ? mutex_trylock+0x2d0/0x2d0 [ 438.380464] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 438.386029] ? rcu_read_unlock_special+0x380/0x380 [ 438.390988] out_of_memory+0x885/0x1420 [ 438.394974] ? mem_cgroup_iter+0x508/0xf30 [ 438.399221] ? oom_killer_disable+0x340/0x340 [ 438.403723] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 438.408831] ? lock_acquire+0x1db/0x570 [ 438.412823] mem_cgroup_out_of_memory+0x160/0x210 [ 438.417669] ? do_raw_spin_unlock+0xa0/0x330 [ 438.422084] ? memcg_memory_event+0x40/0x40 [ 438.426407] ? do_raw_spin_trylock+0x270/0x270 [ 438.431008] ? _raw_spin_unlock+0x2d/0x50 [ 438.435181] try_charge+0xd44/0x19b0 [ 438.438907] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 438.444458] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 438.449309] ? rcu_read_unlock_special+0x380/0x380 [ 438.454260] ? get_mem_cgroup_from_mm+0x1ea/0x420 [ 438.459108] ? get_mem_cgroup_from_page+0x190/0x190 [ 438.464138] ? rcu_read_lock_sched_held+0x110/0x130 [ 438.469191] mem_cgroup_try_charge+0x43a/0xdb0 [ 438.473787] ? mem_cgroup_protected+0xa10/0xa10 [ 438.478474] ? mark_held_locks+0x100/0x100 [ 438.482729] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 438.488267] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 438.493818] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 438.498767] wp_page_copy+0x45a/0x1c30 [ 438.502675] ? swp_swapcount+0x540/0x540 [ 438.506767] ? pmd_pfn+0x1d0/0x1d0 [ 438.510309] ? find_held_lock+0x35/0x120 [ 438.514375] ? do_wp_page+0x70d/0x16b0 [ 438.518272] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 438.523835] ? kasan_check_read+0x11/0x20 [ 438.528032] ? do_raw_spin_unlock+0xa0/0x330 [ 438.532451] ? do_raw_spin_trylock+0x270/0x270 [ 438.537043] ? __lock_acquire+0x572/0x4a30 [ 438.541288] do_wp_page+0x715/0x16b0 [ 438.545024] ? finish_mkwrite_fault+0x540/0x540 [ 438.549694] ? kasan_check_read+0x11/0x20 [ 438.553872] ? do_raw_spin_lock+0x156/0x360 [ 438.558202] ? rwlock_bug.part.0+0x90/0x90 [ 438.562445] ? pmd_devmap_trans_unstable+0x1d0/0x1d0 [ 438.567578] __handle_mm_fault+0x2c8e/0x55a0 [ 438.572019] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 438.576866] ? check_preemption_disabled+0x48/0x290 [ 438.581885] ? handle_mm_fault+0x3cc/0xc80 [ 438.586145] ? lock_downgrade+0x910/0x910 [ 438.590319] ? kasan_check_read+0x11/0x20 [ 438.594471] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 438.599786] ? rcu_read_unlock_special+0x380/0x380 [ 438.604737] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 438.610276] ? check_preemption_disabled+0x48/0x290 [ 438.615314] handle_mm_fault+0x4ec/0xc80 [ 438.619380] ? __handle_mm_fault+0x55a0/0x55a0 [ 438.623970] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 438.629505] ? vmacache_update+0x114/0x140 [ 438.633770] __do_page_fault+0x5da/0xd60 [ 438.637855] do_page_fault+0xe6/0x7d8 [ 438.641666] ? trace_hardirqs_on_caller+0xc0/0x310 [ 438.646601] ? vmalloc_sync_all+0x30/0x30 [ 438.650750] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 438.656204] ? syscall_return_slowpath+0x5f0/0x5f0 [ 438.661138] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 438.666705] ? prepare_exit_to_usermode+0x232/0x3b0 [ 438.671754] ? page_fault+0x8/0x30 [ 438.675344] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 438.680213] ? page_fault+0x8/0x30 [ 438.683757] page_fault+0x1e/0x30 [ 438.687210] RIP: 0033:0x4567ca [ 438.690407] Code: 48 85 db 74 b6 41 bc ca 00 00 00 eb 0c 0f 1f 00 48 8b 5b 08 48 85 db 74 a2 48 8b 3b 48 8b 47 10 48 85 c0 74 05 ff d0 48 8b 3b ff 4f 28 0f 94 c0 84 c0 74 db 8b 47 2c 85 c0 74 d4 45 31 d2 ba [ 438.709311] RSP: 002b:00007fff32860ec0 EFLAGS: 00010246 [ 438.714671] RAX: 0000000000000000 RBX: 00007fff32860ec0 RCX: 000000000045666a [ 438.721940] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000a54fc8 [ 438.729211] RBP: 00007fff32860f00 R08: 0000000000000001 R09: 000000000126c940 [ 438.736478] R10: 000000000126cc10 R11: 0000000000000246 R12: 00000000000000ca [ 438.743772] R13: 00000000000006bb R14: 0000000000000000 R15: 0000000000000002 [ 438.757192] SELinux: security policydb version 15 (MLS) not backwards compatible [ 438.765883] SELinux: failed to load policy [ 438.771548] memory: usage 307048kB, limit 307200kB, failcnt 939 [ 438.777620] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 438.784564] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 438.790779] Memory cgroup stats for /syz2: cache:0KB rss:252416KB rss_huge:229376KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:252472KB inactive_file:0KB active_file:0KB unevictable:0KB [ 438.811709] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor2,pid=11316,uid=0 [ 438.826298] Memory cgroup out of memory: Kill process 11316 (syz-executor2) score 1113 or sacrifice child 17:56:23 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000007000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:56:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:56:23 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:56:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f00000001c0)=ANY=[@ANYBLOB="64ecef1a75f94555237931a14654b943ce"], 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r3, 0x4010aeab, &(0x7f0000000080)={0x87c1, 0x4000}) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f00000000c0)={0x0, 0x100000}) r4 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vfio/vfio\x00', 0x430001, 0x0) ioctl$VIDIOC_S_FREQUENCY(r4, 0x402c5639, &(0x7f0000000180)={0x8, 0x0, 0xa21e}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000028000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:56:23 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045764, &(0x7f0000000100)) [ 438.836131] Killed process 11316 (syz-executor2) total-vm:72576kB, anon-rss:2192kB, file-rss:35788kB, shmem-rss:0kB [ 438.848520] oom_reaper: reaped process 11316 (syz-executor2), now anon-rss:0kB, file-rss:34828kB, shmem-rss:0kB 17:56:23 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045765, &(0x7f0000000100)) 17:56:23 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 438.963370] syz-executor2 invoked oom-killer: gfp_mask=0x7080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 439.028729] XFS (loop4): Invalid superblock magic number [ 439.040647] CPU: 0 PID: 16888 Comm: syz-executor2 Not tainted 5.0.0-rc4 #49 [ 439.047763] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 439.057121] Call Trace: [ 439.059738] dump_stack+0x1db/0x2d0 [ 439.063376] ? dump_stack_print_info.cold+0x20/0x20 [ 439.068416] dump_header+0x1e6/0x116c [ 439.072236] ? add_lock_to_list.isra.0+0x450/0x450 [ 439.077198] ? print_usage_bug+0xd0/0xd0 [ 439.081277] ? pagefault_out_of_memory+0x1a1/0x1a1 [ 439.086220] ? ___ratelimit+0x37c/0x686 [ 439.090212] ? mark_held_locks+0xb1/0x100 [ 439.094370] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 439.099478] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 439.104634] ? lockdep_hardirqs_on+0x415/0x5d0 [ 439.109222] ? trace_hardirqs_on+0xbd/0x310 [ 439.113553] ? kasan_check_read+0x11/0x20 [ 439.117708] ? ___ratelimit+0x37c/0x686 [ 439.121693] ? trace_hardirqs_off_caller+0x300/0x300 [ 439.126804] ? do_raw_spin_trylock+0x270/0x270 [ 439.131395] ? trace_hardirqs_on_caller+0x310/0x310 [ 439.136414] ? lock_acquire+0x1db/0x570 [ 439.140415] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 439.145529] ? ___ratelimit+0xac/0x686 [ 439.149425] ? idr_get_free+0xee0/0xee0 [ 439.153410] ? lockdep_hardirqs_on+0x415/0x5d0 [ 439.158012] oom_kill_process.cold+0x10/0x9d4 [ 439.162544] ? cgroup_procs_next+0x70/0x70 [ 439.166789] ? _raw_spin_unlock_irq+0x5e/0x90 [ 439.171288] ? oom_badness+0xa50/0xa50 [ 439.175213] ? oom_evaluate_task+0x540/0x540 [ 439.179634] ? mem_cgroup_iter_break+0x30/0x30 [ 439.184238] ? mutex_trylock+0x2d0/0x2d0 [ 439.188302] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 439.193858] ? rcu_read_unlock_special+0x380/0x380 [ 439.198800] out_of_memory+0x885/0x1420 [ 439.202787] ? mem_cgroup_iter+0x508/0xf30 [ 439.207033] ? oom_killer_disable+0x340/0x340 [ 439.211554] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 439.216662] ? lock_acquire+0x1db/0x570 [ 439.220652] mem_cgroup_out_of_memory+0x160/0x210 [ 439.225506] ? do_raw_spin_unlock+0xa0/0x330 [ 439.229956] ? memcg_memory_event+0x40/0x40 [ 439.234298] ? do_raw_spin_trylock+0x270/0x270 [ 439.238927] ? _raw_spin_unlock+0x2d/0x50 [ 439.243082] try_charge+0x12a9/0x19b0 [ 439.246886] ? lock_downgrade+0x910/0x910 [ 439.251037] ? kasan_check_read+0x11/0x20 [ 439.255211] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 439.260054] ? get_mem_cgroup_from_mm+0x1cd/0x420 [ 439.264903] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 439.270448] ? lock_downgrade+0x910/0x910 [ 439.274603] ? kasan_check_read+0x11/0x20 [ 439.278759] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 439.284048] ? rcu_read_unlock_special+0x380/0x380 [ 439.288994] ? get_mem_cgroup_from_mm+0x1ea/0x420 [ 439.293851] memcg_kmem_charge_memcg+0x7c/0x130 [ 439.298524] ? memcg_kmem_put_cache+0xb0/0xb0 [ 439.303026] ? lock_release+0xc40/0xc40 [ 439.307029] memcg_kmem_charge+0x13b/0x340 [ 439.311277] __alloc_pages_nodemask+0x7b8/0xdc0 [ 439.315969] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 439.321034] ? rcu_pm_notify+0xd0/0xd0 [ 439.324935] ? rcu_read_lock_sched_held+0x110/0x130 [ 439.329984] ? kmem_cache_alloc_node+0x347/0x710 [ 439.334773] copy_process+0x847/0x8860 [ 439.338670] ? pmd_devmap_trans_unstable+0x1d0/0x1d0 [ 439.343783] ? add_lock_to_list.isra.0+0x450/0x450 [ 439.348720] ? reacquire_held_locks+0xfb/0x520 [ 439.353311] ? alloc_set_pte+0x134a/0x1df0 [ 439.357555] ? find_held_lock+0x60/0x120 [ 439.361641] ? __cleanup_sighand+0x70/0x70 [ 439.365879] ? lock_downgrade+0x910/0x910 [ 439.370033] ? kasan_check_read+0x11/0x20 [ 439.374195] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 439.379480] ? rcu_read_unlock_special+0x380/0x380 [ 439.384443] ? filemap_map_pages+0xe14/0x1cb0 [ 439.388963] ? print_usage_bug+0xd0/0xd0 [ 439.393033] ? print_usage_bug+0xd0/0xd0 [ 439.397118] ? drop_futex_key_refs.isra.0+0x6f/0xf0 [ 439.402198] ? __lock_acquire+0x572/0x4a30 [ 439.406449] ? __handle_mm_fault+0x3fde/0x55a0 [ 439.411054] ? mark_held_locks+0x100/0x100 [ 439.415326] ? kasan_check_read+0x11/0x20 [ 439.419481] ? do_raw_spin_unlock+0xa0/0x330 [ 439.423912] ? do_raw_spin_trylock+0x270/0x270 [ 439.428499] ? add_mm_counter_fast.part.0+0x40/0x40 [ 439.433526] ? save_stack+0x45/0xd0 [ 439.437173] ? add_lock_to_list.isra.0+0x450/0x450 [ 439.442108] ? add_lock_to_list.isra.0+0x450/0x450 [ 439.447042] ? __handle_mm_fault+0x955/0x55a0 [ 439.451549] ? __might_fault+0x12b/0x1e0 [ 439.455615] ? find_held_lock+0x35/0x120 [ 439.459682] ? __might_fault+0x12b/0x1e0 [ 439.463747] ? lock_acquire+0x1db/0x570 [ 439.467734] ? lock_downgrade+0x910/0x910 [ 439.471903] ? lock_release+0xc40/0xc40 [ 439.475879] ? trace_hardirqs_off_caller+0x300/0x300 [ 439.480992] _do_fork+0x1a9/0x1170 [ 439.484542] ? fork_idle+0x1d0/0x1d0 [ 439.488290] ? kasan_check_read+0x11/0x20 [ 439.492444] ? _copy_to_user+0xc9/0x120 [ 439.496472] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 439.502011] ? put_timespec64+0x115/0x1b0 [ 439.506175] ? nsecs_to_jiffies+0x30/0x30 [ 439.510332] ? do_syscall_64+0x8c/0x800 [ 439.514321] ? do_syscall_64+0x8c/0x800 [ 439.518303] ? lockdep_hardirqs_on+0x415/0x5d0 [ 439.522906] ? trace_hardirqs_on+0xbd/0x310 [ 439.527231] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 439.532773] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 439.538142] ? trace_hardirqs_off_caller+0x300/0x300 [ 439.543278] __x64_sys_clone+0xbf/0x150 [ 439.547263] do_syscall_64+0x1a3/0x800 [ 439.551175] ? syscall_return_slowpath+0x5f0/0x5f0 [ 439.556118] ? prepare_exit_to_usermode+0x232/0x3b0 [ 439.561184] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 439.566043] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 439.571245] RIP: 0033:0x458099 [ 439.574438] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 439.593357] RSP: 002b:00007fe2862d6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 439.601065] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000458099 [ 439.608331] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0020002102001fff [ 439.615601] RBP: 000000000073bf00 R08: ffffffffffffffff R09: 0000000000000000 [ 439.622875] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2862d76d4 17:56:24 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045766, &(0x7f0000000100)) [ 439.630143] R13: 00000000004be480 R14: 00000000004cea40 R15: 00000000ffffffff [ 439.639884] memory: usage 307044kB, limit 307200kB, failcnt 972 [ 439.646218] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 439.654023] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 17:56:24 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f0000000000)="0fc77a76ba410066b8f1ffffff66eff30fd6ecd8e80f005d07ba430066ed640f2176660f2b012e2ed9f70f880000", 0x2e}], 0x1, 0x0, 0x0, 0x1e) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = syz_open_dev$radio(&(0x7f0000000280)='/dev/radio#\x00', 0x1, 0x2) write$apparmor_exec(r3, &(0x7f00000002c0)={'stack ', '^selinux\\vmnet1ppp0,\x00'}, 0x1b) select(0x40, &(0x7f0000000180)={0x9, 0xe8, 0x81, 0x9, 0xd1, 0xfffffffffffffffd, 0x2, 0x7fff}, &(0x7f0000000200)={0xac8, 0x1, 0xffff, 0x7, 0x7, 0xfb, 0x7aa, 0x8}, &(0x7f0000000240)={0x3, 0x6, 0x1000, 0x1, 0x6, 0xce, 0x0, 0x401}, 0xfffffffffffffffe) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vfio/vfio\x00', 0x18080, 0x0) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x40, 0x0) ioctl$sock_SIOCINQ(r4, 0x541b, &(0x7f00000000c0)) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r4, 0x114, 0xa, &(0x7f0000000100), 0x1) 17:56:24 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r2 = socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) 17:56:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 439.680097] Memory cgroup stats for /syz2: cache:0KB rss:252428KB rss_huge:229376KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:252460KB inactive_file:0KB active_file:0KB unevictable:0KB [ 439.715581] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor2,pid=11338,uid=0 17:56:24 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045767, &(0x7f0000000100)) [ 439.750000] Memory cgroup out of memory: Kill process 11338 (syz-executor2) score 1113 or sacrifice child [ 439.770268] Killed process 11338 (syz-executor2) total-vm:72576kB, anon-rss:2192kB, file-rss:35788kB, shmem-rss:0kB [ 439.875119] syz-executor2 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 439.918177] CPU: 0 PID: 16877 Comm: syz-executor2 Not tainted 5.0.0-rc4 #49 [ 439.925295] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 439.934658] Call Trace: [ 439.937269] dump_stack+0x1db/0x2d0 [ 439.940916] ? dump_stack_print_info.cold+0x20/0x20 [ 439.945956] dump_header+0x1e6/0x116c [ 439.949772] ? add_lock_to_list.isra.0+0x450/0x450 [ 439.954706] ? print_usage_bug+0xd0/0xd0 [ 439.958765] ? pagefault_out_of_memory+0x1a1/0x1a1 [ 439.963692] ? ___ratelimit+0x37c/0x686 [ 439.967670] ? mark_held_locks+0xb1/0x100 [ 439.971822] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 439.976925] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 439.982038] ? lockdep_hardirqs_on+0x415/0x5d0 [ 439.986656] ? trace_hardirqs_on+0xbd/0x310 [ 439.990997] ? kasan_check_read+0x11/0x20 [ 439.995146] ? ___ratelimit+0x37c/0x686 [ 439.999156] ? trace_hardirqs_off_caller+0x300/0x300 [ 440.004268] ? do_raw_spin_trylock+0x270/0x270 [ 440.008850] ? trace_hardirqs_on_caller+0x310/0x310 [ 440.013867] ? lock_acquire+0x1db/0x570 [ 440.017854] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 440.022983] ? ___ratelimit+0xac/0x686 [ 440.027078] ? idr_get_free+0xee0/0xee0 [ 440.031055] ? lockdep_hardirqs_on+0x415/0x5d0 [ 440.035664] oom_kill_process.cold+0x10/0x9d4 [ 440.040191] ? cgroup_procs_next+0x70/0x70 [ 440.044431] ? _raw_spin_unlock_irq+0x5e/0x90 [ 440.048933] ? oom_badness+0xa50/0xa50 [ 440.052827] ? oom_evaluate_task+0x540/0x540 [ 440.057240] ? mem_cgroup_iter_break+0x30/0x30 [ 440.061816] ? mutex_trylock+0x2d0/0x2d0 [ 440.065876] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 440.071423] ? rcu_read_unlock_special+0x380/0x380 [ 440.076364] out_of_memory+0x885/0x1420 [ 440.080344] ? mem_cgroup_iter+0x508/0xf30 [ 440.084582] ? oom_killer_disable+0x340/0x340 [ 440.089080] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 440.094194] ? lock_acquire+0x1db/0x570 [ 440.098193] mem_cgroup_out_of_memory+0x160/0x210 [ 440.103051] ? do_raw_spin_unlock+0xa0/0x330 [ 440.107467] ? memcg_memory_event+0x40/0x40 [ 440.111824] ? do_raw_spin_trylock+0x270/0x270 [ 440.116418] ? _raw_spin_unlock+0x2d/0x50 [ 440.120570] try_charge+0xd44/0x19b0 [ 440.124283] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 440.129829] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 440.134678] ? rcu_read_unlock_special+0x380/0x380 [ 440.139619] ? get_mem_cgroup_from_mm+0x1ea/0x420 [ 440.144462] ? get_mem_cgroup_from_page+0x190/0x190 [ 440.149485] ? rcu_read_lock_sched_held+0x110/0x130 [ 440.154507] mem_cgroup_try_charge+0x43a/0xdb0 [ 440.159202] ? mem_cgroup_protected+0xa10/0xa10 [ 440.163884] ? __anon_vma_prepare+0x36d/0x760 [ 440.168385] ? anon_vma_fork+0x880/0x880 [ 440.172443] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 440.177976] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 440.183534] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 440.188505] __handle_mm_fault+0x2594/0x55a0 [ 440.192921] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 440.197764] ? check_preemption_disabled+0x48/0x290 [ 440.202782] ? handle_mm_fault+0x3cc/0xc80 [ 440.207035] ? lock_downgrade+0x910/0x910 [ 440.211191] ? kasan_check_read+0x11/0x20 [ 440.215341] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 440.220624] ? rcu_read_unlock_special+0x380/0x380 [ 440.225553] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 440.231090] ? check_preemption_disabled+0x48/0x290 [ 440.236111] handle_mm_fault+0x4ec/0xc80 [ 440.240188] ? __handle_mm_fault+0x55a0/0x55a0 [ 440.244766] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 440.250298] ? vmacache_update+0x114/0x140 [ 440.254540] __do_page_fault+0x5da/0xd60 [ 440.258602] ? do_futex+0x2910/0x2910 [ 440.262412] do_page_fault+0xe6/0x7d8 [ 440.266215] ? trace_hardirqs_on_caller+0xc0/0x310 [ 440.271146] ? vmalloc_sync_all+0x30/0x30 [ 440.275304] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 440.280758] ? syscall_return_slowpath+0x5f0/0x5f0 [ 440.285691] ? prepare_exit_to_usermode+0x232/0x3b0 [ 440.290713] ? page_fault+0x8/0x30 [ 440.294256] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 440.299098] ? page_fault+0x8/0x30 [ 440.302643] page_fault+0x1e/0x30 [ 440.306094] RIP: 0033:0x40fabf [ 440.309288] Code: 0f 84 c8 02 00 00 48 83 bd 78 ff ff ff 00 0f 84 f9 04 00 00 48 8b 95 68 ff ff ff 44 89 95 38 ff ff ff 4c 8d ac 10 00 f7 ff ff <49> 89 85 90 06 00 00 49 8d 85 10 03 00 00 49 89 95 98 06 00 00 41 [ 440.328188] RSP: 002b:00007fff32860c80 EFLAGS: 00010206 [ 440.333545] RAX: 00007fe286296000 RBX: 0000000000020000 RCX: 00000000004580ea [ 440.340809] RDX: 0000000000021000 RSI: 0000000000021000 RDI: 0000000000000000 [ 440.348069] RBP: 00007fff32860d60 R08: ffffffffffffffff R09: 0000000000000000 [ 440.355335] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fff32860e40 [ 440.362612] R13: 00007fe2862b6700 R14: 0000000000000003 R15: 0000000000000001 [ 440.379982] memory: usage 304636kB, limit 307200kB, failcnt 972 [ 440.393165] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 440.411516] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 440.426267] Memory cgroup stats for /syz2: cache:0KB rss:250352KB rss_huge:227328KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:250304KB inactive_file:0KB active_file:0KB unevictable:0KB [ 440.449625] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor2,pid=11389,uid=0 [ 440.465001] Memory cgroup out of memory: Kill process 11389 (syz-executor2) score 1113 or sacrifice child [ 440.475796] Killed process 11389 (syz-executor2) total-vm:72576kB, anon-rss:2192kB, file-rss:35788kB, shmem-rss:0kB [ 440.508527] SELinux: security policydb version 15 (MLS) not backwards compatible [ 440.516905] SELinux: failed to load policy 17:56:25 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000008000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:56:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:56:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:56:25 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045768, &(0x7f0000000100)) [ 440.525968] SELinux: security policydb version 15 (MLS) not backwards compatible [ 440.534336] SELinux: failed to load policy 17:56:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:56:25 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x4000000003e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002800813ee45ae087185082cf0400b0eba06ec4000023000000000800000000000000000051894dd65b2f", 0x2e}], 0x1}, 0x4000000) 17:56:25 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) 17:56:25 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045769, &(0x7f0000000100)) [ 440.624443] SELinux: security policydb version 15 (MLS) not backwards compatible [ 440.663507] SELinux: failed to load policy 17:56:25 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c000000000a000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 440.692394] SELinux: security policydb version 15 (MLS) not backwards compatible [ 440.712144] netlink: 26 bytes leftover after parsing attributes in process `syz-executor5'. [ 440.721552] XFS (loop4): Invalid superblock magic number [ 440.736381] SELinux: failed to load policy 17:56:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 440.774790] netlink: 26 bytes leftover after parsing attributes in process `syz-executor5'. 17:56:25 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x200000088004576a, &(0x7f0000000100)) [ 440.845947] SELinux: security policydb version 15 (MLS) not backwards compatible [ 440.867208] SELinux: failed to load policy [ 440.878081] SELinux: security policydb version 15 (MLS) not backwards compatible 17:56:25 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c000000000b000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:56:25 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_script(r0, &(0x7f0000000180)={'#! ', './file0', [{0x20, 'xselinuxeth0security'}, {}, {0x20, '*eth0.md5sum'}, {0x20, '$'}, {0x20, 'bdev@@wlan1'}, {0x20, '\\systemkeyring'}, {0x20, 'GPLwlan0*{[em0'}, {0x20, 'ppp0md5sum\')selinux'}, {}], 0xa, "b35c6ecd0b8e6542d6267f640d3d24368267ea2b080543c8c2b88a6735d700600f53ed45183ce423b2f70ade1871363aa019b35a0d68ea17d45d3fd6b150166e76a4b29012d94d7ac9b8b8ffae167617606a611e6ffb7defbead3cb2c142a5dd15a67fafe15a05c2e8da4a19fce33e484e9426d60d85"}, 0xe5) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x14, 0x7, 0x1, 0x1}, 0x14}}, 0x0) fchmod(r0, 0x20) accept4$packet(0xffffffffffffff9c, &(0x7f0000000000)={0x11, 0x0, 0x0}, &(0x7f0000000080)=0x14, 0x80800) connect(r0, &(0x7f00000000c0)=@hci={0x1f, r1, 0x3}, 0x80) socket$packet(0x11, 0x2, 0x300) 17:56:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:56:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:56:25 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x200000088004576b, &(0x7f0000000100)) [ 440.987485] audit: type=1400 audit(1548698185.888:91): avc: denied { setattr } for pid=16969 comm="syz-executor5" name="NETLINK" dev="sockfs" ino=50383 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 441.062143] syz-executor2 invoked oom-killer: gfp_mask=0x7080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 441.101934] CPU: 0 PID: 16972 Comm: syz-executor2 Not tainted 5.0.0-rc4 #49 [ 441.109066] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 441.118425] Call Trace: [ 441.121024] dump_stack+0x1db/0x2d0 [ 441.124682] ? dump_stack_print_info.cold+0x20/0x20 [ 441.129723] dump_header+0x1e6/0x116c [ 441.129744] ? add_lock_to_list.isra.0+0x450/0x450 [ 441.129764] ? print_usage_bug+0xd0/0xd0 [ 441.129784] ? pagefault_out_of_memory+0x1a1/0x1a1 [ 441.129802] ? ___ratelimit+0x37c/0x686 [ 441.147492] ? mark_held_locks+0xb1/0x100 [ 441.147513] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 441.147531] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 441.165820] ? lockdep_hardirqs_on+0x415/0x5d0 [ 441.170406] ? trace_hardirqs_on+0xbd/0x310 [ 441.174736] ? kasan_check_read+0x11/0x20 [ 441.178908] ? ___ratelimit+0x37c/0x686 [ 441.182893] ? trace_hardirqs_off_caller+0x300/0x300 [ 441.187998] ? do_raw_spin_trylock+0x270/0x270 [ 441.192604] ? trace_hardirqs_on_caller+0x310/0x310 [ 441.197636] ? lock_acquire+0x1db/0x570 [ 441.201641] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 441.206753] ? ___ratelimit+0xac/0x686 [ 441.210654] ? idr_get_free+0xee0/0xee0 [ 441.214634] ? lockdep_hardirqs_on+0x415/0x5d0 [ 441.219232] oom_kill_process.cold+0x10/0x9d4 [ 441.223735] ? cgroup_procs_next+0x70/0x70 [ 441.227999] ? _raw_spin_unlock_irq+0x5e/0x90 [ 441.232508] ? oom_badness+0xa50/0xa50 [ 441.236411] ? oom_evaluate_task+0x540/0x540 [ 441.240829] ? mem_cgroup_iter_break+0x30/0x30 [ 441.245421] ? mutex_trylock+0x2d0/0x2d0 [ 441.249487] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 441.255067] ? rcu_read_unlock_special+0x380/0x380 [ 441.260011] out_of_memory+0x885/0x1420 [ 441.263994] ? mem_cgroup_iter+0x508/0xf30 [ 441.268256] ? oom_killer_disable+0x340/0x340 [ 441.272762] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 441.277888] ? lock_acquire+0x1db/0x570 [ 441.281894] mem_cgroup_out_of_memory+0x160/0x210 [ 441.286788] ? do_raw_spin_unlock+0xa0/0x330 [ 441.291207] ? memcg_memory_event+0x40/0x40 [ 441.295536] ? do_raw_spin_trylock+0x270/0x270 [ 441.300137] ? _raw_spin_unlock+0x2d/0x50 [ 441.304305] try_charge+0x12a9/0x19b0 [ 441.308107] ? lock_downgrade+0x910/0x910 [ 441.312294] ? kasan_check_read+0x11/0x20 [ 441.316455] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 441.321307] ? get_mem_cgroup_from_mm+0x1cd/0x420 [ 441.326189] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 441.331737] ? lock_downgrade+0x910/0x910 [ 441.335935] ? kasan_check_read+0x11/0x20 [ 441.340090] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 441.345378] ? rcu_read_unlock_special+0x380/0x380 [ 441.350328] ? get_mem_cgroup_from_mm+0x1ea/0x420 [ 441.355195] memcg_kmem_charge_memcg+0x7c/0x130 [ 441.359884] ? memcg_kmem_put_cache+0xb0/0xb0 [ 441.364391] ? lock_release+0xc40/0xc40 [ 441.368381] memcg_kmem_charge+0x13b/0x340 [ 441.372647] __alloc_pages_nodemask+0x7b8/0xdc0 [ 441.377335] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 441.382352] ? rcu_pm_notify+0xd0/0xd0 [ 441.386253] ? rcu_read_lock_sched_held+0x110/0x130 [ 441.391277] ? kmem_cache_alloc_node+0x347/0x710 [ 441.396050] copy_process+0x847/0x8860 [ 441.399949] ? pmd_devmap_trans_unstable+0x1d0/0x1d0 [ 441.405079] ? add_lock_to_list.isra.0+0x450/0x450 [ 441.410017] ? reacquire_held_locks+0xfb/0x520 [ 441.414604] ? alloc_set_pte+0x134a/0x1df0 [ 441.418887] ? find_held_lock+0x60/0x120 [ 441.422969] ? __cleanup_sighand+0x70/0x70 [ 441.427209] ? lock_downgrade+0x910/0x910 [ 441.431360] ? kasan_check_read+0x11/0x20 [ 441.435532] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 441.440834] ? rcu_read_unlock_special+0x380/0x380 [ 441.445784] ? filemap_map_pages+0xe14/0x1cb0 [ 441.450307] ? print_usage_bug+0xd0/0xd0 [ 441.454382] ? print_usage_bug+0xd0/0xd0 [ 441.458465] ? drop_futex_key_refs.isra.0+0x6f/0xf0 [ 441.463494] ? __lock_acquire+0x572/0x4a30 [ 441.467741] ? __handle_mm_fault+0x3fde/0x55a0 [ 441.472354] ? mark_held_locks+0x100/0x100 [ 441.476601] ? kasan_check_read+0x11/0x20 [ 441.480847] ? do_raw_spin_unlock+0xa0/0x330 [ 441.485264] ? do_raw_spin_trylock+0x270/0x270 [ 441.489858] ? add_mm_counter_fast.part.0+0x40/0x40 [ 441.494894] ? save_stack+0x45/0xd0 [ 441.498529] ? add_lock_to_list.isra.0+0x450/0x450 [ 441.503469] ? add_lock_to_list.isra.0+0x450/0x450 [ 441.508402] ? __handle_mm_fault+0x955/0x55a0 [ 441.512913] ? __might_fault+0x12b/0x1e0 [ 441.516978] ? find_held_lock+0x35/0x120 [ 441.521047] ? __might_fault+0x12b/0x1e0 [ 441.525114] ? lock_acquire+0x1db/0x570 [ 441.529099] ? lock_downgrade+0x910/0x910 [ 441.533255] ? lock_release+0xc40/0xc40 [ 441.537236] ? trace_hardirqs_off_caller+0x300/0x300 [ 441.542350] _do_fork+0x1a9/0x1170 [ 441.545898] ? fork_idle+0x1d0/0x1d0 [ 441.549644] ? kasan_check_read+0x11/0x20 [ 441.553832] ? _copy_to_user+0xc9/0x120 [ 441.557831] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 441.563388] ? put_timespec64+0x115/0x1b0 [ 441.567559] ? nsecs_to_jiffies+0x30/0x30 [ 441.571732] ? do_syscall_64+0x8c/0x800 [ 441.575740] ? do_syscall_64+0x8c/0x800 [ 441.579732] ? lockdep_hardirqs_on+0x415/0x5d0 [ 441.584334] ? trace_hardirqs_on+0xbd/0x310 [ 441.588658] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 441.594245] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 441.599613] ? trace_hardirqs_off_caller+0x300/0x300 [ 441.603688] XFS (loop4): Invalid superblock magic number [ 441.604733] __x64_sys_clone+0xbf/0x150 [ 441.604754] do_syscall_64+0x1a3/0x800 [ 441.604774] ? syscall_return_slowpath+0x5f0/0x5f0 [ 441.604795] ? prepare_exit_to_usermode+0x232/0x3b0 [ 441.628053] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 441.632914] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 441.638107] RIP: 0033:0x458099 [ 441.641305] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 17:56:26 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockname$packet(r0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000680)=0x14) sendmsg$xdp(r1, &(0x7f0000001940)={&(0x7f00000006c0)={0x2c, 0x7, r3, 0x10}, 0x10, &(0x7f0000001900)=[{&(0x7f0000000700)="f04d938845419a18296d773306e92e5abfbc0ad5377f40d5ffdea68d7f4d2c0923684ca86d4e46dee2fc3672e8b84da044f99ad38b7f82e60719eae81309ea038d2982eebe6beb9e1775759bbc89acd9977da0df654271cef32d554b167e1c2168b75698e8f8a69d7854c0232f1434e752bf2bbb79372c3eaf6051652f36929a97957a987c564bc4cec4213aee6a3eaa2d6e2489912dc12f610ef7ed6f975fdfe0cff007130f01cbb4b610a8cd8724d156db52e6963d22e64a96d35d6178d57ca6a54711d0acc8724488296bb73e7cdf6c4122ea877ccc", 0xd7}, {&(0x7f0000000800)="ecdc24697f5274596ee9e396f8516f5dd677786a0bc33c2d4e12de16eb9ca3292bc7043eb3aa32f11a7709e08a5cb2c92bf5f6d3b7f134069c32ca9d5ee6963d4613d9c378b3d1f57d73e555bc9a5ed810d196f059327f0205f9ec680cacb2d1dd76b21948ff8147915af6a0", 0x6c}, {&(0x7f0000000880)="76e7f677794bc0290d8d902ce3a16d0601a07da1ff516f9122e5d6b665a38121e1726e88faa2cf1973966e091f3247b72caecd8c192c08449196dc0c8fa5a3e262f063", 0x43}, {&(0x7f0000000900)="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", 0x1000}], 0x4, 0x0, 0x0, 0x8080}, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$unix(0x1, 0x5, 0x0) pipe(&(0x7f0000000180)) unshare(0x400) ioctl$BLKROSET(r2, 0x125d, &(0x7f0000000000)=0x2) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x6b0}, 0x0, 0x0, 0x0, 0x0) 17:56:26 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 441.660212] RSP: 002b:00007fe2862d6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 441.667922] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000458099 [ 441.675197] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0020002102001fff [ 441.682471] RBP: 000000000073bf00 R08: ffffffffffffffff R09: 0000000000000000 [ 441.689756] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2862d76d4 [ 441.697028] R13: 00000000004be480 R14: 00000000004cea40 R15: 00000000ffffffff [ 441.709995] protocol 88fb is buggy, dev hsr_slave_0 [ 441.710114] protocol 88fb is buggy, dev hsr_slave_1 [ 441.725733] memory: usage 307180kB, limit 307200kB, failcnt 1007 [ 441.739175] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 441.746074] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 441.752332] Memory cgroup stats for /syz2: cache:0KB rss:252560KB rss_huge:229376KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:252580KB inactive_file:0KB active_file:0KB unevictable:0KB [ 441.793956] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor2,pid=11410,uid=0 17:56:26 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) 17:56:26 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x200000088004576c, &(0x7f0000000100)) 17:56:26 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0xfffffffffe, 0x7ff) ioctl$int_in(r0, 0x80000040045010, &(0x7f0000000000)) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='s'], 0x1) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000080)={0x1, 0x5, [{r0}, {r0, 0x0, 0x12000, 0xfffffffff0000000}, {r0, 0x0, 0xfffffffffffff000, 0x8000}, {r0, 0x0, 0x1000, 0x1000}, {r0, 0x0, 0x8000, 0xfffffffff0000000}]}) ioctl$int_in(r0, 0x80000000005001, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000040)) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f00000001c0)={0x0, @reserved}) [ 441.814928] Memory cgroup out of memory: Kill process 11410 (syz-executor2) score 1113 or sacrifice child [ 441.827210] Killed process 11410 (syz-executor2) total-vm:72576kB, anon-rss:2192kB, file-rss:35788kB, shmem-rss:0kB 17:56:26 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:56:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) [ 441.902222] syz-executor2 invoked oom-killer: gfp_mask=0x7080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 441.946527] CPU: 1 PID: 16968 Comm: syz-executor2 Not tainted 5.0.0-rc4 #49 [ 441.953676] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 441.963027] Call Trace: [ 441.965619] dump_stack+0x1db/0x2d0 [ 441.969253] ? dump_stack_print_info.cold+0x20/0x20 [ 441.974286] dump_header+0x1e6/0x116c [ 441.978092] ? add_lock_to_list.isra.0+0x450/0x450 [ 441.983033] ? print_usage_bug+0xd0/0xd0 [ 441.987100] ? pagefault_out_of_memory+0x1a1/0x1a1 [ 441.992040] ? ___ratelimit+0x37c/0x686 [ 441.996029] ? mark_held_locks+0xb1/0x100 [ 442.000200] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 442.005310] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 442.010414] ? lockdep_hardirqs_on+0x415/0x5d0 [ 442.015036] ? trace_hardirqs_on+0xbd/0x310 [ 442.019400] ? kasan_check_read+0x11/0x20 [ 442.023567] ? ___ratelimit+0x37c/0x686 [ 442.027718] ? trace_hardirqs_off_caller+0x300/0x300 [ 442.032827] ? do_raw_spin_trylock+0x270/0x270 [ 442.037414] ? trace_hardirqs_on_caller+0x310/0x310 [ 442.042440] ? lock_acquire+0x1db/0x570 [ 442.046455] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 442.051564] ? ___ratelimit+0xac/0x686 [ 442.055459] ? idr_get_free+0xee0/0xee0 [ 442.059438] ? lockdep_hardirqs_on+0x415/0x5d0 [ 442.064040] oom_kill_process.cold+0x10/0x9d4 [ 442.068544] ? cgroup_procs_next+0x70/0x70 [ 442.072806] ? _raw_spin_unlock_irq+0x5e/0x90 [ 442.077308] ? oom_badness+0xa50/0xa50 [ 442.081210] ? oom_evaluate_task+0x540/0x540 [ 442.085623] ? mem_cgroup_iter_break+0x30/0x30 [ 442.090211] ? mutex_trylock+0x2d0/0x2d0 [ 442.094272] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 442.099825] ? rcu_read_unlock_special+0x380/0x380 [ 442.104769] out_of_memory+0x885/0x1420 [ 442.108748] ? mem_cgroup_iter+0x508/0xf30 [ 442.112989] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 442.118113] ? oom_killer_disable+0x340/0x340 [ 442.122614] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 442.127718] ? lock_acquire+0x1db/0x570 [ 442.131731] mem_cgroup_out_of_memory+0x160/0x210 [ 442.136575] ? do_raw_spin_unlock+0xa0/0x330 [ 442.141011] ? memcg_memory_event+0x40/0x40 [ 442.145337] ? do_raw_spin_trylock+0x270/0x270 [ 442.149949] ? _raw_spin_unlock+0x2d/0x50 [ 442.154131] try_charge+0xd44/0x19b0 [ 442.158384] ? lock_downgrade+0x910/0x910 [ 442.162541] ? kasan_check_read+0x11/0x20 [ 442.166715] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 442.171578] ? get_mem_cgroup_from_mm+0x1cd/0x420 [ 442.176424] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 442.181972] ? lock_downgrade+0x910/0x910 [ 442.186138] ? kasan_check_read+0x11/0x20 [ 442.190324] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 442.195607] ? rcu_read_unlock_special+0x380/0x380 [ 442.200553] ? get_mem_cgroup_from_mm+0x1ea/0x420 [ 442.205422] memcg_kmem_charge_memcg+0x7c/0x130 [ 442.210096] ? memcg_kmem_put_cache+0xb0/0xb0 [ 442.214592] ? lock_release+0xc40/0xc40 [ 442.218580] memcg_kmem_charge+0x13b/0x340 [ 442.222823] __alloc_pages_nodemask+0x7b8/0xdc0 [ 442.227505] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 442.232526] ? rcu_pm_notify+0xd0/0xd0 [ 442.236460] ? rcu_read_lock_sched_held+0x110/0x130 [ 442.241484] ? kmem_cache_alloc_node+0x347/0x710 [ 442.246240] ? print_usage_bug+0xd0/0xd0 [ 442.250317] copy_process+0x847/0x8860 [ 442.254211] ? print_usage_bug+0xd0/0xd0 [ 442.258285] ? rcu_read_unlock+0x16/0x60 [ 442.262357] ? __lock_acquire+0x572/0x4a30 [ 442.266594] ? mark_held_locks+0x100/0x100 [ 442.270847] ? __cleanup_sighand+0x70/0x70 [ 442.275093] ? mark_held_locks+0x100/0x100 [ 442.279331] ? find_held_lock+0x35/0x120 [ 442.283405] ? mark_held_locks+0x100/0x100 [ 442.287655] ? delayacct_end+0xc9/0x100 [ 442.291642] ? add_lock_to_list.isra.0+0x450/0x450 [ 442.296581] ? lock_acquire+0x1db/0x570 [ 442.300569] ? add_lock_to_list.isra.0+0x450/0x450 [ 442.305513] ? find_held_lock+0x35/0x120 [ 442.309577] ? print_usage_bug+0xd0/0xd0 [ 442.313654] ? psi_memstall_leave+0x1f8/0x280 [ 442.318169] ? find_held_lock+0x35/0x120 [ 442.322238] ? __lock_acquire+0x572/0x4a30 [ 442.326480] ? _raw_spin_unlock_irq+0x28/0x90 [ 442.330980] ? _raw_spin_unlock_irq+0x28/0x90 [ 442.335481] ? lockdep_hardirqs_on+0x415/0x5d0 [ 442.340070] ? trace_hardirqs_on+0xbd/0x310 [ 442.344404] ? mark_held_locks+0x100/0x100 [ 442.348643] ? check_preemption_disabled+0x48/0x290 [ 442.353680] ? rcu_lockdep_current_cpu_online+0x1aa/0x220 [ 442.359224] ? rcu_pm_notify+0xd0/0xd0 [ 442.363130] ? add_lock_to_list.isra.0+0x450/0x450 [ 442.368069] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 442.373613] ? try_to_free_mem_cgroup_pages+0x597/0xcd0 [ 442.378987] ? lockdep_hardirqs_on+0x415/0x5d0 [ 442.383579] ? try_to_free_pages+0xb70/0xb70 [ 442.387991] ? percpu_ref_put_many+0x129/0x270 [ 442.392602] ? blkcg_maybe_throttle_current+0x75e/0x1400 [ 442.398059] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 442.403610] _do_fork+0x1a9/0x1170 [ 442.407173] ? fork_idle+0x1d0/0x1d0 [ 442.410904] ? trace_hardirqs_off+0xb8/0x310 [ 442.415318] ? get_mctgt_type_thp.isra.0+0x4c0/0x4c0 [ 442.420807] ? prepare_exit_to_usermode+0x32e/0x3b0 [ 442.425827] ? do_syscall_64+0x8c/0x800 [ 442.429805] ? do_syscall_64+0x8c/0x800 [ 442.433784] ? lockdep_hardirqs_on+0x415/0x5d0 [ 442.438370] ? trace_hardirqs_on+0xbd/0x310 [ 442.442701] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 442.448069] ? trace_hardirqs_off_caller+0x300/0x300 [ 442.453194] __x64_sys_clone+0xbf/0x150 [ 442.457186] do_syscall_64+0x1a3/0x800 [ 442.461079] ? syscall_return_slowpath+0x5f0/0x5f0 [ 442.466024] ? prepare_exit_to_usermode+0x232/0x3b0 [ 442.471084] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 442.475944] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 442.481198] RIP: 0033:0x45aa69 [ 442.484398] Code: ff 48 85 f6 0f 84 97 8d fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c 6e 8d fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 442.503296] RSP: 002b:00007fff32860c38 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 442.511006] RAX: ffffffffffffffda RBX: 00007fe2862b6700 RCX: 000000000045aa69 [ 442.518277] RDX: 00007fe2862b69d0 RSI: 00007fe2862b5db0 RDI: 00000000003d0f00 [ 442.525546] RBP: 00007fff32860e40 R08: 00007fe2862b6700 R09: 00007fe2862b6700 [ 442.532841] R10: 00007fe2862b69d0 R11: 0000000000000202 R12: 0000000000000000 [ 442.540135] R13: 00007fff32860cef R14: 00007fe2862b69c0 R15: 0000000000000001 [ 442.552289] memory: usage 304864kB, limit 307200kB, failcnt 1007 [ 442.558504] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 442.565575] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 442.572192] Memory cgroup stats for /syz2: cache:0KB rss:250444KB rss_huge:227328KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:250424KB inactive_file:0KB active_file:0KB unevictable:0KB [ 442.595233] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor2,pid=11470,uid=0 [ 442.610142] Memory cgroup out of memory: Kill process 11470 (syz-executor2) score 1113 or sacrifice child [ 442.628897] Killed process 11470 (syz-executor2) total-vm:72576kB, anon-rss:2192kB, file-rss:35788kB, shmem-rss:0kB 17:56:27 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c000000000c000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:56:27 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x200000088004576d, &(0x7f0000000100)) 17:56:27 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4000000000000024, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95)=0x4, 0x133) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x53, 0x0, &(0x7f0000000180)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000040)={{{@in6=@local, @in=@remote}}, {{@in6=@local}, 0x0, @in6=@initdev}}, &(0x7f0000000140)=0xe8) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0xa000, 0x0) ioctl$KDGKBMODE(r3, 0x4b44, &(0x7f00000002c0)) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000300)={0x1, 0x1, {0x25, 0x2a, 0x11, 0xb, 0xa, 0x0, 0x2, 0x5}}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r1) close(r0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x404000, 0x0) ioctl$TIOCLINUX4(r4, 0x541c, &(0x7f0000000240)) 17:56:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 442.670776] SELinux: security policydb version 15 (MLS) not backwards compatible [ 442.679311] sel_write_load: 1 callbacks suppressed [ 442.679317] SELinux: failed to load policy [ 442.700054] SELinux: security policydb version 15 (MLS) not backwards compatible [ 442.707896] SELinux: failed to load policy 17:56:27 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) [ 442.767516] XFS (loop4): Invalid superblock magic number [ 442.789216] SELinux: security policydb version 15 (MLS) not backwards compatible 17:56:27 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x200000088004576e, &(0x7f0000000100)) [ 442.829470] SELinux: failed to load policy 17:56:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 442.858984] SELinux: security policydb version 15 (MLS) not backwards compatible 17:56:27 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c000000000d000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:56:27 executing program 5: r0 = socket$inet_sctp(0x2, 0x205, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000000000000, 0x0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x7, [0x5, 0xd23, 0x0, 0x0, 0x0, 0x80, 0x8001]}, &(0x7f0000000180)=0x12) r1 = dup3(0xffffffffffffffff, r0, 0x80000) clone(0x802122101ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0xa0, &(0x7f00000007c0)=[@in={0x2, 0x4e21, @rand_addr=0x3ff}, @in={0x2, 0x4e20, @multicast2}, @in6={0xa, 0x4e21, 0xe, @mcast2, 0x1}, @in6={0xa, 0x4e24, 0xfffffffffffffffe, @loopback, 0x71e7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1b}}, @in6={0xa, 0x0, 0x0, @mcast2, 0x8}, @in6={0xa, 0x4e21, 0x1f, @mcast1, 0x3}]}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, 0x0, &(0x7f0000000500)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="f8f18e3c308d8552bc958d3f953b1b5cd7512e3ca390f332daea5921b8a730a840aa264671ee95026709d267e94b52b633e2df16", 0x34, 0xfffffffffffffff8) keyctl$assume_authority(0x10, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r1, 0x8040ae69, &(0x7f0000000100)={0x7, 0x1ff, 0xae3, 0x1, 0x5}) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000005ed0050bfa30000000000000703000028feffff7a0af0fff8ffffff71a4f0ff00000000b7060000000000012d400500000000005504000001ed00001d040000000000002c460000000000006b0a00fe000000008500000007000000b7000000000000009500000000000000"], 0x0}, 0x48) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000580)={0x0, 0x8, 0x0, 0x400}, 0x10) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f00000000c0)={0x1, 0xdc81}, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f00000004c0)=0x9) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000680)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x38, 0x0, {"57bb98dec69283b091a00f37fcfaa104d1b505872e5cc4b155d4dac6bc"}}}, 0x0, 0x3a}, 0x20) exit(0x0) [ 442.905936] SELinux: failed to load policy 17:56:27 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x200000088004576f, &(0x7f0000000100)) 17:56:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) [ 442.991419] SELinux: security policydb version 15 (MLS) not backwards compatible 17:56:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 443.043471] SELinux: failed to load policy 17:56:27 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045770, &(0x7f0000000100)) 17:56:28 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c000000000e000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 443.070202] SELinux: security policydb version 15 (MLS) not backwards compatible [ 443.080853] SELinux: failed to load policy 17:56:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:56:28 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045771, &(0x7f0000000100)) [ 443.195979] syz-executor2 invoked oom-killer: gfp_mask=0x7080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 443.225756] XFS (loop4): Invalid superblock magic number [ 443.234895] CPU: 1 PID: 17075 Comm: syz-executor2 Not tainted 5.0.0-rc4 #49 [ 443.242013] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 443.251365] Call Trace: [ 443.253962] dump_stack+0x1db/0x2d0 [ 443.257600] ? dump_stack_print_info.cold+0x20/0x20 [ 443.262636] dump_header+0x1e6/0x116c [ 443.266473] ? add_lock_to_list.isra.0+0x450/0x450 [ 443.271411] ? print_usage_bug+0xd0/0xd0 [ 443.275486] ? pagefault_out_of_memory+0x1a1/0x1a1 [ 443.280428] ? ___ratelimit+0x37c/0x686 [ 443.284417] ? mark_held_locks+0xb1/0x100 [ 443.288575] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 443.293687] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 443.298801] ? lockdep_hardirqs_on+0x415/0x5d0 [ 443.303388] ? trace_hardirqs_on+0xbd/0x310 [ 443.307716] ? kasan_check_read+0x11/0x20 [ 443.311885] ? ___ratelimit+0x37c/0x686 [ 443.315870] ? trace_hardirqs_off_caller+0x300/0x300 [ 443.320977] ? do_raw_spin_trylock+0x270/0x270 [ 443.325568] ? trace_hardirqs_on_caller+0x310/0x310 [ 443.330586] ? lock_acquire+0x1db/0x570 [ 443.334573] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 443.339686] ? ___ratelimit+0xac/0x686 [ 443.343584] ? idr_get_free+0xee0/0xee0 [ 443.347580] ? lockdep_hardirqs_on+0x415/0x5d0 [ 443.352202] oom_kill_process.cold+0x10/0x9d4 [ 443.356711] ? cgroup_procs_next+0x70/0x70 [ 443.360956] ? _raw_spin_unlock_irq+0x5e/0x90 [ 443.365457] ? oom_badness+0xa50/0xa50 [ 443.369352] ? oom_evaluate_task+0x540/0x540 [ 443.373768] ? mem_cgroup_iter_break+0x30/0x30 [ 443.378374] ? mutex_trylock+0x2d0/0x2d0 [ 443.382454] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 443.388014] ? rcu_read_unlock_special+0x380/0x380 [ 443.392960] out_of_memory+0x885/0x1420 [ 443.396942] ? mem_cgroup_iter+0x508/0xf30 [ 443.401197] ? oom_killer_disable+0x340/0x340 [ 443.405741] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 443.410877] ? lock_acquire+0x1db/0x570 [ 443.414889] mem_cgroup_out_of_memory+0x160/0x210 [ 443.419748] ? do_raw_spin_unlock+0xa0/0x330 [ 443.424172] ? memcg_memory_event+0x40/0x40 [ 443.428494] ? do_raw_spin_trylock+0x270/0x270 [ 443.433090] ? _raw_spin_unlock+0x2d/0x50 [ 443.437252] try_charge+0x12a9/0x19b0 [ 443.441051] ? lock_downgrade+0x910/0x910 [ 443.445211] ? kasan_check_read+0x11/0x20 [ 443.449388] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 443.454239] ? get_mem_cgroup_from_mm+0x1cd/0x420 [ 443.459100] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 443.464646] ? lock_downgrade+0x910/0x910 [ 443.468807] ? kasan_check_read+0x11/0x20 [ 443.472988] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 443.478391] ? rcu_read_unlock_special+0x380/0x380 [ 443.483342] ? get_mem_cgroup_from_mm+0x1ea/0x420 [ 443.488201] memcg_kmem_charge_memcg+0x7c/0x130 [ 443.492873] ? memcg_kmem_put_cache+0xb0/0xb0 [ 443.497368] ? lock_release+0xc40/0xc40 [ 443.501354] memcg_kmem_charge+0x13b/0x340 [ 443.505643] __alloc_pages_nodemask+0x7b8/0xdc0 [ 443.510332] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 443.515355] ? rcu_pm_notify+0xd0/0xd0 [ 443.519278] ? rcu_read_lock_sched_held+0x110/0x130 [ 443.524299] ? kmem_cache_alloc_node+0x347/0x710 [ 443.529077] copy_process+0x847/0x8860 [ 443.532970] ? pmd_devmap_trans_unstable+0x1d0/0x1d0 [ 443.538081] ? add_lock_to_list.isra.0+0x450/0x450 [ 443.543019] ? reacquire_held_locks+0xfb/0x520 [ 443.547633] ? alloc_set_pte+0x134a/0x1df0 [ 443.551884] ? find_held_lock+0x60/0x120 [ 443.555961] ? __cleanup_sighand+0x70/0x70 [ 443.560201] ? lock_downgrade+0x910/0x910 [ 443.564369] ? kasan_check_read+0x11/0x20 [ 443.568537] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 443.573820] ? rcu_read_unlock_special+0x380/0x380 [ 443.578767] ? filemap_map_pages+0xe14/0x1cb0 [ 443.583283] ? print_usage_bug+0xd0/0xd0 [ 443.587351] ? print_usage_bug+0xd0/0xd0 [ 443.591418] ? drop_futex_key_refs.isra.0+0x6f/0xf0 [ 443.596447] ? __lock_acquire+0x572/0x4a30 [ 443.600699] ? __handle_mm_fault+0x3fde/0x55a0 [ 443.605295] ? mark_held_locks+0x100/0x100 [ 443.609543] ? kasan_check_read+0x11/0x20 [ 443.613698] ? do_raw_spin_unlock+0xa0/0x330 [ 443.618108] ? do_raw_spin_trylock+0x270/0x270 [ 443.622706] ? add_mm_counter_fast.part.0+0x40/0x40 [ 443.627726] ? save_stack+0x45/0xd0 [ 443.631371] ? add_lock_to_list.isra.0+0x450/0x450 [ 443.636306] ? add_lock_to_list.isra.0+0x450/0x450 [ 443.641258] ? __handle_mm_fault+0x955/0x55a0 [ 443.645783] ? __might_fault+0x12b/0x1e0 [ 443.649861] ? find_held_lock+0x35/0x120 [ 443.653930] ? __might_fault+0x12b/0x1e0 [ 443.658026] ? lock_acquire+0x1db/0x570 [ 443.662014] ? lock_downgrade+0x910/0x910 [ 443.666176] ? lock_release+0xc40/0xc40 [ 443.670168] ? trace_hardirqs_off_caller+0x300/0x300 [ 443.675285] _do_fork+0x1a9/0x1170 [ 443.678840] ? fork_idle+0x1d0/0x1d0 [ 443.682554] ? kasan_check_read+0x11/0x20 [ 443.686704] ? _copy_to_user+0xc9/0x120 [ 443.690710] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 443.696251] ? put_timespec64+0x115/0x1b0 [ 443.700402] ? nsecs_to_jiffies+0x30/0x30 [ 443.704562] ? do_syscall_64+0x8c/0x800 [ 443.708545] ? do_syscall_64+0x8c/0x800 [ 443.712527] ? lockdep_hardirqs_on+0x415/0x5d0 [ 443.717121] ? trace_hardirqs_on+0xbd/0x310 [ 443.721450] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 443.726996] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 443.732375] ? trace_hardirqs_off_caller+0x300/0x300 [ 443.737495] __x64_sys_clone+0xbf/0x150 [ 443.741486] do_syscall_64+0x1a3/0x800 [ 443.745385] ? syscall_return_slowpath+0x5f0/0x5f0 [ 443.750324] ? prepare_exit_to_usermode+0x232/0x3b0 [ 443.755357] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 443.760214] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 443.765403] RIP: 0033:0x458099 [ 443.768603] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 443.787503] RSP: 002b:00007fe2862d6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 443.795213] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000458099 [ 443.802502] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0020002102001fff [ 443.809771] RBP: 000000000073bf00 R08: ffffffffffffffff R09: 0000000000000000 [ 443.817042] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2862d76d4 [ 443.824331] R13: 00000000004be480 R14: 00000000004cea40 R15: 00000000ffffffff [ 443.840317] memory: usage 307172kB, limit 307200kB, failcnt 1023 [ 443.848774] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 443.866091] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 443.883592] Memory cgroup stats for /syz2: cache:0KB rss:252468KB rss_huge:229376KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:252572KB inactive_file:0KB active_file:0KB unevictable:0KB 17:56:28 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, 0x0) read(r0, &(0x7f0000000040)=""/6, 0xe) 17:56:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:56:28 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045772, &(0x7f0000000100)) 17:56:28 executing program 5: r0 = socket$inet_sctp(0x2, 0x205, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000000000000, 0x0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x7, [0x5, 0xd23, 0x0, 0x0, 0x0, 0x80, 0x8001]}, &(0x7f0000000180)=0x12) r1 = dup3(0xffffffffffffffff, r0, 0x80000) clone(0x802122101ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0xa0, &(0x7f00000007c0)=[@in={0x2, 0x4e21, @rand_addr=0x3ff}, @in={0x2, 0x4e20, @multicast2}, @in6={0xa, 0x4e21, 0xe, @mcast2, 0x1}, @in6={0xa, 0x4e24, 0xfffffffffffffffe, @loopback, 0x71e7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1b}}, @in6={0xa, 0x0, 0x0, @mcast2, 0x8}, @in6={0xa, 0x4e21, 0x1f, @mcast1, 0x3}]}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, 0x0, &(0x7f0000000500)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="f8f18e3c308d8552bc958d3f953b1b5cd7512e3ca390f332daea5921b8a730a840aa264671ee95026709d267e94b52b633e2df16", 0x34, 0xfffffffffffffff8) keyctl$assume_authority(0x10, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r1, 0x8040ae69, &(0x7f0000000100)={0x7, 0x1ff, 0xae3, 0x1, 0x5}) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000005ed0050bfa30000000000000703000028feffff7a0af0fff8ffffff71a4f0ff00000000b7060000000000012d400500000000005504000001ed00001d040000000000002c460000000000006b0a00fe000000008500000007000000b7000000000000009500000000000000"], 0x0}, 0x48) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000580)={0x0, 0x8, 0x0, 0x400}, 0x10) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f00000000c0)={0x1, 0xdc81}, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f00000004c0)=0x9) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000680)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x38, 0x0, {"57bb98dec69283b091a00f37fcfaa104d1b505872e5cc4b155d4dac6bc"}}}, 0x0, 0x3a}, 0x20) exit(0x0) [ 443.969928] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor2,pid=11496,uid=0 17:56:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:56:28 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045773, &(0x7f0000000100)) 17:56:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 444.030038] Memory cgroup out of memory: Kill process 11496 (syz-executor2) score 1113 or sacrifice child [ 444.061021] Killed process 11496 (syz-executor2) total-vm:72576kB, anon-rss:2192kB, file-rss:35788kB, shmem-rss:0kB [ 444.135401] syz-executor2 invoked oom-killer: gfp_mask=0x7080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 444.176134] CPU: 1 PID: 17073 Comm: syz-executor2 Not tainted 5.0.0-rc4 #49 [ 444.183259] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 444.192609] Call Trace: [ 444.195225] dump_stack+0x1db/0x2d0 [ 444.198857] ? dump_stack_print_info.cold+0x20/0x20 [ 444.203895] dump_header+0x1e6/0x116c [ 444.207734] ? add_lock_to_list.isra.0+0x450/0x450 [ 444.212677] ? print_usage_bug+0xd0/0xd0 [ 444.216750] ? pagefault_out_of_memory+0x1a1/0x1a1 [ 444.221719] ? ___ratelimit+0x37c/0x686 [ 444.225705] ? mark_held_locks+0xb1/0x100 [ 444.229864] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 444.234969] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 444.240079] ? lockdep_hardirqs_on+0x415/0x5d0 [ 444.244671] ? trace_hardirqs_on+0xbd/0x310 [ 444.248995] ? kasan_check_read+0x11/0x20 [ 444.253144] ? ___ratelimit+0x37c/0x686 [ 444.257131] ? trace_hardirqs_off_caller+0x300/0x300 [ 444.262261] ? do_raw_spin_trylock+0x270/0x270 [ 444.266857] ? trace_hardirqs_on_caller+0x310/0x310 [ 444.271878] ? lock_acquire+0x1db/0x570 [ 444.275867] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 444.280978] ? ___ratelimit+0xac/0x686 [ 444.284871] ? idr_get_free+0xee0/0xee0 [ 444.288852] ? lockdep_hardirqs_on+0x415/0x5d0 [ 444.293451] oom_kill_process.cold+0x10/0x9d4 [ 444.297953] ? cgroup_procs_next+0x70/0x70 [ 444.302196] ? _raw_spin_unlock_irq+0x5e/0x90 [ 444.306737] ? oom_badness+0xa50/0xa50 [ 444.310648] ? oom_evaluate_task+0x540/0x540 [ 444.315068] ? mem_cgroup_iter_break+0x30/0x30 [ 444.319654] ? mutex_trylock+0x2d0/0x2d0 [ 444.323727] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 444.329280] ? rcu_read_unlock_special+0x380/0x380 [ 444.334224] out_of_memory+0x885/0x1420 [ 444.338207] ? mem_cgroup_iter+0x508/0xf30 [ 444.342446] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 444.347555] ? oom_killer_disable+0x340/0x340 [ 444.352091] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 444.357200] ? lock_acquire+0x1db/0x570 [ 444.361202] mem_cgroup_out_of_memory+0x160/0x210 [ 444.366064] ? do_raw_spin_unlock+0xa0/0x330 [ 444.370509] ? memcg_memory_event+0x40/0x40 [ 444.374860] ? do_raw_spin_trylock+0x270/0x270 [ 444.379475] ? _raw_spin_unlock+0x2d/0x50 [ 444.383634] try_charge+0xd44/0x19b0 [ 444.387352] ? lock_downgrade+0x910/0x910 [ 444.391503] ? kasan_check_read+0x11/0x20 [ 444.395673] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 444.400518] ? get_mem_cgroup_from_mm+0x1cd/0x420 [ 444.405368] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 444.410913] ? lock_downgrade+0x910/0x910 [ 444.415064] ? kasan_check_read+0x11/0x20 [ 444.419236] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 444.424516] ? rcu_read_unlock_special+0x380/0x380 [ 444.429476] ? get_mem_cgroup_from_mm+0x1ea/0x420 [ 444.434330] memcg_kmem_charge_memcg+0x7c/0x130 [ 444.439007] ? memcg_kmem_put_cache+0xb0/0xb0 [ 444.443506] ? lock_release+0xc40/0xc40 [ 444.447497] memcg_kmem_charge+0x13b/0x340 [ 444.451745] __alloc_pages_nodemask+0x7b8/0xdc0 [ 444.456422] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 444.461438] ? rcu_pm_notify+0xd0/0xd0 [ 444.465337] ? rcu_read_lock_sched_held+0x110/0x130 [ 444.470356] ? kmem_cache_alloc_node+0x347/0x710 [ 444.475112] ? print_usage_bug+0xd0/0xd0 [ 444.479206] copy_process+0x847/0x8860 [ 444.483101] ? print_usage_bug+0xd0/0xd0 [ 444.487180] ? rcu_read_unlock+0x16/0x60 [ 444.491256] ? __lock_acquire+0x572/0x4a30 [ 444.495492] ? mark_held_locks+0x100/0x100 [ 444.499741] ? __cleanup_sighand+0x70/0x70 [ 444.503994] ? mark_held_locks+0x100/0x100 [ 444.508267] ? find_held_lock+0x35/0x120 [ 444.512337] ? mark_held_locks+0x100/0x100 [ 444.516582] ? delayacct_end+0xc9/0x100 [ 444.520581] ? add_lock_to_list.isra.0+0x450/0x450 [ 444.525518] ? lock_acquire+0x1db/0x570 [ 444.529502] ? add_lock_to_list.isra.0+0x450/0x450 [ 444.534431] ? find_held_lock+0x35/0x120 [ 444.538530] ? print_usage_bug+0xd0/0xd0 [ 444.542605] ? psi_memstall_leave+0x1f8/0x280 [ 444.547109] ? find_held_lock+0x35/0x120 [ 444.551189] ? __lock_acquire+0x572/0x4a30 [ 444.555436] ? _raw_spin_unlock_irq+0x28/0x90 [ 444.559938] ? _raw_spin_unlock_irq+0x28/0x90 [ 444.564437] ? lockdep_hardirqs_on+0x415/0x5d0 [ 444.569023] ? trace_hardirqs_on+0xbd/0x310 [ 444.573353] ? mark_held_locks+0x100/0x100 [ 444.577589] ? check_preemption_disabled+0x48/0x290 [ 444.582614] ? rcu_lockdep_current_cpu_online+0x1aa/0x220 [ 444.588169] ? rcu_pm_notify+0xd0/0xd0 [ 444.592076] ? add_lock_to_list.isra.0+0x450/0x450 [ 444.597020] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 444.602560] ? try_to_free_mem_cgroup_pages+0x597/0xcd0 [ 444.607926] ? lockdep_hardirqs_on+0x415/0x5d0 [ 444.612517] ? try_to_free_pages+0xb70/0xb70 [ 444.616971] ? percpu_ref_put_many+0x129/0x270 [ 444.621593] ? blkcg_maybe_throttle_current+0x75e/0x1400 [ 444.627051] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 444.632598] _do_fork+0x1a9/0x1170 [ 444.636162] ? fork_idle+0x1d0/0x1d0 [ 444.639907] ? trace_hardirqs_off+0xb8/0x310 [ 444.644332] ? get_mctgt_type_thp.isra.0+0x4c0/0x4c0 [ 444.649441] ? prepare_exit_to_usermode+0x32e/0x3b0 [ 444.654477] ? do_syscall_64+0x8c/0x800 [ 444.658460] ? do_syscall_64+0x8c/0x800 [ 444.662438] ? lockdep_hardirqs_on+0x415/0x5d0 [ 444.667026] ? trace_hardirqs_on+0xbd/0x310 [ 444.671368] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 444.676738] ? trace_hardirqs_off_caller+0x300/0x300 [ 444.681854] __x64_sys_clone+0xbf/0x150 [ 444.685840] do_syscall_64+0x1a3/0x800 [ 444.689739] ? syscall_return_slowpath+0x5f0/0x5f0 [ 444.694682] ? prepare_exit_to_usermode+0x232/0x3b0 [ 444.699712] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 444.704573] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 444.709764] RIP: 0033:0x45aa69 17:56:29 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045774, &(0x7f0000000100)) [ 444.712960] Code: ff 48 85 f6 0f 84 97 8d fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c 6e 8d fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 444.731890] RSP: 002b:00007fff32860c38 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 444.739598] RAX: ffffffffffffffda RBX: 00007fe2862b6700 RCX: 000000000045aa69 [ 444.746868] RDX: 00007fe2862b69d0 RSI: 00007fe2862b5db0 RDI: 00000000003d0f00 [ 444.754135] RBP: 00007fff32860e40 R08: 00007fe2862b6700 R09: 00007fe2862b6700 [ 444.761414] R10: 00007fe2862b69d0 R11: 0000000000000202 R12: 0000000000000000 [ 444.768690] R13: 00007fff32860cef R14: 00007fe2862b69c0 R15: 0000000000000001 17:56:29 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 444.802103] memory: usage 304860kB, limit 307200kB, failcnt 1033 [ 444.812307] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 444.843092] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 444.864736] Memory cgroup stats for /syz2: cache:0KB rss:250380KB rss_huge:227328KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:250424KB inactive_file:0KB active_file:0KB unevictable:0KB [ 444.920023] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor2,pid=11729,uid=0 [ 444.940501] XFS (loop4): Invalid superblock magic number [ 444.955335] Memory cgroup out of memory: Kill process 11729 (syz-executor2) score 1113 or sacrifice child [ 444.966365] Killed process 11729 (syz-executor2) total-vm:72576kB, anon-rss:2192kB, file-rss:35788kB, shmem-rss:0kB [ 444.995448] SELinux: security policydb version 15 (MLS) not backwards compatible [ 445.005260] SELinux: failed to load policy 17:56:29 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000010000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:56:29 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="24000000220007031dfffd946f610500020000000500000000000000421ba3a20400ff7e", 0x24}], 0x1}, 0x0) setsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000000)="3d0f18035a0d8d3e70a47f59767a87567668538dbe2752582fd644c7572b17ab", 0x20) recvmsg(r0, &(0x7f0000001640)={0x0, 0x0, 0x0}, 0x0) 17:56:29 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, 0x0) read(r0, &(0x7f0000000040)=""/6, 0xe) 17:56:29 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:56:29 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045775, &(0x7f0000000100)) [ 445.013870] SELinux: security policydb version 15 (MLS) not backwards compatible [ 445.022173] SELinux: failed to load policy 17:56:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:56:30 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045776, &(0x7f0000000100)) 17:56:30 executing program 5: r0 = shmget(0x2, 0x1000, 0x1000, &(0x7f0000fff000/0x1000)=nil) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000080)={{{@in6=@mcast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000000)=0xe8) getgroups(0x8, &(0x7f0000000180)=[0xee01, 0x0, 0xee01, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xee00]) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x48180, 0x0) ioctl$TIOCGETD(r3, 0x5424, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@empty}}, &(0x7f00000002c0)=0xe8) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xffffffffffffffff]) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000340)=0x0) r7 = fcntl$getown(0xffffffffffffff9c, 0x9) r8 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x800, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r8, 0x84, 0x15, &(0x7f0000000400)={0x800}, 0x1) shmctl$IPC_SET(r0, 0x1, &(0x7f0000000380)={{0x7, r1, r2, r4, r5, 0x4, 0x800}, 0x80000001, 0x1, 0x1, 0xa5, r6, r7, 0x101}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) clone(0x4000, 0x0, 0x0, 0x0, 0x0) r10 = getpid() waitid(0x2, r10, 0x0, 0x41000007, 0x0) 17:56:30 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 445.116526] SELinux: security policydb version 15 (MLS) not backwards compatible [ 445.156202] SELinux: failed to load policy 17:56:30 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045777, &(0x7f0000000100)) 17:56:30 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 445.182801] SELinux: security policydb version 15 (MLS) not backwards compatible [ 445.199759] QAT: Invalid ioctl [ 445.206894] SELinux: failed to load policy 17:56:30 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000011000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 445.267363] XFS (loop4): Invalid superblock magic number 17:56:30 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x10}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:56:30 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045778, &(0x7f0000000100)) [ 445.378608] SELinux: security policydb version 15 (MLS) not backwards compatible [ 445.394307] SELinux: security policydb version 15 (MLS) not backwards compatible 17:56:30 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, 0x0) read(r0, &(0x7f0000000040)=""/6, 0xe) 17:56:30 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000012000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:56:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:56:30 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x20003846}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:56:30 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045779, &(0x7f0000000100)) [ 445.984912] SELinux: security policydb version 15 (MLS) not backwards compatible [ 445.999193] QAT: Invalid ioctl [ 446.014652] SELinux: security policydb version 15 (MLS) not backwards compatible 17:56:31 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='io.stat\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100), 0x10) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000040)=ANY=[@ANYBLOB="03000000900000000000"], &(0x7f00000000c0)=0xa) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) fcntl$setsig(r0, 0xa, 0x1d) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x8042, 0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000200)={0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @remote}}}}, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000100)) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000002c0)='ip6tnl0\x00') 17:56:31 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c000000002e000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:56:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x7ffff000}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:56:31 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x200000088004577a, &(0x7f0000000100)) [ 446.082293] XFS (loop4): Invalid superblock magic number 17:56:31 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000054000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 446.141146] SELinux: security policydb version 15 (MLS) not backwards compatible 17:56:31 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x200000088004577b, &(0x7f0000000100)) 17:56:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0xffffffffffffffff}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 446.319393] SELinux: security policydb version 15 (MLS) not backwards compatible [ 446.353529] SELinux: security policydb version 15 (MLS) not backwards compatible 17:56:31 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(0xffffffffffffffff, &(0x7f0000000040)=""/6, 0xe) 17:56:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:56:31 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x200000088004577c, &(0x7f0000000100)) 17:56:31 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000009020000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:56:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0xfa00}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:56:31 executing program 5: syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x3, 0x101000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0x0, 0x0, 0xfffffffffffffe03}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents(r0, &(0x7f0000000040)=""/46, 0x2e) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) lsetxattr$trusted_overlay_nlink(0x0, &(0x7f0000000300)='trusted.overlay.nlink\x00', &(0x7f0000000380)={'L+', 0x79}, 0x28, 0x0) write$eventfd(r0, &(0x7f0000000000)=0x9, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') read(0xffffffffffffffff, 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:56:31 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x200000088004577d, &(0x7f0000000100)) 17:56:31 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000009030000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 446.933174] SELinux: security policydb version 15 (MLS) not backwards compatible 17:56:32 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000009040000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 447.055981] SELinux: security policydb version 15 (MLS) not backwards compatible [ 447.076920] XFS (loop4): Invalid superblock magic number 17:56:32 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x1fa00}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 447.181786] device nr0 entered promiscuous mode 17:56:32 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x200000088004577e, &(0x7f0000000100)) 17:56:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) [ 447.245286] SELinux: security policydb version 15 (MLS) not backwards compatible [ 447.269039] SELinux: security policydb version 15 (MLS) not backwards compatible [ 447.477438] XFS (loop4): Invalid superblock magic number 17:56:32 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(0xffffffffffffffff, &(0x7f0000000040)=""/6, 0xe) 17:56:32 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000009050000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:56:32 executing program 5: r0 = memfd_create(0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)=0x0) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0xb9e9fce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, r1, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000002580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r3 = syz_open_dev$dspn(&(0x7f0000000200)='/dev/dsp#\x00', 0x4, 0x400000) ioctl$EVIOCSKEYCODE(r3, 0x40084504, &(0x7f0000000280)=[0x8, 0x4]) ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f00000002c0)=""/50) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$NBD_SET_TIMEOUT(0xffffffffffffffff, 0xab09, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000a00)=@assoc_value={0x0}, 0x0) r5 = openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_CONTEXT(r5, 0x84, 0x11, &(0x7f0000000240)={r4}, 0x8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@initdev, @in6=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000300)=0xe8) sendmsg$nl_netfilter(r0, 0x0, 0x10) mkdirat(0xffffffffffffffff, 0x0, 0x80) r6 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x21) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r6, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x5, 0x4500000000000003, 0x2200, 0x0, 0xa0008000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xebffffff, 0x3f00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r6, &(0x7f0000000100)={0xc, 0x8, 0xfa00, {0x0}}, 0x10) msgget$private(0x0, 0x1) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x1) getsockname$netlink(r0, &(0x7f0000000040), &(0x7f0000000080)=0xc) msgget$private(0x0, 0xa07e6c5876c5528a) ioctl$SIOCRSGCAUSE(r6, 0x89e0, &(0x7f0000000140)) 17:56:32 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045782, &(0x7f0000000100)) 17:56:32 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x2fa00}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:56:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) [ 447.850968] SELinux: security policydb version 15 (MLS) not backwards compatible 17:56:32 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x3fa00}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:56:32 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045783, &(0x7f0000000100)) [ 447.884776] audit: type=1804 audit(1548698192.778:92): pid=17308 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir103046459/syzkaller.0k5Fj6/306/bus" dev="sda1" ino=16635 res=1 [ 447.929125] sel_write_load: 11 callbacks suppressed [ 447.929129] SELinux: failed to load policy [ 447.969245] SELinux: security policydb version 15 (MLS) not backwards compatible [ 448.002809] SELinux: failed to load policy [ 448.013543] device nr0 entered promiscuous mode 17:56:32 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045784, &(0x7f0000000100)) 17:56:32 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000009060000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:56:32 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x4fa00}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 448.108018] audit: type=1804 audit(1548698192.998:93): pid=17308 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor5" name="/root/syzkaller-testdir103046459/syzkaller.0k5Fj6/306/bus" dev="sda1" ino=16635 res=1 [ 448.188208] SELinux: security policydb version 15 (MLS) not backwards compatible [ 448.190110] audit: type=1804 audit(1548698193.048:94): pid=17324 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir103046459/syzkaller.0k5Fj6/306/bus" dev="sda1" ino=16635 res=1 [ 448.214140] SELinux: failed to load policy [ 448.229772] XFS (loop4): Invalid superblock magic number 17:56:33 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000009070000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 448.246858] SELinux: security policydb version 15 (MLS) not backwards compatible [ 448.281594] SELinux: failed to load policy [ 448.380818] SELinux: security policydb version 15 (MLS) not backwards compatible [ 448.420854] syz-executor2 invoked oom-killer: gfp_mask=0x7080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 448.440182] SELinux: failed to load policy [ 448.444608] CPU: 0 PID: 17356 Comm: syz-executor2 Not tainted 5.0.0-rc4 #49 [ 448.451710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 448.461068] Call Trace: [ 448.463665] dump_stack+0x1db/0x2d0 [ 448.467306] ? dump_stack_print_info.cold+0x20/0x20 [ 448.472340] dump_header+0x1e6/0x116c [ 448.476161] ? add_lock_to_list.isra.0+0x450/0x450 [ 448.481111] ? print_usage_bug+0xd0/0xd0 [ 448.485195] ? pagefault_out_of_memory+0x1a1/0x1a1 [ 448.490134] ? ___ratelimit+0x37c/0x686 [ 448.494138] ? mark_held_locks+0xb1/0x100 [ 448.498314] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 448.503426] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 448.508534] ? lockdep_hardirqs_on+0x415/0x5d0 [ 448.513144] ? trace_hardirqs_on+0xbd/0x310 [ 448.517502] ? kasan_check_read+0x11/0x20 [ 448.521654] ? ___ratelimit+0x37c/0x686 [ 448.525641] ? trace_hardirqs_off_caller+0x300/0x300 [ 448.530750] ? do_raw_spin_trylock+0x270/0x270 [ 448.535336] ? trace_hardirqs_on_caller+0x310/0x310 [ 448.540354] ? lock_acquire+0x1db/0x570 [ 448.544342] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 448.549455] ? ___ratelimit+0xac/0x686 [ 448.553356] ? idr_get_free+0xee0/0xee0 [ 448.557336] ? lockdep_hardirqs_on+0x415/0x5d0 [ 448.561938] oom_kill_process.cold+0x10/0x9d4 [ 448.566444] ? cgroup_procs_next+0x70/0x70 [ 448.570690] ? _raw_spin_unlock_irq+0x5e/0x90 [ 448.575204] ? oom_badness+0xa50/0xa50 [ 448.579100] ? oom_evaluate_task+0x540/0x540 [ 448.583516] ? mem_cgroup_iter_break+0x30/0x30 [ 448.588101] ? mutex_trylock+0x2d0/0x2d0 [ 448.592180] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 448.597736] ? rcu_read_unlock_special+0x380/0x380 [ 448.602679] out_of_memory+0x885/0x1420 [ 448.606661] ? mem_cgroup_iter+0x508/0xf30 [ 448.610908] ? oom_killer_disable+0x340/0x340 [ 448.615411] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 448.620521] ? lock_acquire+0x1db/0x570 [ 448.624513] mem_cgroup_out_of_memory+0x160/0x210 [ 448.629357] ? do_raw_spin_unlock+0xa0/0x330 [ 448.633771] ? memcg_memory_event+0x40/0x40 [ 448.638100] ? do_raw_spin_trylock+0x270/0x270 [ 448.642692] ? _raw_spin_unlock+0x2d/0x50 [ 448.646851] try_charge+0x12a9/0x19b0 [ 448.650654] ? lock_downgrade+0x910/0x910 [ 448.654808] ? kasan_check_read+0x11/0x20 [ 448.658966] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 448.663816] ? get_mem_cgroup_from_mm+0x1cd/0x420 [ 448.668679] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 448.674224] ? lock_downgrade+0x910/0x910 [ 448.678372] ? kasan_check_read+0x11/0x20 [ 448.682527] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 448.687808] ? rcu_read_unlock_special+0x380/0x380 [ 448.692760] ? get_mem_cgroup_from_mm+0x1ea/0x420 [ 448.697613] memcg_kmem_charge_memcg+0x7c/0x130 [ 448.702290] ? memcg_kmem_put_cache+0xb0/0xb0 [ 448.706790] ? lock_release+0xc40/0xc40 [ 448.710837] memcg_kmem_charge+0x13b/0x340 [ 448.715082] __alloc_pages_nodemask+0x7b8/0xdc0 [ 448.719764] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 448.724789] ? rcu_pm_notify+0xd0/0xd0 [ 448.728688] ? rcu_read_lock_sched_held+0x110/0x130 [ 448.733713] ? kmem_cache_alloc_node+0x347/0x710 [ 448.738472] ? print_usage_bug+0xd0/0xd0 [ 448.742548] copy_process+0x847/0x8860 [ 448.746447] ? update_load_avg+0x2f8/0x23b0 [ 448.750781] ? __update_load_avg_blocked_se+0x670/0x670 [ 448.756173] ? __update_load_avg_se+0xa80/0xa80 [ 448.760857] ? attach_entity_load_avg+0x810/0x810 [ 448.765720] ? __cleanup_sighand+0x70/0x70 [ 448.769962] ? print_usage_bug+0xd0/0xd0 [ 448.774050] ? rb_insert_color+0x12e0/0x12e0 [ 448.778461] ? mark_held_locks+0x100/0x100 [ 448.782707] ? add_lock_to_list.isra.0+0x450/0x450 [ 448.787651] ? __lock_acquire+0x572/0x4a30 [ 448.791892] ? add_lock_to_list.isra.0+0x450/0x450 [ 448.796827] ? __lock_is_held+0xb6/0x140 [ 448.800905] ? mark_held_locks+0x100/0x100 [ 448.805170] ? set_next_entity+0x2ef/0xb00 [ 448.809416] ? update_load_avg+0x23b0/0x23b0 [ 448.813833] ? add_lock_to_list.isra.0+0x450/0x450 [ 448.818784] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 448.824334] ? check_preemption_disabled+0x48/0x290 [ 448.829358] ? check_preemption_disabled+0x48/0x290 [ 448.834387] ? finish_task_switch+0x1e9/0xac0 [ 448.838888] ? find_held_lock+0x35/0x120 [ 448.842958] ? finish_task_switch+0x1e9/0xac0 [ 448.847465] ? _raw_spin_unlock_irq+0x28/0x90 [ 448.851967] ? _raw_spin_unlock_irq+0x28/0x90 [ 448.856470] ? lockdep_hardirqs_on+0x415/0x5d0 [ 448.861074] ? trace_hardirqs_on+0xbd/0x310 [ 448.865397] ? kasan_check_read+0x11/0x20 [ 448.869550] ? finish_task_switch+0x1e9/0xac0 [ 448.874050] ? trace_hardirqs_off_caller+0x300/0x300 [ 448.879173] ? do_raw_spin_trylock+0x270/0x270 [ 448.883767] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 448.889313] ? _raw_spin_unlock_irq+0x5e/0x90 [ 448.893813] ? finish_task_switch+0x1e9/0xac0 [ 448.898315] ? finish_task_switch+0x1a8/0xac0 [ 448.902812] ? __switch_to_asm+0x34/0x70 [ 448.906906] ? __switch_to_asm+0x40/0x70 [ 448.910972] ? __switch_to_asm+0x34/0x70 [ 448.915037] ? preempt_notifier_register+0x200/0x200 [ 448.920143] ? __switch_to_asm+0x34/0x70 [ 448.924227] ? __switch_to_asm+0x40/0x70 [ 448.928289] ? __switch_to_asm+0x34/0x70 [ 448.932359] ? __switch_to_asm+0x34/0x70 [ 448.936421] ? __switch_to_asm+0x34/0x70 [ 448.940490] ? __switch_to_asm+0x40/0x70 [ 448.944556] ? __switch_to_asm+0x34/0x70 [ 448.948627] ? __switch_to_asm+0x40/0x70 [ 448.952705] ? __schedule+0x89f/0x1e60 [ 448.956607] _do_fork+0x1a9/0x1170 [ 448.960176] ? lockdep_hardirqs_on+0x415/0x5d0 [ 448.964773] ? fork_idle+0x1d0/0x1d0 [ 448.968495] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 448.973951] ? retint_kernel+0x1b/0x2d [ 448.977867] ? trace_hardirqs_on_caller+0x310/0x310 [ 448.982898] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 448.987667] ? retint_kernel+0x2d/0x2d [ 448.991574] __x64_sys_clone+0xbf/0x150 [ 448.995554] ? do_syscall_64+0xbc/0x800 [ 448.999535] do_syscall_64+0x1a3/0x800 [ 449.003433] ? syscall_return_slowpath+0x5f0/0x5f0 [ 449.008371] ? prepare_exit_to_usermode+0x232/0x3b0 [ 449.013400] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 449.018260] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 449.023467] RIP: 0033:0x45aa69 [ 449.026663] Code: ff 48 85 f6 0f 84 97 8d fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c 6e 8d fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 449.045562] RSP: 002b:00007fff32860c38 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 449.053271] RAX: ffffffffffffffda RBX: 00007fe2862b6700 RCX: 000000000045aa69 [ 449.060542] RDX: 00007fe2862b69d0 RSI: 00007fe2862b5db0 RDI: 00000000003d0f00 [ 449.067809] RBP: 00007fff32860e40 R08: 00007fe2862b6700 R09: 00007fe2862b6700 [ 449.075078] R10: 00007fe2862b69d0 R11: 0000000000000202 R12: 0000000000000000 [ 449.082347] R13: 00007fff32860cef R14: 00007fe2862b69c0 R15: 0000000000000001 [ 449.097631] memory: usage 307152kB, limit 307200kB, failcnt 1064 [ 449.141522] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 449.160184] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 449.173250] Memory cgroup stats for /syz2: cache:0KB rss:251236KB rss_huge:227328KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:251308KB inactive_file:4KB active_file:0KB unevictable:0KB 17:56:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:56:34 executing program 5: r0 = memfd_create(0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)=0x0) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0xb9e9fce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, r1, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000002580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r3 = syz_open_dev$dspn(&(0x7f0000000200)='/dev/dsp#\x00', 0x4, 0x400000) ioctl$EVIOCSKEYCODE(r3, 0x40084504, &(0x7f0000000280)=[0x8, 0x4]) ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f00000002c0)=""/50) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$NBD_SET_TIMEOUT(0xffffffffffffffff, 0xab09, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000a00)=@assoc_value={0x0}, 0x0) r5 = openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_CONTEXT(r5, 0x84, 0x11, &(0x7f0000000240)={r4}, 0x8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@initdev, @in6=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000300)=0xe8) sendmsg$nl_netfilter(r0, 0x0, 0x10) mkdirat(0xffffffffffffffff, 0x0, 0x80) r6 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x21) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r6, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x5, 0x4500000000000003, 0x2200, 0x0, 0xa0008000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xebffffff, 0x3f00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r6, &(0x7f0000000100)={0xc, 0x8, 0xfa00, {0x0}}, 0x10) msgget$private(0x0, 0x1) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x1) getsockname$netlink(r0, &(0x7f0000000040), &(0x7f0000000080)=0xc) msgget$private(0x0, 0xa07e6c5876c5528a) ioctl$SIOCRSGCAUSE(r6, 0x89e0, &(0x7f0000000140)) 17:56:34 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(0xffffffffffffffff, &(0x7f0000000040)=""/6, 0xe) 17:56:34 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045785, &(0x7f0000000100)) 17:56:34 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x5fa00}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 449.219967] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor2,pid=11805,uid=0 [ 449.249549] Memory cgroup out of memory: Kill process 11805 (syz-executor2) score 1113 or sacrifice child [ 449.303017] Killed process 11805 (syz-executor2) total-vm:72576kB, anon-rss:2192kB, file-rss:35788kB, shmem-rss:0kB [ 449.316594] audit: type=1804 audit(1548698194.218:95): pid=17370 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir103046459/syzkaller.0k5Fj6/307/bus" dev="sda1" ino=16710 res=1 17:56:34 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045786, &(0x7f0000000100)) 17:56:34 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x6fa00}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 449.417225] syz-executor2 invoked oom-killer: gfp_mask=0x7080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 449.441056] SELinux: security policydb version 15 (MLS) not backwards compatible [ 449.449263] device nr0 entered promiscuous mode [ 449.451546] CPU: 0 PID: 17358 Comm: syz-executor2 Not tainted 5.0.0-rc4 #49 [ 449.454303] XFS (loop4): Invalid superblock magic number [ 449.461124] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 449.461131] Call Trace: [ 449.461162] dump_stack+0x1db/0x2d0 [ 449.461189] ? dump_stack_print_info.cold+0x20/0x20 [ 449.461221] dump_header+0x1e6/0x116c [ 449.491074] ? add_lock_to_list.isra.0+0x450/0x450 [ 449.496020] ? print_usage_bug+0xd0/0xd0 [ 449.496172] SELinux: failed to load policy [ 449.500101] ? pagefault_out_of_memory+0x1a1/0x1a1 [ 449.500119] ? ___ratelimit+0x37c/0x686 [ 449.500140] ? mark_held_locks+0xb1/0x100 [ 449.500175] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 449.500190] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 449.500220] ? lockdep_hardirqs_on+0x415/0x5d0 [ 449.500236] ? trace_hardirqs_on+0xbd/0x310 [ 449.500252] ? kasan_check_read+0x11/0x20 [ 449.500268] ? ___ratelimit+0x37c/0x686 [ 449.500299] ? trace_hardirqs_off_caller+0x300/0x300 [ 449.500317] ? do_raw_spin_trylock+0x270/0x270 [ 449.554404] ? trace_hardirqs_on_caller+0x310/0x310 [ 449.559426] ? lock_acquire+0x1db/0x570 17:56:34 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045787, &(0x7f0000000100)) [ 449.563440] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 449.568580] ? ___ratelimit+0xac/0x686 [ 449.572480] ? idr_get_free+0xee0/0xee0 [ 449.576461] ? lockdep_hardirqs_on+0x415/0x5d0 [ 449.581059] oom_kill_process.cold+0x10/0x9d4 [ 449.585563] ? cgroup_procs_next+0x70/0x70 [ 449.589809] ? _raw_spin_unlock_irq+0x5e/0x90 [ 449.594318] ? oom_badness+0xa50/0xa50 [ 449.598229] ? oom_evaluate_task+0x540/0x540 [ 449.602653] ? mem_cgroup_iter_break+0x30/0x30 [ 449.607241] ? mutex_trylock+0x2d0/0x2d0 [ 449.611310] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 17:56:34 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fa00}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 449.616893] ? rcu_read_unlock_special+0x380/0x380 [ 449.621838] out_of_memory+0x885/0x1420 [ 449.625828] ? mem_cgroup_iter+0x508/0xf30 [ 449.630068] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 449.635191] ? oom_killer_disable+0x340/0x340 [ 449.635211] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 449.635227] ? lock_acquire+0x1db/0x570 [ 449.635251] mem_cgroup_out_of_memory+0x160/0x210 [ 449.644832] ? do_raw_spin_unlock+0xa0/0x330 [ 449.658030] ? memcg_memory_event+0x40/0x40 [ 449.662358] ? do_raw_spin_trylock+0x270/0x270 [ 449.666957] ? _raw_spin_unlock+0x2d/0x50 [ 449.671136] try_charge+0xd44/0x19b0 [ 449.674873] ? lock_downgrade+0x910/0x910 [ 449.679028] ? kasan_check_read+0x11/0x20 [ 449.683231] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 449.688094] ? get_mem_cgroup_from_mm+0x1cd/0x420 [ 449.692949] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 449.698500] ? lock_downgrade+0x910/0x910 [ 449.702654] ? kasan_check_read+0x11/0x20 [ 449.706810] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 449.712109] ? rcu_read_unlock_special+0x380/0x380 17:56:34 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045788, &(0x7f0000000100)) [ 449.717051] ? get_mem_cgroup_from_mm+0x1ea/0x420 [ 449.721903] memcg_kmem_charge_memcg+0x7c/0x130 [ 449.726579] ? memcg_kmem_put_cache+0xb0/0xb0 [ 449.731093] ? lock_release+0xc40/0xc40 [ 449.735079] memcg_kmem_charge+0x13b/0x340 [ 449.739360] __alloc_pages_nodemask+0x7b8/0xdc0 [ 449.744060] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 449.749097] ? rcu_pm_notify+0xd0/0xd0 [ 449.753005] ? rcu_read_lock_sched_held+0x110/0x130 [ 449.758031] ? kmem_cache_alloc_node+0x347/0x710 [ 449.762793] ? pci_mmcfg_check_reserved+0x170/0x170 17:56:34 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0xa00005fa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 449.767827] copy_process+0x847/0x8860 [ 449.771733] ? ___might_sleep+0x1e7/0x310 [ 449.775906] ? arch_local_save_flags+0x50/0x50 [ 449.780506] ? __schedule+0x1e60/0x1e60 [ 449.784486] ? do_raw_spin_trylock+0x270/0x270 [ 449.789132] ? __cleanup_sighand+0x70/0x70 [ 449.793386] ? futex_wait_queue_me+0x539/0x810 [ 449.797989] ? refill_pi_state_cache.part.0+0x310/0x310 [ 449.798005] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 449.798029] ? handle_futex_death+0x230/0x230 [ 449.798044] ? lock_acquire+0x1db/0x570 [ 449.816891] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 449.822085] ? drop_futex_key_refs.isra.0+0x6f/0xf0 [ 449.822102] ? futex_wait+0x6e6/0xa40 [ 449.822125] ? print_usage_bug+0xd0/0xd0 [ 449.822141] ? futex_wait_setup+0x430/0x430 [ 449.822176] ? drop_futex_key_refs.isra.0+0x6f/0xf0 [ 449.822199] ? __lock_acquire+0x572/0x4a30 [ 449.822231] ? mark_held_locks+0x100/0x100 [ 449.822252] ? do_futex+0x1b0/0x2910 [ 449.856611] ? save_stack+0xa9/0xd0 [ 449.860249] ? save_stack+0x45/0xd0 [ 449.863885] ? __kasan_slab_free+0x102/0x150 [ 449.868297] ? add_lock_to_list.isra.0+0x450/0x450 [ 449.873232] ? add_lock_to_list.isra.0+0x450/0x450 [ 449.878187] ? exit_robust_list+0x290/0x290 [ 449.882523] ? __might_fault+0x12b/0x1e0 [ 449.886620] ? find_held_lock+0x35/0x120 [ 449.890686] ? __might_fault+0x12b/0x1e0 [ 449.894757] ? lock_acquire+0x1db/0x570 [ 449.898743] ? lock_downgrade+0x910/0x910 [ 449.902899] ? lock_release+0xc40/0xc40 [ 449.906885] ? trace_hardirqs_off_caller+0x300/0x300 [ 449.911997] _do_fork+0x1a9/0x1170 [ 449.915549] ? fork_idle+0x1d0/0x1d0 [ 449.919271] ? kasan_check_read+0x11/0x20 [ 449.923430] ? _copy_to_user+0xc9/0x120 [ 449.927421] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 449.927460] ? put_timespec64+0x115/0x1b0 [ 449.927483] ? nsecs_to_jiffies+0x30/0x30 [ 449.941297] ? do_syscall_64+0x8c/0x800 [ 449.945284] ? do_syscall_64+0x8c/0x800 [ 449.945315] ? lockdep_hardirqs_on+0x415/0x5d0 [ 449.945343] ? trace_hardirqs_on+0xbd/0x310 [ 449.945367] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 449.963735] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 449.969131] ? trace_hardirqs_off_caller+0x300/0x300 [ 449.974277] __x64_sys_clone+0xbf/0x150 [ 449.978262] do_syscall_64+0x1a3/0x800 [ 449.982178] ? syscall_return_slowpath+0x5f0/0x5f0 [ 449.987113] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 449.992147] ? __switch_to_asm+0x34/0x70 [ 449.996235] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 450.001095] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 450.006307] RIP: 0033:0x458099 [ 450.009501] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 450.028863] RSP: 002b:00007fe2862d6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 450.036575] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000458099 [ 450.043849] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0020002102001fff [ 450.051117] RBP: 000000000073bf00 R08: ffffffffffffffff R09: 0000000000000000 [ 450.058384] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2862d76d4 [ 450.065659] R13: 00000000004be480 R14: 00000000004cea40 R15: 00000000ffffffff 17:56:35 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000009100000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 450.333531] memory: usage 304900kB, limit 307200kB, failcnt 1064 [ 450.353397] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 450.375500] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 450.400887] Memory cgroup stats for /syz2: cache:0KB rss:251220KB rss_huge:227328KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:251288KB inactive_file:4KB active_file:0KB unevictable:0KB [ 450.423691] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor2,pid=11942,uid=0 17:56:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:56:35 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x8, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:56:35 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, 0x0, 0x0) 17:56:35 executing program 5: r0 = memfd_create(0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)=0x0) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0xb9e9fce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, r1, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000002580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r3 = syz_open_dev$dspn(&(0x7f0000000200)='/dev/dsp#\x00', 0x4, 0x400000) ioctl$EVIOCSKEYCODE(r3, 0x40084504, &(0x7f0000000280)=[0x8, 0x4]) ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f00000002c0)=""/50) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$NBD_SET_TIMEOUT(0xffffffffffffffff, 0xab09, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000a00)=@assoc_value={0x0}, 0x0) r5 = openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_CONTEXT(r5, 0x84, 0x11, &(0x7f0000000240)={r4}, 0x8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@initdev, @in6=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000300)=0xe8) sendmsg$nl_netfilter(r0, 0x0, 0x10) mkdirat(0xffffffffffffffff, 0x0, 0x80) r6 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x21) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r6, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x5, 0x4500000000000003, 0x2200, 0x0, 0xa0008000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xebffffff, 0x3f00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r6, &(0x7f0000000100)={0xc, 0x8, 0xfa00, {0x0}}, 0x10) msgget$private(0x0, 0x1) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x1) getsockname$netlink(r0, &(0x7f0000000040), &(0x7f0000000080)=0xc) msgget$private(0x0, 0xa07e6c5876c5528a) ioctl$SIOCRSGCAUSE(r6, 0x89e0, &(0x7f0000000140)) 17:56:35 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045789, &(0x7f0000000100)) [ 450.528128] Memory cgroup out of memory: Kill process 11942 (syz-executor2) score 1113 or sacrifice child 17:56:35 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x10, &(0x7f00000048c0)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:56:35 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x200000088004578a, &(0x7f0000000100)) [ 450.575821] audit: type=1804 audit(1548698195.478:96): pid=17417 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir103046459/syzkaller.0k5Fj6/308/bus" dev="sda1" ino=16742 res=1 [ 450.575964] SELinux: security policydb version 15 (MLS) not backwards compatible [ 450.627485] device nr0 entered promiscuous mode [ 450.710451] Killed process 11942 (syz-executor2) total-vm:72576kB, anon-rss:2192kB, file-rss:35788kB, shmem-rss:0kB 17:56:35 executing program 5: r0 = memfd_create(0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)=0x0) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0xb9e9fce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, r1, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000002580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r3 = syz_open_dev$dspn(&(0x7f0000000200)='/dev/dsp#\x00', 0x4, 0x400000) ioctl$EVIOCSKEYCODE(r3, 0x40084504, &(0x7f0000000280)=[0x8, 0x4]) ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f00000002c0)=""/50) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$NBD_SET_TIMEOUT(0xffffffffffffffff, 0xab09, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000a00)=@assoc_value={0x0}, 0x0) r5 = openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_CONTEXT(r5, 0x84, 0x11, &(0x7f0000000240)={r4}, 0x8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@initdev, @in6=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000300)=0xe8) sendmsg$nl_netfilter(r0, 0x0, 0x10) mkdirat(0xffffffffffffffff, 0x0, 0x80) r6 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x21) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r6, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x5, 0x4500000000000003, 0x2200, 0x0, 0xa0008000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xebffffff, 0x3f00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r6, &(0x7f0000000100)={0xc, 0x8, 0xfa00, {0x0}}, 0x10) msgget$private(0x0, 0x1) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x1) getsockname$netlink(r0, &(0x7f0000000040), &(0x7f0000000080)=0xc) msgget$private(0x0, 0xa07e6c5876c5528a) ioctl$SIOCRSGCAUSE(r6, 0x89e0, &(0x7f0000000140)) [ 450.816003] SELinux: failed to load policy [ 450.827868] XFS (loop4): Invalid superblock magic number [ 450.868023] SELinux: security policydb version 15 (MLS) not backwards compatible [ 450.886804] audit: type=1804 audit(1548698195.788:97): pid=17444 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir103046459/syzkaller.0k5Fj6/309/bus" dev="sda1" ino=16611 res=1 17:56:35 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000009480000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 450.937585] SELinux: failed to load policy 17:56:35 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = syz_open_dev$usb(0x0, 0x80000000005, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f00000006c0)={0x2, 0x70, 0x4800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181d, 0x0, 0xf03, 0x4, 0x7, 0x98e, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x7e7, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8, 0xab85, 0x7, 0x0, 0x7fff, 0x5, 0x20, 0x9, 0x8, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0xd6a, 0x2, 0xfff, 0x365, 0x80000001}) close(r0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vhci\x00', 0x6) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x200, 0xd8) write$P9_RLERRORu(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="ffc0a42105d18c0f9c9d9a5d0f918678244fb751d2"], 0x15) ioctl$SIOCX25GCAUSEDIAG(r2, 0x89e6, &(0x7f0000000000)={0x9, 0xd9}) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, 0x0, 0x0) ioctl$VT_RELDISP(r2, 0x5605) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x800, 0x0) sendfile(r0, r2, &(0x7f0000d83ff8), 0x2) linkat(r3, &(0x7f0000000080)='./bus/file0\x00', r1, &(0x7f00000000c0)='./bus\x00', 0x400) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(0xffffffffffffffff, 0xc008551a, 0x0) [ 451.023677] SELinux: security policydb version 15 (MLS) not backwards compatible [ 451.073879] SELinux: failed to load policy [ 451.089785] SELinux: security policydb version 15 (MLS) not backwards compatible 17:56:36 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c00000000094c0000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 451.125905] SELinux: failed to load policy [ 451.239304] SELinux: security policydb version 15 (MLS) not backwards compatible [ 451.304322] syz-executor2 invoked oom-killer: gfp_mask=0x7080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 451.317992] SELinux: security policydb version 15 (MLS) not backwards compatible [ 451.337236] CPU: 0 PID: 17456 Comm: syz-executor2 Not tainted 5.0.0-rc4 #49 [ 451.344342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 451.353692] Call Trace: [ 451.356287] dump_stack+0x1db/0x2d0 [ 451.356308] ? dump_stack_print_info.cold+0x20/0x20 [ 451.356338] dump_header+0x1e6/0x116c [ 451.356356] ? add_lock_to_list.isra.0+0x450/0x450 [ 451.356374] ? print_usage_bug+0xd0/0xd0 [ 451.356394] ? pagefault_out_of_memory+0x1a1/0x1a1 [ 451.382894] ? ___ratelimit+0x37c/0x686 [ 451.386872] ? mark_held_locks+0xb1/0x100 [ 451.386890] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 451.386904] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 451.386918] ? lockdep_hardirqs_on+0x415/0x5d0 [ 451.386933] ? trace_hardirqs_on+0xbd/0x310 [ 451.386948] ? kasan_check_read+0x11/0x20 [ 451.386962] ? ___ratelimit+0x37c/0x686 [ 451.386978] ? trace_hardirqs_off_caller+0x300/0x300 [ 451.396211] ? do_raw_spin_trylock+0x270/0x270 [ 451.396228] ? trace_hardirqs_on_caller+0x310/0x310 [ 451.396264] ? lock_acquire+0x1db/0x570 [ 451.405937] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 451.405955] ? ___ratelimit+0xac/0x686 [ 451.405975] ? idr_get_free+0xee0/0xee0 [ 451.405990] ? lockdep_hardirqs_on+0x415/0x5d0 [ 451.406016] oom_kill_process.cold+0x10/0x9d4 [ 451.406035] ? cgroup_procs_next+0x70/0x70 [ 451.414483] ? _raw_spin_unlock_irq+0x5e/0x90 [ 451.414500] ? oom_badness+0xa50/0xa50 [ 451.414519] ? oom_evaluate_task+0x540/0x540 [ 451.476086] ? mem_cgroup_iter_break+0x30/0x30 [ 451.480671] ? mutex_trylock+0x2d0/0x2d0 [ 451.484734] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 451.490288] ? rcu_read_unlock_special+0x380/0x380 [ 451.495236] out_of_memory+0x885/0x1420 [ 451.499220] ? mem_cgroup_iter+0x508/0xf30 [ 451.503466] ? oom_killer_disable+0x340/0x340 [ 451.503484] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 451.503515] ? lock_acquire+0x1db/0x570 [ 451.513096] mem_cgroup_out_of_memory+0x160/0x210 [ 451.513111] ? do_raw_spin_unlock+0xa0/0x330 [ 451.513127] ? memcg_memory_event+0x40/0x40 [ 451.513141] ? do_raw_spin_trylock+0x270/0x270 [ 451.513197] ? _raw_spin_unlock+0x2d/0x50 [ 451.530716] try_charge+0x12a9/0x19b0 [ 451.543221] ? lock_downgrade+0x910/0x910 [ 451.547366] ? kasan_check_read+0x11/0x20 [ 451.551537] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 451.556374] ? get_mem_cgroup_from_mm+0x1cd/0x420 [ 451.561222] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 451.566764] ? lock_downgrade+0x910/0x910 [ 451.570908] ? kasan_check_read+0x11/0x20 [ 451.575057] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 451.580340] ? rcu_read_unlock_special+0x380/0x380 [ 451.585281] ? get_mem_cgroup_from_mm+0x1ea/0x420 [ 451.590129] memcg_kmem_charge_memcg+0x7c/0x130 [ 451.594809] ? memcg_kmem_put_cache+0xb0/0xb0 [ 451.599327] ? lock_release+0xc40/0xc40 [ 451.603319] memcg_kmem_charge+0x13b/0x340 [ 451.607555] __alloc_pages_nodemask+0x7b8/0xdc0 [ 451.612229] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 451.617239] ? rcu_pm_notify+0xd0/0xd0 [ 451.621136] ? rcu_read_lock_sched_held+0x110/0x130 [ 451.626170] ? kmem_cache_alloc_node+0x347/0x710 [ 451.630942] copy_process+0x847/0x8860 [ 451.634840] ? ___might_sleep+0x1e7/0x310 [ 451.638992] ? arch_local_save_flags+0x50/0x50 [ 451.643574] ? __schedule+0x1e60/0x1e60 [ 451.647551] ? do_raw_spin_trylock+0x270/0x270 [ 451.652147] ? __cleanup_sighand+0x70/0x70 [ 451.656397] ? futex_wait_queue_me+0x539/0x810 [ 451.660983] ? refill_pi_state_cache.part.0+0x310/0x310 [ 451.666341] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 451.671368] ? handle_futex_death+0x230/0x230 [ 451.675860] ? lock_acquire+0x1db/0x570 [ 451.679837] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 451.685034] ? drop_futex_key_refs.isra.0+0x6f/0xf0 [ 451.690053] ? futex_wait+0x6e6/0xa40 [ 451.693856] ? print_usage_bug+0xd0/0xd0 [ 451.697915] ? futex_wait_setup+0x430/0x430 [ 451.702239] ? drop_futex_key_refs.isra.0+0x6f/0xf0 [ 451.707260] ? __lock_acquire+0x572/0x4a30 [ 451.711514] ? mark_held_locks+0x100/0x100 [ 451.715758] ? do_futex+0x1b0/0x2910 [ 451.719472] ? save_stack+0xa9/0xd0 [ 451.723107] ? save_stack+0x45/0xd0 [ 451.726733] ? __kasan_slab_free+0x102/0x150 [ 451.731143] ? add_lock_to_list.isra.0+0x450/0x450 [ 451.736082] ? add_lock_to_list.isra.0+0x450/0x450 [ 451.741016] ? exit_robust_list+0x290/0x290 [ 451.745343] ? __might_fault+0x12b/0x1e0 [ 451.749417] ? find_held_lock+0x35/0x120 [ 451.753479] ? __might_fault+0x12b/0x1e0 [ 451.757542] ? lock_acquire+0x1db/0x570 [ 451.761524] ? lock_downgrade+0x910/0x910 [ 451.765700] ? lock_release+0xc40/0xc40 [ 451.769674] ? trace_hardirqs_off_caller+0x300/0x300 [ 451.774809] _do_fork+0x1a9/0x1170 [ 451.778354] ? fork_idle+0x1d0/0x1d0 [ 451.782075] ? kasan_check_read+0x11/0x20 [ 451.786224] ? _copy_to_user+0xc9/0x120 [ 451.790204] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 451.795743] ? put_timespec64+0x115/0x1b0 [ 451.799892] ? nsecs_to_jiffies+0x30/0x30 [ 451.804041] ? do_syscall_64+0x8c/0x800 [ 451.808017] ? do_syscall_64+0x8c/0x800 [ 451.812007] ? lockdep_hardirqs_on+0x415/0x5d0 [ 451.816594] ? trace_hardirqs_on+0xbd/0x310 [ 451.820913] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 451.826454] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 451.831819] ? trace_hardirqs_off_caller+0x300/0x300 [ 451.836921] ? ret_from_fork+0x15/0x50 [ 451.840817] __x64_sys_clone+0xbf/0x150 [ 451.844800] do_syscall_64+0x1a3/0x800 [ 451.848695] ? syscall_return_slowpath+0x5f0/0x5f0 [ 451.853631] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 451.858642] ? __switch_to_asm+0x34/0x70 [ 451.862750] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 451.867600] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 451.872786] RIP: 0033:0x458099 [ 451.875982] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 451.894883] RSP: 002b:00007fe2862d6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 17:56:36 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000009600000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 451.902589] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000458099 [ 451.909854] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0020002102001fff [ 451.917123] RBP: 000000000073bf00 R08: ffffffffffffffff R09: 0000000000000000 [ 451.924393] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2862d76d4 [ 451.931658] R13: 00000000004be480 R14: 00000000004cea40 R15: 00000000ffffffff 17:56:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:56:36 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a, 0x2}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 451.999956] memory: usage 307200kB, limit 307200kB, failcnt 1119 [ 452.006132] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 452.022951] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 452.031987] Memory cgroup stats for /syz2: cache:0KB rss:251328KB rss_huge:227328KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:251312KB inactive_file:4KB active_file:4KB unevictable:0KB [ 452.060756] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor2,pid=11959,uid=0 17:56:37 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, 0x0, 0x0) 17:56:37 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x200000088004578b, &(0x7f0000000100)) 17:56:37 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = syz_open_dev$usb(0x0, 0x80000000005, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f00000006c0)={0x2, 0x70, 0x4800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181d, 0x0, 0xf03, 0x4, 0x7, 0x98e, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x7e7, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8, 0xab85, 0x7, 0x0, 0x7fff, 0x5, 0x20, 0x9, 0x8, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0xd6a, 0x2, 0xfff, 0x365, 0x80000001}) close(r0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vhci\x00', 0x6) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x200, 0xd8) write$P9_RLERRORu(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="ffc0a42105d18c0f9c9d9a5d0f918678244fb751d2"], 0x15) ioctl$SIOCX25GCAUSEDIAG(r2, 0x89e6, &(0x7f0000000000)={0x9, 0xd9}) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, 0x0, 0x0) ioctl$VT_RELDISP(r2, 0x5605) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x800, 0x0) sendfile(r0, r2, &(0x7f0000d83ff8), 0x2) linkat(r3, &(0x7f0000000080)='./bus/file0\x00', r1, &(0x7f00000000c0)='./bus\x00', 0x400) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(0xffffffffffffffff, 0xc008551a, 0x0) [ 452.093578] Memory cgroup out of memory: Kill process 11959 (syz-executor2) score 1113 or sacrifice child 17:56:37 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x200000088004578c, &(0x7f0000000100)) [ 452.133262] Killed process 11959 (syz-executor2) total-vm:72576kB, anon-rss:2192kB, file-rss:35788kB, shmem-rss:0kB [ 452.173376] device nr0 entered promiscuous mode 17:56:37 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a, 0x8}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 452.216957] XFS (loop4): Invalid superblock magic number [ 452.248773] syz-executor2 invoked oom-killer: gfp_mask=0x7080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=0 [ 452.306128] CPU: 1 PID: 8545 Comm: syz-executor2 Not tainted 5.0.0-rc4 #49 [ 452.313175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 452.322530] Call Trace: [ 452.325123] dump_stack+0x1db/0x2d0 [ 452.328773] ? dump_stack_print_info.cold+0x20/0x20 [ 452.333806] dump_header+0x1e6/0x116c [ 452.337621] ? add_lock_to_list.isra.0+0x450/0x450 [ 452.342566] ? print_usage_bug+0xd0/0xd0 [ 452.346635] ? pagefault_out_of_memory+0x1a1/0x1a1 [ 452.351594] ? ___ratelimit+0x37c/0x686 [ 452.355581] ? mark_held_locks+0xb1/0x100 [ 452.359752] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 452.364860] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 452.369967] ? lockdep_hardirqs_on+0x415/0x5d0 [ 452.374576] ? trace_hardirqs_on+0xbd/0x310 [ 452.378918] ? kasan_check_read+0x11/0x20 [ 452.383073] ? ___ratelimit+0x37c/0x686 [ 452.387054] ? trace_hardirqs_off_caller+0x300/0x300 [ 452.392170] ? do_raw_spin_trylock+0x270/0x270 [ 452.396773] ? trace_hardirqs_on_caller+0x310/0x310 [ 452.401795] ? lock_acquire+0x1db/0x570 [ 452.405782] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 452.410892] ? ___ratelimit+0xac/0x686 [ 452.414802] ? idr_get_free+0xee0/0xee0 [ 452.418783] ? lockdep_hardirqs_on+0x415/0x5d0 [ 452.423386] oom_kill_process.cold+0x10/0x9d4 [ 452.427894] ? cgroup_procs_next+0x70/0x70 [ 452.432139] ? _raw_spin_unlock_irq+0x5e/0x90 [ 452.436649] ? oom_badness+0xa50/0xa50 [ 452.440556] ? oom_evaluate_task+0x540/0x540 [ 452.444976] ? mem_cgroup_iter_break+0x30/0x30 [ 452.449570] ? mutex_trylock+0x2d0/0x2d0 [ 452.453637] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 452.459202] ? rcu_read_unlock_special+0x380/0x380 [ 452.464149] out_of_memory+0x885/0x1420 [ 452.468140] ? mem_cgroup_iter+0x508/0xf30 [ 452.472406] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 452.477521] ? oom_killer_disable+0x340/0x340 [ 452.482025] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 452.487132] ? lock_acquire+0x1db/0x570 [ 452.491140] mem_cgroup_out_of_memory+0x160/0x210 [ 452.495993] ? do_raw_spin_unlock+0xa0/0x330 [ 452.500408] ? memcg_memory_event+0x40/0x40 [ 452.504751] ? do_raw_spin_trylock+0x270/0x270 [ 452.509363] ? _raw_spin_unlock+0x2d/0x50 [ 452.513519] try_charge+0xd44/0x19b0 [ 452.517239] ? lock_downgrade+0x910/0x910 [ 452.521411] ? kasan_check_read+0x11/0x20 [ 452.525582] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 452.530458] ? get_mem_cgroup_from_mm+0x1cd/0x420 [ 452.535318] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 452.540867] ? lock_downgrade+0x910/0x910 [ 452.545019] ? kasan_check_read+0x11/0x20 [ 452.549181] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 452.554466] ? rcu_read_unlock_special+0x380/0x380 [ 452.559409] ? get_mem_cgroup_from_mm+0x1ea/0x420 [ 452.564260] memcg_kmem_charge_memcg+0x7c/0x130 [ 452.568937] ? memcg_kmem_put_cache+0xb0/0xb0 [ 452.573436] ? lock_release+0xc40/0xc40 [ 452.577422] memcg_kmem_charge+0x13b/0x340 [ 452.581674] __alloc_pages_nodemask+0x7b8/0xdc0 [ 452.586347] ? add_lock_to_list.isra.0+0x450/0x450 [ 452.591287] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 452.596310] ? copy_page_range+0x157c/0x2840 [ 452.600732] ? __lock_is_held+0xb6/0x140 [ 452.604810] ? copy_page_range+0xb28/0x2840 [ 452.609165] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 452.614715] alloc_pages_current+0x107/0x210 [ 452.619132] pte_alloc_one+0x1b/0x1a0 [ 452.622981] __pte_alloc+0x20/0x310 [ 452.626613] copy_page_range+0x18d1/0x2840 [ 452.630890] ? mark_held_locks+0x100/0x100 [ 452.635195] ? __pmd_alloc+0x460/0x460 [ 452.639088] ? add_lock_to_list.isra.0+0x450/0x450 [ 452.644024] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 452.649571] ? copy_process+0x3607/0x8860 [ 452.653724] ? find_held_lock+0x35/0x120 [ 452.657794] ? copy_process+0x3607/0x8860 [ 452.661959] ? lock_acquire+0x1db/0x570 [ 452.665943] ? lock_downgrade+0x910/0x910 [ 452.670100] ? rcu_read_lock_sched_held+0x110/0x130 [ 452.675124] ? kmem_cache_alloc+0x341/0x710 [ 452.679463] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 452.684488] ? vma_compute_subtree_gap+0x158/0x230 [ 452.689436] ? __vma_link_rb+0x279/0x370 [ 452.693533] copy_process+0x423b/0x8860 [ 452.697542] ? __cleanup_sighand+0x70/0x70 [ 452.701796] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 452.707338] ? reuse_swap_page+0x453/0x14a0 [ 452.711677] ? swp_swapcount+0x540/0x540 [ 452.715761] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 452.715865] ? __lock_acquire+0x572/0x4a30 [ 452.725622] ? do_raw_spin_trylock+0x270/0x270 [ 452.725652] ? mark_held_locks+0x100/0x100 [ 452.725679] ? finish_mkwrite_fault+0x540/0x540 [ 452.725694] ? kasan_check_read+0x11/0x20 [ 452.725710] ? do_raw_spin_lock+0x156/0x360 [ 452.725729] ? rwlock_bug.part.0+0x90/0x90 [ 452.725750] ? pmd_devmap_trans_unstable+0x1d0/0x1d0 [ 452.756959] ? add_lock_to_list.isra.0+0x450/0x450 [ 452.761908] ? add_lock_to_list.isra.0+0x450/0x450 [ 452.766851] ? __handle_mm_fault+0x955/0x55a0 [ 452.771354] ? __might_fault+0x12b/0x1e0 [ 452.775422] ? find_held_lock+0x35/0x120 [ 452.779493] ? __might_fault+0x12b/0x1e0 [ 452.783560] ? lock_acquire+0x1db/0x570 [ 452.787552] ? lock_downgrade+0x910/0x910 [ 452.791721] ? lock_release+0xc40/0xc40 [ 452.795704] ? trace_hardirqs_off_caller+0x300/0x300 [ 452.800816] _do_fork+0x1a9/0x1170 [ 452.804368] ? fork_idle+0x1d0/0x1d0 [ 452.808087] ? kasan_check_read+0x11/0x20 [ 452.812267] ? _copy_to_user+0xc9/0x120 [ 452.816254] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 452.821825] ? put_timespec64+0x115/0x1b0 [ 452.825980] ? nsecs_to_jiffies+0x30/0x30 [ 452.830124] ? vmacache_update+0x114/0x140 [ 452.834387] ? do_syscall_64+0x8c/0x800 [ 452.838375] ? do_syscall_64+0x8c/0x800 [ 452.842355] ? lockdep_hardirqs_on+0x415/0x5d0 [ 452.846944] ? trace_hardirqs_on+0xbd/0x310 [ 452.851284] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 452.856830] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 452.862228] ? trace_hardirqs_off_caller+0x300/0x300 [ 452.867344] __x64_sys_clone+0xbf/0x150 [ 452.871357] do_syscall_64+0x1a3/0x800 [ 452.875271] ? syscall_return_slowpath+0x5f0/0x5f0 [ 452.880209] ? prepare_exit_to_usermode+0x232/0x3b0 [ 452.885256] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 452.890143] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 452.895363] RIP: 0033:0x45666a [ 452.898603] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 452.917502] RSP: 002b:00007fff32860ec0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 452.925218] RAX: ffffffffffffffda RBX: 00007fff32860ec0 RCX: 000000000045666a [ 452.932491] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 452.939764] RBP: 00007fff32860f00 R08: 0000000000000001 R09: 000000000126c940 [ 452.947039] R10: 000000000126cc10 R11: 0000000000000246 R12: 0000000000000001 17:56:37 executing program 5: r0 = socket$inet(0x2, 0x3, 0x800000800000001) getsockopt$inet_mreqsrc(r0, 0x0, 0x53, &(0x7f0000000000)={@dev, @local, @broadcast}, &(0x7f0000000040)=0x2c) r1 = syz_open_dev$media(&(0x7f0000001200)='/dev/media#\x00', 0x4, 0x4c01) ioctl$KVM_INTERRUPT(r1, 0x4004ae86, &(0x7f0000001240)=0xfffffffffffffffe) readv(r0, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/213, 0xd5}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/14, 0xe}], 0x3) ioctl$KVM_GET_XCRS(r1, 0x8188aea6, &(0x7f0000001280)={0x9, 0x4, [{0x140000, 0x0, 0x20}, {0x742f, 0x0, 0x5}, {0xff, 0x0, 0x3}, {0xffffffff, 0x0, 0x7}, {0x2, 0x0, 0x7}, {0xcce, 0x0, 0x200}, {0x3, 0x0, 0xfffffffffffffff7}, {0x6, 0x0, 0x9}, {0x2, 0x0, 0x76}]}) [ 452.954313] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000002 [ 452.971720] memory: usage 304608kB, limit 307200kB, failcnt 1119 [ 452.977971] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 452.999905] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 17:56:37 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x200000088004578d, &(0x7f0000000100)) [ 453.006061] Memory cgroup stats for /syz2: cache:0KB rss:249068KB rss_huge:225280KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:249044KB inactive_file:4KB active_file:4KB unevictable:0KB 17:56:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:56:37 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a, 0xf}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 453.045289] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor2,pid=11969,uid=0 [ 453.060936] Memory cgroup out of memory: Kill process 11969 (syz-executor2) score 1113 or sacrifice child [ 453.072927] Killed process 11969 (syz-executor2) total-vm:72576kB, anon-rss:2192kB, file-rss:35788kB, shmem-rss:0kB [ 453.118015] SELinux: security policydb version 15 (MLS) not backwards compatible [ 453.139262] sel_write_load: 2 callbacks suppressed [ 453.139267] SELinux: failed to load policy 17:56:38 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000009680000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:56:38 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, 0x0, 0x0) 17:56:38 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x200000088004578e, &(0x7f0000000100)) [ 453.180791] SELinux: security policydb version 15 (MLS) not backwards compatible [ 453.198682] SELinux: failed to load policy 17:56:38 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a, 0x10}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:56:38 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f0000000080)={0x2, 0x9}) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) fremovexattr(r1, &(0x7f0000000100)=@known='trusted.overlay.opaque\x00') sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x3c0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000040)}}], 0x4000363, 0x0) [ 453.280613] device nr0 entered promiscuous mode [ 453.289061] SELinux: security policydb version 15 (MLS) not backwards compatible [ 453.298934] XFS (loop4): Invalid superblock magic number 17:56:38 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x200000088004578f, &(0x7f0000000100)) [ 453.355631] SELinux: failed to load policy 17:56:38 executing program 5: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000001c0)=0x0) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0xa) getresgid(0x0, &(0x7f0000000500), &(0x7f0000000540)) setxattr$system_posix_acl(&(0x7f0000000280)='./file0\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1000"], 0x1, 0x0) write$P9_RSTATu(0xffffffffffffffff, 0x0, 0x0) write(r1, &(0x7f0000000340), 0x10000014c) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/uinput\x00', 0x802, 0x0) bind$vsock_dgram(r1, &(0x7f00000003c0)={0x28, 0x0, 0xffffffff}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000400)='vfat\x00', &(0x7f0000000440)='./file0\x00', 0x1, 0x6, &(0x7f0000000940)=[{&(0x7f00000005c0)="687270e92020f4a9b82f6acdd45985d1369860348a952c99f42fefdf636ae411a45722d5c8a1df0518b94b3a5e49459bb8c60f6db267e070cba6e5c0c23555ebc4f56472e1d41b91abef1e986a9c67f55f2031359c5a0efaf02f6092aeee136be5990b43ffc92f2a580e60efda40dd92a4896a6f79ffe1416b9262513166c892555132a848bcb115bf4d59c21571993fe61389b66feb5d4acaceea303aa983bc00743270c944c82d36dbf793b0e792af9ab174de394f6ade605844a6927a0056e8d9a3779f57fa0d19b005930b49e6f4611df27a1160ccaf9a506b62dcacc545", 0xe0, 0x5}, {&(0x7f00000006c0)="9ffb613515", 0x5, 0x3f}, {&(0x7f0000000700)="7fa0a1a6d5172c043f0787621283b0f1bf59c9b24c6940ebf5b967a3", 0x1c, 0x100000000}, {&(0x7f0000000740)="56a33a4acdd89e7b9b981a5dc130eb578801e71011cd44d022ffa53f28b7c62c313e59dc423da023ce2cd6dfb0c3a4204aaa0ee532981a", 0x37, 0x81}, {&(0x7f0000000780)="d1bf26ee80b06c3e0cdecdb471aed4feaf49bb6d89c83ba68167676f73699563e388eac46ff3d2415fba576b1be44fc5a139b9ddd10a04dfa8bce41f9dd440ab45264394af215ea9b5f4438b221fabce3ecc20540b9335d0a144a7b7410e5cb5addf95fa8fe308e2cb9b52e7949628d53e5b50985705896b4a5467999611ce47978f6af30538306c0f4ee6936f1fdfb598d247be119c6caaffe0cb09525cbbf7e34892776c1821eae2952d184401d8cf90e915ab05e69a26c8b59899b8af82de14762f19c66a5329d0ddf7f2d06d3a2508e258b076adf9a255987373cd90d7eac2009c94cee9469a1a6e4e", 0xeb, 0x7f}, {&(0x7f0000000880)="b500163f30943e1ad1425b4739c70aecc59a0b8b4721584aaa3f1322b8a619acbfb649cd739773f94e65ddc3dd12b3a07e2e1f5d7c490946758c23e19e41d12f6028b9e2af122237dbe78b3586646e0ec8950068528a90ffb048c35e44b0c2aa8a0e428fde524e5185134f0b61ecbb33c0f12c4113a00ed6e19a1dbca58720738d346d7352449a3429ff298b276fc2182aac56bc13921118ae56", 0x9a, 0x78}], 0x10, &(0x7f0000000a00)={[{@numtail='nonumtail=0'}, {@fat=@nfs='nfs'}, {@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@uni_xlate='uni_xlate=1'}], [{@fsmagic={'fsmagic', 0x3d, 0xd97d}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@fowner_eq={'fowner', 0x3d, r3}}, {@fowner_lt={'fowner<', r3}}, {@uid_lt={'uid<', r2}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/uinput\x00'}}, {@subj_type={'subj_type', 0x3d, 'sit0\x00'}}, {@dont_hash='dont_hash'}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x0, 0x0) signalfd(r1, &(0x7f0000000340), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000380)=0x20040, 0x4) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000000)={'sit0\x00', &(0x7f0000000080)=@ethtool_link_settings={0x4c}}) clock_gettime(0x5, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r5+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) socket$isdn(0x22, 0x3, 0x26) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 453.385302] SELinux: security policydb version 15 (MLS) not backwards compatible 17:56:38 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c00000000096c0000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 453.451243] SELinux: failed to load policy [ 453.582413] SELinux: security policydb version 15 (MLS) not backwards compatible [ 453.636697] FAT-fs (loop5): Unrecognized mount option "fsmagic=0x000000000000d97d" or missing value [ 453.646450] syz-executor2 invoked oom-killer: gfp_mask=0x7080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 453.690361] SELinux: failed to load policy [ 453.695312] SELinux: security policydb version 15 (MLS) not backwards compatible [ 453.741724] SELinux: failed to load policy [ 453.767905] CPU: 0 PID: 17545 Comm: syz-executor2 Not tainted 5.0.0-rc4 #49 [ 453.775018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 453.784367] Call Trace: [ 453.786960] dump_stack+0x1db/0x2d0 [ 453.790600] ? dump_stack_print_info.cold+0x20/0x20 [ 453.795632] dump_header+0x1e6/0x116c [ 453.799447] ? add_lock_to_list.isra.0+0x450/0x450 [ 453.804384] ? print_usage_bug+0xd0/0xd0 [ 453.808459] ? pagefault_out_of_memory+0x1a1/0x1a1 [ 453.813397] ? ___ratelimit+0x37c/0x686 [ 453.817385] ? mark_held_locks+0xb1/0x100 [ 453.821546] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 453.826651] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 453.831765] ? lockdep_hardirqs_on+0x415/0x5d0 [ 453.836353] ? trace_hardirqs_on+0xbd/0x310 [ 453.840676] ? kasan_check_read+0x11/0x20 [ 453.844827] ? ___ratelimit+0x37c/0x686 [ 453.848813] ? trace_hardirqs_off_caller+0x300/0x300 [ 453.853920] ? do_raw_spin_trylock+0x270/0x270 [ 453.858512] ? trace_hardirqs_on_caller+0x310/0x310 [ 453.863538] ? lock_acquire+0x1db/0x570 [ 453.867525] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 453.872639] ? ___ratelimit+0xac/0x686 [ 453.876533] ? idr_get_free+0xee0/0xee0 [ 453.880527] ? lockdep_hardirqs_on+0x415/0x5d0 [ 453.885131] oom_kill_process.cold+0x10/0x9d4 [ 453.889648] ? cgroup_procs_next+0x70/0x70 [ 453.893891] ? _raw_spin_unlock_irq+0x5e/0x90 [ 453.898424] ? oom_badness+0xa50/0xa50 [ 453.902322] ? oom_evaluate_task+0x540/0x540 [ 453.906736] ? mem_cgroup_iter_break+0x30/0x30 [ 453.911324] ? mutex_trylock+0x2d0/0x2d0 [ 453.915392] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 453.920951] ? rcu_read_unlock_special+0x380/0x380 [ 453.925894] out_of_memory+0x885/0x1420 [ 453.929879] ? mem_cgroup_iter+0x508/0xf30 [ 453.934125] ? oom_killer_disable+0x340/0x340 [ 453.938676] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 453.943787] ? lock_acquire+0x1db/0x570 [ 453.947782] mem_cgroup_out_of_memory+0x160/0x210 [ 453.952644] ? do_raw_spin_unlock+0xa0/0x330 [ 453.957084] ? memcg_memory_event+0x40/0x40 [ 453.961413] ? do_raw_spin_trylock+0x270/0x270 [ 453.966013] ? _raw_spin_unlock+0x2d/0x50 [ 453.970199] try_charge+0x12a9/0x19b0 [ 453.974005] ? lock_downgrade+0x910/0x910 [ 453.978172] ? kasan_check_read+0x11/0x20 [ 453.982335] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 453.987195] ? get_mem_cgroup_from_mm+0x1cd/0x420 [ 453.992045] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 453.997591] ? lock_downgrade+0x910/0x910 [ 454.001746] ? kasan_check_read+0x11/0x20 [ 454.005921] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 454.011234] ? rcu_read_unlock_special+0x380/0x380 [ 454.016209] ? get_mem_cgroup_from_mm+0x1ea/0x420 [ 454.021077] memcg_kmem_charge_memcg+0x7c/0x130 [ 454.025960] ? memcg_kmem_put_cache+0xb0/0xb0 [ 454.030462] ? lock_release+0xc40/0xc40 [ 454.034458] memcg_kmem_charge+0x13b/0x340 [ 454.038703] __alloc_pages_nodemask+0x7b8/0xdc0 [ 454.043389] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 454.048406] ? rcu_pm_notify+0xd0/0xd0 [ 454.052308] ? rcu_read_lock_sched_held+0x110/0x130 [ 454.057347] ? kmem_cache_alloc_node+0x347/0x710 [ 454.062126] copy_process+0x847/0x8860 [ 454.066039] ? find_held_lock+0x35/0x120 [ 454.070108] ? try_to_wake_up+0xf9/0x1480 [ 454.074276] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 454.079383] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 454.084500] ? preempt_schedule+0x4b/0x60 [ 454.088653] ? preempt_schedule_common+0x4f/0xe0 [ 454.093431] ? __cleanup_sighand+0x70/0x70 [ 454.097674] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 454.102785] ? try_to_wake_up+0xf9/0x1480 [ 454.106970] ? migrate_swap_stop+0x920/0x920 [ 454.111388] ? futex_wake+0x62c/0x7b0 [ 454.115206] ? lock_acquire+0x1db/0x570 [ 454.119207] ? kasan_check_read+0x11/0x20 [ 454.123361] ? do_raw_spin_unlock+0xa0/0x330 [ 454.127780] ? do_raw_spin_trylock+0x270/0x270 [ 454.132366] ? print_usage_bug+0xd0/0xd0 [ 454.136435] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 454.141644] ? drop_futex_key_refs.isra.0+0x6f/0xf0 [ 454.146684] ? __lock_acquire+0x572/0x4a30 [ 454.150944] ? get_futex_key+0x2050/0x2050 [ 454.155201] ? mark_held_locks+0x100/0x100 [ 454.159610] ? do_futex+0x1b0/0x2910 [ 454.163336] ? save_stack+0xa9/0xd0 [ 454.166985] ? save_stack+0x45/0xd0 [ 454.170621] ? __kasan_slab_free+0x102/0x150 [ 454.175036] ? add_lock_to_list.isra.0+0x450/0x450 [ 454.179998] ? add_lock_to_list.isra.0+0x450/0x450 [ 454.184935] ? exit_robust_list+0x290/0x290 [ 454.189268] ? __might_fault+0x12b/0x1e0 [ 454.193337] ? find_held_lock+0x35/0x120 [ 454.197408] ? __might_fault+0x12b/0x1e0 [ 454.201486] ? lock_acquire+0x1db/0x570 [ 454.205481] ? lock_downgrade+0x910/0x910 [ 454.209650] ? lock_release+0xc40/0xc40 [ 454.213643] ? trace_hardirqs_off_caller+0x300/0x300 [ 454.218759] _do_fork+0x1a9/0x1170 [ 454.222324] ? fork_idle+0x1d0/0x1d0 [ 454.226047] ? kasan_check_read+0x11/0x20 [ 454.230203] ? _copy_to_user+0xc9/0x120 [ 454.234195] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 454.239748] ? put_timespec64+0x115/0x1b0 [ 454.243931] ? nsecs_to_jiffies+0x30/0x30 [ 454.248084] ? do_syscall_64+0x8c/0x800 [ 454.252071] ? do_syscall_64+0x8c/0x800 [ 454.256051] ? lockdep_hardirqs_on+0x415/0x5d0 [ 454.260642] ? trace_hardirqs_on+0xbd/0x310 [ 454.264980] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 454.270539] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 454.275909] ? trace_hardirqs_off_caller+0x300/0x300 [ 454.281035] __x64_sys_clone+0xbf/0x150 [ 454.285033] do_syscall_64+0x1a3/0x800 [ 454.288950] ? syscall_return_slowpath+0x5f0/0x5f0 [ 454.293887] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 454.298916] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 454.303776] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 454.308966] RIP: 0033:0x458099 [ 454.312178] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 454.331083] RSP: 002b:00007fe2862d6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 454.338795] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000458099 [ 454.346066] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0020002102001fff [ 454.353337] RBP: 000000000073bf00 R08: ffffffffffffffff R09: 0000000000000000 [ 454.360608] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2862d76d4 [ 454.367881] R13: 00000000004be480 R14: 00000000004cea40 R15: 00000000ffffffff [ 454.376503] memory: usage 307192kB, limit 307200kB, failcnt 1143 [ 454.391788] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 17:56:39 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045790, &(0x7f0000000100)) 17:56:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:56:39 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a, 0x21}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 454.414532] FAT-fs (loop5): Unrecognized mount option "fsmagic=0x000000000000d97d" or missing value [ 454.440236] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 454.446541] Memory cgroup stats for /syz2: cache:0KB rss:251240KB rss_huge:227328KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:251296KB inactive_file:4KB active_file:0KB unevictable:0KB 17:56:39 executing program 1 (fault-call:6 fault-nth:0): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) 17:56:39 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045791, &(0x7f0000000100)) [ 454.519948] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor2,pid=11993,uid=0 [ 454.550020] Memory cgroup out of memory: Kill process 11993 (syz-executor2) score 1113 or sacrifice child 17:56:39 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000009740000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:56:39 executing program 5: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000001c0)=0x0) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0xa) getresgid(0x0, &(0x7f0000000500), &(0x7f0000000540)) setxattr$system_posix_acl(&(0x7f0000000280)='./file0\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1000"], 0x1, 0x0) write$P9_RSTATu(0xffffffffffffffff, 0x0, 0x0) write(r1, &(0x7f0000000340), 0x10000014c) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/uinput\x00', 0x802, 0x0) bind$vsock_dgram(r1, &(0x7f00000003c0)={0x28, 0x0, 0xffffffff}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000400)='vfat\x00', &(0x7f0000000440)='./file0\x00', 0x1, 0x6, &(0x7f0000000940)=[{&(0x7f00000005c0)="687270e92020f4a9b82f6acdd45985d1369860348a952c99f42fefdf636ae411a45722d5c8a1df0518b94b3a5e49459bb8c60f6db267e070cba6e5c0c23555ebc4f56472e1d41b91abef1e986a9c67f55f2031359c5a0efaf02f6092aeee136be5990b43ffc92f2a580e60efda40dd92a4896a6f79ffe1416b9262513166c892555132a848bcb115bf4d59c21571993fe61389b66feb5d4acaceea303aa983bc00743270c944c82d36dbf793b0e792af9ab174de394f6ade605844a6927a0056e8d9a3779f57fa0d19b005930b49e6f4611df27a1160ccaf9a506b62dcacc545", 0xe0, 0x5}, {&(0x7f00000006c0)="9ffb613515", 0x5, 0x3f}, {&(0x7f0000000700)="7fa0a1a6d5172c043f0787621283b0f1bf59c9b24c6940ebf5b967a3", 0x1c, 0x100000000}, {&(0x7f0000000740)="56a33a4acdd89e7b9b981a5dc130eb578801e71011cd44d022ffa53f28b7c62c313e59dc423da023ce2cd6dfb0c3a4204aaa0ee532981a", 0x37, 0x81}, {&(0x7f0000000780)="d1bf26ee80b06c3e0cdecdb471aed4feaf49bb6d89c83ba68167676f73699563e388eac46ff3d2415fba576b1be44fc5a139b9ddd10a04dfa8bce41f9dd440ab45264394af215ea9b5f4438b221fabce3ecc20540b9335d0a144a7b7410e5cb5addf95fa8fe308e2cb9b52e7949628d53e5b50985705896b4a5467999611ce47978f6af30538306c0f4ee6936f1fdfb598d247be119c6caaffe0cb09525cbbf7e34892776c1821eae2952d184401d8cf90e915ab05e69a26c8b59899b8af82de14762f19c66a5329d0ddf7f2d06d3a2508e258b076adf9a255987373cd90d7eac2009c94cee9469a1a6e4e", 0xeb, 0x7f}, {&(0x7f0000000880)="b500163f30943e1ad1425b4739c70aecc59a0b8b4721584aaa3f1322b8a619acbfb649cd739773f94e65ddc3dd12b3a07e2e1f5d7c490946758c23e19e41d12f6028b9e2af122237dbe78b3586646e0ec8950068528a90ffb048c35e44b0c2aa8a0e428fde524e5185134f0b61ecbb33c0f12c4113a00ed6e19a1dbca58720738d346d7352449a3429ff298b276fc2182aac56bc13921118ae56", 0x9a, 0x78}], 0x10, &(0x7f0000000a00)={[{@numtail='nonumtail=0'}, {@fat=@nfs='nfs'}, {@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@uni_xlate='uni_xlate=1'}], [{@fsmagic={'fsmagic', 0x3d, 0xd97d}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@fowner_eq={'fowner', 0x3d, r3}}, {@fowner_lt={'fowner<', r3}}, {@uid_lt={'uid<', r2}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/uinput\x00'}}, {@subj_type={'subj_type', 0x3d, 'sit0\x00'}}, {@dont_hash='dont_hash'}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x0, 0x0) signalfd(r1, &(0x7f0000000340), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000380)=0x20040, 0x4) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000000)={'sit0\x00', &(0x7f0000000080)=@ethtool_link_settings={0x4c}}) clock_gettime(0x5, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r5+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) socket$isdn(0x22, 0x3, 0x26) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 454.570009] Killed process 11993 (syz-executor2) total-vm:72576kB, anon-rss:2192kB, file-rss:35788kB, shmem-rss:0kB [ 454.592884] oom_reaper: reaped process 11993 (syz-executor2), now anon-rss:0kB, file-rss:34828kB, shmem-rss:0kB [ 454.680004] device nr0 entered promiscuous mode 17:56:39 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045792, &(0x7f0000000100)) 17:56:39 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a, 0x19a}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 454.765706] XFS (loop4): Invalid superblock magic number [ 454.802622] SELinux: security policydb version 15 (MLS) not backwards compatible [ 454.856855] FAT-fs (loop5): Unrecognized mount option "fsmagic=0x000000000000d97d" or missing value [ 454.872647] SELinux: failed to load policy [ 454.895305] SELinux: security policydb version 15 (MLS) not backwards compatible [ 454.935850] SELinux: failed to load policy 17:56:39 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c00000000097a0000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 455.136998] SELinux: security policydb version 15 (MLS) not backwards compatible [ 455.193210] SELinux: failed to load policy 17:56:40 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000009000300"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 455.230788] SELinux: security policydb version 15 (MLS) not backwards compatible [ 455.238578] SELinux: failed to load policy 17:56:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:56:40 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045793, &(0x7f0000000100)) 17:56:40 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a, 0xf00}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:56:40 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) 17:56:40 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000009000500"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 455.326990] SELinux: security policydb version 15 (MLS) not backwards compatible [ 455.475004] syz-executor2 invoked oom-killer: gfp_mask=0x7080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=0 [ 455.517127] device nr0 entered promiscuous mode [ 455.528756] CPU: 0 PID: 8545 Comm: syz-executor2 Not tainted 5.0.0-rc4 #49 [ 455.535778] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 455.545139] Call Trace: [ 455.547743] dump_stack+0x1db/0x2d0 [ 455.551378] ? dump_stack_print_info.cold+0x20/0x20 [ 455.556442] dump_header+0x1e6/0x116c [ 455.560267] ? add_lock_to_list.isra.0+0x450/0x450 [ 455.560765] XFS (loop4): Invalid superblock magic number [ 455.565205] ? print_usage_bug+0xd0/0xd0 [ 455.574734] ? pagefault_out_of_memory+0x1a1/0x1a1 [ 455.579668] ? ___ratelimit+0x37c/0x686 [ 455.583664] ? mark_held_locks+0xb1/0x100 [ 455.587836] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 455.592959] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 455.592974] ? lockdep_hardirqs_on+0x415/0x5d0 [ 455.592993] ? trace_hardirqs_on+0xbd/0x310 [ 455.602650] ? kasan_check_read+0x11/0x20 [ 455.602666] ? ___ratelimit+0x37c/0x686 17:56:40 executing program 5: mkdir(&(0x7f00000000c0)='./control\x00', 0x0) r0 = geteuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000200)={{{@in6, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@initdev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@local}}, &(0x7f0000000340)=0xe8) lstat(&(0x7f0000000380)='./file1\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x2, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000180)="18139aef225398e4838ec58724bcc4546973417bfa4b6b28237769c5f3f0e6855e", 0x21, 0xdbae}], 0x8084, &(0x7f00000005c0)={[{@nodiscard='nodiscard'}, {@wsync='wsync'}], [{@audit='audit'}, {@permit_directio='permit_directio'}, {@subj_type={'subj_type', 0x3d, 'keyringtrusted'}}, {@euid_gt={'euid>', r0}}, {@uid_gt={'uid>', r1}}, {@euid_lt={'euid<', r2}}, {@smackfsroot={'smackfsroot', 0x3d, '%nodev'}}, {@obj_type={'obj_type', 0x3d, '\\(vmnet0'}}, {@euid_lt={'euid<', r3}}]}) r4 = dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000006c0)={'icmp6\x00'}, &(0x7f0000000780)=0x1e) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/policy\x00', 0x0, 0x0) setsockopt$bt_BT_SECURITY(r5, 0x112, 0x4, &(0x7f0000000740)={0x5, 0x400}, 0x2) r6 = open(&(0x7f0000028000)='./control\x00', 0x0, 0x0) mknodat(r6, &(0x7f0000000000)='./control\x00', 0x0, 0x0) ioctl$SIOCAX25CTLCON(r6, 0x89e8, &(0x7f00000009c0)={@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x67, 0x1f, 0x0, [@null, @null, @default, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000980)='/dev/dlm-monitor\x00', 0x8000, 0x0) mkdirat(r6, &(0x7f0000000080)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000000800)={0x0, @in6={{0xa, 0x4e22, 0x9, @empty, 0x200}}}, &(0x7f00000008c0)=0x84) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r6, 0x84, 0x76, &(0x7f0000000900)={r7, 0xffff}, &(0x7f0000000940)=0x8) ioctl$FS_IOC_FSSETXATTR(r6, 0x401c5820, &(0x7f0000000040)={0x220}) renameat2(r6, &(0x7f00000003c0)='./control\x00', r6, &(0x7f0000000400)='./file0\x00', 0x2) openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000007c0)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) 17:56:40 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045794, &(0x7f0000000100)) [ 455.602681] ? trace_hardirqs_off_caller+0x300/0x300 [ 455.602696] ? do_raw_spin_trylock+0x270/0x270 [ 455.602711] ? trace_hardirqs_on_caller+0x310/0x310 [ 455.602725] ? lock_acquire+0x1db/0x570 [ 455.602747] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 455.638935] ? ___ratelimit+0xac/0x686 [ 455.642831] ? idr_get_free+0xee0/0xee0 [ 455.646813] ? lockdep_hardirqs_on+0x415/0x5d0 [ 455.651425] oom_kill_process.cold+0x10/0x9d4 [ 455.655980] ? cgroup_procs_next+0x70/0x70 [ 455.660230] ? _raw_spin_unlock_irq+0x5e/0x90 [ 455.664728] ? oom_badness+0xa50/0xa50 [ 455.668628] ? oom_evaluate_task+0x540/0x540 [ 455.673052] ? mem_cgroup_iter_break+0x30/0x30 [ 455.673066] ? mutex_trylock+0x2d0/0x2d0 [ 455.673080] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 455.673107] ? rcu_read_unlock_special+0x380/0x380 [ 455.673130] out_of_memory+0x885/0x1420 [ 455.673147] ? mem_cgroup_iter+0x508/0xf30 [ 455.673182] ? oom_killer_disable+0x340/0x340 [ 455.699065] XFS (loop5): unknown mount option [audit]. [ 455.700441] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 455.700458] ? lock_acquire+0x1db/0x570 [ 455.700485] mem_cgroup_out_of_memory+0x160/0x210 [ 455.700500] ? do_raw_spin_unlock+0xa0/0x330 [ 455.700517] ? memcg_memory_event+0x40/0x40 [ 455.700531] ? do_raw_spin_trylock+0x270/0x270 [ 455.700573] ? _raw_spin_unlock+0x2d/0x50 [ 455.741636] try_charge+0x12a9/0x19b0 [ 455.745436] ? lock_downgrade+0x910/0x910 [ 455.749586] ? kasan_check_read+0x11/0x20 [ 455.753749] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 455.758599] ? get_mem_cgroup_from_mm+0x1cd/0x420 [ 455.763450] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 455.769013] ? lock_downgrade+0x910/0x910 [ 455.773195] ? kasan_check_read+0x11/0x20 [ 455.777355] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 455.782640] ? rcu_read_unlock_special+0x380/0x380 [ 455.787588] ? get_mem_cgroup_from_mm+0x1ea/0x420 [ 455.792439] memcg_kmem_charge_memcg+0x7c/0x130 [ 455.797111] ? memcg_kmem_put_cache+0xb0/0xb0 [ 455.801610] ? lock_release+0xc40/0xc40 [ 455.805600] memcg_kmem_charge+0x13b/0x340 [ 455.809848] __alloc_pages_nodemask+0x7b8/0xdc0 [ 455.814523] ? add_lock_to_list.isra.0+0x450/0x450 [ 455.819462] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 455.824486] ? copy_page_range+0x157c/0x2840 [ 455.828907] ? __lock_is_held+0xb6/0x140 [ 455.832973] ? copy_page_range+0xb28/0x2840 [ 455.837303] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 455.842848] alloc_pages_current+0x107/0x210 [ 455.847268] pte_alloc_one+0x1b/0x1a0 [ 455.851083] __pte_alloc+0x20/0x310 [ 455.854717] copy_page_range+0x18d1/0x2840 [ 455.858956] ? mark_held_locks+0x100/0x100 [ 455.863243] ? __pmd_alloc+0x460/0x460 [ 455.867132] ? add_lock_to_list.isra.0+0x450/0x450 [ 455.872082] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 455.877631] ? copy_process+0x3607/0x8860 [ 455.881796] ? find_held_lock+0x35/0x120 [ 455.885867] ? copy_process+0x3607/0x8860 [ 455.890034] ? lock_acquire+0x1db/0x570 [ 455.894019] ? lock_downgrade+0x910/0x910 [ 455.898185] ? rcu_read_lock_sched_held+0x110/0x130 [ 455.903213] ? kmem_cache_alloc+0x341/0x710 [ 455.907541] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 455.912564] ? vma_compute_subtree_gap+0x158/0x230 [ 455.917510] ? __vma_link_rb+0x279/0x370 [ 455.921580] copy_process+0x423b/0x8860 [ 455.925593] ? __cleanup_sighand+0x70/0x70 [ 455.929837] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 455.935380] ? reuse_swap_page+0x453/0x14a0 [ 455.939709] ? swp_swapcount+0x540/0x540 [ 455.943797] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 455.949349] ? __lock_acquire+0x572/0x4a30 [ 455.953589] ? do_raw_spin_trylock+0x270/0x270 [ 455.958204] ? mark_held_locks+0x100/0x100 [ 455.962448] ? finish_mkwrite_fault+0x540/0x540 [ 455.967120] ? kasan_check_read+0x11/0x20 [ 455.971279] ? do_raw_spin_lock+0x156/0x360 [ 455.975615] ? rwlock_bug.part.0+0x90/0x90 [ 455.979857] ? pmd_devmap_trans_unstable+0x1d0/0x1d0 [ 455.984982] ? add_lock_to_list.isra.0+0x450/0x450 [ 455.989917] ? add_lock_to_list.isra.0+0x450/0x450 [ 455.994855] ? __handle_mm_fault+0x955/0x55a0 [ 455.999377] ? __might_fault+0x12b/0x1e0 [ 456.003459] ? find_held_lock+0x35/0x120 [ 456.007524] ? __might_fault+0x12b/0x1e0 [ 456.011608] ? lock_acquire+0x1db/0x570 [ 456.015589] ? lock_downgrade+0x910/0x910 [ 456.019750] ? lock_release+0xc40/0xc40 [ 456.023730] ? trace_hardirqs_off_caller+0x300/0x300 [ 456.029313] _do_fork+0x1a9/0x1170 [ 456.032867] ? fork_idle+0x1d0/0x1d0 [ 456.036588] ? kasan_check_read+0x11/0x20 [ 456.040745] ? _copy_to_user+0xc9/0x120 [ 456.044731] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 456.050275] ? put_timespec64+0x115/0x1b0 [ 456.054444] ? nsecs_to_jiffies+0x30/0x30 [ 456.058591] ? vmacache_update+0x114/0x140 [ 456.062832] ? do_syscall_64+0x8c/0x800 [ 456.066814] ? do_syscall_64+0x8c/0x800 [ 456.070799] ? lockdep_hardirqs_on+0x415/0x5d0 [ 456.075385] ? trace_hardirqs_on+0xbd/0x310 [ 456.079706] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 456.085249] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 456.090614] ? trace_hardirqs_off_caller+0x300/0x300 [ 456.095724] __x64_sys_clone+0xbf/0x150 [ 456.099725] do_syscall_64+0x1a3/0x800 [ 456.103625] ? syscall_return_slowpath+0x5f0/0x5f0 [ 456.108564] ? prepare_exit_to_usermode+0x232/0x3b0 [ 456.113594] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 456.118474] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 456.124612] RIP: 0033:0x45666a [ 456.127807] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 456.146992] RSP: 002b:00007fff32860ec0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 456.154719] RAX: ffffffffffffffda RBX: 00007fff32860ec0 RCX: 000000000045666a [ 456.162172] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 17:56:41 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a, 0x2000}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 456.169446] RBP: 00007fff32860f00 R08: 0000000000000001 R09: 000000000126c940 [ 456.176711] R10: 000000000126cc10 R11: 0000000000000246 R12: 0000000000000001 [ 456.183998] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000002 [ 456.195000] memory: usage 307200kB, limit 307200kB, failcnt 1179 [ 456.201394] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 456.208284] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 456.214624] Memory cgroup stats for /syz2: cache:0KB rss:251148KB rss_huge:227328KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:251276KB inactive_file:4KB active_file:0KB unevictable:0KB [ 456.235713] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor2,pid=12012,uid=0 [ 456.251623] Memory cgroup out of memory: Kill process 12012 (syz-executor2) score 1113 or sacrifice child [ 456.262114] Killed process 12012 (syz-executor2) total-vm:72576kB, anon-rss:2192kB, file-rss:35788kB, shmem-rss:0kB [ 456.321422] SELinux: security policydb version 15 (MLS) not backwards compatible [ 456.338343] syz-executor2 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 456.351370] XFS (loop5): unknown mount option [audit]. [ 456.354284] CPU: 0 PID: 17634 Comm: syz-executor2 Not tainted 5.0.0-rc4 #49 [ 456.363781] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 456.373131] Call Trace: [ 456.375736] dump_stack+0x1db/0x2d0 [ 456.379384] ? dump_stack_print_info.cold+0x20/0x20 [ 456.384419] dump_header+0x1e6/0x116c [ 456.388227] ? add_lock_to_list.isra.0+0x450/0x450 [ 456.393182] ? print_usage_bug+0xd0/0xd0 [ 456.397257] ? pagefault_out_of_memory+0x1a1/0x1a1 [ 456.402210] ? ___ratelimit+0x37c/0x686 [ 456.406207] ? mark_held_locks+0xb1/0x100 [ 456.410365] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 456.415471] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 456.420578] ? lockdep_hardirqs_on+0x415/0x5d0 [ 456.425184] ? trace_hardirqs_on+0xbd/0x310 [ 456.429510] ? kasan_check_read+0x11/0x20 [ 456.433664] ? ___ratelimit+0x37c/0x686 [ 456.437646] ? trace_hardirqs_off_caller+0x300/0x300 [ 456.442766] ? do_raw_spin_trylock+0x270/0x270 [ 456.447352] ? trace_hardirqs_on_caller+0x310/0x310 [ 456.452370] ? lock_acquire+0x1db/0x570 [ 456.456357] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 456.461464] ? ___ratelimit+0xac/0x686 [ 456.465360] ? idr_get_free+0xee0/0xee0 [ 456.469341] ? lockdep_hardirqs_on+0x415/0x5d0 [ 456.473938] oom_kill_process.cold+0x10/0x9d4 [ 456.478469] ? cgroup_procs_next+0x70/0x70 [ 456.482710] ? _raw_spin_unlock_irq+0x5e/0x90 [ 456.487230] ? oom_badness+0xa50/0xa50 [ 456.491127] ? oom_evaluate_task+0x540/0x540 [ 456.495557] ? mem_cgroup_iter_break+0x30/0x30 [ 456.500214] ? mutex_trylock+0x2d0/0x2d0 [ 456.504294] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 456.509848] ? rcu_read_unlock_special+0x380/0x380 [ 456.514794] out_of_memory+0x885/0x1420 [ 456.518776] ? mem_cgroup_iter+0x508/0xf30 [ 456.523020] ? oom_killer_disable+0x340/0x340 [ 456.527518] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 456.532623] ? lock_acquire+0x1db/0x570 [ 456.536616] mem_cgroup_out_of_memory+0x160/0x210 [ 456.541462] ? do_raw_spin_unlock+0xa0/0x330 [ 456.545891] ? memcg_memory_event+0x40/0x40 [ 456.550235] ? do_raw_spin_trylock+0x270/0x270 [ 456.554830] ? _raw_spin_unlock+0x2d/0x50 [ 456.558984] try_charge+0x12a9/0x19b0 [ 456.562792] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 456.568342] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 456.573205] ? rcu_read_unlock_special+0x380/0x380 [ 456.578169] ? get_mem_cgroup_from_mm+0x1ea/0x420 [ 456.583018] ? get_mem_cgroup_from_page+0x190/0x190 [ 456.588066] ? rcu_read_lock_sched_held+0x110/0x130 [ 456.593092] mem_cgroup_try_charge+0x43a/0xdb0 [ 456.597705] ? mem_cgroup_protected+0xa10/0xa10 [ 456.602393] ? mark_held_locks+0x100/0x100 [ 456.606650] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 456.612198] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 456.617746] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 456.622681] wp_page_copy+0x45a/0x1c30 [ 456.626568] ? swp_swapcount+0x540/0x540 [ 456.630647] ? pmd_pfn+0x1d0/0x1d0 [ 456.634202] ? find_held_lock+0x35/0x120 [ 456.638269] ? do_wp_page+0x70d/0x16b0 [ 456.642187] ? kasan_check_read+0x11/0x20 [ 456.646342] ? do_raw_spin_unlock+0xa0/0x330 [ 456.650759] ? do_raw_spin_trylock+0x270/0x270 [ 456.655346] ? __lock_acquire+0x572/0x4a30 [ 456.659600] do_wp_page+0x715/0x16b0 [ 456.663321] ? finish_mkwrite_fault+0x540/0x540 [ 456.667993] ? kasan_check_read+0x11/0x20 [ 456.672144] ? do_raw_spin_lock+0x156/0x360 [ 456.676501] ? rwlock_bug.part.0+0x90/0x90 [ 456.680740] ? pmd_devmap_trans_unstable+0x1d0/0x1d0 [ 456.685857] __handle_mm_fault+0x2c8e/0x55a0 [ 456.690284] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 456.695132] ? check_preemption_disabled+0x48/0x290 [ 456.700179] ? handle_mm_fault+0x3cc/0xc80 [ 456.704440] ? lock_downgrade+0x910/0x910 [ 456.708602] ? kasan_check_read+0x11/0x20 [ 456.712761] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 456.718043] ? rcu_read_unlock_special+0x380/0x380 [ 456.722982] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 456.728524] ? check_preemption_disabled+0x48/0x290 [ 456.733552] handle_mm_fault+0x4ec/0xc80 [ 456.737627] ? __handle_mm_fault+0x55a0/0x55a0 [ 456.742243] __do_page_fault+0x5da/0xd60 [ 456.746321] do_page_fault+0xe6/0x7d8 [ 456.750125] ? trace_hardirqs_on_caller+0xc0/0x310 [ 456.755089] ? vmalloc_sync_all+0x30/0x30 [ 456.759241] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 456.764695] ? syscall_return_slowpath+0x5f0/0x5f0 [ 456.769628] ? prepare_exit_to_usermode+0x232/0x3b0 [ 456.774650] ? page_fault+0x8/0x30 [ 456.778208] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 456.783059] ? page_fault+0x8/0x30 [ 456.786605] page_fault+0x1e/0x30 [ 456.790056] RIP: 0033:0x40bca3 [ 456.793251] Code: 7b 02 33 00 88 48 20 48 8b 4c 24 48 48 89 48 10 48 8b 4c 24 58 48 89 48 18 8b 4c 24 54 89 48 24 31 c0 48 8b 8c 04 10 01 00 00 <48> 89 8c 02 30 bf 73 00 48 83 c0 08 48 83 f8 48 75 e6 e8 66 71 ff [ 456.812149] RSP: 002b:00007fff32860d70 EFLAGS: 00010297 [ 456.817526] RAX: 0000000000000030 RBX: 000000000073bfa0 RCX: 0000000000000000 [ 456.824794] RDX: 00000000000000a0 RSI: 00007fe2862b5db0 RDI: 000000000073bfa8 [ 456.832065] RBP: 00000000000009f6 R08: 0000000000000000 R09: 00007fe2862b6700 [ 456.839331] R10: 00007fe2862b69d0 R11: 0000000000000202 R12: 000000000073bfac [ 456.846599] R13: 000000000073bfac R14: 0000000000000003 R15: 0000000000000001 [ 456.859666] memory: usage 307196kB, limit 307200kB, failcnt 1202 [ 456.866260] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 456.873508] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 456.880051] Memory cgroup stats for /syz2: cache:0KB rss:251128KB rss_huge:227328KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:251256KB inactive_file:0KB active_file:0KB unevictable:0KB [ 456.901458] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor2,pid=12031,uid=0 [ 456.916414] Memory cgroup out of memory: Kill process 12031 (syz-executor2) score 1113 or sacrifice child [ 456.926635] Killed process 12031 (syz-executor2) total-vm:72576kB, anon-rss:2192kB, file-rss:35788kB, shmem-rss:0kB 17:56:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:56:41 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a, 0x2100}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:56:41 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0x3) 17:56:41 executing program 5: mkdir(&(0x7f00000000c0)='./control\x00', 0x0) r0 = geteuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000200)={{{@in6, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@initdev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@local}}, &(0x7f0000000340)=0xe8) lstat(&(0x7f0000000380)='./file1\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x2, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000180)="18139aef225398e4838ec58724bcc4546973417bfa4b6b28237769c5f3f0e6855e", 0x21, 0xdbae}], 0x8084, &(0x7f00000005c0)={[{@nodiscard='nodiscard'}, {@wsync='wsync'}], [{@audit='audit'}, {@permit_directio='permit_directio'}, {@subj_type={'subj_type', 0x3d, 'keyringtrusted'}}, {@euid_gt={'euid>', r0}}, {@uid_gt={'uid>', r1}}, {@euid_lt={'euid<', r2}}, {@smackfsroot={'smackfsroot', 0x3d, '%nodev'}}, {@obj_type={'obj_type', 0x3d, '\\(vmnet0'}}, {@euid_lt={'euid<', r3}}]}) r4 = dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000006c0)={'icmp6\x00'}, &(0x7f0000000780)=0x1e) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/policy\x00', 0x0, 0x0) setsockopt$bt_BT_SECURITY(r5, 0x112, 0x4, &(0x7f0000000740)={0x5, 0x400}, 0x2) r6 = open(&(0x7f0000028000)='./control\x00', 0x0, 0x0) mknodat(r6, &(0x7f0000000000)='./control\x00', 0x0, 0x0) ioctl$SIOCAX25CTLCON(r6, 0x89e8, &(0x7f00000009c0)={@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x67, 0x1f, 0x0, [@null, @null, @default, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000980)='/dev/dlm-monitor\x00', 0x8000, 0x0) mkdirat(r6, &(0x7f0000000080)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000000800)={0x0, @in6={{0xa, 0x4e22, 0x9, @empty, 0x200}}}, &(0x7f00000008c0)=0x84) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r6, 0x84, 0x76, &(0x7f0000000900)={r7, 0xffff}, &(0x7f0000000940)=0x8) ioctl$FS_IOC_FSSETXATTR(r6, 0x401c5820, &(0x7f0000000040)={0x220}) renameat2(r6, &(0x7f00000003c0)='./control\x00', r6, &(0x7f0000000400)='./file0\x00', 0x2) openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000007c0)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) 17:56:41 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045795, &(0x7f0000000100)) [ 457.042949] SELinux: security policydb version 15 (MLS) not backwards compatible [ 457.083244] syz-executor2 invoked oom-killer: gfp_mask=0x6040c0(GFP_KERNEL|__GFP_COMP), order=1, oom_score_adj=1000 [ 457.105983] CPU: 0 PID: 17637 Comm: syz-executor2 Not tainted 5.0.0-rc4 #49 [ 457.113090] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 457.113096] Call Trace: [ 457.113116] dump_stack+0x1db/0x2d0 [ 457.113135] ? dump_stack_print_info.cold+0x20/0x20 [ 457.133716] dump_header+0x1e6/0x116c [ 457.133735] ? add_lock_to_list.isra.0+0x450/0x450 [ 457.133753] ? print_usage_bug+0xd0/0xd0 [ 457.142470] ? pagefault_out_of_memory+0x1a1/0x1a1 [ 457.142490] ? ___ratelimit+0x37c/0x686 [ 457.142512] ? mark_held_locks+0xb1/0x100 [ 457.142531] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 457.142546] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 457.142562] ? lockdep_hardirqs_on+0x415/0x5d0 [ 457.142579] ? trace_hardirqs_on+0xbd/0x310 [ 457.142594] ? kasan_check_read+0x11/0x20 [ 457.142610] ? ___ratelimit+0x37c/0x686 [ 457.142626] ? trace_hardirqs_off_caller+0x300/0x300 [ 457.164778] ? do_raw_spin_trylock+0x270/0x270 [ 457.164794] ? trace_hardirqs_on_caller+0x310/0x310 [ 457.164810] ? lock_acquire+0x1db/0x570 [ 457.182920] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 457.182938] ? ___ratelimit+0xac/0x686 [ 457.182957] ? idr_get_free+0xee0/0xee0 [ 457.182973] ? lockdep_hardirqs_on+0x415/0x5d0 [ 457.182998] oom_kill_process.cold+0x10/0x9d4 [ 457.183016] ? cgroup_procs_next+0x70/0x70 [ 457.223103] ? _raw_spin_unlock_irq+0x5e/0x90 [ 457.223121] ? oom_badness+0xa50/0xa50 [ 457.223142] ? oom_evaluate_task+0x540/0x540 [ 457.223176] ? mem_cgroup_iter_break+0x30/0x30 [ 457.223189] ? mutex_trylock+0x2d0/0x2d0 [ 457.223205] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 457.223233] ? rcu_read_unlock_special+0x380/0x380 [ 457.249247] out_of_memory+0x885/0x1420 [ 457.249266] ? mem_cgroup_iter+0x508/0xf30 [ 457.249288] ? oom_killer_disable+0x340/0x340 [ 457.249310] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 457.267770] ? lock_acquire+0x1db/0x570 [ 457.267797] mem_cgroup_out_of_memory+0x160/0x210 [ 457.267813] ? do_raw_spin_unlock+0xa0/0x330 [ 457.267829] ? memcg_memory_event+0x40/0x40 [ 457.267845] ? do_raw_spin_trylock+0x270/0x270 [ 457.299161] ? _raw_spin_unlock+0x2d/0x50 [ 457.299188] try_charge+0xd44/0x19b0 [ 457.299206] ? check_preemption_disabled+0x48/0x290 [ 457.299229] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 457.308900] XFS (loop5): unknown mount option [audit]. [ 457.311635] ? rcu_read_lock_sched_held+0x110/0x130 [ 457.311652] ? __alloc_pages_nodemask+0xaca/0xdc0 [ 457.311673] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 457.311691] ? ____cache_alloc_node+0x1be/0x1e0 [ 457.311706] ? cache_grow_begin+0x599/0x8c0 [ 457.311736] ? cache_grow_begin+0x599/0x8c0 [ 457.311757] memcg_kmem_charge_memcg+0x7c/0x130 [ 457.311772] ? memcg_kmem_put_cache+0xb0/0xb0 [ 457.311789] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 457.341712] ? __cpuset_node_allowed+0x19f/0x640 [ 457.341732] cache_grow_begin+0x25f/0x8c0 [ 457.341748] ? kasan_check_read+0x11/0x20 [ 457.341763] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 457.341777] ? mempolicy_slab_node+0x139/0x390 [ 457.341795] fallback_alloc+0x1fd/0x2d0 [ 457.341817] ____cache_alloc_node+0x1be/0x1e0 [ 457.341836] kmem_cache_alloc_node+0xe3/0x710 [ 457.364342] copy_process+0x405b/0x8860 [ 457.364357] ? find_held_lock+0x35/0x120 [ 457.364376] ? try_to_wake_up+0xf9/0x1480 [ 457.364400] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 457.401464] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 457.401484] ? preempt_schedule+0x4b/0x60 [ 457.401513] ? preempt_schedule_common+0x4f/0xe0 [ 457.401543] ? __cleanup_sighand+0x70/0x70 [ 457.401558] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 457.401574] ? try_to_wake_up+0xf9/0x1480 [ 457.401600] ? migrate_swap_stop+0x920/0x920 [ 457.401631] ? futex_wake+0x62c/0x7b0 [ 457.401662] ? lock_acquire+0x1db/0x570 [ 457.423447] ? kasan_check_read+0x11/0x20 [ 457.423464] ? do_raw_spin_unlock+0xa0/0x330 [ 457.423481] ? do_raw_spin_trylock+0x270/0x270 [ 457.423498] ? print_usage_bug+0xd0/0xd0 [ 457.423515] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 457.423534] ? drop_futex_key_refs.isra.0+0x6f/0xf0 [ 457.423555] ? __lock_acquire+0x572/0x4a30 [ 457.423580] ? get_futex_key+0x2050/0x2050 [ 457.499022] ? mark_held_locks+0x100/0x100 [ 457.503276] ? do_futex+0x1b0/0x2910 [ 457.507004] ? save_stack+0xa9/0xd0 [ 457.510638] ? save_stack+0x45/0xd0 [ 457.514270] ? __kasan_slab_free+0x102/0x150 [ 457.518682] ? add_lock_to_list.isra.0+0x450/0x450 [ 457.523621] ? add_lock_to_list.isra.0+0x450/0x450 [ 457.528558] ? exit_robust_list+0x290/0x290 [ 457.532898] ? __might_fault+0x12b/0x1e0 [ 457.536962] ? find_held_lock+0x35/0x120 [ 457.541033] ? __might_fault+0x12b/0x1e0 [ 457.545111] ? lock_acquire+0x1db/0x570 [ 457.549123] ? lock_downgrade+0x910/0x910 [ 457.553318] ? lock_release+0xc40/0xc40 [ 457.557309] ? trace_hardirqs_off_caller+0x300/0x300 [ 457.562422] _do_fork+0x1a9/0x1170 [ 457.565974] ? fork_idle+0x1d0/0x1d0 [ 457.569693] ? kasan_check_read+0x11/0x20 [ 457.573876] ? _copy_to_user+0xc9/0x120 [ 457.577869] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 457.583410] ? put_timespec64+0x115/0x1b0 [ 457.587564] ? nsecs_to_jiffies+0x30/0x30 [ 457.591725] ? do_syscall_64+0x8c/0x800 [ 457.595706] ? do_syscall_64+0x8c/0x800 [ 457.599686] ? lockdep_hardirqs_on+0x415/0x5d0 [ 457.604281] ? trace_hardirqs_on+0xbd/0x310 [ 457.608607] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 457.614162] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 457.619537] ? trace_hardirqs_off_caller+0x300/0x300 [ 457.624651] __x64_sys_clone+0xbf/0x150 [ 457.628663] do_syscall_64+0x1a3/0x800 [ 457.632570] ? syscall_return_slowpath+0x5f0/0x5f0 [ 457.637509] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 457.642535] ? __switch_to_asm+0x34/0x70 [ 457.646607] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 457.651463] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 457.656668] RIP: 0033:0x458099 [ 457.659866] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 17:56:42 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000009000600"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:56:42 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a, 0x9a01}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 457.678770] RSP: 002b:00007fe2862d6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 457.686480] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000458099 [ 457.693753] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0020002102001fff [ 457.701024] RBP: 000000000073bf00 R08: ffffffffffffffff R09: 0000000000000000 [ 457.708294] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2862d76d4 [ 457.715562] R13: 00000000004be480 R14: 00000000004cea40 R15: 00000000ffffffff [ 457.727705] device nr0 entered promiscuous mode 17:56:42 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045796, &(0x7f0000000100)) [ 457.750980] memory: usage 304912kB, limit 307200kB, failcnt 1202 [ 457.758290] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 457.765632] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 457.772523] Memory cgroup stats for /syz2: cache:0KB rss:249060KB rss_huge:225280KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:249108KB inactive_file:0KB active_file:0KB unevictable:0KB [ 457.829334] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor2,pid=12044,uid=0 [ 457.845465] XFS (loop4): Invalid superblock magic number 17:56:42 executing program 5: r0 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{0x0}, {0x0}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/64, 0x40}], 0x4, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, &(0x7f0000003480)=[{&(0x7f00000033c0)=""/137, 0x89}], 0x1, 0x0, 0x0, 0x2}, 0xca}, {{&(0x7f00000034c0)=@sco, 0x80, &(0x7f0000003700)=[{&(0x7f0000003540)=""/187, 0xbb}, {&(0x7f0000003600)=""/253, 0xfd}], 0x2, 0x0, 0x0, 0x10001}, 0x5}, {{&(0x7f0000003980)=@ipx, 0x80, &(0x7f0000005bc0)=[{&(0x7f0000003a00)=""/181, 0xb5}, {&(0x7f0000000480)=""/4, 0x4}, {0x0}, {&(0x7f0000005b00)=""/119, 0x77}, {0x0}], 0x5, 0x0, 0x0, 0xb5d}, 0x8}, {{&(0x7f0000006c40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000006ec0)=[{0x0}, {&(0x7f0000006dc0)=""/66, 0x42}, {&(0x7f0000006e40)=""/103, 0x67}], 0x3, 0x0, 0x0, 0x1000}, 0x5}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x7}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000008340)=""/4096, 0x1000, 0x49e1}}], 0x7, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x4000000000000001, 0x70, 0x800, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x1, 0x9, 0x7e, 0x0, 0x0, 0xfffffffffffffffc, 0x200, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x72ca}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x6, 0x8000000000800) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000340)) r3 = accept$alg(r1, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)={0x0, @remote, @multicast1}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000280)=ANY=[@ANYBLOB="ace267eefbde7487b371ec051351824b5d52139592559c6d819d79a161d225dd1dee1108bdd8741c5815f8b1c1850e63589b4115bfacb7204224de50e18c9ea4ae4b2f34ef15292497de890af862f7"], 0x1}, 0x1, 0x0, 0x0, 0x4008844}, 0x0) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0406400, &(0x7f0000000300)={0x7f, 0x0, 0x0, 0x0, 0x0, 0x22, &(0x7f0000000100)=""/34, 0x6b, &(0x7f0000000140)=""/107}) [ 457.878259] Memory cgroup out of memory: Kill process 12044 (syz-executor2) score 1113 or sacrifice child [ 457.893110] SELinux: security policydb version 15 (MLS) not backwards compatible [ 457.924941] Killed process 12044 (syz-executor2) total-vm:72576kB, anon-rss:2192kB, file-rss:35788kB, shmem-rss:0kB [ 457.992823] syz-executor2 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 458.020390] CPU: 1 PID: 17680 Comm: syz-executor2 Not tainted 5.0.0-rc4 #49 [ 458.027697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 458.037064] Call Trace: [ 458.039669] dump_stack+0x1db/0x2d0 [ 458.043324] ? dump_stack_print_info.cold+0x20/0x20 [ 458.048364] dump_header+0x1e6/0x116c [ 458.052184] ? add_lock_to_list.isra.0+0x450/0x450 [ 458.057122] ? print_usage_bug+0xd0/0xd0 [ 458.061204] ? pagefault_out_of_memory+0x1a1/0x1a1 [ 458.066144] ? ___ratelimit+0x37c/0x686 [ 458.070140] ? mark_held_locks+0xb1/0x100 [ 458.074313] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 458.079424] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 458.084554] ? lockdep_hardirqs_on+0x415/0x5d0 [ 458.089185] ? trace_hardirqs_on+0xbd/0x310 [ 458.093514] ? kasan_check_read+0x11/0x20 [ 458.097679] ? ___ratelimit+0x37c/0x686 [ 458.101662] ? trace_hardirqs_off_caller+0x300/0x300 [ 458.106794] ? do_raw_spin_trylock+0x270/0x270 [ 458.111385] ? trace_hardirqs_on_caller+0x310/0x310 [ 458.116404] ? lock_acquire+0x1db/0x570 [ 458.120689] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 458.125804] ? ___ratelimit+0xac/0x686 [ 458.129701] ? idr_get_free+0xee0/0xee0 [ 458.133686] ? lockdep_hardirqs_on+0x415/0x5d0 [ 458.138294] oom_kill_process.cold+0x10/0x9d4 [ 458.142799] ? cgroup_procs_next+0x70/0x70 [ 458.147040] ? _raw_spin_unlock_irq+0x5e/0x90 [ 458.151540] ? oom_badness+0xa50/0xa50 [ 458.155439] ? oom_evaluate_task+0x540/0x540 [ 458.160377] ? mem_cgroup_iter_break+0x30/0x30 [ 458.164965] ? mutex_trylock+0x2d0/0x2d0 [ 458.169030] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 458.174590] ? rcu_read_unlock_special+0x380/0x380 [ 458.179531] out_of_memory+0x885/0x1420 [ 458.183515] ? mem_cgroup_iter+0x508/0xf30 [ 458.187756] ? oom_killer_disable+0x340/0x340 [ 458.192259] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 458.197367] ? lock_acquire+0x1db/0x570 [ 458.201359] mem_cgroup_out_of_memory+0x160/0x210 [ 458.206207] ? do_raw_spin_unlock+0xa0/0x330 [ 458.210624] ? memcg_memory_event+0x40/0x40 [ 458.214973] ? do_raw_spin_trylock+0x270/0x270 [ 458.219585] ? _raw_spin_unlock+0x2d/0x50 [ 458.223736] try_charge+0x12a9/0x19b0 [ 458.227547] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 458.233114] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 458.237977] ? rcu_read_unlock_special+0x380/0x380 [ 458.242927] ? get_mem_cgroup_from_mm+0x1ea/0x420 [ 458.247776] ? get_mem_cgroup_from_page+0x190/0x190 [ 458.252817] ? rcu_read_lock_sched_held+0x110/0x130 [ 458.257841] mem_cgroup_try_charge+0x43a/0xdb0 [ 458.262438] ? mem_cgroup_protected+0xa10/0xa10 [ 458.267137] ? update_load_avg+0x2f8/0x23b0 [ 458.271477] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 458.277018] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 458.282569] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 458.287508] wp_page_copy+0x45a/0x1c30 [ 458.291403] ? swp_swapcount+0x540/0x540 [ 458.295475] ? pmd_pfn+0x1d0/0x1d0 [ 458.299024] ? find_held_lock+0x35/0x120 [ 458.303119] ? do_wp_page+0x70d/0x16b0 [ 458.307034] ? kasan_check_read+0x11/0x20 [ 458.311195] ? do_raw_spin_unlock+0xa0/0x330 [ 458.315611] ? do_raw_spin_trylock+0x270/0x270 [ 458.320198] ? __lock_acquire+0x572/0x4a30 [ 458.324467] do_wp_page+0x715/0x16b0 [ 458.328202] ? finish_mkwrite_fault+0x540/0x540 [ 458.332875] ? kasan_check_read+0x11/0x20 [ 458.337030] ? do_raw_spin_lock+0x156/0x360 [ 458.341376] ? rwlock_bug.part.0+0x90/0x90 [ 458.345616] ? pmd_devmap_trans_unstable+0x1d0/0x1d0 [ 458.350743] __handle_mm_fault+0x2c8e/0x55a0 [ 458.355172] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 458.360022] ? check_preemption_disabled+0x48/0x290 [ 458.365042] ? handle_mm_fault+0x3cc/0xc80 [ 458.369310] ? lock_downgrade+0x910/0x910 [ 458.373459] ? kasan_check_read+0x11/0x20 [ 458.377633] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 458.382944] ? rcu_read_unlock_special+0x380/0x380 [ 458.387879] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 458.393435] ? check_preemption_disabled+0x48/0x290 [ 458.398479] handle_mm_fault+0x4ec/0xc80 [ 458.402567] ? __handle_mm_fault+0x55a0/0x55a0 [ 458.407178] __do_page_fault+0x5da/0xd60 [ 458.411254] ? do_futex+0x2910/0x2910 [ 458.415087] do_page_fault+0xe6/0x7d8 [ 458.418914] ? trace_hardirqs_on_caller+0xc0/0x310 [ 458.423877] ? vmalloc_sync_all+0x30/0x30 [ 458.428031] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 458.433501] ? syscall_return_slowpath+0x5f0/0x5f0 [ 458.438435] ? prepare_exit_to_usermode+0x232/0x3b0 [ 458.443557] ? page_fault+0x8/0x30 [ 458.447124] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 458.451997] ? page_fault+0x8/0x30 [ 458.455547] page_fault+0x1e/0x30 [ 458.459029] RIP: 0033:0x40bca3 [ 458.462221] Code: 7b 02 33 00 88 48 20 48 8b 4c 24 48 48 89 48 10 48 8b 4c 24 58 48 89 48 18 8b 4c 24 54 89 48 24 31 c0 48 8b 8c 04 10 01 00 00 <48> 89 8c 02 30 bf 73 00 48 83 c0 08 48 83 f8 48 75 e6 e8 66 71 ff [ 458.481124] RSP: 002b:00007fff32860d70 EFLAGS: 00010297 [ 458.486502] RAX: 0000000000000030 RBX: 000000000073bfa0 RCX: 0000000000000000 [ 458.493775] RDX: 00000000000000a0 RSI: 00007fe2862b5db0 RDI: 000000000073bfa8 [ 458.501047] RBP: 00000000000009f6 R08: 0000000000000000 R09: 00007fe2862b6700 [ 458.508312] R10: 00007fe2862b69d0 R11: 0000000000000202 R12: 000000000073bfac [ 458.515581] R13: 000000000073bfac R14: 0000000000000003 R15: 0000000000000001 [ 458.804644] memory: usage 302664kB, limit 307200kB, failcnt 1218 [ 458.818053] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 458.825345] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 17:56:43 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000004c0)="24000000200007031dfffd946f610500810000005e00000000000000f1ffffff0400ff7e280000001100ffffba16a0aa1c0900040000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) ioctl$RTC_UIE_OFF(r1, 0x7004) 17:56:43 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045797, &(0x7f0000000100)) 17:56:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:56:43 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a, 0x2000000}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 458.839104] Memory cgroup stats for /syz2: cache:0KB rss:246984KB rss_huge:223232KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:246948KB inactive_file:0KB active_file:0KB unevictable:0KB [ 458.873122] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor2,pid=12059,uid=0 [ 458.902008] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. [ 458.920292] Memory cgroup out of memory: Kill process 12059 (syz-executor2) score 1113 or sacrifice child 17:56:43 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0x4) [ 458.947409] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. [ 458.952262] Killed process 12059 (syz-executor2) total-vm:72576kB, anon-rss:2192kB, file-rss:35788kB, shmem-rss:0kB 17:56:43 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045798, &(0x7f0000000100)) 17:56:43 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a, 0x8000000}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 458.993295] XFS (loop4): Invalid superblock magic number [ 459.024880] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. [ 459.070396] syz-executor2 invoked oom-killer: gfp_mask=0x7080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 459.081171] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. [ 459.105175] device nr0 entered promiscuous mode [ 459.116576] SELinux: security policydb version 15 (MLS) not backwards compatible [ 459.134994] sel_write_load: 4 callbacks suppressed [ 459.134999] SELinux: failed to load policy 17:56:44 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000880045799, &(0x7f0000000100)) [ 459.168296] CPU: 0 PID: 17682 Comm: syz-executor2 Not tainted 5.0.0-rc4 #49 [ 459.175403] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 459.184754] Call Trace: [ 459.187351] dump_stack+0x1db/0x2d0 [ 459.190994] ? dump_stack_print_info.cold+0x20/0x20 [ 459.196048] dump_header+0x1e6/0x116c [ 459.199857] ? add_lock_to_list.isra.0+0x450/0x450 [ 459.204801] ? print_usage_bug+0xd0/0xd0 [ 459.208869] ? pagefault_out_of_memory+0x1a1/0x1a1 [ 459.213836] ? ___ratelimit+0x37c/0x686 [ 459.217822] ? mark_held_locks+0xb1/0x100 [ 459.221974] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 459.227095] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 459.232203] ? lockdep_hardirqs_on+0x415/0x5d0 [ 459.236788] ? trace_hardirqs_on+0xbd/0x310 [ 459.241144] ? kasan_check_read+0x11/0x20 [ 459.245315] ? ___ratelimit+0x37c/0x686 [ 459.249291] ? trace_hardirqs_off_caller+0x300/0x300 [ 459.254396] ? do_raw_spin_trylock+0x270/0x270 [ 459.258980] ? trace_hardirqs_on_caller+0x310/0x310 [ 459.264002] ? lock_acquire+0x1db/0x570 [ 459.267988] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 459.273096] ? ___ratelimit+0xac/0x686 [ 459.276993] ? idr_get_free+0xee0/0xee0 [ 459.280973] ? lockdep_hardirqs_on+0x415/0x5d0 [ 459.285568] oom_kill_process.cold+0x10/0x9d4 [ 459.290075] ? cgroup_procs_next+0x70/0x70 [ 459.294315] ? _raw_spin_unlock_irq+0x5e/0x90 [ 459.298813] ? oom_badness+0xa50/0xa50 [ 459.302709] ? oom_evaluate_task+0x540/0x540 [ 459.307124] ? mem_cgroup_iter_break+0x30/0x30 [ 459.311723] ? mutex_trylock+0x2d0/0x2d0 [ 459.315790] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 459.321349] ? rcu_read_unlock_special+0x380/0x380 [ 459.326288] out_of_memory+0x885/0x1420 [ 459.330284] ? mem_cgroup_iter+0x508/0xf30 [ 459.334524] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 459.339633] ? oom_killer_disable+0x340/0x340 [ 459.344138] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 459.349260] ? lock_acquire+0x1db/0x570 [ 459.353258] mem_cgroup_out_of_memory+0x160/0x210 [ 459.358104] ? do_raw_spin_unlock+0xa0/0x330 [ 459.362519] ? memcg_memory_event+0x40/0x40 [ 459.366856] ? do_raw_spin_trylock+0x270/0x270 [ 459.371452] ? _raw_spin_unlock+0x2d/0x50 [ 459.375606] try_charge+0xd44/0x19b0 [ 459.379319] ? lock_downgrade+0x910/0x910 [ 459.383467] ? kasan_check_read+0x11/0x20 [ 459.387635] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 459.392485] ? get_mem_cgroup_from_mm+0x1cd/0x420 [ 459.397331] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 459.402878] ? lock_downgrade+0x910/0x910 [ 459.407026] ? kasan_check_read+0x11/0x20 [ 459.411194] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 459.416479] ? rcu_read_unlock_special+0x380/0x380 [ 459.421453] ? get_mem_cgroup_from_mm+0x1ea/0x420 [ 459.426394] memcg_kmem_charge_memcg+0x7c/0x130 [ 459.431066] ? memcg_kmem_put_cache+0xb0/0xb0 [ 459.435559] ? lock_release+0xc40/0xc40 [ 459.439544] memcg_kmem_charge+0x13b/0x340 [ 459.443800] __alloc_pages_nodemask+0x7b8/0xdc0 [ 459.448482] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 459.453499] ? rcu_pm_notify+0xd0/0xd0 [ 459.457403] ? rcu_read_lock_sched_held+0x110/0x130 [ 459.462422] ? kmem_cache_alloc_node+0x347/0x710 [ 459.467206] copy_process+0x847/0x8860 [ 459.471109] ? find_held_lock+0x35/0x120 [ 459.475187] ? try_to_wake_up+0xf9/0x1480 [ 459.479347] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 459.484468] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 459.489578] ? preempt_schedule+0x4b/0x60 [ 459.493748] ? preempt_schedule_common+0x4f/0xe0 [ 459.498538] ? __cleanup_sighand+0x70/0x70 [ 459.502775] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 459.507895] ? try_to_wake_up+0xf9/0x1480 [ 459.512056] ? migrate_swap_stop+0x920/0x920 [ 459.516473] ? futex_wake+0x62c/0x7b0 [ 459.520277] ? lock_acquire+0x1db/0x570 [ 459.524264] ? kasan_check_read+0x11/0x20 [ 459.528412] ? do_raw_spin_unlock+0xa0/0x330 [ 459.532838] ? do_raw_spin_trylock+0x270/0x270 [ 459.537424] ? print_usage_bug+0xd0/0xd0 [ 459.541490] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 459.546687] ? drop_futex_key_refs.isra.0+0x6f/0xf0 [ 459.551720] ? __lock_acquire+0x572/0x4a30 [ 459.555964] ? get_futex_key+0x2050/0x2050 [ 459.560219] ? mark_held_locks+0x100/0x100 [ 459.564465] ? do_futex+0x1b0/0x2910 [ 459.568207] ? save_stack+0xa9/0xd0 [ 459.571841] ? save_stack+0x45/0xd0 [ 459.575485] ? __kasan_slab_free+0x102/0x150 [ 459.579914] ? add_lock_to_list.isra.0+0x450/0x450 [ 459.584846] ? add_lock_to_list.isra.0+0x450/0x450 [ 459.589783] ? exit_robust_list+0x290/0x290 [ 459.594130] ? __might_fault+0x12b/0x1e0 [ 459.598207] ? find_held_lock+0x35/0x120 [ 459.602275] ? __might_fault+0x12b/0x1e0 [ 459.606339] ? lock_acquire+0x1db/0x570 [ 459.610327] ? lock_downgrade+0x910/0x910 [ 459.614480] ? lock_release+0xc40/0xc40 [ 459.618460] ? trace_hardirqs_off_caller+0x300/0x300 [ 459.623590] _do_fork+0x1a9/0x1170 [ 459.627169] ? fork_idle+0x1d0/0x1d0 [ 459.630886] ? kasan_check_read+0x11/0x20 [ 459.635030] ? _copy_to_user+0xc9/0x120 [ 459.639009] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 459.644550] ? put_timespec64+0x115/0x1b0 [ 459.648705] ? nsecs_to_jiffies+0x30/0x30 [ 459.652864] ? do_syscall_64+0x8c/0x800 [ 459.656843] ? do_syscall_64+0x8c/0x800 [ 459.660817] ? lockdep_hardirqs_on+0x415/0x5d0 [ 459.665402] ? trace_hardirqs_on+0xbd/0x310 [ 459.669721] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 459.675261] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 459.680636] ? trace_hardirqs_off_caller+0x300/0x300 [ 459.685742] ? ret_from_fork+0x15/0x50 [ 459.689649] __x64_sys_clone+0xbf/0x150 [ 459.693636] do_syscall_64+0x1a3/0x800 [ 459.697531] ? syscall_return_slowpath+0x5f0/0x5f0 [ 459.702465] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 459.707496] ? __switch_to_asm+0x34/0x70 [ 459.711563] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 459.716434] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 459.721623] RIP: 0033:0x458099 [ 459.724821] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 459.743720] RSP: 002b:00007fe2862d6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 459.751427] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000458099 [ 459.758696] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0020002102001fff [ 459.765963] RBP: 000000000073bf00 R08: ffffffffffffffff R09: 0000000000000000 [ 459.773235] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2862d76d4 [ 459.780507] R13: 00000000004be480 R14: 00000000004cea40 R15: 00000000ffffffff 17:56:44 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000009000700"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:56:44 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a, 0xf000000}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:56:44 executing program 5: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$VT_WAITACTIVE(r0, 0x5607) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xa, &(0x7f00000000c0)=0x73058cdb, 0x4) mmap(&(0x7f00001ed000/0x4000)=nil, 0x4000, 0x0, 0x4012, r1, 0x0) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000080)={&(0x7f00001f0000/0x10000)=nil, 0x10000}, &(0x7f0000000040)=0x10) 17:56:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) [ 459.839399] memory: usage 300096kB, limit 307200kB, failcnt 1218 17:56:44 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x200000088004579a, &(0x7f0000000100)) 17:56:44 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0x3e) [ 459.875533] audit: type=1400 audit(1548698204.778:98): avc: denied { map } for pid=17726 comm="syz-executor5" path="socket:[51180]" dev="sockfs" ino=51180 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=tcp_socket permissive=1 [ 459.922502] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 17:56:44 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4004af07, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x6000}) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x200000, 0x0) setsockopt$llc_int(r1, 0x10c, 0x8, &(0x7f0000000080)=0x9, 0x4) [ 459.957811] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 17:56:44 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a, 0x10000000}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:56:44 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x200000088004579b, &(0x7f0000000100)) [ 459.988608] Memory cgroup stats for /syz2: cache:0KB rss:244744KB rss_huge:221184KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:244820KB inactive_file:0KB active_file:0KB unevictable:0KB [ 460.048059] device nr0 entered promiscuous mode [ 460.089991] XFS (loop4): Invalid superblock magic number [ 460.097694] SELinux: security policydb version 15 (MLS) not backwards compatible [ 460.125346] SELinux: failed to load policy 17:56:45 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000009002000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:56:45 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765626469723d2e2f66696469723d2e2f66696c65315c0000000000000000003d9932252493d86553148bb70e23958f35f7fac9d1829aaab0ebf178345e64b3eb261d2f9e70e68446a40100010000000000f3e9356e651a59cf604fe02b1e9d8cd3d6ebbc2c882b4eda16eb42fcfc68b28971f7b9d08ee244e3b235cd2b9b745eb63781e3c0c1c8b877935f292cad03a851aacf24dc0ca67a8fe079d596f81d2638861422dbca2b456ab1f35453c30db78f1f5bbcb7ea80b1e986e209009473ba42fa7c6941d1e5888268a55023708255ce0214f371c0654e520b9efba7eb70e6c908d6459da61d212b32dbedfee00d4f7df8ce967fe552d810942404f4136cf944c0e3864a86d71b401a6453e20271b50c7cf8f1568ee24500bed7f69f07c29a091c0fa8ec80a1077cf8fba8b5a9f432a229e24c8d63b6232522b6edc6e1d6a1d38a17e6c3dfc39f08f17017026db6597c2eeca8475806a5dede7d0cf3125d228a3e7da24fad6e8392b21cbdb40505509cdbd1b262aa450c277ce0f88e1061000086ac043d733525333cafed7ec49f4b923933d3e8187a628910476758493378497bd2541881a29d70c5b0e295086fc3f2440b523b28314b32ea823c3099e962c50016373586c123522748ba730ff6eb3d509b73ee3f5ef23201f5fa"]) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./file0\x00', 0x141042, 0x0) fstat(r2, &(0x7f0000000300)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000100)) [ 460.138309] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor2,pid=12098,uid=0 [ 460.205255] Memory cgroup out of memory: Kill process 12098 (syz-executor2) score 1113 or sacrifice child [ 460.251255] Killed process 12098 (syz-executor2) total-vm:72576kB, anon-rss:2192kB, file-rss:35788kB, shmem-rss:0kB [ 460.280281] oom_reaper: reaped process 12098 (syz-executor2), now anon-rss:0kB, file-rss:34828kB, shmem-rss:0kB [ 460.292233] overlayfs: unrecognized mount option "lowebdir=./fidir=./file1\" or missing value 17:56:45 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000009003f00"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 460.298379] SELinux: security policydb version 15 (MLS) not backwards compatible [ 460.319053] SELinux: failed to load policy [ 460.325391] SELinux: security policydb version 15 (MLS) not backwards compatible [ 460.341132] SELinux: failed to load policy [ 460.456025] SELinux: security policydb version 15 (MLS) not backwards compatible [ 460.488560] SELinux: failed to load policy [ 460.512678] SELinux: security policydb version 15 (MLS) not backwards compatible [ 460.546753] SELinux: failed to load policy [ 460.631426] overlayfs: unrecognized mount option "lowebdir=./fidir=./file1\" or missing value 17:56:45 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000009004800"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:56:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:56:45 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a, 0x20000000}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:56:45 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x200000088004579c, &(0x7f0000000100)) [ 460.677817] audit: type=1804 audit(1548698205.578:99): pid=17770 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir103046459/syzkaller.0k5Fj6/322/file0/file0" dev="sda1" ino=17075 res=1 17:56:45 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xfdef) [ 460.714033] audit: type=1804 audit(1548698205.578:100): pid=17770 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor5" name="/root/syzkaller-testdir103046459/syzkaller.0k5Fj6/322/file0/file0" dev="sda1" ino=17075 res=1 17:56:45 executing program 5: read(0xffffffffffffffff, &(0x7f0000000040)=""/28, 0xfe91) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000080)={0x200000000bf}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x40505330, &(0x7f0000000100)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000300)={0x0, 0x0, 0x0, 'queue0\x00'}) r0 = gettid() timer_create(0x0, &(0x7f00000002c0)={0x0, 0x12}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) [ 460.783494] SELinux: security policydb version 15 (MLS) not backwards compatible [ 460.825529] SELinux: failed to load policy [ 460.834743] device nr0 entered promiscuous mode [ 460.847885] SELinux: security policydb version 15 (MLS) not backwards compatible 17:56:45 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x200000088004579d, &(0x7f0000000100)) 17:56:45 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000009004c00"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:56:45 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a, 0x21000000}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 460.876576] SELinux: failed to load policy [ 460.895114] XFS (loop4): Invalid superblock magic number 17:56:45 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x9, 0x8000) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000080)={0x8, &(0x7f0000000040)=[{0x2, 0x739f5db3, 0x7, 0x4}, {0x94, 0x0, 0x6, 0x20000}, {0xffff, 0x9, 0x101, 0x6}, {0x1, 0x625, 0x7, 0x6000000000}, {0x200000, 0x2, 0x2, 0x7f}, {0xb6b7, 0xffffffffffffff2d, 0x2, 0xffff}, {0x7f, 0x2, 0x4, 0x5}, {0x824, 0xfffffffffffffff7, 0x7, 0x7}]}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000180)={0x0, @in6={{0xa, 0x0, 0x0, @ipv4}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x0) syz_open_dev$media(&(0x7f0000000540)='/dev/media#\x00', 0x0, 0x0) ppoll(&(0x7f00000000c0)=[{}], 0x2000000000000074, 0x0, 0x0, 0x0) [ 460.951554] SELinux: security policydb version 15 (MLS) not backwards compatible [ 460.988434] SELinux: failed to load policy 17:56:45 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000009006000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:56:45 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f0000508ff6)='./control\x00', 0x0) read(r1, &(0x7f0000e6d000)=""/384, 0x180) signalfd(r1, &(0x7f0000432ff8)={0xfffffffffffffffe}, 0x8) r2 = inotify_init1(0x0) fcntl$setstatus(r2, 0x4, 0x72109c5fef5d34d3) r3 = gettid() fcntl$setown(r2, 0x8, r3) rt_sigprocmask(0x0, &(0x7f0000000000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r2, 0xa, 0x20) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) ioctl$SIOCAX25ADDFWD(r4, 0x89ea, &(0x7f0000000080)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}}) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f00000000c0)=0x5d08, 0x4) inotify_add_watch(r2, &(0x7f00007a7000)='./control\x00', 0xa4000960) open(&(0x7f00003f5000)='./control\x00', 0x0, 0x0) [ 461.001138] SELinux: security policydb version 15 (MLS) not backwards compatible [ 461.032398] SELinux: failed to load policy [ 461.109119] SELinux: security policydb version 15 (MLS) not backwards compatible [ 461.142936] syz-executor2 invoked oom-killer: gfp_mask=0x7080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 461.188557] CPU: 0 PID: 17828 Comm: syz-executor2 Not tainted 5.0.0-rc4 #49 [ 461.195670] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 461.205019] Call Trace: [ 461.207619] dump_stack+0x1db/0x2d0 [ 461.211257] ? dump_stack_print_info.cold+0x20/0x20 [ 461.216287] dump_header+0x1e6/0x116c [ 461.220090] ? add_lock_to_list.isra.0+0x450/0x450 [ 461.225026] ? print_usage_bug+0xd0/0xd0 [ 461.229093] ? pagefault_out_of_memory+0x1a1/0x1a1 [ 461.234045] ? ___ratelimit+0x37c/0x686 [ 461.238035] ? mark_held_locks+0xb1/0x100 [ 461.242198] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 461.247304] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 461.252443] ? lockdep_hardirqs_on+0x415/0x5d0 [ 461.257058] ? trace_hardirqs_on+0xbd/0x310 [ 461.261388] ? kasan_check_read+0x11/0x20 [ 461.265540] ? ___ratelimit+0x37c/0x686 [ 461.269536] ? trace_hardirqs_off_caller+0x300/0x300 [ 461.274648] ? do_raw_spin_trylock+0x270/0x270 [ 461.279234] ? trace_hardirqs_on_caller+0x310/0x310 [ 461.284284] ? lock_acquire+0x1db/0x570 [ 461.288272] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 461.293384] ? ___ratelimit+0xac/0x686 [ 461.297292] ? idr_get_free+0xee0/0xee0 [ 461.301278] ? lockdep_hardirqs_on+0x415/0x5d0 [ 461.305878] oom_kill_process.cold+0x10/0x9d4 [ 461.310385] ? cgroup_procs_next+0x70/0x70 [ 461.314634] ? _raw_spin_unlock_irq+0x5e/0x90 [ 461.319133] ? oom_badness+0xa50/0xa50 [ 461.323040] ? oom_evaluate_task+0x540/0x540 [ 461.327458] ? mem_cgroup_iter_break+0x30/0x30 [ 461.332042] ? mutex_trylock+0x2d0/0x2d0 [ 461.336107] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 461.341661] ? rcu_read_unlock_special+0x380/0x380 [ 461.346600] out_of_memory+0x885/0x1420 [ 461.350614] ? mem_cgroup_iter+0x508/0xf30 [ 461.354875] ? oom_killer_disable+0x340/0x340 [ 461.359380] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 461.364491] ? lock_acquire+0x1db/0x570 [ 461.368482] mem_cgroup_out_of_memory+0x160/0x210 [ 461.373332] ? do_raw_spin_unlock+0xa0/0x330 [ 461.377788] ? memcg_memory_event+0x40/0x40 [ 461.382117] ? do_raw_spin_trylock+0x270/0x270 [ 461.386712] ? _raw_spin_unlock+0x2d/0x50 [ 461.390871] try_charge+0x12a9/0x19b0 [ 461.394690] ? lock_downgrade+0x910/0x910 [ 461.398859] ? kasan_check_read+0x11/0x20 [ 461.403065] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 461.407934] ? get_mem_cgroup_from_mm+0x1cd/0x420 [ 461.412788] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 461.418335] ? lock_downgrade+0x910/0x910 [ 461.422486] ? kasan_check_read+0x11/0x20 [ 461.426644] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 461.431929] ? rcu_read_unlock_special+0x380/0x380 [ 461.436897] ? get_mem_cgroup_from_mm+0x1ea/0x420 [ 461.441749] memcg_kmem_charge_memcg+0x7c/0x130 [ 461.446425] ? memcg_kmem_put_cache+0xb0/0xb0 [ 461.450935] ? lock_release+0xc40/0xc40 [ 461.454924] memcg_kmem_charge+0x13b/0x340 [ 461.459184] __alloc_pages_nodemask+0x7b8/0xdc0 [ 461.463867] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 461.468885] ? rcu_pm_notify+0xd0/0xd0 [ 461.472795] ? rcu_read_lock_sched_held+0x110/0x130 [ 461.477816] ? kmem_cache_alloc_node+0x347/0x710 [ 461.482589] copy_process+0x847/0x8860 [ 461.486482] ? print_usage_bug+0xd0/0xd0 [ 461.490574] ? mark_held_locks+0x100/0x100 [ 461.494841] ? add_lock_to_list.isra.0+0x450/0x450 [ 461.499784] ? __lock_acquire+0x572/0x4a30 [ 461.504040] ? try_charge+0xcfb/0x19b0 [ 461.507928] ? try_charge+0xcfb/0x19b0 [ 461.511847] ? __cleanup_sighand+0x70/0x70 [ 461.516091] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 461.521632] ? __lru_cache_add+0x2eb/0x4b0 [ 461.525869] ? __lock_acquire+0x572/0x4a30 [ 461.530108] ? __pagevec_lru_add+0x30/0x30 [ 461.534348] ? percpu_ref_put_many+0x129/0x270 [ 461.538948] ? lru_cache_add+0x3e5/0xa30 [ 461.543021] ? lru_cache_add_file+0x20/0x20 [ 461.547357] ? mem_cgroup_commit_charge+0x273/0x8b0 [ 461.552378] ? add_lock_to_list.isra.0+0x450/0x450 [ 461.557328] ? trace_hardirqs_on+0xbd/0x310 [ 461.561654] ? __mem_cgroup_threshold+0x610/0x610 [ 461.566501] ? __handle_mm_fault+0x29b7/0x55a0 [ 461.571100] ? __handle_mm_fault+0x2a8e/0x55a0 [ 461.575700] ? find_held_lock+0x35/0x120 [ 461.579785] ? __handle_mm_fault+0x2a8e/0x55a0 [ 461.584383] ? kasan_check_read+0x11/0x20 [ 461.588532] ? do_raw_spin_unlock+0xa0/0x330 [ 461.592950] ? do_raw_spin_trylock+0x270/0x270 [ 461.597535] ? pmd_devmap_trans_unstable+0x1d0/0x1d0 [ 461.602647] ? _raw_spin_unlock+0x2d/0x50 [ 461.606796] ? __handle_mm_fault+0x955/0x55a0 [ 461.611296] ? add_lock_to_list.isra.0+0x450/0x450 [ 461.616235] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 461.621099] ? check_preemption_disabled+0x48/0x290 [ 461.626126] ? __do_page_fault+0x610/0xd60 [ 461.630376] ? find_held_lock+0x35/0x120 [ 461.634457] _do_fork+0x1a9/0x1170 [ 461.638010] ? fork_idle+0x1d0/0x1d0 [ 461.641733] ? kasan_check_write+0x14/0x20 [ 461.645971] ? up_read+0x212/0x2b0 [ 461.649519] ? up_read_non_owner+0x100/0x100 [ 461.653935] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 461.659476] ? vmacache_update+0x114/0x140 [ 461.663719] ? do_syscall_64+0x8c/0x800 [ 461.667697] ? do_syscall_64+0x8c/0x800 [ 461.671681] ? lockdep_hardirqs_on+0x415/0x5d0 [ 461.676269] ? trace_hardirqs_on+0xbd/0x310 [ 461.680601] ? __do_page_fault+0x3f1/0xd60 [ 461.684850] ? do_futex+0x2910/0x2910 [ 461.688660] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 461.694027] ? trace_hardirqs_off_caller+0x300/0x300 [ 461.699141] __x64_sys_clone+0xbf/0x150 [ 461.703168] do_syscall_64+0x1a3/0x800 [ 461.707075] ? syscall_return_slowpath+0x5f0/0x5f0 [ 461.712013] ? prepare_exit_to_usermode+0x232/0x3b0 [ 461.717043] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 461.721901] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 461.727092] RIP: 0033:0x45aa69 [ 461.730287] Code: ff 48 85 f6 0f 84 97 8d fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c 6e 8d fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 461.749199] RSP: 002b:00007fff32860c38 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 461.756928] RAX: ffffffffffffffda RBX: 00007fe2862b6700 RCX: 000000000045aa69 [ 461.764220] RDX: 00007fe2862b69d0 RSI: 00007fe2862b5db0 RDI: 00000000003d0f00 [ 461.771518] RBP: 00007fff32860e40 R08: 00007fe2862b6700 R09: 00007fe2862b6700 [ 461.778787] R10: 00007fe2862b69d0 R11: 0000000000000202 R12: 0000000000000000 [ 461.786055] R13: 00007fff32860cef R14: 00007fe2862b69c0 R15: 0000000000000001 17:56:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:56:46 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x200000088004579e, &(0x7f0000000100)) [ 461.841673] memory: usage 307176kB, limit 307200kB, failcnt 1234 [ 461.850997] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 461.857816] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 461.864445] Memory cgroup stats for /syz2: cache:0KB rss:251128KB rss_huge:227328KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:251248KB inactive_file:0KB active_file:0KB unevictable:0KB 17:56:46 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a, 0x8dffffff}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:56:46 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0x2000004e) [ 461.886289] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor2,pid=12132,uid=0 17:56:46 executing program 5: r0 = userfaultfd(0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x34040, 0x0) connect$ax25(r1, &(0x7f00000001c0)={{0x3, @bcast, 0x6}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast]}, 0x48) mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x1}) r2 = userfaultfd(0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000240)=0x3) close(r2) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f00000000c0)={0x6, 0xb2}) clone(0x4800a000, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000140)=""/100, 0x64) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ffc000/0x3000)=nil, 0x3000}, 0x1}) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 17:56:46 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x200000088004579f, &(0x7f0000000100)) [ 461.952853] Memory cgroup out of memory: Kill process 12132 (syz-executor2) score 1113 or sacrifice child [ 462.007436] Killed process 12132 (syz-executor2) total-vm:72576kB, anon-rss:2192kB, file-rss:35788kB, shmem-rss:0kB [ 462.038889] device nr0 entered promiscuous mode [ 462.068440] SELinux: security policydb version 15 (MLS) not backwards compatible [ 462.080459] syz-executor2 invoked oom-killer: gfp_mask=0x7080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 462.086679] [ 462.093363] ===================================================== [ 462.099589] WARNING: SOFTIRQ-safe -> SOFTIRQ-unsafe lock order detected [ 462.106333] 5.0.0-rc4 #49 Not tainted [ 462.110123] ----------------------------------------------------- [ 462.116370] syz-executor5/17861 [HC0[0]:SC0[0]:HE0:SE1] is trying to acquire: [ 462.123631] 00000000a0f9379c (&ctx->fault_pending_wqh){+.+.}, at: userfaultfd_ctx_read+0x690/0x2060 [ 462.132902] [ 462.132902] and this task is already holding: [ 462.138861] 00000000fdb97e15 (&ctx->fd_wqh){....}, at: userfaultfd_ctx_read+0x25e/0x2060 [ 462.147098] which would create a new lock dependency: [ 462.152280] (&ctx->fd_wqh){....} -> (&ctx->fault_pending_wqh){+.+.} [ 462.158996] [ 462.158996] but this new dependency connects a SOFTIRQ-irq-safe lock: [ 462.162917] CPU: 1 PID: 17830 Comm: syz-executor2 Not tainted 5.0.0-rc4 #49 [ 462.167055] (&(&ctx->ctx_lock)->rlock){..-.} [ 462.167065] [ 462.167065] ... which became SOFTIRQ-irq-safe at: [ 462.174177] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 462.178676] lock_acquire+0x1db/0x570 [ 462.184967] Call Trace: [ 462.194322] _raw_spin_lock_irq+0x60/0x80 [ 462.198185] dump_stack+0x1db/0x2d0 [ 462.200755] free_ioctx_users+0xa7/0x6e0 [ 462.204972] ? dump_stack_print_info.cold+0x20/0x20 [ 462.208581] percpu_ref_switch_to_atomic_rcu+0x50c/0x6b0 [ 462.212714] dump_header+0x1e6/0x116c [ 462.217706] rcu_process_callbacks+0xc4a/0x1680 [ 462.223220] ? add_lock_to_list.isra.0+0x450/0x450 [ 462.227001] __do_softirq+0x30b/0xb11 [ 462.231748] ? print_usage_bug+0xd0/0xd0 [ 462.236669] irq_exit+0x180/0x1d0 [ 462.240544] ? pagefault_out_of_memory+0x1a1/0x1a1 [ 462.244583] smp_apic_timer_interrupt+0x1b7/0x760 [ 462.248105] ? ___ratelimit+0x37c/0x686 [ 462.253016] apic_timer_interrupt+0xf/0x20 [ 462.257921] ? mark_held_locks+0xb1/0x100 [ 462.261873] _raw_spin_unlock_irq+0x54/0x90 [ 462.266179] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 462.266196] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 462.270331] finish_task_switch+0x1e9/0xac0 [ 462.274714] ? lockdep_hardirqs_on+0x415/0x5d0 [ 462.279796] __schedule+0x89f/0x1e60 [ 462.284879] ? trace_hardirqs_on+0xbd/0x310 [ 462.289267] schedule+0xfe/0x350 [ 462.293832] ? kasan_check_read+0x11/0x20 [ 462.297657] do_nanosleep+0x208/0x750 [ 462.301968] ? ___ratelimit+0x37c/0x686 [ 462.305401] hrtimer_nanosleep+0x2e4/0x640 [ 462.309523] ? trace_hardirqs_off_caller+0x300/0x300 [ 462.313392] __x64_sys_nanosleep+0x1e0/0x280 [ 462.317348] ? do_raw_spin_trylock+0x270/0x270 [ 462.321648] do_syscall_64+0x1a3/0x800 [ 462.326730] ? trace_hardirqs_on_caller+0x310/0x310 [ 462.331205] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 462.335765] ? lock_acquire+0x1db/0x570 [ 462.339710] [ 462.339710] to a SOFTIRQ-irq-unsafe lock: [ 462.344712] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 462.349960] (&ctx->fault_pending_wqh){+.+.} [ 462.349970] [ 462.349970] ... which became SOFTIRQ-irq-unsafe at: [ 462.353924] ? ___ratelimit+0xac/0x686 [ 462.359526] ... [ 462.359542] lock_acquire+0x1db/0x570 [ 462.364628] ? idr_get_free+0xee0/0xee0 [ 462.369014] _raw_spin_lock+0x2f/0x40 [ 462.375489] ? lockdep_hardirqs_on+0x415/0x5d0 [ 462.379360] handle_userfault+0x901/0x2510 [ 462.381236] oom_kill_process.cold+0x10/0x9d4 [ 462.385098] __handle_mm_fault+0x4563/0x55a0 [ 462.389053] ? cgroup_procs_next+0x70/0x70 [ 462.392921] handle_mm_fault+0x4ec/0xc80 [ 462.397478] ? _raw_spin_unlock_irq+0x5e/0x90 [ 462.401777] __do_page_fault+0x5da/0xd60 [ 462.401793] do_page_fault+0xe6/0x7d8 [ 462.406272] ? oom_badness+0xa50/0xa50 [ 462.410743] page_fault+0x1e/0x30 [ 462.414961] ? oom_evaluate_task+0x540/0x540 [ 462.419092] __get_user_4+0x21/0x30 [ 462.423566] ? mem_cgroup_iter_break+0x30/0x30 [ 462.427708] sock_common_setsockopt+0x9a/0xe0 [ 462.431596] ? mutex_trylock+0x2d0/0x2d0 [ 462.435464] __sys_setsockopt+0x1b0/0x3a0 [ 462.435481] __x64_sys_setsockopt+0xbe/0x150 [ 462.439004] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 462.443389] do_syscall_64+0x1a3/0x800 [ 462.447086] ? rcu_read_unlock_special+0x380/0x380 [ 462.451644] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 462.456209] out_of_memory+0x885/0x1420 [ 462.460236] [ 462.460236] other info that might help us debug this: [ 462.460236] [ 462.464459] ? mem_cgroup_iter+0x508/0xf30 [ 462.468925] Chain exists of: [ 462.468925] &(&ctx->ctx_lock)->rlock --> &ctx->fd_wqh --> &ctx->fault_pending_wqh [ 462.468925] [ 462.474450] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 462.478392] Possible interrupt unsafe locking scenario: [ 462.478392] [ 462.483312] ? oom_killer_disable+0x340/0x340 [ 462.488557] CPU0 CPU1 [ 462.492521] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 462.500634] ---- ---- [ 462.504859] ? lock_acquire+0x1db/0x570 [ 462.516966] lock(&ctx->fault_pending_wqh); [ 462.522072] mem_cgroup_out_of_memory+0x160/0x210 [ 462.528964] local_irq_disable(); [ 462.533450] ? do_raw_spin_unlock+0xa0/0x330 [ 462.538092] lock(&(&ctx->ctx_lock)->rlock); [ 462.543193] ? memcg_memory_event+0x40/0x40 [ 462.547831] lock(&ctx->fd_wqh); [ 462.551795] ? do_raw_spin_trylock+0x270/0x270 [ 462.556182] [ 462.561028] ? _raw_spin_unlock+0x2d/0x50 [ 462.567050] lock(&(&ctx->ctx_lock)->rlock); [ 462.571451] try_charge+0xd44/0x19b0 [ 462.578436] [ 462.578436] *** DEADLOCK *** [ 462.578436] [ 462.582746] ? lock_downgrade+0x910/0x910 [ 462.588694] 1 lock held by syz-executor5/17861: [ 462.593269] ? kasan_check_read+0x11/0x20 [ 462.595998] #0: 00000000fdb97e15 (&ctx->fd_wqh){....}, at: userfaultfd_ctx_read+0x25e/0x2060 [ 462.600139] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 462.604777] [ 462.604777] the dependencies between SOFTIRQ-irq-safe lock and the holding lock: [ 462.608481] ? get_mem_cgroup_from_mm+0x1cd/0x420 [ 462.614510] -> (&(&ctx->ctx_lock)->rlock){..-.} { [ 462.618651] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 462.623293] IN-SOFTIRQ-W at: [ 462.627430] ? lock_downgrade+0x910/0x910 [ 462.636072] lock_acquire+0x1db/0x570 [ 462.640895] ? kasan_check_read+0x11/0x20 [ 462.649884] _raw_spin_lock_irq+0x60/0x80 [ 462.654704] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 462.659618] free_ioctx_users+0xa7/0x6e0 [ 462.665136] ? rcu_read_unlock_special+0x380/0x380 [ 462.668487] percpu_ref_switch_to_atomic_rcu+0x50c/0x6b0 [ 462.672619] ? get_mem_cgroup_from_mm+0x1ea/0x420 [ 462.678221] rcu_process_callbacks+0xc4a/0x1680 [ 462.682345] memcg_kmem_charge_memcg+0x7c/0x130 [ 462.688294] __do_softirq+0x30b/0xb11 [ 462.693549] ? memcg_kmem_put_cache+0xb0/0xb0 [ 462.699417] irq_exit+0x180/0x1d0 [ 462.704327] ? lock_release+0xc40/0xc40 [ 462.711579] smp_apic_timer_interrupt+0x1b7/0x760 [ 462.716407] memcg_kmem_charge+0x13b/0x340 [ 462.722893] apic_timer_interrupt+0xf/0x20 [ 462.727528] __alloc_pages_nodemask+0x7b8/0xdc0 [ 462.733130] _raw_spin_unlock_irq+0x54/0x90 [ 462.737606] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 462.742864] finish_task_switch+0x1e9/0xac0 [ 462.746820] ? rcu_pm_notify+0xd0/0xd0 [ 462.753470] __schedule+0x89f/0x1e60 [ 462.757687] ? rcu_read_lock_sched_held+0x110/0x130 [ 462.763718] schedule+0xfe/0x350 [ 462.768371] ? kmem_cache_alloc_node+0x347/0x710 [ 462.774496] do_nanosleep+0x208/0x750 [ 462.779497] copy_process+0x847/0x8860 [ 462.785616] hrtimer_nanosleep+0x2e4/0x640 [ 462.785633] __x64_sys_nanosleep+0x1e0/0x280 [ 462.789497] ? find_held_lock+0x35/0x120 [ 462.795020] do_syscall_64+0x1a3/0x800 [ 462.800016] ? try_to_wake_up+0xf9/0x1480 [ 462.805196] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 462.809931] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 462.815528] INITIAL USE at: [ 462.819407] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 462.825442] lock_acquire+0x1db/0x570 [ 462.831650] ? preempt_schedule+0x4b/0x60 [ 462.835691] _raw_spin_lock_irq+0x60/0x80 [ 462.841376] ? preempt_schedule_common+0x4f/0xe0 [ 462.841398] ? __cleanup_sighand+0x70/0x70 [ 462.845521] free_ioctx_users+0xa7/0x6e0 [ 462.852516] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 462.857596] percpu_ref_switch_to_atomic_rcu+0x50c/0x6b0 [ 462.860858] ? try_to_wake_up+0xf9/0x1480 [ 462.865941] rcu_process_callbacks+0xc4a/0x1680 [ 462.871462] ? migrate_swap_stop+0x920/0x920 [ 462.875583] __do_softirq+0x30b/0xb11 [ 462.881452] ? futex_wake+0x62c/0x7b0 [ 462.886198] irq_exit+0x180/0x1d0 [ 462.890413] ? lock_acquire+0x1db/0x570 [ 462.896199] smp_apic_timer_interrupt+0x1b7/0x760 [ 462.901285] ? kasan_check_read+0x11/0x20 [ 462.908453] apic_timer_interrupt+0xf/0x20 [ 462.912582] ? do_raw_spin_unlock+0xa0/0x330 [ 462.918967] _raw_spin_unlock_irq+0x54/0x90 [ 462.923353] ? do_raw_spin_trylock+0x270/0x270 [ 462.928882] finish_task_switch+0x1e9/0xac0 [ 462.932669] ? print_usage_bug+0xd0/0xd0 [ 462.937861] __schedule+0x89f/0x1e60 [ 462.941820] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 462.948400] schedule+0xfe/0x350 [ 462.952535] ? drop_futex_key_refs.isra.0+0x6f/0xf0 [ 462.958478] do_nanosleep+0x208/0x750 [ 462.958496] hrtimer_nanosleep+0x2e4/0x640 [ 462.962883] ? __lock_acquire+0x572/0x4a30 [ 462.968925] __x64_sys_nanosleep+0x1e0/0x280 [ 462.973485] ? get_futex_key+0x2050/0x2050 [ 462.979522] do_syscall_64+0x1a3/0x800 [ 462.983560] ? mark_held_locks+0x100/0x100 [ 462.988990] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 462.994169] ? do_futex+0x1b0/0x2910 [ 462.999246] } [ 463.004256] ? save_stack+0xa9/0xd0 [ 463.009842] ... key at: [] __key.51971+0x0/0x40 [ 463.015724] ? save_stack+0x45/0xd0 [ 463.019930] ... acquired at: [ 463.026064] ? __kasan_slab_free+0x102/0x150 [ 463.030278] _raw_spin_lock+0x2f/0x40 [ 463.035885] ? add_lock_to_list.isra.0+0x450/0x450 [ 463.040100] aio_poll+0x7b9/0x14e0 [ 463.047004] ? add_lock_to_list.isra.0+0x450/0x450 [ 463.050698] io_submit_one+0xc39/0x1050 [ 463.052569] ? exit_robust_list+0x290/0x290 [ 463.056241] __x64_sys_io_submit+0x1c4/0x5d0 [ 463.063008] ? __might_fault+0x12b/0x1e0 [ 463.066616] do_syscall_64+0x1a3/0x800 [ 463.069784] ? find_held_lock+0x35/0x120 [ 463.074181] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 463.078132] ? __might_fault+0x12b/0x1e0 [ 463.083032] [ 463.086736] ? lock_acquire+0x1db/0x570 [ 463.091635] -> (&ctx->fd_wqh){....} { [ 463.095773] ? lock_downgrade+0x910/0x910 [ 463.100066] INITIAL USE at: [ 463.104638] ? lock_release+0xc40/0xc40 [ 463.108707] lock_acquire+0x1db/0x570 [ 463.112740] ? trace_hardirqs_off_caller+0x300/0x300 [ 463.116805] _raw_spin_lock_irqsave+0x95/0xcd [ 463.122371] _do_fork+0x1a9/0x1170 [ 463.126413] __wake_up_common_lock+0x19b/0x390 [ 463.128025] ? fork_idle+0x1d0/0x1d0 [ 463.131976] __wake_up+0xe/0x10 [ 463.135776] ? kasan_check_read+0x11/0x20 [ 463.139914] handle_userfault+0xdfb/0x2510 [ 463.139944] __handle_mm_fault+0x4563/0x55a0 [ 463.143117] ? _copy_to_user+0xc9/0x120 [ 463.147070] handle_mm_fault+0x4ec/0xc80 [ 463.152417] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 463.157499] __do_page_fault+0x5da/0xd60 [ 463.163534] ? put_timespec64+0x115/0x1b0 [ 463.167057] do_page_fault+0xe6/0x7d8 [ 463.173202] ? nsecs_to_jiffies+0x30/0x30 [ 463.176900] page_fault+0x1e/0x30 [ 463.181728] ? do_syscall_64+0x8c/0x800 [ 463.185856] __get_user_4+0x21/0x30 [ 463.191637] ? do_syscall_64+0x8c/0x800 [ 463.197606] sock_common_setsockopt+0x9a/0xe0 [ 463.201572] ? lockdep_hardirqs_on+0x415/0x5d0 [ 463.207187] __sys_setsockopt+0x1b0/0x3a0 [ 463.207208] __x64_sys_setsockopt+0xbe/0x150 [ 463.212726] ? trace_hardirqs_on+0xbd/0x310 [ 463.218334] do_syscall_64+0x1a3/0x800 [ 463.222460] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 463.227804] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 463.231931] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 463.236932] } [ 463.240895] ? trace_hardirqs_off_caller+0x300/0x300 [ 463.246067] ... key at: [] __key.44853+0x0/0x40 [ 463.250018] ? ret_from_fork+0x15/0x50 [ 463.256047] ... acquired at: [ 463.260620] __x64_sys_clone+0xbf/0x150 [ 463.266308] lock_acquire+0x1db/0x570 [ 463.272258] do_syscall_64+0x1a3/0x800 [ 463.276557] _raw_spin_lock+0x2f/0x40 [ 463.281989] ? syscall_return_slowpath+0x5f0/0x5f0 [ 463.287514] userfaultfd_ctx_read+0x690/0x2060 [ 463.287528] userfaultfd_read+0x1e0/0x2c0 [ 463.294263] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 463.299605] __vfs_read+0x116/0xb20 [ 463.301394] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 463.306475] vfs_read+0x194/0x3e0 [ 463.313208] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 463.317074] ksys_read+0x105/0x260 [ 463.320168] RIP: 0033:0x458099 [ 463.324125] __x64_sys_read+0x73/0xb0 [ 463.328079] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 463.331959] do_syscall_64+0x1a3/0x800 [ 463.335906] RSP: 002b:00007fe2862d6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 463.340823] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 463.345550] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000458099 [ 463.349846] [ 463.354849] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0020002102001fff [ 463.358624] [ 463.358624] the dependencies between the lock to be acquired [ 463.358628] and SOFTIRQ-irq-unsafe lock: [ 463.363450] RBP: 000000000073bf00 R08: ffffffffffffffff R09: 0000000000000000 [ 463.367054] -> (&ctx->fault_pending_wqh){+.+.} { [ 463.372227] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2862d76d4 [ 463.375916] HARDIRQ-ON-W at: 17:56:48 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a, 0x9a010000}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 463.379094] R13: 00000000004be480 R14: 00000000004cea40 R15: 00000000ffffffff [ 463.383052] lock_acquire+0x1db/0x570 [ 463.481774] _raw_spin_lock+0x2f/0x40 [ 463.483522] kobject: 'loop3' (000000002d2e089c): kobject_uevent_env [ 463.487248] handle_userfault+0x901/0x2510 [ 463.487263] __handle_mm_fault+0x4563/0x55a0 [ 463.487280] handle_mm_fault+0x4ec/0xc80 [ 463.511315] __do_page_fault+0x5da/0xd60 [ 463.516529] kobject: 'loop3' (000000002d2e089c): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 463.517059] do_page_fault+0xe6/0x7d8 [ 463.531936] page_fault+0x1e/0x30 [ 463.537047] __get_user_4+0x21/0x30 [ 463.542324] sock_common_setsockopt+0x9a/0xe0 [ 463.548472] __sys_setsockopt+0x1b0/0x3a0 [ 463.554268] __x64_sys_setsockopt+0xbe/0x150 [ 463.560323] do_syscall_64+0x1a3/0x800 [ 463.565858] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 463.572686] SOFTIRQ-ON-W at: [ 463.575965] lock_acquire+0x1db/0x570 [ 463.581412] _raw_spin_lock+0x2f/0x40 [ 463.586861] handle_userfault+0x901/0x2510 [ 463.592741] __handle_mm_fault+0x4563/0x55a0 [ 463.598796] handle_mm_fault+0x4ec/0xc80 [ 463.604508] __do_page_fault+0x5da/0xd60 [ 463.610216] do_page_fault+0xe6/0x7d8 [ 463.615664] page_fault+0x1e/0x30 [ 463.620781] __get_user_4+0x21/0x30 [ 463.626061] sock_common_setsockopt+0x9a/0xe0 [ 463.632218] __sys_setsockopt+0x1b0/0x3a0 [ 463.638020] __x64_sys_setsockopt+0xbe/0x150 [ 463.644074] do_syscall_64+0x1a3/0x800 [ 463.649611] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 463.656438] INITIAL USE at: [ 463.659635] lock_acquire+0x1db/0x570 [ 463.665022] _raw_spin_lock+0x2f/0x40 [ 463.670421] handle_userfault+0x901/0x2510 [ 463.676237] __handle_mm_fault+0x4563/0x55a0 [ 463.682206] handle_mm_fault+0x4ec/0xc80 [ 463.687829] __do_page_fault+0x5da/0xd60 [ 463.693458] do_page_fault+0xe6/0x7d8 [ 463.698825] page_fault+0x1e/0x30 [ 463.703850] __get_user_4+0x21/0x30 [ 463.709039] sock_common_setsockopt+0x9a/0xe0 [ 463.715094] __sys_setsockopt+0x1b0/0x3a0 [ 463.720801] __x64_sys_setsockopt+0xbe/0x150 [ 463.726773] do_syscall_64+0x1a3/0x800 [ 463.732222] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 463.738955] } [ 463.740752] ... key at: [] __key.44850+0x0/0x40 [ 463.747507] ... acquired at: [ 463.750611] lock_acquire+0x1db/0x570 [ 463.754601] _raw_spin_lock+0x2f/0x40 [ 463.758608] userfaultfd_ctx_read+0x690/0x2060 [ 463.763374] userfaultfd_read+0x1e0/0x2c0 [ 463.767698] __vfs_read+0x116/0xb20 [ 463.771507] vfs_read+0x194/0x3e0 [ 463.775127] ksys_read+0x105/0x260 [ 463.778863] __x64_sys_read+0x73/0xb0 [ 463.782838] do_syscall_64+0x1a3/0x800 [ 463.786899] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 463.792250] [ 463.793880] [ 463.793880] stack backtrace: [ 463.798380] CPU: 0 PID: 17861 Comm: syz-executor5 Not tainted 5.0.0-rc4 #49 [ 463.805471] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 463.814818] Call Trace: [ 463.817408] dump_stack+0x1db/0x2d0 [ 463.821041] ? dump_stack_print_info.cold+0x20/0x20 [ 463.826061] ? print_shortest_lock_dependencies.cold+0x176/0x1f0 [ 463.832240] ? vprintk_func+0x86/0x189 [ 463.836188] check_usage.cold+0x5e2/0x917 [ 463.840374] ? check_usage_forwards+0x3e0/0x3e0 [ 463.845063] ? lockdep_on+0x50/0x50 [ 463.848690] ? lock_pin_lock+0x3a0/0x3a0 [ 463.852753] ? save_trace+0x290/0x290 [ 463.856568] __lock_acquire+0x2169/0x4a30 [ 463.860726] ? __lock_acquire+0x2169/0x4a30 [ 463.865070] ? mark_held_locks+0x100/0x100 [ 463.869316] ? print_usage_bug+0xd0/0xd0 [ 463.873384] ? __lock_acquire+0x572/0x4a30 [ 463.877619] ? print_usage_bug+0xd0/0xd0 [ 463.881697] lock_acquire+0x1db/0x570 [ 463.885499] ? userfaultfd_ctx_read+0x690/0x2060 [ 463.890254] ? lock_release+0xc40/0xc40 [ 463.894229] ? rwlock_bug.part.0+0x90/0x90 [ 463.898462] ? trace_hardirqs_on_caller+0x310/0x310 [ 463.903481] ? print_usage_bug+0xd0/0xd0 [ 463.907549] _raw_spin_lock+0x2f/0x40 [ 463.911364] ? userfaultfd_ctx_read+0x690/0x2060 [ 463.916118] userfaultfd_ctx_read+0x690/0x2060 [ 463.920707] ? userfaultfd_release+0x8c0/0x8c0 [ 463.925293] ? print_usage_bug+0xd0/0xd0 [ 463.929356] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 463.934898] ? add_lock_to_list.isra.0+0x450/0x450 [ 463.939832] ? wake_up_q+0x100/0x100 [ 463.943550] ? __lock_acquire+0x572/0x4a30 [ 463.947799] ? find_held_lock+0x35/0x120 [ 463.951862] ? __fget+0x472/0x710 [ 463.955347] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 463.960918] ? lock_downgrade+0x910/0x910 [ 463.965061] ? kasan_check_read+0x11/0x20 [ 463.969208] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 463.974484] ? rcu_read_unlock_special+0x380/0x380 [ 463.979414] ? __fget+0x499/0x710 [ 463.982887] userfaultfd_read+0x1e0/0x2c0 [ 463.987040] ? userfaultfd_ctx_read+0x2060/0x2060 [ 463.991894] ? inode_has_perm.isra.0+0x17e/0x210 [ 463.996651] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 464.002200] ? fsnotify+0x4f5/0xed0 [ 464.005830] __vfs_read+0x116/0xb20 [ 464.009460] ? userfaultfd_ctx_read+0x2060/0x2060 [ 464.014306] ? vfs_copy_file_range+0xbb0/0xbb0 [ 464.018923] ? selinux_file_permission+0x92/0x550 [ 464.023767] ? security_file_permission+0x94/0x320 [ 464.029132] ? rw_verify_area+0x118/0x360 [ 464.033292] vfs_read+0x194/0x3e0 [ 464.036751] ksys_read+0x105/0x260 [ 464.040309] ? kernel_write+0x120/0x120 [ 464.044298] ? trace_hardirqs_off_caller+0x300/0x300 [ 464.049397] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 464.054162] __x64_sys_read+0x73/0xb0 [ 464.057974] do_syscall_64+0x1a3/0x800 [ 464.061861] ? syscall_return_slowpath+0x5f0/0x5f0 [ 464.066795] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 464.071808] ? __switch_to_asm+0x34/0x70 [ 464.075879] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 464.080744] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 464.085930] RIP: 0033:0x458099 [ 464.089121] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 464.108021] RSP: 002b:00007ff2359e2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 464.115757] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458099 [ 464.123026] RDX: 0000000000000064 RSI: 0000000020000140 RDI: 0000000000000003 [ 464.130291] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 464.137566] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2359e36d4 [ 464.144832] R13: 00000000004c3b97 R14: 00000000004d8520 R15: 00000000ffffffff [ 464.161790] kobject: 'rx-0' (00000000b1bb98b1): kobject_cleanup, parent 00000000237c4873 [ 464.169431] IPVS: ftp: loaded support on port[0] = 21 [ 464.172948] kobject: 'loop4' (000000001338c9b4): kobject_uevent_env [ 464.180620] memory: usage 304896kB, limit 307200kB, failcnt 1234 [ 464.182148] kobject: 'rx-0' (00000000b1bb98b1): auto cleanup 'remove' event [ 464.188794] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 464.195577] kobject: 'loop4' (000000001338c9b4): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 464.204033] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 464.211734] kobject: 'rx-0' (00000000b1bb98b1): kobject_uevent_env [ 464.218498] Memory cgroup stats for /syz2: cache:0KB rss:249052KB rss_huge:225280KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:249096KB inactive_file:0KB active_file:0KB unevictable:0KB [ 464.229609] kobject: 'rx-0' (00000000b1bb98b1): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' [ 464.245092] kobject: 'loop4' (000000001338c9b4): kobject_uevent_env [ 464.264979] kobject: 'loop4' (000000001338c9b4): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 464.283065] kobject: 'rx-0' (00000000b1bb98b1): auto cleanup kobject_del [ 464.284442] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor2,pid=12179,uid=0 [ 464.297824] kobject: 'rx-0' (00000000b1bb98b1): calling ktype release [ 464.309683] Memory cgroup out of memory: Kill process 12179 (syz-executor2) score 1113 or sacrifice child [ 464.324118] Killed process 12179 (syz-executor2) total-vm:72576kB, anon-rss:2192kB, file-rss:35788kB, shmem-rss:0kB [ 464.325593] kobject: 'rx-0': free name [ 464.348781] kobject: 'tx-0' (00000000769bc7d9): kobject_cleanup, parent 00000000237c4873 [ 464.363130] kobject: 'tx-0' (00000000769bc7d9): auto cleanup 'remove' event [ 464.377202] IPVS: ftp: loaded support on port[0] = 21 17:56:49 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000009006800"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 464.388915] kobject: 'tx-0' (00000000769bc7d9): kobject_uevent_env [ 464.405346] kobject: 'loop2' (00000000aba18d7e): kobject_uevent_env [ 464.412015] kobject: 'loop2' (00000000aba18d7e): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 464.415058] kobject: 'tx-0' (00000000769bc7d9): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' [ 464.434832] kobject: 'tx-0' (00000000769bc7d9): auto cleanup kobject_del [ 464.441828] kobject: 'tx-0' (00000000769bc7d9): calling ktype release [ 464.448500] kobject: 'tx-0': free name [ 464.455865] kobject: 'queues' (00000000237c4873): kobject_cleanup, parent (null) [ 464.464381] kobject: 'queues' (00000000237c4873): calling ktype release [ 464.474078] kobject: 'queues' (00000000237c4873): kset_release [ 464.481215] kobject: 'queues': free name 17:56:49 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x20000008800457a0, &(0x7f0000000100)) [ 464.485709] kobject: 'nr0' (0000000052d88df4): kobject_uevent_env [ 464.495001] kobject: 'nr0' (0000000052d88df4): fill_kobj_path: path = '/devices/virtual/net/nr0' [ 464.524823] SELinux: security policydb version 15 (MLS) not backwards compatible 17:56:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:56:49 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000009006c00"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 464.538385] sel_write_load: 2 callbacks suppressed [ 464.538390] SELinux: failed to load policy [ 464.548495] SELinux: security policydb version 15 (MLS) not backwards compatible [ 464.554619] kobject: 'loop4' (000000001338c9b4): kobject_uevent_env [ 464.558409] SELinux: failed to load policy [ 464.567218] kobject: 'loop4' (000000001338c9b4): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 464.578372] kobject: 'loop2' (00000000aba18d7e): kobject_uevent_env [ 464.585773] kobject: 'loop2' (00000000aba18d7e): fill_kobj_path: path = '/devices/virtual/block/loop2' 17:56:49 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x20000008800457a1, &(0x7f0000000100)) 17:56:49 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a, 0xeffdffff}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 464.619898] kobject: 'nr0' (0000000052d88df4): kobject_cleanup, parent (null) [ 464.625119] kobject: 'loop4' (000000001338c9b4): kobject_uevent_env [ 464.628132] kobject: 'nr0' (0000000052d88df4): calling ktype release [ 464.628170] kobject: 'nr0': free name [ 464.644383] SELinux: security policydb version 15 (MLS) not backwards compatible 17:56:49 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xfffffdef) 17:56:49 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000009007400"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 464.670364] SELinux: failed to load policy [ 464.679402] SELinux: security policydb version 15 (MLS) not backwards compatible [ 464.695393] SELinux: failed to load policy [ 464.704774] kobject: 'loop4' (000000001338c9b4): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 464.737684] kobject: 'loop3' (000000002d2e089c): kobject_uevent_env [ 464.758111] kobject: 'loop3' (000000002d2e089c): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 464.770400] SELinux: security policydb version 15 (MLS) not backwards compatible [ 464.772543] kobject: 'nr0' (00000000219238f5): kobject_add_internal: parent: 'net', set: 'devices' 17:56:49 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a, 0xf0ffffff}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 464.789063] kobject: 'loop1' (0000000018805d49): kobject_uevent_env [ 464.800774] kobject: 'nr0' (00000000219238f5): kobject_uevent_env [ 464.807125] kobject: 'nr0' (00000000219238f5): fill_kobj_path: path = '/devices/virtual/net/nr0' [ 464.807856] kobject: 'loop1' (0000000018805d49): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 464.827091] syz-executor2 invoked oom-killer: gfp_mask=0x6040c0(GFP_KERNEL|__GFP_COMP), order=1, oom_score_adj=1000 [ 464.832795] SELinux: failed to load policy [ 464.848899] kobject: 'loop2' (00000000aba18d7e): kobject_uevent_env [ 464.855887] kobject: 'loop2' (00000000aba18d7e): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 464.862310] CPU: 0 PID: 17904 Comm: syz-executor2 Not tainted 5.0.0-rc4 #49 [ 464.866689] kobject: 'loop3' (000000002d2e089c): kobject_uevent_env [ 464.872455] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 464.872460] Call Trace: [ 464.872484] dump_stack+0x1db/0x2d0 [ 464.872505] ? dump_stack_print_info.cold+0x20/0x20 [ 464.872520] ? __switch_to_asm+0x40/0x70 [ 464.872533] ? __switch_to_asm+0x34/0x70 [ 464.872549] ? __switch_to_asm+0x40/0x70 [ 464.880339] kobject: 'loop3' (000000002d2e089c): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 464.888279] ? __switch_to_asm+0x34/0x70 [ 464.888292] ? __switch_to_asm+0x40/0x70 [ 464.888312] dump_header+0x1e6/0x116c [ 464.888327] ? lock_acquire+0x1db/0x570 [ 464.900095] kobject: 'queues' (00000000b064fea6): kobject_add_internal: parent: 'nr0', set: '' [ 464.903623] ? pagefault_out_of_memory+0x1a1/0x1a1 [ 464.903640] ? cgroup_mount+0xdd0/0xdd0 [ 464.903656] ? lock_acquire+0x1db/0x570 [ 464.907852] kobject: 'queues' (00000000b064fea6): kobject_uevent_env [ 464.911802] ? ___ratelimit+0x16e/0x686 [ 464.911819] ? trace_hardirqs_on+0xbd/0x310 [ 464.911834] ? kasan_check_read+0x11/0x20 [ 464.911847] ? ___ratelimit+0x37c/0x686 [ 464.911861] ? trace_hardirqs_off_caller+0x300/0x300 [ 464.911892] ? do_raw_spin_trylock+0x270/0x270 [ 464.935168] kobject: 'queues' (00000000b064fea6): kobject_uevent_env: filter function caused the event to drop! [ 464.937177] ? trace_hardirqs_on_caller+0x310/0x310 [ 464.937190] ? lock_acquire+0x1db/0x570 [ 464.937208] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 464.937223] ? ___ratelimit+0xac/0x686 [ 464.958880] kobject: 'rx-0' (00000000de002ece): kobject_add_internal: parent: 'queues', set: 'queues' [ 464.959391] ? idr_get_free+0xee0/0xee0 [ 464.984395] kobject: 'rx-0' (00000000de002ece): kobject_uevent_env [ 464.987330] oom_kill_process.cold+0x10/0x9d4 [ 464.987361] ? cgroup_procs_next+0x70/0x70 [ 464.987392] ? _raw_spin_unlock_irq+0x5e/0x90 [ 465.003185] kobject: 'rx-0' (00000000de002ece): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' [ 465.007213] ? oom_badness+0xa50/0xa50 [ 465.007232] ? oom_evaluate_task+0x540/0x540 [ 465.007246] ? mem_cgroup_iter_break+0x30/0x30 [ 465.007262] ? mutex_trylock+0x2d0/0x2d0 [ 465.025808] kobject: 'tx-0' (000000000e058f13): kobject_add_internal: parent: 'queues', set: 'queues' [ 465.029553] ? cgroup_mount+0xdd0/0xdd0 [ 465.029576] ? rcu_read_unlock_special+0x380/0x380 [ 465.029600] out_of_memory+0x885/0x1420 [ 465.049225] kobject: 'tx-0' (000000000e058f13): kobject_uevent_env [ 465.053039] ? mem_cgroup_iter+0x508/0xf30 [ 465.053058] ? oom_killer_disable+0x340/0x340 [ 465.053074] ? mem_cgroup_nr_lru_pages+0x80/0x80 [ 465.053087] ? lock_acquire+0x1db/0x570 [ 465.053112] mem_cgroup_out_of_memory+0x160/0x210 [ 465.093270] kobject: 'tx-0' (000000000e058f13): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' [ 465.093422] ? do_raw_spin_unlock+0xa0/0x330 [ 465.145336] ? memcg_memory_event+0x40/0x40 [ 465.149435] kobject: 'loop3' (000000002d2e089c): kobject_uevent_env [ 465.149662] ? do_raw_spin_trylock+0x270/0x270 [ 465.160650] ? _raw_spin_unlock+0x2d/0x50 [ 465.164803] try_charge+0x12a9/0x19b0 [ 465.166116] kobject: 'loop3' (000000002d2e089c): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 465.168597] ? set_page_refcounted+0x270/0x270 [ 465.168617] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 465.168637] ? __alloc_pages_nodemask+0x8b2/0xdc0 [ 465.192287] ? retint_kernel+0x1b/0x2d [ 465.195298] device nr0 entered promiscuous mode [ 465.196191] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 465.196212] memcg_kmem_charge_memcg+0x7c/0x130 [ 465.196243] ? memcg_kmem_put_cache+0xb0/0xb0 [ 465.215132] cache_grow_begin+0x25f/0x8c0 [ 465.219295] ? kasan_check_read+0x11/0x20 [ 465.223459] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 465.228993] ? mempolicy_slab_node+0x139/0x390 [ 465.233572] fallback_alloc+0x1fd/0x2d0 [ 465.237561] ____cache_alloc_node+0x1be/0x1e0 [ 465.242061] kmem_cache_alloc_node+0xe3/0x710 [ 465.246570] ? pci_mmcfg_check_reserved+0x170/0x170 [ 465.251592] copy_process+0x405b/0x8860 [ 465.255562] ? plist_add+0x5ea/0x780 [ 465.259300] ? ___might_sleep+0x1e7/0x310 [ 465.263448] ? arch_local_save_flags+0x50/0x50 [ 465.268043] ? __schedule+0x1e60/0x1e60 [ 465.272021] ? do_raw_spin_trylock+0x270/0x270 [ 465.276609] ? __cleanup_sighand+0x70/0x70 [ 465.280847] ? futex_wait_queue_me+0x539/0x810 [ 465.285431] ? refill_pi_state_cache.part.0+0x310/0x310 [ 465.290797] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 465.295817] ? handle_futex_death+0x230/0x230 [ 465.300317] ? lock_acquire+0x1db/0x570 [ 465.304289] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 465.309479] ? drop_futex_key_refs.isra.0+0x6f/0xf0 [ 465.314508] ? futex_wait+0x6e6/0xa40 [ 465.318318] ? futex_wait_setup+0x430/0x430 [ 465.322645] ? drop_futex_key_refs.isra.0+0x6f/0xf0 [ 465.327661] ? futex_wake+0x306/0x7b0 [ 465.331480] ? mark_held_locks+0x100/0x100 [ 465.335716] ? do_futex+0x1b0/0x2910 [ 465.335852] XFS (loop4): Invalid superblock magic number [ 465.339428] ? save_stack+0xa9/0xd0 [ 465.339443] ? save_stack+0x45/0xd0 [ 465.339456] ? __kasan_slab_free+0x102/0x150 [ 465.339474] ? kasan_slab_free+0xe/0x10 [ 465.360477] ? kmem_cache_free+0x86/0x260 [ 465.364624] ? putname+0xef/0x130 [ 465.368084] ? exit_robust_list+0x290/0x290 [ 465.372409] ? trace_hardirqs_off+0xb8/0x310 [ 465.376824] ? kasan_check_read+0x11/0x20 [ 465.380975] ? do_raw_spin_unlock+0xa0/0x330 [ 465.383416] kobject: 'loop4' (000000001338c9b4): kobject_uevent_env [ 465.385411] ? trace_hardirqs_on_caller+0x310/0x310 [ 465.385425] ? do_raw_spin_trylock+0x270/0x270 [ 465.385442] ? lock_acquire+0x1db/0x570 [ 465.403118] kobject: 'loop4' (000000001338c9b4): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 465.405360] ? __might_fault+0xfb/0x1e0 [ 465.405379] ? lock_downgrade+0x910/0x910 [ 465.422891] ? lock_release+0xc40/0xc40 [ 465.426895] ? trace_hardirqs_off_caller+0x300/0x300 [ 465.432003] _do_fork+0x1a9/0x1170 [ 465.435548] ? fork_idle+0x1d0/0x1d0 [ 465.439259] ? kasan_check_read+0x11/0x20 [ 465.443419] ? _copy_to_user+0xc9/0x120 [ 465.447393] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 465.452944] ? put_timespec64+0x115/0x1b0 [ 465.457120] ? nsecs_to_jiffies+0x30/0x30 [ 465.461268] ? trace_hardirqs_on+0xbd/0x310 [ 465.465605] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 465.471143] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 465.476525] ? trace_hardirqs_off_caller+0x300/0x300 [ 465.481628] __x64_sys_clone+0xbf/0x150 [ 465.485604] do_syscall_64+0x1a3/0x800 [ 465.489494] ? syscall_return_slowpath+0x5f0/0x5f0 [ 465.494441] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 465.499454] ? __switch_to_asm+0x34/0x70 [ 465.503517] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 465.508362] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 465.513547] RIP: 0033:0x458099 [ 465.516736] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 465.535632] RSP: 002b:00007fe2862d6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 465.543337] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000458099 [ 465.550607] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0020002102001fff [ 465.557871] RBP: 000000000073bf00 R08: ffffffffffffffff R09: 0000000000000000 [ 465.565135] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2862d76d4 [ 465.572415] R13: 00000000004be480 R14: 00000000004cea40 R15: 00000000ffffffff [ 465.580631] memory: usage 307200kB, limit 307200kB, failcnt 1271 [ 465.586937] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 465.593913] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 465.600217] Memory cgroup stats for /syz2: cache:0KB rss:251104KB rss_huge:227328KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:251236KB inactive_file:0KB active_file:0KB unevictable:0KB [ 465.621505] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor2,pid=12201,uid=0 [ 465.630532] kobject: 'loop4' (000000001338c9b4): kobject_uevent_env [ 465.636252] Memory cgroup out of memory: Kill process 12201 (syz-executor2) score 1113 or sacrifice child [ 465.652348] Killed process 12201 (syz-executor2) total-vm:72576kB, anon-rss:2192kB, file-rss:35788kB, shmem-rss:0kB [ 465.663206] kobject: 'loop4' (000000001338c9b4): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 465.677854] syz-executor2 invoked oom-killer: gfp_mask=0x6040c0(GFP_KERNEL|__GFP_COMP), order=1, oom_score_adj=1000 [ 465.688972] CPU: 0 PID: 17896 Comm: syz-executor2 Not tainted 5.0.0-rc4 #49 [ 465.696075] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 465.705421] Call Trace: [ 465.708034] dump_stack+0x1db/0x2d0 [ 465.711681] ? dump_stack_print_info.cold+0x20/0x20 [ 465.716711] dump_header+0x1e6/0x116c [ 465.720513] ? lock_acquire+0x1db/0x570 [ 465.724493] ? pagefault_out_of_memory+0x1a1/0x1a1 [ 465.729424] ? cgroup_mount+0xdd0/0xdd0 [ 465.733398] ? lock_acquire+0x1db/0x570 [ 465.737368] ? ___ratelimit+0x16e/0x686 [ 465.741342] ? trace_hardirqs_on+0xbd/0x310 [ 465.745661] ? kasan_check_read+0x11/0x20 [ 465.749828] ? ___ratelimit+0x37c/0x686 [ 465.753819] ? trace_hardirqs_off_caller+0x300/0x300 [ 465.758931] ? do_raw_spin_trylock+0x270/0x270 [ 465.763522] ? trace_hardirqs_on_caller+0x310/0x310 [ 465.768535] ? lock_acquire+0x1db/0x570 [ 465.772512] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 465.777617] ? ___ratelimit+0xac/0x686 [ 465.781504] ? idr_get_free+0xee0/0xee0 [ 465.785485] oom_kill_process.cold+0x10/0x9d4 [ 465.789981] ? cgroup_procs_next+0x70/0x70 [ 465.794231] ? _raw_spin_unlock_irq+0x5e/0x90 [ 465.798728] ? oom_badness+0xa50/0xa50 [ 465.802621] ? oom_evaluate_task+0x540/0x540 [ 465.807036] ? mem_cgroup_iter_break+0x30/0x30 [ 465.811619] ? mutex_trylock+0x2d0/0x2d0 [ 465.815675] ? cgroup_mount+0xdd0/0xdd0 [ 465.819659] ? rcu_read_unlock_special+0x380/0x380 [ 465.824594] out_of_memory+0x885/0x1420 [ 465.828574] ? mem_cgroup_iter+0x508/0xf30 [ 465.832815] ? oom_killer_disable+0x340/0x340 [ 465.837314] ? mem_cgroup_nr_lru_pages+0x80/0x80 [ 465.842072] ? lock_acquire+0x1db/0x570 [ 465.846050] mem_cgroup_out_of_memory+0x160/0x210 [ 465.850892] ? do_raw_spin_unlock+0xa0/0x330 [ 465.855302] ? memcg_memory_event+0x40/0x40 [ 465.859618] ? do_raw_spin_trylock+0x270/0x270 [ 465.864220] ? _raw_spin_unlock+0x2d/0x50 [ 465.868385] try_charge+0xd44/0x19b0 [ 465.872109] ? set_page_refcounted+0x270/0x270 [ 465.876707] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 465.881555] ? __alloc_pages_nodemask+0x8b2/0xdc0 [ 465.886402] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 465.891434] memcg_kmem_charge_memcg+0x7c/0x130 [ 465.896103] ? memcg_kmem_put_cache+0xb0/0xb0 [ 465.900602] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 465.906137] ? __cpuset_node_allowed+0x19f/0x640 [ 465.910910] cache_grow_begin+0x25f/0x8c0 [ 465.915063] ? kasan_check_read+0x11/0x20 [ 465.919210] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 465.924744] ? mempolicy_slab_node+0x139/0x390 [ 465.929329] fallback_alloc+0x1fd/0x2d0 [ 465.933308] ____cache_alloc_node+0x1be/0x1e0 [ 465.937801] kmem_cache_alloc_node+0xe3/0x710 [ 465.942304] copy_process+0x405b/0x8860 [ 465.946282] ? mark_held_locks+0x100/0x100 [ 465.950525] ? rcu_read_unlock+0x33/0x60 [ 465.954581] ? mem_cgroup_iter+0x508/0xf30 [ 465.958811] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 465.964351] ? css_next_child+0x1a7/0x510 [ 465.968496] ? trace_hardirqs_on_caller+0x310/0x310 [ 465.973514] ? mark_held_locks+0x100/0x100 [ 465.977760] ? __cleanup_sighand+0x70/0x70 [ 465.981994] ? rcu_read_unlock_special+0x380/0x380 [ 465.986922] ? mark_held_locks+0x100/0x100 [ 465.991176] ? mark_held_locks+0x100/0x100 [ 465.995422] ? pvclock_read_flags+0x160/0x160 [ 465.999919] ? delayacct_end+0x27/0x100 [ 466.003900] ? lock_acquire+0x1db/0x570 [ 466.007879] ? pvclock_read_flags+0x160/0x160 [ 466.012388] ? kasan_check_read+0x11/0x20 [ 466.016542] ? lock_downgrade+0x910/0x910 [ 466.020689] ? sched_clock_cpu+0x1b/0x1b0 [ 466.025235] ? lock_release+0xc40/0xc40 [ 466.029236] ? trace_hardirqs_on+0xbd/0x310 [ 466.033571] ? kasan_check_read+0x11/0x20 [ 466.037734] ? psi_memstall_leave+0x1f8/0x280 [ 466.042231] ? trace_hardirqs_off_caller+0x300/0x300 [ 466.047367] ? mark_held_locks+0x100/0x100 [ 466.051610] ? _raw_spin_unlock_irq+0x5e/0x90 [ 466.056107] ? psi_memstall_leave+0x1f8/0x280 [ 466.060668] ? wq_calc_node_cpumask+0x3a0/0x3a0 [ 466.065344] ? psi_memstall_enter+0x2b0/0x2b0 [ 466.069836] ? lock_acquire+0x1db/0x570 [ 466.073830] ? kernfs_notify+0xf8/0x210 [ 466.077816] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 466.083371] ? try_to_free_mem_cgroup_pages+0x597/0xcd0 [ 466.088735] ? try_to_free_pages+0xb70/0xb70 [ 466.093143] ? preempt_schedule+0x4b/0x60 [ 466.097316] ? ___preempt_schedule+0x16/0x18 [ 466.101730] ? blkcg_maybe_throttle_current+0x75e/0x1400 [ 466.107209] ? lock_acquire+0x1db/0x570 [ 466.111212] _do_fork+0x1a9/0x1170 [ 466.114756] ? fork_idle+0x1d0/0x1d0 [ 466.118478] ? trace_hardirqs_off+0xb8/0x310 [ 466.122891] ? get_mctgt_type_thp.isra.0+0x4c0/0x4c0 [ 466.128001] ? prepare_exit_to_usermode+0x32e/0x3b0 [ 466.133023] ? trace_hardirqs_on_caller+0x310/0x310 [ 466.138044] ? trace_hardirqs_on+0xbd/0x310 [ 466.142372] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 466.147761] ? trace_hardirqs_off_caller+0x300/0x300 [ 466.152880] __x64_sys_clone+0xbf/0x150 [ 466.156969] do_syscall_64+0x1a3/0x800 [ 466.160864] ? syscall_return_slowpath+0x5f0/0x5f0 [ 466.165803] ? prepare_exit_to_usermode+0x232/0x3b0 [ 466.170822] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 466.175693] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 466.180887] RIP: 0033:0x45aa69 [ 466.184077] Code: ff 48 85 f6 0f 84 97 8d fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c 6e 8d fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 466.202971] RSP: 002b:00007fff32860c38 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 466.210675] RAX: ffffffffffffffda RBX: 00007fe2862b6700 RCX: 000000000045aa69 [ 466.217937] RDX: 00007fe2862b69d0 RSI: 00007fe2862b5db0 RDI: 00000000003d0f00 [ 466.225216] RBP: 00007fff32860e40 R08: 00007fe2862b6700 R09: 00007fe2862b6700 [ 466.232492] R10: 00007fe2862b69d0 R11: 0000000000000202 R12: 0000000000000000 [ 466.239762] R13: 00007fff32860cef R14: 00007fe2862b69c0 R15: 0000000000000001 [ 466.248015] memory: usage 304956kB, limit 307200kB, failcnt 1271 [ 466.254392] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 466.261336] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 466.262958] kobject: 'rx-0' (00000000de002ece): kobject_cleanup, parent 00000000b064fea6 [ 466.267607] Memory cgroup stats for /syz2: cache:0KB rss:249036KB rss_huge:225280KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:249080KB inactive_file:0KB active_file:0KB unevictable:0KB [ 466.296870] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor2,pid=12221,uid=0 [ 466.303349] kobject: 'rx-0' (00000000de002ece): auto cleanup 'remove' event [ 466.311637] Memory cgroup out of memory: Kill process 12221 (syz-executor2) score 1113 or sacrifice child [ 466.328402] Killed process 12221 (syz-executor2) total-vm:72576kB, anon-rss:2192kB, file-rss:35788kB, shmem-rss:0kB [ 466.349874] kobject: 'rx-0' (00000000de002ece): kobject_uevent_env [ 466.353357] SELinux: security policydb version 15 (MLS) not backwards compatible [ 466.356277] kobject: 'rx-0' (00000000de002ece): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' [ 466.364100] SELinux: failed to load policy [ 466.387698] kobject: 'rx-0' (00000000de002ece): auto cleanup kobject_del [ 466.414935] kobject: 'rx-0' (00000000de002ece): calling ktype release [ 466.433333] kobject: 'rx-0': free name [ 466.439927] kobject: 'tx-0' (000000000e058f13): kobject_cleanup, parent 00000000b064fea6 [ 466.448178] kobject: 'tx-0' (000000000e058f13): auto cleanup 'remove' event [ 466.455836] kobject: 'loop2' (00000000aba18d7e): kobject_uevent_env [ 466.462324] kobject: 'loop2' (00000000aba18d7e): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 466.471824] kobject: 'tx-0' (000000000e058f13): kobject_uevent_env [ 466.489919] kobject: 'tx-0' (000000000e058f13): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' [ 466.509912] kobject: 'tx-0' (000000000e058f13): auto cleanup kobject_del [ 466.516799] kobject: 'tx-0' (000000000e058f13): calling ktype release [ 466.523460] kobject: 'tx-0': free name [ 466.527364] kobject: 'queues' (00000000b064fea6): kobject_cleanup, parent (null) [ 466.535801] kobject: 'queues' (00000000b064fea6): calling ktype release [ 466.542575] kobject: 'queues' (00000000b064fea6): kset_release [ 466.548560] kobject: 'queues': free name [ 466.553010] kobject: 'nr0' (00000000219238f5): kobject_uevent_env [ 466.559353] kobject: 'nr0' (00000000219238f5): fill_kobj_path: path = '/devices/virtual/net/nr0' [ 466.590088] kobject: 'nr0' (00000000219238f5): kobject_cleanup, parent (null) [ 466.598455] kobject: 'nr0' (00000000219238f5): calling ktype release [ 466.617729] kobject: 'loop4' (000000001338c9b4): kobject_uevent_env [ 466.619867] kobject: 'nr0': free name [ 466.630230] kobject: 'loop4' (000000001338c9b4): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 466.660303] kobject: 'loop1' (0000000018805d49): kobject_uevent_env [ 466.667231] kobject: 'loop1' (0000000018805d49): fill_kobj_path: path = '/devices/virtual/block/loop1' 17:56:52 executing program 5: r0 = userfaultfd(0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x34040, 0x0) connect$ax25(r1, &(0x7f00000001c0)={{0x3, @bcast, 0x6}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast]}, 0x48) mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x1}) r2 = userfaultfd(0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000240)=0x3) close(r2) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f00000000c0)={0x6, 0xb2}) clone(0x4800a000, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000140)=""/100, 0x64) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ffc000/0x3000)=nil, 0x3000}, 0x1}) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 17:56:52 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x20000008800457a2, &(0x7f0000000100)) 17:56:52 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a, 0xfffffdef}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:56:52 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000009007a00"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:56:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:56:52 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xfffffffffffffdef) [ 467.220702] kobject: 'loop5' (00000000c8cbdb4d): kobject_uevent_env [ 467.228713] kobject: 'loop4' (000000001338c9b4): kobject_uevent_env [ 467.237004] kobject: 'nr0' (00000000b02de220): kobject_add_internal: parent: 'net', set: 'devices' [ 467.239724] kobject: 'loop5' (00000000c8cbdb4d): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 467.252245] kobject: 'loop4' (000000001338c9b4): fill_kobj_path: path = '/devices/virtual/block/loop4' 17:56:52 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x20000008800457a3, &(0x7f0000000100)) 17:56:52 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a, 0xffffff8d}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) [ 467.268907] SELinux: security policydb version 15 (MLS) not backwards compatible [ 467.292580] kobject: 'loop3' (000000002d2e089c): kobject_uevent_env [ 467.297318] kobject: 'nr0' (00000000b02de220): kobject_uevent_env [ 467.308000] SELinux: failed to load policy [ 467.313574] kobject: 'loop3' (000000002d2e089c): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 467.322184] kobject: 'nr0' (00000000b02de220): fill_kobj_path: path = '/devices/virtual/net/nr0' [ 467.335664] SELinux: security policydb version 15 (MLS) not backwards compatible [ 467.339276] IPVS: ftp: loaded support on port[0] = 21 [ 467.352033] SELinux: failed to load policy [ 467.356935] kobject: 'queues' (0000000081da2bb4): kobject_add_internal: parent: 'nr0', set: '' 17:56:52 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 467.381717] kobject: 'queues' (0000000081da2bb4): kobject_uevent_env [ 467.396891] kobject: 'queues' (0000000081da2bb4): kobject_uevent_env: filter function caused the event to drop! [ 467.401371] kobject: 'loop2' (00000000aba18d7e): kobject_uevent_env [ 467.409127] kobject: 'rx-0' (0000000061ed9fe2): kobject_add_internal: parent: 'queues', set: 'queues' [ 467.422467] kobject: 'loop2' (00000000aba18d7e): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 467.426427] kobject: 'rx-0' (0000000061ed9fe2): kobject_uevent_env [ 467.436651] SELinux: security policydb version 15 (MLS) not backwards compatible [ 467.439280] kobject: 'rx-0' (0000000061ed9fe2): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' [ 467.460054] XFS (loop4): Invalid superblock magic number [ 467.462486] SELinux: failed to load policy [ 467.466285] kobject: 'tx-0' (00000000673ec7da): kobject_add_internal: parent: 'queues', set: 'queues' 17:56:52 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 467.474656] SELinux: security policydb version 15 (MLS) not backwards compatible [ 467.482128] kobject: 'tx-0' (00000000673ec7da): kobject_uevent_env [ 467.497235] kobject: 'tx-0' (00000000673ec7da): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' [ 467.502117] SELinux: failed to load policy [ 467.509063] device nr0 entered promiscuous mode [ 467.527062] kobject: 'lo' (0000000074eaa890): kobject_add_internal: parent: 'net', set: 'devices' [ 467.540468] kobject: 'loop4' (000000001338c9b4): kobject_uevent_env [ 467.547032] kobject: 'loop4' (000000001338c9b4): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 467.566611] kobject: 'lo' (0000000074eaa890): kobject_uevent_env 17:56:52 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x20000008800457a4, &(0x7f0000000100)) [ 467.580575] kobject: 'lo' (0000000074eaa890): fill_kobj_path: path = '/devices/virtual/net/lo' [ 467.589874] kobject: 'loop4' (000000001338c9b4): kobject_uevent_env [ 467.597815] SELinux: security policydb version 15 (MLS) not backwards compatible [ 467.606367] kobject: 'loop4' (000000001338c9b4): kobject_uevent_env [ 467.610149] kobject: 'loop4' (000000001338c9b4): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 467.616423] kobject: 'queues' (00000000d0ca3bde): kobject_add_internal: parent: 'lo', set: '' 17:56:52 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 467.633942] SELinux: security policydb version 15 (MLS) not backwards compatible [ 467.634994] kobject: 'loop4' (000000001338c9b4): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 467.642408] kobject: 'loop2' (00000000aba18d7e): kobject_uevent_env [ 467.657691] kobject: 'queues' (00000000d0ca3bde): kobject_uevent_env [ 467.664504] kobject: 'queues' (00000000d0ca3bde): kobject_uevent_env: filter function caused the event to drop! [ 467.674863] kobject: 'loop2' (00000000aba18d7e): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 467.682626] kobject: 'rx-0' (000000006452ca7e): kobject_add_internal: parent: 'queues', set: 'queues' [ 467.684815] kobject: 'loop4' (000000001338c9b4): kobject_uevent_env [ 467.696995] kobject: 'rx-0' (000000006452ca7e): kobject_uevent_env [ 467.700202] kobject: 'loop4' (000000001338c9b4): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 467.719253] kobject: 'rx-0' (000000006452ca7e): fill_kobj_path: path = '/devices/virtual/net/lo/queues/rx-0' [ 467.729761] kobject: 'tx-0' (000000008fe59b37): kobject_add_internal: parent: 'queues', set: 'queues' [ 467.743397] kobject: 'loop2' (00000000aba18d7e): kobject_uevent_env [ 467.749896] kobject: 'loop2' (00000000aba18d7e): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 467.750087] kobject: 'tx-0' (000000008fe59b37): kobject_uevent_env [ 467.771202] kobject: 'tx-0' (000000008fe59b37): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0' [ 467.785585] SELinux: security policydb version 15 (MLS) not backwards compatible [ 467.810191] kobject: 'tunl0' (00000000ec76c6be): kobject_add_internal: parent: 'net', set: 'devices' [ 467.832957] kobject: 'loop3' (000000002d2e089c): kobject_uevent_env [ 467.835747] kobject: 'tunl0' (00000000ec76c6be): kobject_uevent_env [ 467.839395] kobject: 'loop3' (000000002d2e089c): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 467.852403] SELinux: security policydb version 15 (MLS) not backwards compatible [ 467.864617] kobject: 'tunl0' (00000000ec76c6be): fill_kobj_path: path = '/devices/virtual/net/tunl0' [ 467.876516] kobject: 'queues' (000000000ef4a22e): kobject_add_internal: parent: 'tunl0', set: '' [ 467.887254] kobject: 'loop4' (000000001338c9b4): kobject_uevent_env [ 467.896116] kobject: 'loop4' (000000001338c9b4): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 467.906597] kobject: 'queues' (000000000ef4a22e): kobject_uevent_env [ 467.918500] kobject: 'queues' (000000000ef4a22e): kobject_uevent_env: filter function caused the event to drop! [ 467.918529] kobject: 'loop2' (00000000aba18d7e): kobject_uevent_env [ 467.929335] kobject: 'rx-0' (00000000a34eb4ac): kobject_add_internal: parent: 'queues', set: 'queues' [ 467.935588] kobject: 'loop2' (00000000aba18d7e): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 467.946883] kobject: 'rx-0' (00000000a34eb4ac): kobject_uevent_env [ 467.955093] kobject: 'loop4' (000000001338c9b4): kobject_uevent_env [ 467.964119] kobject: 'rx-0' (00000000a34eb4ac): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/rx-0' [ 467.967350] kobject: 'loop4' (000000001338c9b4): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 467.979835] kobject: 'tx-0' (000000006cfb5cf7): kobject_add_internal: parent: 'queues', set: 'queues' [ 467.999186] kobject: 'tx-0' (000000006cfb5cf7): kobject_uevent_env [ 468.005694] kobject: 'tx-0' (000000006cfb5cf7): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/tx-0' [ 468.019608] kobject: 'gre0' (0000000052c62647): kobject_add_internal: parent: 'net', set: 'devices' [ 468.033324] kobject: 'gre0' (0000000052c62647): kobject_uevent_env [ 468.039762] kobject: 'gre0' (0000000052c62647): fill_kobj_path: path = '/devices/virtual/net/gre0' [ 468.049272] kobject: 'queues' (0000000034b1644f): kobject_add_internal: parent: 'gre0', set: '' [ 468.070856] kobject: 'queues' (0000000034b1644f): kobject_uevent_env [ 468.084092] kobject: 'queues' (0000000034b1644f): kobject_uevent_env: filter function caused the event to drop! [ 468.096856] kobject: 'rx-0' (0000000057768a87): kobject_add_internal: parent: 'queues', set: 'queues' [ 468.108602] kobject: 'rx-0' (0000000057768a87): kobject_uevent_env [ 468.116234] kobject: 'rx-0' (0000000057768a87): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/rx-0' [ 468.128717] kobject: 'tx-0' (000000004b0a547c): kobject_add_internal: parent: 'queues', set: 'queues' [ 468.139500] kobject: 'tx-0' (000000004b0a547c): kobject_uevent_env [ 468.148250] kobject: 'tx-0' (000000004b0a547c): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/tx-0' [ 468.333610] kobject: 'rx-0' (0000000061ed9fe2): kobject_cleanup, parent 0000000081da2bb4 [ 468.341954] kobject: 'rx-0' (0000000061ed9fe2): auto cleanup 'remove' event [ 468.349132] kobject: 'rx-0' (0000000061ed9fe2): kobject_uevent_env [ 468.358759] kobject: 'rx-0' (0000000061ed9fe2): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' [ 468.369248] kobject: 'rx-0' (0000000061ed9fe2): auto cleanup kobject_del [ 468.379628] kobject: 'rx-0' (0000000061ed9fe2): calling ktype release [ 468.386556] kobject: 'rx-0': free name [ 468.393652] kobject: 'tx-0' (00000000673ec7da): kobject_cleanup, parent 0000000081da2bb4 [ 468.402126] kobject: 'tx-0' (00000000673ec7da): auto cleanup 'remove' event [ 468.409299] kobject: 'tx-0' (00000000673ec7da): kobject_uevent_env [ 468.418730] kobject: 'tx-0' (00000000673ec7da): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' [ 468.429322] kobject: 'tx-0' (00000000673ec7da): auto cleanup kobject_del [ 468.439470] kobject: 'tx-0' (00000000673ec7da): calling ktype release [ 468.446315] kobject: 'tx-0': free name [ 468.453227] kobject: 'queues' (0000000081da2bb4): kobject_cleanup, parent (null) [ 468.461861] kobject: 'queues' (0000000081da2bb4): calling ktype release [ 468.468674] kobject: 'queues' (0000000081da2bb4): kset_release [ 468.477673] kobject: 'queues': free name [ 468.482325] kobject: 'nr0' (00000000b02de220): kobject_uevent_env [ 468.488772] kobject: 'nr0' (00000000b02de220): fill_kobj_path: path = '/devices/virtual/net/nr0' [ 468.501396] kobject: 'nr0' (00000000bb190bd5): kobject_add_internal: parent: 'net', set: 'devices' [ 468.513327] kobject: 'nr0' (00000000bb190bd5): kobject_uevent_env [ 468.519749] kobject: 'nr0' (00000000bb190bd5): fill_kobj_path: path = '/devices/virtual/net/nr0' [ 468.531847] kobject: 'queues' (000000001b01ecf5): kobject_add_internal: parent: 'nr0', set: '' [ 468.542071] kobject: 'queues' (000000001b01ecf5): kobject_uevent_env [ 468.548626] kobject: 'queues' (000000001b01ecf5): kobject_uevent_env: filter function caused the event to drop! [ 468.561994] kobject: 'rx-0' (00000000f5cbafe5): kobject_add_internal: parent: 'queues', set: 'queues' [ 468.572308] kobject: 'rx-0' (00000000f5cbafe5): kobject_uevent_env [ 468.578724] kobject: 'rx-0' (00000000f5cbafe5): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' [ 468.591991] kobject: 'tx-0' (000000000ff72f60): kobject_add_internal: parent: 'queues', set: 'queues' [ 468.602327] kobject: 'tx-0' (000000000ff72f60): kobject_uevent_env [ 468.608745] kobject: 'tx-0' (000000000ff72f60): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' [ 468.623001] kobject: 'gretap0' (000000009ea6c188): kobject_add_internal: parent: 'net', set: 'devices' [ 468.634076] kobject: 'gretap0' (000000009ea6c188): kobject_uevent_env [ 468.643227] kobject: 'gretap0' (000000009ea6c188): fill_kobj_path: path = '/devices/virtual/net/gretap0' [ 468.653909] kobject: 'queues' (00000000506c36a2): kobject_add_internal: parent: 'gretap0', set: '' [ 468.666134] kobject: 'queues' (00000000506c36a2): kobject_uevent_env [ 468.676464] kobject: 'queues' (00000000506c36a2): kobject_uevent_env: filter function caused the event to drop! [ 468.689258] kobject: 'rx-0' (00000000f0e96b5a): kobject_add_internal: parent: 'queues', set: 'queues' [ 468.699476] kobject: 'rx-0' (00000000f0e96b5a): kobject_uevent_env [ 468.708385] kobject: 'rx-0' (00000000f0e96b5a): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/rx-0' [ 468.719597] kobject: 'tx-0' (0000000009354623): kobject_add_internal: parent: 'queues', set: 'queues' [ 468.732475] kobject: 'tx-0' (0000000009354623): kobject_uevent_env [ 468.738877] kobject: 'tx-0' (0000000009354623): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/tx-0' [ 468.753226] kobject: 'batman_adv' (000000009af1188d): kobject_add_internal: parent: 'gretap0', set: '' [ 468.763888] kobject: 'nr0' (00000000b02de220): kobject_cleanup, parent (null) [ 468.775340] kobject: 'erspan0' (000000003ff08b5d): kobject_add_internal: parent: 'net', set: 'devices' [ 468.784853] kobject: 'nr0' (00000000b02de220): calling ktype release [ 468.794422] kobject: 'nr0': free name [ 468.799448] kobject: 'erspan0' (000000003ff08b5d): kobject_uevent_env [ 468.806357] kobject: 'erspan0' (000000003ff08b5d): fill_kobj_path: path = '/devices/virtual/net/erspan0' [ 468.819224] kobject: 'queues' (00000000bf102a2e): kobject_add_internal: parent: 'erspan0', set: '' [ 468.829173] kobject: 'queues' (00000000bf102a2e): kobject_uevent_env [ 468.842328] kobject: 'queues' (00000000bf102a2e): kobject_uevent_env: filter function caused the event to drop! [ 468.853298] kobject: 'rx-0' (000000001189dd61): kobject_add_internal: parent: 'queues', set: 'queues' [ 468.865399] kobject: 'rx-0' (000000001189dd61): kobject_uevent_env [ 468.872542] kobject: 'rx-0' (000000001189dd61): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/rx-0' [ 468.885602] kobject: 'tx-0' (00000000fa4783d2): kobject_add_internal: parent: 'queues', set: 'queues' [ 468.896014] kobject: 'tx-0' (00000000fa4783d2): kobject_uevent_env [ 468.905139] kobject: 'tx-0' (00000000fa4783d2): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/tx-0' [ 468.917079] kobject: 'batman_adv' (00000000a35de42b): kobject_add_internal: parent: 'erspan0', set: '' [ 468.931615] kobject: 'rx-0' (00000000f5cbafe5): kobject_cleanup, parent 000000001b01ecf5 [ 468.942248] kobject: 'rx-0' (00000000f5cbafe5): auto cleanup 'remove' event [ 468.949399] kobject: 'rx-0' (00000000f5cbafe5): kobject_uevent_env [ 468.956656] kobject: 'rx-0' (00000000f5cbafe5): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' [ 468.969525] kobject: 'rx-0' (00000000f5cbafe5): auto cleanup kobject_del [ 468.983497] kobject: 'rx-0' (00000000f5cbafe5): calling ktype release [ 468.990347] kobject: 'rx-0': free name [ 468.994338] kobject: 'tx-0' (000000000ff72f60): kobject_cleanup, parent 000000001b01ecf5 [ 469.005806] kobject: 'tx-0' (000000000ff72f60): auto cleanup 'remove' event [ 469.013221] kobject: 'tx-0' (000000000ff72f60): kobject_uevent_env [ 469.019622] kobject: 'tx-0' (000000000ff72f60): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' [ 469.033206] kobject: 'tx-0' (000000000ff72f60): auto cleanup kobject_del [ 469.040397] kobject: 'tx-0' (000000000ff72f60): calling ktype release [ 469.047031] kobject: 'tx-0': free name [ 469.054081] kobject: 'queues' (000000001b01ecf5): kobject_cleanup, parent (null) [ 469.062727] kobject: 'queues' (000000001b01ecf5): calling ktype release [ 469.069532] kobject: 'queues' (000000001b01ecf5): kset_release [ 469.078517] kobject: 'queues': free name [ 469.083253] kobject: 'nr0' (00000000bb190bd5): kobject_uevent_env [ 469.089650] kobject: 'nr0' (00000000bb190bd5): fill_kobj_path: path = '/devices/virtual/net/nr0' [ 469.102150] kobject: 'ip_vti0' (0000000026e6428a): kobject_add_internal: parent: 'net', set: 'devices' [ 469.113725] kobject: 'ip_vti0' (0000000026e6428a): kobject_uevent_env [ 469.122441] kobject: 'ip_vti0' (0000000026e6428a): fill_kobj_path: path = '/devices/virtual/net/ip_vti0' [ 469.133338] kobject: 'queues' (0000000030c98352): kobject_add_internal: parent: 'ip_vti0', set: '' [ 469.145049] kobject: 'queues' (0000000030c98352): kobject_uevent_env [ 469.152814] kobject: 'queues' (0000000030c98352): kobject_uevent_env: filter function caused the event to drop! [ 469.165561] kobject: 'rx-0' (000000008e427258): kobject_add_internal: parent: 'queues', set: 'queues' [ 469.176179] kobject: 'rx-0' (000000008e427258): kobject_uevent_env [ 469.184645] kobject: 'rx-0' (000000008e427258): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/rx-0' [ 469.196331] kobject: 'tx-0' (000000004d82a04f): kobject_add_internal: parent: 'queues', set: 'queues' [ 469.207913] kobject: 'tx-0' (000000004d82a04f): kobject_uevent_env [ 469.215426] kobject: 'tx-0' (000000004d82a04f): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/tx-0' [ 469.228536] kobject: 'nr0' (00000000bb190bd5): kobject_cleanup, parent (null) [ 469.238448] kobject: 'ip6_vti0' (0000000083c04073): kobject_add_internal: parent: 'net', set: 'devices' [ 469.250771] kobject: 'nr0' (00000000bb190bd5): calling ktype release [ 469.257366] kobject: 'nr0': free name [ 469.263819] kobject: 'ip6_vti0' (0000000083c04073): kobject_uevent_env [ 469.281814] kobject: 'ip6_vti0' (0000000083c04073): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0' [ 469.298604] kobject: 'queues' (00000000316f9c9e): kobject_add_internal: parent: 'ip6_vti0', set: '' [ 469.303335] kobject: 'loop1' (0000000018805d49): kobject_uevent_env [ 469.311183] kobject: 'queues' (00000000316f9c9e): kobject_uevent_env [ 469.315838] kobject: 'loop1' (0000000018805d49): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 469.324466] kobject: 'queues' (00000000316f9c9e): kobject_uevent_env: filter function caused the event to drop! [ 469.344087] kobject: 'rx-0' (00000000a5e3c7d9): kobject_add_internal: parent: 'queues', set: 'queues' [ 469.353830] kobject: 'rx-0' (00000000a5e3c7d9): kobject_uevent_env [ 469.363284] kobject: 'rx-0' (00000000a5e3c7d9): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0/queues/rx-0' [ 469.374192] kobject: 'tx-0' (00000000f970bd0b): kobject_add_internal: parent: 'queues', set: 'queues' [ 469.386814] kobject: 'tx-0' (00000000f970bd0b): kobject_uevent_env [ 469.393528] kobject: 'tx-0' (00000000f970bd0b): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0/queues/tx-0' [ 469.408104] kobject: 'sit0' (00000000adf8060d): kobject_add_internal: parent: 'net', set: 'devices' [ 469.418695] kobject: 'sit0' (00000000adf8060d): kobject_uevent_env [ 469.428105] kobject: 'sit0' (00000000adf8060d): fill_kobj_path: path = '/devices/virtual/net/sit0' [ 469.437723] kobject: 'queues' (0000000039b6be81): kobject_add_internal: parent: 'sit0', set: '' [ 469.450258] kobject: 'queues' (0000000039b6be81): kobject_uevent_env [ 469.456815] kobject: 'queues' (0000000039b6be81): kobject_uevent_env: filter function caused the event to drop! [ 469.469791] kobject: 'rx-0' (00000000a2f1b707): kobject_add_internal: parent: 'queues', set: 'queues' [ 469.479609] kobject: 'rx-0' (00000000a2f1b707): kobject_uevent_env [ 469.488677] kobject: 'rx-0' (00000000a2f1b707): fill_kobj_path: path = '/devices/virtual/net/sit0/queues/rx-0' [ 469.499611] kobject: 'tx-0' (00000000ec7f0241): kobject_add_internal: parent: 'queues', set: 'queues' [ 469.512137] kobject: 'tx-0' (00000000ec7f0241): kobject_uevent_env [ 469.518567] kobject: 'tx-0' (00000000ec7f0241): fill_kobj_path: path = '/devices/virtual/net/sit0/queues/tx-0' [ 469.532978] kobject: 'ip6tnl0' (0000000082a93eda): kobject_add_internal: parent: 'net', set: 'devices' [ 469.543876] kobject: 'ip6tnl0' (0000000082a93eda): kobject_uevent_env [ 469.553289] kobject: 'ip6tnl0' (0000000082a93eda): fill_kobj_path: path = '/devices/virtual/net/ip6tnl0' [ 469.563918] kobject: 'queues' (000000009867a231): kobject_add_internal: parent: 'ip6tnl0', set: '' [ 469.576049] kobject: 'queues' (000000009867a231): kobject_uevent_env [ 469.583277] kobject: 'queues' (000000009867a231): kobject_uevent_env: filter function caused the event to drop! [ 469.596012] kobject: 'rx-0' (0000000031c75358): kobject_add_internal: parent: 'queues', set: 'queues' [ 469.606133] kobject: 'rx-0' (0000000031c75358): kobject_uevent_env [ 469.615141] kobject: 'rx-0' (0000000031c75358): fill_kobj_path: path = '/devices/virtual/net/ip6tnl0/queues/rx-0' [ 469.626442] kobject: 'tx-0' (00000000de59693e): kobject_add_internal: parent: 'queues', set: 'queues' [ 469.638958] kobject: 'tx-0' (00000000de59693e): kobject_uevent_env [ 469.646085] kobject: 'tx-0' (00000000de59693e): fill_kobj_path: path = '/devices/virtual/net/ip6tnl0/queues/tx-0' [ 469.660538] kobject: 'ip6gre0' (00000000cf8769b1): kobject_add_internal: parent: 'net', set: 'devices' [ 469.673520] kobject: 'ip6gre0' (00000000cf8769b1): kobject_uevent_env [ 469.680871] kobject: 'ip6gre0' (00000000cf8769b1): fill_kobj_path: path = '/devices/virtual/net/ip6gre0' [ 469.693349] kobject: 'queues' (00000000ba76866f): kobject_add_internal: parent: 'ip6gre0', set: '' [ 469.703903] kobject: 'queues' (00000000ba76866f): kobject_uevent_env [ 469.713042] kobject: 'queues' (00000000ba76866f): kobject_uevent_env: filter function caused the event to drop! [ 469.723994] kobject: 'rx-0' (0000000088220a3f): kobject_add_internal: parent: 'queues', set: 'queues' [ 469.736262] kobject: 'rx-0' (0000000088220a3f): kobject_uevent_env [ 469.743409] kobject: 'rx-0' (0000000088220a3f): fill_kobj_path: path = '/devices/virtual/net/ip6gre0/queues/rx-0' [ 469.758685] kobject: 'tx-0' (000000009f4a6753): kobject_add_internal: parent: 'queues', set: 'queues' [ 469.768961] kobject: 'tx-0' (000000009f4a6753): kobject_uevent_env [ 469.777802] kobject: 'tx-0' (000000009f4a6753): fill_kobj_path: path = '/devices/virtual/net/ip6gre0/queues/tx-0' 17:56:54 executing program 5: r0 = userfaultfd(0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x34040, 0x0) connect$ax25(r1, &(0x7f00000001c0)={{0x3, @bcast, 0x6}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast]}, 0x48) mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x1}) r2 = userfaultfd(0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000240)=0x3) close(r2) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f00000000c0)={0x6, 0xb2}) clone(0x4800a000, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000140)=""/100, 0x64) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ffc000/0x3000)=nil, 0x3000}, 0x1}) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 17:56:54 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="4a0300d192ee26f942afc896a77dcfc413dd0000919a0600000000000000000000", 0x21, 0xfffffffffffffffe, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{&(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000004840)=[{&(0x7f0000003840)=""/4096, 0x6}, {&(0x7f0000001600)=""/129, 0x7fffeffa}], 0x2, &(0x7f00000048c0)=""/58, 0x3a, 0xfffffff0}}], 0x1, 0x0, &(0x7f0000009340)={0x0, 0x989680}) 17:56:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@filestreams='filestreams'}]}) 17:56:54 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x20000008800457a5, &(0x7f0000000100)) 17:56:54 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:56:54 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') read(r0, &(0x7f0000000040)=""/6, 0xe) [ 469.926516] SELinux: security policydb version 15 (MLS) not backwards compatible [ 469.934631] kobject: 'nr0' (00000000add00bd1): kobject_add_internal: parent: 'net', set: 'devices' [ 469.946678] sel_write_load: 4 callbacks suppressed [ 469.946687] kobject: 'loop5' (00000000c8cbdb4d): kobject_uevent_env [ 469.946690] SELinux: failed to load policy [ 469.946967] SELinux: security policydb version 15 (MLS) not backwards compatible 17:56:54 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 469.954601] kobject: 'loop5' (00000000c8cbdb4d): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 469.965994] kobject: 'nr0' (00000000add00bd1): kobject_uevent_env [ 469.988633] SELinux: failed to load policy [ 469.989505] kobject: 'loop4' (000000001338c9b4): kobject_uevent_env [ 469.995019] kobject: 'nr0' (00000000add00bd1): fill_kobj_path: path = '/devices/virtual/net/nr0' [ 470.000275] kobject: 'loop4' (000000001338c9b4): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 470.028714] kobject: 'queues' (00000000f7e2c48d): kobject_add_internal: parent: 'nr0', set: '' [ 470.040289] kobject: 'loop2' (00000000aba18d7e): kobject_uevent_env [ 470.052563] kobject: 'loop2' (00000000aba18d7e): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 470.063026] SELinux: security policydb version 15 (MLS) not backwards compatible [ 470.072174] kobject: 'queues' (00000000f7e2c48d): kobject_uevent_env [ 470.079235] IPVS: ftp: loaded support on port[0] = 21 [ 470.086930] kobject: 'queues' (00000000f7e2c48d): kobject_uevent_env: filter function caused the event to drop! [ 470.098309] SELinux: failed to load policy [ 470.108951] kobject: 'rx-0' (0000000010b094e9): kobject_add_internal: parent: 'queues', set: 'queues' [ 470.120176] SELinux: security policydb version 15 (MLS) not backwards compatible [ 470.123216] kobject: 'rx-0' (0000000010b094e9): kobject_uevent_env [ 470.135085] kobject: 'rx-0' (0000000010b094e9): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' [ 470.139496] SELinux: failed to load policy [ 470.148056] kobject: 'tx-0' (00000000195b9d6d): kobject_add_internal: parent: 'queues', set: 'queues' [ 470.163257] XFS (loop4): Invalid superblock magic number [ 470.169512] kobject: 'tx-0' (00000000195b9d6d): kobject_uevent_env 17:56:55 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:56:55 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x20000008800457a6, &(0x7f0000000100)) [ 470.188025] kobject: 'tx-0' (00000000195b9d6d): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' [ 470.212245] kobject: 'rx-0' (0000000088220a3f): kobject_cleanup, parent 00000000ba76866f [ 470.223352] kobject: 'loop4' (000000001338c9b4): kobject_uevent_env [ 470.229807] kobject: 'loop4' (000000001338c9b4): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 470.246109] kobject: 'rx-0' (0000000088220a3f): auto cleanup 'remove' event [ 470.253354] kobject: 'rx-0' (0000000088220a3f): kobject_uevent_env [ 470.263055] kobject: 'rx-0' (0000000088220a3f): kobject_uevent_env: uevent_suppress caused the event to drop! [ 470.276455] kobject: 'rx-0' (0000000088220a3f): auto cleanup kobject_del [ 470.287538] kobject: 'loop4' (000000001338c9b4): kobject_uevent_env [ 470.293082] kobject: 'rx-0' (0000000088220a3f): calling ktype release [ 470.303890] kobject: 'loop4' (000000001338c9b4): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 470.303976] kobject: 'loop4' (000000001338c9b4): kobject_uevent_env [ 470.314121] kobject: 'loop2' (00000000aba18d7e): kobject_uevent_env [ 470.323612] kobject: 'rx-0': free name [ 470.327289] SELinux: security policydb version 15 (MLS) not backwards compatible [ 470.330482] kobject: 'tx-0' (000000009f4a6753): kobject_cleanup, parent 00000000ba76866f [ 470.339426] kobject: 'loop2' (00000000aba18d7e): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 470.350122] SELinux: failed to load policy [ 470.364256] kobject: 'loop4' (000000001338c9b4): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 470.374698] kobject: 'tx-0' (000000009f4a6753): auto cleanup 'remove' event 17:56:55 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 470.374706] SELinux: security policydb version 15 (MLS) not backwards compatible [ 470.374897] SELinux: failed to load policy [ 470.384816] kobject: 'tx-0' (000000009f4a6753): kobject_uevent_env [ 470.390066] kobject: 'loop4' (000000001338c9b4): kobject_uevent_env [ 470.393872] kobject: 'tx-0' (000000009f4a6753): kobject_uevent_env: uevent_suppress caused the event to drop! [ 470.400601] kobject: 'loop4' (000000001338c9b4): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 470.411741] kobject: 'tx-0' (000000009f4a6753): auto cleanup kobject_del [ 470.435783] kobject: 'loop2' (00000000aba18d7e): kobject_uevent_env [ 470.442517] kobject: 'loop2' (00000000aba18d7e): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 470.442950] kobject: 'tx-0' (000000009f4a6753): calling ktype release [ 470.464473] kobject: 'tx-0': free name [ 470.468682] kobject: 'queues' (00000000ba76866f): kobject_cleanup, parent (null) [ 470.477592] SELinux: security policydb version 15 (MLS) not backwards compatible [ 470.494831] SELinux: failed to load policy [ 470.501331] kobject: 'queues' (00000000ba76866f): calling ktype release [ 470.508985] SELinux: security policydb version 15 (MLS) not backwards compatible [ 470.516182] kobject: 'queues' (00000000ba76866f): kset_release [ 470.517395] SELinux: failed to load policy [ 470.531528] kobject: 'queues': free name 17:56:55 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 470.541768] kobject: 'ip6gre0' (00000000cf8769b1): kobject_uevent_env [ 470.548600] kobject: 'ip6gre0' (00000000cf8769b1): kobject_uevent_env: uevent_suppress caused the event to drop! [ 470.554781] kobject: 'loop2' (00000000aba18d7e): kobject_uevent_env [ 470.568890] kobject: 'loop2' (00000000aba18d7e): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 470.569033] device nr0 entered promiscuous mode [ 470.585128] kobject: 'lo' (000000008fbab8be): kobject_add_internal: parent: 'net', set: 'devices' 17:56:55 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "0f000000bbdb007c0000000009000000"}, 0x20) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 470.598234] SELinux: security policydb version 15 (MLS) not backwards compatible [ 470.606799] kobject: 'lo' (000000008fbab8be): kobject_uevent_env [ 470.614796] SELinux: failed to load policy [ 470.619319] SELinux: security policydb version 15 (MLS) not backwards compatible [ 470.627039] kobject: 'lo' (000000008fbab8be): fill_kobj_path: path = '/devices/virtual/net/lo' [ 470.636723] SELinux: failed to load policy [ 470.641352] kobject: 'queues' (00000000fc817f92): kobject_add_internal: parent: 'lo', set: '' [ 470.647477] kobject: 'loop2' (00000000aba18d7e): kobject_uevent_env [ 470.650733] kobject: 'queues' (00000000fc817f92): kobject_uevent_env [ 470.661369] kobject: 'loop2' (00000000aba18d7e): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 470.663612] kobject: 'queues' (00000000fc817f92): kobject_uevent_env: filter function caused the event to drop! [ 470.663654] kobject: 'rx-0' (00000000ea890678): kobject_add_internal: parent: 'queues', set: 'queues' [ 470.697547] SELinux: security policydb version 15 (MLS) not backwards compatible [ 470.709643] SELinux: security policydb version 15 (MLS) not backwards compatible [ 470.718054] kobject: 'rx-0' (00000000ea890678): kobject_uevent_env [ 470.722254] kobject: 'loop2' (00000000aba18d7e): kobject_uevent_env [ 470.727064] kobject: 'rx-0' (00000000ea890678): fill_kobj_path: path = '/devices/virtual/net/lo/queues/rx-0' [ 470.733851] kobject: 'loop2' (00000000aba18d7e): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 470.744273] kobject: 'tx-0' (00000000b21ede55): kobject_add_internal: parent: 'queues', set: 'queues' [ 470.766568] kobject: 'tx-0' (00000000b21ede55): kobject_uevent_env [ 470.773006] kobject: 'tx-0' (00000000b21ede55): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0' [ 470.804815] kobject: 'loop3' (000000002d2e089c): kobject_uevent_env [ 470.814813] kobject: 'tunl0' (0000000062c3025c): kobject_add_internal: parent: 'net', set: 'devices' [ 470.826027] kobject: 'loop3' (000000002d2e089c): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 470.833055] kobject: 'tunl0' (0000000062c3025c): kobject_uevent_env [ 470.844655] kobject: 'tunl0' (0000000062c3025c): fill_kobj_path: path = '/devices/virtual/net/tunl0' [ 470.854581] kobject: 'queues' (0000000078e701ca): kobject_add_internal: parent: 'tunl0', set: '' [ 470.864393] kobject: 'queues' (0000000078e701ca): kobject_uevent_env [ 470.871488] kobject: 'loop4' (000000001338c9b4): kobject_uevent_env [ 470.877980] kobject: 'queues' (0000000078e701ca): kobject_uevent_env: filter function caused the event to drop! [ 470.888602] kobject: 'loop4' (000000001338c9b4): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 470.899575] kobject: 'rx-0' (000000004241e037): kobject_add_internal: parent: 'queues', set: 'queues' [ 470.913945] kobject: 'rx-0' (000000004241e037): kobject_uevent_env [ 470.915933] kobject: 'loop4' (000000001338c9b4): kobject_uevent_env [ 470.920577] kobject: 'rx-0' (000000004241e037): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/rx-0' [ 470.929347] kobject: 'loop4' (000000001338c9b4): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 470.937338] kobject: 'tx-0' (00000000548fd1dc): kobject_add_internal: parent: 'queues', set: 'queues' [ 470.956305] kobject: 'tx-0' (00000000548fd1dc): kobject_uevent_env [ 470.963122] kobject: 'tx-0' (00000000548fd1dc): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/tx-0' [ 470.974226] kobject: 'ip6gre0' (00000000cf8769b1): kobject_cleanup, parent (null) [ 470.983994] kobject: 'ip6gre0' (00000000cf8769b1): auto cleanup 'remove' event [ 470.991614] kobject: 'ip6gre0' (00000000cf8769b1): kobject_uevent_env [ 470.998266] kobject: 'ip6gre0' (00000000cf8769b1): kobject_uevent_env: uevent_suppress caused the event to drop! [ 471.008858] kobject: 'ip6gre0' (00000000cf8769b1): calling ktype release [ 471.016026] kobject: 'ip6gre0': free name [ 471.147052] kobject: 'rx-0' (0000000010b094e9): kobject_cleanup, parent 00000000f7e2c48d [ 471.155438] kobject: 'rx-0' (0000000010b094e9): auto cleanup 'remove' event [ 471.162903] kobject: 'rx-0' (0000000010b094e9): kobject_uevent_env [ 471.169300] kobject: 'rx-0' (0000000010b094e9): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' [ 471.179790] kobject: 'rx-0' (0000000010b094e9): auto cleanup kobject_del [ 471.187121] kobject: 'rx-0' (0000000010b094e9): calling ktype release [ 471.193964] kobject: 'rx-0': free name [ 471.197957] kobject: 'tx-0' (00000000195b9d6d): kobject_cleanup, parent 00000000f7e2c48d [ 471.206521] kobject: 'tx-0' (00000000195b9d6d): auto cleanup 'remove' event [ 471.213880] kobject: 'tx-0' (00000000195b9d6d): kobject_uevent_env [ 471.220495] kobject: 'tx-0' (00000000195b9d6d): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' [ 471.230987] kobject: 'tx-0' (00000000195b9d6d): auto cleanup kobject_del [ 471.237917] kobject: 'tx-0' (00000000195b9d6d): calling ktype release [ 471.244826] kobject: 'tx-0': free name [ 471.248783] kobject: 'queues' (00000000f7e2c48d): kobject_cleanup, parent (null) [ 471.257451] kobject: 'queues' (00000000f7e2c48d): calling ktype release [ 471.264457] kobject: 'queues' (00000000f7e2c48d): kset_release [ 471.270674] kobject: 'queues': free name [ 471.275142] kobject: 'nr0' (00000000add00bd1): kobject_uevent_env [ 471.281805] kobject: 'nr0' (00000000add00bd1): fill_kobj_path: path = '/devices/virtual/net/nr0' [ 471.291616] kobject: 'gre0' (000000008834e267): kobject_add_internal: parent: 'net', set: 'devices' [ 471.302006] kobject: 'gre0' (000000008834e267): kobject_uevent_env [ 471.308443] kobject: 'gre0' (000000008834e267): fill_kobj_path: path = '/devices/virtual/net/gre0' [ 471.317949] kobject: 'queues' (00000000d333eed4): kobject_add_internal: parent: 'gre0', set: '' [ 471.327601] kobject: 'queues' (00000000d333eed4): kobject_uevent_env [ 471.334441] kobject: 'queues' (00000000d333eed4): kobject_uevent_env: filter function caused the event to drop! [ 471.344950] kobject: 'rx-0' (00000000e8b9cdc5): kobject_add_internal: parent: 'queues', set: 'queues' [ 471.354644] kobject: 'rx-0' (00000000e8b9cdc5): kobject_uevent_env [ 471.361279] kobject: 'rx-0' (00000000e8b9cdc5): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/rx-0' [ 471.371756] kobject: 'tx-0' (0000000053d0bd6b): kobject_add_internal: parent: 'queues', set: 'queues' [ 471.381558] kobject: 'tx-0' (0000000053d0bd6b): kobject_uevent_env [ 471.387958] kobject: 'tx-0' (0000000053d0bd6b): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/tx-0' [ 471.399868] kobject: 'rx-0' (0000000031c75358): kobject_cleanup, parent 000000009867a231 [ 471.408104] kobject: 'rx-0' (0000000031c75358): auto cleanup 'remove' event [ 471.415547] kobject: 'rx-0' (0000000031c75358): kobject_uevent_env [ 471.422133] kobject: 'rx-0' (0000000031c75358): kobject_uevent_env: uevent_suppress caused the event to drop! [ 471.432463] kobject: 'rx-0' (0000000031c75358): auto cleanup kobject_del [ 471.439380] kobject: 'rx-0' (0000000031c75358): calling ktype release [ 471.446411] kobject: 'rx-0': free name [ 471.450722] kobject: 'tx-0' (00000000de59693e): kobject_cleanup, parent 000000009867a231 [ 471.459007] kobject: 'tx-0' (00000000de59693e): auto cleanup 'remove' event [ 471.466375] kobject: 'tx-0' (00000000de59693e): kobject_uevent_env [ 471.472940] kobject: 'tx-0' (00000000de59693e): kobject_uevent_env: uevent_suppress caused the event to drop! [ 471.483249] kobject: 'tx-0' (00000000de59693e): auto cleanup kobject_del [ 471.490376] kobject: 'tx-0' (00000000de59693e): calling ktype release [ 471.497002] kobject: 'tx-0': free name [ 471.501226] kobject: 'queues' (000000009867a231): kobject_cleanup, parent (null) [ 471.509690] kobject: 'queues' (000000009867a231): calling ktype release [ 471.516761] kobject: 'queues' (000000009867a231): kset_release [ 471.523004] kobject: 'queues': free name [ 471.527515] kobject: 'ip6tnl0' (0000000082a93eda): kobject_uevent_env [ 471.534373] kobject: 'ip6tnl0' (0000000082a93eda): kobject_uevent_env: uevent_suppress caused the event to drop! [ 471.545044] kobject: 'nr0' (00000000add00bd1): kobject_cleanup, parent (null) [ 471.553589] kobject: 'gretap0' (000000000dbf608b): kobject_add_internal: parent: 'net', set: 'devices' [ 471.563397] kobject: 'nr0' (00000000add00bd1): calling ktype release [ 471.571134] kobject: 'gretap0' (000000000dbf608b): kobject_uevent_env [ 471.577763] kobject: 'gretap0' (000000000dbf608b): fill_kobj_path: path = '/devices/virtual/net/gretap0' [ 471.587699] kobject: 'nr0': free name [ 471.592104] kobject: 'queues' (000000007f3a22fb): kobject_add_internal: parent: 'gretap0', set: '' [ 471.602006] kobject: 'queues' (000000007f3a22fb): kobject_uevent_env [ 471.608558] kobject: 'queues' (000000007f3a22fb): kobject_uevent_env: filter function caused the event to drop! [ 471.619118] kobject: 'rx-0' (000000003d2405fb): kobject_add_internal: parent: 'queues', set: 'queues' [ 471.628792] kobject: 'rx-0' (000000003d2405fb): kobject_uevent_env [ 471.635588] kobject: 'rx-0' (000000003d2405fb): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/rx-0' [ 471.646433] kobject: 'tx-0' (00000000bd5f9c03): kobject_add_internal: parent: 'queues', set: 'queues' [ 471.656225] kobject: 'tx-0' (00000000bd5f9c03): kobject_uevent_env [ 471.662833] kobject: 'tx-0' (00000000bd5f9c03): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/tx-0' [ 471.674208] kobject: 'batman_adv' (00000000f608163a): kobject_add_internal: parent: 'gretap0', set: '' [ 471.684803] kobject: 'ip6tnl0' (0000000082a93eda): kobject_cleanup, parent (null) [ 471.694681] kobject: 'erspan0' (00000000fbf4f2fb): kobject_add_internal: parent: 'net', set: 'devices' [ 471.704255] kobject: 'ip6tnl0' (0000000082a93eda): auto cleanup 'remove' event [ 471.711932] kobject: 'ip6tnl0' (0000000082a93eda): kobject_uevent_env [ 471.722915] kobject: 'loop1' (0000000018805d49): kobject_uevent_env [ 471.725502] kobject: 'erspan0' (00000000fbf4f2fb): kobject_uevent_env [ 471.729419] kobject: 'loop1' (0000000018805d49): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 471.736222] kobject: 'ip6tnl0' (0000000082a93eda): kobject_uevent_env: uevent_suppress caused the event to drop! [ 471.756055] kobject: 'erspan0' (00000000fbf4f2fb): fill_kobj_path: path = '/devices/virtual/net/erspan0' [ 471.766127] kobject: 'ip6tnl0' (0000000082a93eda): calling ktype release [ 471.773338] kobject: 'queues' (00000000a4e84448): kobject_add_internal: parent: 'erspan0', set: '' [ 471.783192] kobject: 'ip6tnl0': free name [ 471.787383] kobject: 'queues' (00000000a4e84448): kobject_uevent_env [ 471.794363] kobject: 'queues' (00000000a4e84448): kobject_uevent_env: filter function caused the event to drop! [ 471.804891] kobject: 'rx-0' (00000000819c7ec2): kobject_add_internal: parent: 'queues', set: 'queues' [ 471.814531] kobject: 'rx-0' (00000000819c7ec2): kobject_uevent_env [ 471.821110] kobject: 'rx-0' (00000000819c7ec2): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/rx-0' [ 471.831893] kobject: 'tx-0' (00000000515235cf): kobject_add_internal: parent: 'queues', set: 'queues' [ 471.841700] kobject: 'tx-0' (00000000515235cf): kobject_uevent_env [ 471.848062] kobject: 'tx-0' (00000000515235cf): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/tx-0' [ 471.859394] kobject: 'batman_adv' (000000001bfa7b41): kobject_add_internal: parent: 'erspan0', set: '' [ 471.870921] kobject: 'rx-0' (00000000a2f1b707): kobject_cleanup, parent 0000000039b6be81 [ 471.879150] kobject: 'rx-0' (00000000a2f1b707): auto cleanup 'remove' event [ 471.886543] kobject: 'rx-0' (00000000a2f1b707): kobject_uevent_env [ 471.893095] kobject: 'rx-0' (00000000a2f1b707): kobject_uevent_env: uevent_suppress caused the event to drop! [ 471.903420] kobject: 'rx-0' (00000000a2f1b707): auto cleanup kobject_del [ 471.910644] kobject: 'rx-0' (00000000a2f1b707): calling ktype release [ 471.917240] kobject: 'rx-0': free name [ 471.921396] kobject: 'tx-0' (00000000ec7f0241): kobject_cleanup, parent 0000000039b6be81 [ 471.929624] kobject: 'tx-0' (00000000ec7f0241): auto cleanup 'remove' event [ 471.936973] kobject: 'tx-0' (00000000ec7f0241): kobject_uevent_env [ 471.943530] kobject: 'tx-0' (00000000ec7f0241): kobject_uevent_env: uevent_suppress caused the event to drop! [ 471.953789] kobject: 'tx-0' (00000000ec7f0241): auto cleanup kobject_del [ 471.962972] kobject: 'tx-0' (00000000ec7f0241): calling ktype release [ 471.969553] kobject: 'tx-0': free name [ 471.973743] kobject: 'queues' (0000000039b6be81): kobject_cleanup, parent (null) [ 471.982361] kobject: 'queues' (0000000039b6be81): calling ktype release [ 471.989131] kobject: 'queues' (0000000039b6be81): kset_release [ 471.995350] kobject: 'queues': free name [ 471.999792] kobject: 'sit0' (00000000adf8060d): kobject_uevent_env [ 472.006383] kobject: 'sit0' (00000000adf8060d): kobject_uevent_env: uevent_suppress caused the event to drop! [ 472.016935] kobject: 'ip_vti0' (00000000fb434822): kobject_add_internal: parent: 'net', set: 'devices' [ 472.028081] kobject: 'ip_vti0' (00000000fb434822): kobject_uevent_env [ 472.034994] kobject: 'ip_vti0' (00000000fb434822): fill_kobj_path: path = '/devices/virtual/net/ip_vti0' [ 472.044935] kobject: 'queues' (000000001c155459): kobject_add_internal: parent: 'ip_vti0', set: '' [ 472.054802] kobject: 'queues' (000000001c155459): kobject_uevent_env [ 472.061538] kobject: 'queues' (000000001c155459): kobject_uevent_env: filter function caused the event to drop! [ 472.072127] kobject: 'rx-0' (00000000858f2fbd): kobject_add_internal: parent: 'queues', set: 'queues' [ 472.081780] kobject: 'rx-0' (00000000858f2fbd): kobject_uevent_env [ 472.088132] kobject: 'rx-0' (00000000858f2fbd): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/rx-0'