(r5, 0x9) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r6}) r7 = openat$mixer(0xffffffffffffff9c, 0x0, 0x40, 0x0) setsockopt$packet_buf(r7, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:15 executing program 2: 03:48:15 executing program 4: socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040)={0x41}, 0x10) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x2}, 0x10) sendmsg$tipc(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) [ 3404.880199][T28082] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 03:48:15 executing program 2: 03:48:15 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000200)={{0x48b3ccb3, 0x1}, 'port0\x00', 0x63, 0x41821, 0xfff, 0x6dc, 0x3, 0x4, 0x0, 0x0, 0x4, 0x1}) write$sndseq(r0, &(0x7f0000000000)=[{0x5, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) 03:48:15 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff, 0x1}) 03:48:15 executing program 5: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e4359", 0x9d}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100}) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(r6, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:15 executing program 1: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r3, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x20}, 0xf) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d66", 0xb9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489abcd69fcc7154d066c7ff2e07b", 0xd1}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b07", 0x65}], 0x5}}], 0x1, 0x40) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r5, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r7 = fcntl$getown(r6, 0x9) fcntl$lock(r6, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r7}) r8 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) pipe2(&(0x7f0000000140), 0x1800) setsockopt$packet_buf(r8, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:16 executing program 4: socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040)={0x41}, 0x10) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x2}, 0x10) sendmsg$tipc(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 03:48:16 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000200)={{0x48b3ccb3, 0x1}, 'port0\x00', 0x63, 0x41821, 0xfff, 0x6dc, 0x3, 0x4, 0x0, 0x0, 0x4, 0x1}) write$sndseq(r0, &(0x7f0000000000)=[{0x5, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) 03:48:16 executing program 3: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b2", 0x3d}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489", 0xc4}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r6 = fcntl$getown(r5, 0x9) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r6}) r7 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) setsockopt$packet_buf(r7, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:16 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x2}, 0x10) sendmsg$tipc(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) [ 3405.369522][T28416] FS-Cache: Duplicate cookie detected [ 3405.375299][T28416] FS-Cache: O-cookie c=000000007c9d888f [p=000000008669d53b fl=222 nc=0 na=1] [ 3405.384654][T28416] FS-Cache: O-cookie d=00000000531d9e7f n=000000009aab3a77 [ 3405.391945][T28416] FS-Cache: O-key=[10] '02000200000002000000' [ 3405.398339][T28416] FS-Cache: N-cookie c=00000000209691e1 [p=000000008669d53b fl=2 nc=0 na=1] [ 3405.407231][T28416] FS-Cache: N-cookie d=00000000531d9e7f n=00000000836e636e [ 3405.414631][T28416] FS-Cache: N-key=[10] '02000200000002000000' 03:48:16 executing program 2: socket$isdn(0x22, 0x3, 0x26) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r1, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000600)}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed", 0x47}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489", 0xc4}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x4}}], 0x1, 0x40) r2 = socket$inet(0x2, 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r3 = fcntl$getown(r2, 0x9) fcntl$lock(r2, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r3}) 03:48:16 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000200)={{0x48b3ccb3, 0x1}, 'port0\x00', 0x63, 0x41821, 0xfff, 0x6dc, 0x3, 0x4, 0x0, 0x0, 0x4, 0x1}) write$sndseq(r0, &(0x7f0000000000)=[{0x5, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) 03:48:16 executing program 5: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e4359", 0x9d}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100}) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(r6, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:16 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x2}, 0x10) sendmsg$tipc(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 03:48:16 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(0xffffffffffffffff, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000200)={{0x48b3ccb3, 0x1}, 'port0\x00', 0x63, 0x41821, 0xfff, 0x6dc, 0x3, 0x4, 0x0, 0x0, 0x4, 0x1}) write$sndseq(r0, &(0x7f0000000000)=[{0x5, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) 03:48:16 executing program 3: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b2", 0x3d}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489", 0xc4}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r6 = fcntl$getown(r5, 0x9) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r6}) r7 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) setsockopt$packet_buf(r7, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:16 executing program 1: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r3, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x20}, 0xf) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d66", 0xb9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489abcd69fcc7154d066c7ff2e07b", 0xd1}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b07", 0x65}], 0x5}}], 0x1, 0x40) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r5, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r7 = fcntl$getown(r6, 0x9) fcntl$lock(r6, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r7}) r8 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) pipe2(&(0x7f0000000140), 0x1800) setsockopt$packet_buf(r8, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:16 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x2}, 0x10) sendmsg$tipc(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 03:48:16 executing program 2: syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f000000dfd0)={0x4, 0x0, &(0x7f0000000080)=[@register_looper], 0x0, 0x0, 0x0}) [ 3406.057700][T28903] debugfs: File '28865' in directory 'proc' already present! 03:48:16 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040), 0x10) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x2}, 0x10) sendmsg$tipc(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 03:48:17 executing program 5: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e4359", 0x9d}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100}) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(r6, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:17 executing program 3: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b2", 0x3d}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489", 0xc4}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r6 = fcntl$getown(r5, 0x9) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r6}) r7 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) setsockopt$packet_buf(r7, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:17 executing program 1: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r3, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x20}, 0xf) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d66", 0xb9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489abcd69fcc7154d066c7ff2e07b", 0xd1}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b07", 0x65}], 0x5}}], 0x1, 0x40) getsockname(r0, 0x0, &(0x7f0000000200)) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(0xffffffffffffffff, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r6 = fcntl$getown(r5, 0x9) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r6}) r7 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) pipe2(&(0x7f0000000140), 0x1800) setsockopt$packet_buf(r7, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:17 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040), 0x10) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x2}, 0x10) sendmsg$tipc(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 03:48:17 executing program 2: r0 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x2, 0x10000) getsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000580)=0x8, &(0x7f00000005c0)=0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000140)='cgroup2\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x10000803}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYBLOB="000500eaffff99870047"], &(0x7f0000000280)=0xe) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r3, 0x1000, 0x28}, &(0x7f0000000300)=0x8) ioctl$sock_ifreq(r1, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") getrusage(0x40000000000001, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, 0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000540)) write$RDMA_USER_CM_CMD_GET_EVENT(0xffffffffffffffff, &(0x7f0000000140)={0xc, 0x8, 0xfa00, {&(0x7f0000000340)}}, 0x10) 03:48:17 executing program 5: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e4359", 0x9d}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100}) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(r6, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) [ 3406.512793][T29187] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 03:48:17 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(0xffffffffffffffff, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000200)={{0x48b3ccb3, 0x1}, 'port0\x00', 0x63, 0x41821, 0xfff, 0x6dc, 0x3, 0x4, 0x0, 0x0, 0x4, 0x1}) write$sndseq(r0, &(0x7f0000000000)=[{0x5, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) 03:48:17 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040), 0x10) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x2}, 0x10) sendmsg$tipc(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 03:48:17 executing program 3: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b2", 0x3d}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489", 0xc4}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r6 = fcntl$getown(r5, 0x9) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r6}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:17 executing program 1: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r3, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x20}, 0xf) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d66", 0xb9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489abcd69fcc7154d066c7ff2e07b", 0xd1}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b07", 0x65}], 0x5}}], 0x1, 0x40) getsockname(r0, 0x0, &(0x7f0000000200)) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(0xffffffffffffffff, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r6 = fcntl$getown(r5, 0x9) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r6}) r7 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) pipe2(&(0x7f0000000140), 0x1800) setsockopt$packet_buf(r7, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:17 executing program 5: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e4359", 0x9d}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100}) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(r6, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) [ 3406.944848][T29309] FS-Cache: Duplicate cookie detected [ 3406.950645][T29309] FS-Cache: O-cookie c=0000000040cfb2a0 [p=000000008669d53b fl=222 nc=0 na=1] [ 3406.959869][T29309] FS-Cache: O-cookie d=00000000531d9e7f n=000000002f96c2cb [ 3406.967359][T29309] FS-Cache: O-key=[10] '02000200000002000000' [ 3406.973973][T29309] FS-Cache: N-cookie c=000000007ccc241b [p=000000008669d53b fl=2 nc=0 na=1] [ 3406.982733][T29309] FS-Cache: N-cookie d=00000000531d9e7f n=00000000e9d13f09 03:48:17 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x41}, 0x10) r1 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x2}, 0x10) sendmsg$tipc(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) [ 3406.990219][T29309] FS-Cache: N-key=[10] '02000200000002000000' [ 3407.039583][T29335] FS-Cache: Duplicate cookie detected [ 3407.045131][T29335] FS-Cache: O-cookie c=0000000040cfb2a0 [p=000000008669d53b fl=222 nc=0 na=1] [ 3407.054053][T29335] FS-Cache: O-cookie d=00000000531d9e7f n=000000002f96c2cb [ 3407.061259][T29335] FS-Cache: O-key=[10] '02000200000002000000' [ 3407.067655][T29335] FS-Cache: N-cookie c=00000000c5c97621 [p=000000008669d53b fl=2 nc=0 na=1] [ 3407.076456][T29335] FS-Cache: N-cookie d=00000000531d9e7f n=000000003a911b7b [ 3407.083801][T29335] FS-Cache: N-key=[10] '02000200000002000000' 03:48:18 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x41}, 0x10) r1 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x2}, 0x10) sendmsg$tipc(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 03:48:18 executing program 5: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e4359", 0x9d}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100}) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(r6, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:18 executing program 3: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b2", 0x3d}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489", 0xc4}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r6 = fcntl$getown(r5, 0x9) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r6}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:18 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x41}, 0x10) r1 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x2}, 0x10) sendmsg$tipc(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 03:48:19 executing program 2: sysfs$1(0x1, 0x0) r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x2) r1 = socket(0x40000000015, 0x0, 0x0) connect$inet(r1, 0x0, 0x0) bind$inet(r1, 0x0, 0x0) sendmsg$xdp(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) syz_open_dev$adsp(0x0, 0x9, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000040)=0x10000000006) perf_event_open(&(0x7f0000000980)={0x1, 0x3b4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$UHID_INPUT(r0, &(0x7f00000002c0)={0x8, "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", 0xa943708f26830065}, 0x1005) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, 0x0, 0x0) timer_create(0x6, &(0x7f0000000080)={0x0, 0x31, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000001c0)=0x0) clock_gettime(0x0, 0x0) timer_settime(r2, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}}, &(0x7f0000000280)) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x1) fcntl$setsig(0xffffffffffffffff, 0xa, 0x36) 03:48:19 executing program 1: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r3, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x20}, 0xf) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d66", 0xb9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489abcd69fcc7154d066c7ff2e07b", 0xd1}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b07", 0x65}], 0x5}}], 0x1, 0x40) getsockname(r0, 0x0, &(0x7f0000000200)) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(0xffffffffffffffff, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r6 = fcntl$getown(r5, 0x9) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r6}) r7 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) pipe2(&(0x7f0000000140), 0x1800) setsockopt$packet_buf(r7, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:19 executing program 3: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b2", 0x3d}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489", 0xc4}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r6 = fcntl$getown(r5, 0x9) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r6}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:19 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x41}, 0x10) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x2}, 0x10) sendmsg$tipc(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 03:48:19 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(0xffffffffffffffff, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000200)={{0x48b3ccb3, 0x1}, 'port0\x00', 0x63, 0x41821, 0xfff, 0x6dc, 0x3, 0x4, 0x0, 0x0, 0x4, 0x1}) write$sndseq(r0, &(0x7f0000000000)=[{0x5, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) 03:48:19 executing program 5: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e4359", 0x9d}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100}) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(r6, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) [ 3408.948946][T29763] FS-Cache: Duplicate cookie detected [ 3408.954883][T29763] FS-Cache: O-cookie c=00000000e0f770dc [p=000000008669d53b fl=222 nc=0 na=1] [ 3408.963897][T29763] FS-Cache: O-cookie d=00000000531d9e7f n=00000000ebdc2db3 [ 3408.971297][T29763] FS-Cache: O-key=[10] '02000200000002000000' [ 3408.978002][T29763] FS-Cache: N-cookie c=000000002ef4bd3b [p=000000008669d53b fl=2 nc=0 na=1] [ 3408.986971][T29763] FS-Cache: N-cookie d=00000000531d9e7f n=0000000018288a8a 03:48:19 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x41}, 0x10) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x2}, 0x10) sendmsg$tipc(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) [ 3408.994366][T29763] FS-Cache: N-key=[10] '02000200000002000000' 03:48:20 executing program 5: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e4359", 0x9d}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100}) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(r6, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:20 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x41}, 0x10) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x2}, 0x10) sendmsg$tipc(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 03:48:20 executing program 3: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b2", 0x3d}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489", 0xc4}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r6 = fcntl$getown(r5, 0x9) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r6}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:20 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) 03:48:20 executing program 1: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r3, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x20}, 0xf) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d66", 0xb9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489abcd69fcc7154d066c7ff2e07b", 0xd1}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b07", 0x65}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x0) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r5, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r7 = fcntl$getown(r6, 0x9) fcntl$lock(r6, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r7}) r8 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) pipe2(&(0x7f0000000140), 0x1800) setsockopt$packet_buf(r8, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:20 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x41}, 0x10) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, 0x0, 0x0) sendmsg$tipc(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) [ 3409.606612][T30186] FS-Cache: Duplicate cookie detected [ 3409.612261][T30186] FS-Cache: O-cookie c=000000000386fc60 [p=000000008669d53b fl=222 nc=0 na=1] [ 3409.621377][T30186] FS-Cache: O-cookie d=00000000531d9e7f n=00000000db9b44ae [ 3409.628933][T30186] FS-Cache: O-key=[10] '02000200000002000000' [ 3409.635466][T30186] FS-Cache: N-cookie c=0000000008182f42 [p=000000008669d53b fl=2 nc=0 na=1] [ 3409.644331][T30186] FS-Cache: N-cookie d=00000000531d9e7f n=00000000eb46efbb [ 3409.644339][T30186] FS-Cache: N-key=[10] '02000200000002000000' 03:48:20 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x41}, 0x10) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, 0x0, 0x0) sendmsg$tipc(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) [ 3409.758175][T30198] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 03:48:20 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000200)={{0x48b3ccb3, 0x1}, 'port0\x00', 0x63, 0x41821, 0xfff, 0x6dc, 0x3, 0x4, 0x0, 0x0, 0x4, 0x1}) write$sndseq(r0, &(0x7f0000000000)=[{0x5, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) 03:48:20 executing program 3: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b2", 0x3d}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489", 0xc4}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r6 = fcntl$getown(r5, 0x9) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r6}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:20 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x41}, 0x10) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, 0x0, 0x0) sendmsg$tipc(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 03:48:20 executing program 1: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r3, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x20}, 0xf) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d66", 0xb9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489abcd69fcc7154d066c7ff2e07b", 0xd1}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b07", 0x65}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x0) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r5, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r7 = fcntl$getown(r6, 0x9) fcntl$lock(r6, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r7}) r8 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) pipe2(&(0x7f0000000140), 0x1800) setsockopt$packet_buf(r8, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:20 executing program 2: clone(0x8000000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7d, 0x1, 0x3}, 0x3c) bpf$MAP_CREATE(0x1500000000000000, &(0x7f0000214fd4)={0xc, 0x4, 0x4, 0x234, 0x0, r0, 0x0, [0x305f, 0xa, 0x300, 0x1800, 0x6000000]}, 0x2c) 03:48:20 executing program 5: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e4359", 0x9d}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100}) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(r6, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:21 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x41}, 0x10) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x0, 0x0, 0x2}, 0x10) sendmsg$tipc(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) [ 3410.297053][T30523] FS-Cache: Duplicate cookie detected [ 3410.302762][T30523] FS-Cache: O-cookie c=0000000051addf60 [p=000000008669d53b fl=222 nc=0 na=1] [ 3410.312287][T30523] FS-Cache: O-cookie d=00000000531d9e7f n=0000000089f44950 [ 3410.319902][T30523] FS-Cache: O-key=[10] '02000200000002000000' [ 3410.326642][T30523] FS-Cache: N-cookie c=0000000071b05be2 [p=000000008669d53b fl=2 nc=0 na=1] [ 3410.335548][T30523] FS-Cache: N-cookie d=00000000531d9e7f n=00000000a473c28e [ 3410.342855][T30523] FS-Cache: N-key=[10] '02000200000002000000' 03:48:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff, 0x1}) semget$private(0x0, 0x2, 0x41) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xffffffffffffffe1, 0x600000) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000180), r2, 0x2}}, 0x18) 03:48:21 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x41}, 0x10) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x0, 0x0, 0x2}, 0x10) sendmsg$tipc(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 03:48:21 executing program 1: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r3, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x20}, 0xf) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d66", 0xb9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489abcd69fcc7154d066c7ff2e07b", 0xd1}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b07", 0x65}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x0) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r5, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r7 = fcntl$getown(r6, 0x9) fcntl$lock(r6, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r7}) r8 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) pipe2(&(0x7f0000000140), 0x1800) setsockopt$packet_buf(r8, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:21 executing program 3: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b2", 0x3d}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489", 0xc4}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r6 = fcntl$getown(r5, 0x9) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r6}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x17, 0x0, 0x0) 03:48:21 executing program 5: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e4359", 0x9d}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100}) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(r6, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) [ 3410.773426][T30868] FS-Cache: Duplicate cookie detected [ 3410.779204][T30868] FS-Cache: O-cookie c=000000009cba3edc [p=000000008669d53b fl=222 nc=0 na=1] [ 3410.788397][T30868] FS-Cache: O-cookie d=00000000531d9e7f n=0000000083675bc7 [ 3410.795737][T30868] FS-Cache: O-key=[10] '02000200000002000000' [ 3410.801942][T30868] FS-Cache: N-cookie c=0000000064e8ff0a [p=000000008669d53b fl=2 nc=0 na=1] [ 3410.811046][T30868] FS-Cache: N-cookie d=00000000531d9e7f n=000000003d66e45f [ 3410.818650][T30868] FS-Cache: N-key=[10] '02000200000002000000' 03:48:21 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000200)={{0x48b3ccb3, 0x1}, 'port0\x00', 0x63, 0x41821, 0xfff, 0x6dc, 0x3, 0x4, 0x0, 0x0, 0x4, 0x1}) write$sndseq(r0, &(0x7f0000000000)=[{0x5, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) 03:48:21 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x41}, 0x10) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x0, 0x0, 0x2}, 0x10) sendmsg$tipc(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 03:48:21 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) init_module(&(0x7f0000000140)='vboxnet0\x13mime_typewlan0-:@vmnet0eth1mime_type\x00', 0xfff7d, &(0x7f0000000180)='mounts\x00') 03:48:21 executing program 5: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e4359", 0x9d}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100}) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(r6, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:21 executing program 1: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r3, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x20}, 0xf) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d66", 0xb9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489abcd69fcc7154d066c7ff2e07b", 0xd1}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b07", 0x65}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r6 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r5, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r7 = fcntl$getown(r6, 0x9) fcntl$lock(r6, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r7}) r8 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) pipe2(&(0x7f0000000140), 0x1800) setsockopt$packet_buf(r8, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:21 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x41}, 0x10) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41}, 0x10) sendmsg$tipc(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 03:48:22 executing program 3: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b2", 0x3d}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489", 0xc4}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r6 = fcntl$getown(r5, 0x9) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r6}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x17, 0x0, 0x0) 03:48:22 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x41}, 0x10) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41}, 0x10) sendmsg$tipc(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 03:48:22 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) init_module(&(0x7f0000000140)='vboxnet0\x13mime_typewlan0-:@vmnet0eth1mime_type\x00', 0xfff7d, &(0x7f0000000180)='mounts\x00') 03:48:22 executing program 1: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r3, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x20}, 0xf) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d66", 0xb9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489abcd69fcc7154d066c7ff2e07b", 0xd1}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b07", 0x65}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r6 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r5, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r7 = fcntl$getown(r6, 0x9) fcntl$lock(r6, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r7}) r8 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) pipe2(&(0x7f0000000140), 0x1800) setsockopt$packet_buf(r8, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:22 executing program 3: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b2", 0x3d}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489", 0xc4}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r6 = fcntl$getown(r5, 0x9) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r6}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x17, 0x0, 0x0) 03:48:22 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x41}, 0x10) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41}, 0x10) sendmsg$tipc(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) [ 3411.659066][T31493] FS-Cache: Duplicate cookie detected [ 3411.665313][T31493] FS-Cache: O-cookie c=000000000f644091 [p=000000008669d53b fl=222 nc=0 na=1] [ 3411.674679][T31493] FS-Cache: O-cookie d=00000000531d9e7f n=000000007d8f8f87 [ 3411.682026][T31493] FS-Cache: O-key=[10] '02000200000002000000' [ 3411.688598][T31493] FS-Cache: N-cookie c=000000004966a87f [p=000000008669d53b fl=2 nc=0 na=1] [ 3411.697355][T31493] FS-Cache: N-cookie d=00000000531d9e7f n=00000000c6c6d754 [ 3411.704834][T31493] FS-Cache: N-key=[10] '02000200000002000000' 03:48:22 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000200)={{0x48b3ccb3, 0x1}, 'port0\x00', 0x63, 0x41821, 0xfff, 0x6dc, 0x3, 0x4, 0x0, 0x0, 0x4, 0x1}) write$sndseq(r0, &(0x7f0000000000)=[{0x5, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) 03:48:22 executing program 5: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e4359", 0x9d}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100}) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(r6, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:22 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) init_module(&(0x7f0000000140)='vboxnet0\x13mime_typewlan0-:@vmnet0eth1mime_type\x00', 0xfff7d, &(0x7f0000000180)='mounts\x00') 03:48:22 executing program 1: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r3, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x20}, 0xf) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d66", 0xb9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489abcd69fcc7154d066c7ff2e07b", 0xd1}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b07", 0x65}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r6 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r5, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r7 = fcntl$getown(r6, 0x9) fcntl$lock(r6, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r7}) r8 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) pipe2(&(0x7f0000000140), 0x1800) setsockopt$packet_buf(r8, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:22 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x41}, 0x10) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x2}, 0x10) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 03:48:22 executing program 3: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b2", 0x3d}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489", 0xc4}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r6 = fcntl$getown(r5, 0x9) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r6}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x17, &(0x7f0000000080), 0x0) 03:48:22 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x41}, 0x10) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x2}, 0x10) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 03:48:22 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) init_module(&(0x7f0000000140)='vboxnet0\x13mime_typewlan0-:@vmnet0eth1mime_type\x00', 0xfff7d, &(0x7f0000000180)='mounts\x00') 03:48:23 executing program 5: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e4359", 0x9d}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100}) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(r6, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:23 executing program 1: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r3, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x20}, 0xf) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d66", 0xb9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489abcd69fcc7154d066c7ff2e07b", 0xd1}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b07", 0x65}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r5, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r7 = fcntl$getown(r6, 0x9) fcntl$lock(r6, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r7}) r8 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) pipe2(&(0x7f0000000140), 0x1800) setsockopt$packet_buf(r8, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:23 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x41}, 0x10) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x2}, 0x10) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 03:48:23 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) init_module(&(0x7f0000000140)='vboxnet0\x13mime_typewlan0-:@vmnet0eth1mime_type\x00', 0xfff7d, &(0x7f0000000180)='mounts\x00') 03:48:23 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000200)={{0x48b3ccb3, 0x1}, 'port0\x00', 0x63, 0x41821, 0xfff, 0x6dc, 0x3, 0x4, 0x0, 0x0, 0x4, 0x1}) write$sndseq(r0, &(0x7f0000000000)=[{0x5, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) 03:48:23 executing program 5: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e4359", 0x9d}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100}) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(r6, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:23 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x41}, 0x10) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x2}, 0x10) sendmsg$tipc(r1, 0x0, 0x0) 03:48:23 executing program 3: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b2", 0x3d}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489", 0xc4}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r6 = fcntl$getown(r5, 0x9) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r6}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x17, &(0x7f0000000080), 0x0) 03:48:23 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) init_module(&(0x7f0000000140)='vboxnet0\x13mime_typewlan0-:@vmnet0eth1mime_type\x00', 0xfff7d, &(0x7f0000000180)='mounts\x00') 03:48:23 executing program 1: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r3, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x20}, 0xf) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d66", 0xb9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489abcd69fcc7154d066c7ff2e07b", 0xd1}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b07", 0x65}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r5, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r7 = fcntl$getown(r6, 0x9) fcntl$lock(r6, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r7}) r8 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) pipe2(&(0x7f0000000140), 0x1800) setsockopt$packet_buf(r8, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:23 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) init_module(&(0x7f0000000140)='vboxnet0\x13mime_typewlan0-:@vmnet0eth1mime_type\x00', 0xfff7d, &(0x7f0000000180)='mounts\x00') 03:48:23 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x41}, 0x10) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x2}, 0x10) sendmsg$tipc(r1, 0x0, 0x0) 03:48:23 executing program 5: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e4359", 0x9d}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100}) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(r6, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:23 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000200)={{0x48b3ccb3, 0x1}, 'port0\x00', 0x63, 0x41821, 0xfff, 0x6dc, 0x3, 0x4, 0x0, 0x0, 0x4, 0x1}) write$sndseq(r0, &(0x7f0000000000)=[{0x5, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) 03:48:24 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) init_module(&(0x7f0000000140)='vboxnet0\x13mime_typewlan0-:@vmnet0eth1mime_type\x00', 0xfff7d, &(0x7f0000000180)='mounts\x00') 03:48:24 executing program 3: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b2", 0x3d}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489", 0xc4}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r6 = fcntl$getown(r5, 0x9) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r6}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x17, &(0x7f0000000080), 0x0) 03:48:24 executing program 1: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r3, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x20}, 0xf) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d66", 0xb9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489abcd69fcc7154d066c7ff2e07b", 0xd1}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b07", 0x65}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r5, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r7 = fcntl$getown(r6, 0x9) fcntl$lock(r6, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r7}) r8 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) pipe2(&(0x7f0000000140), 0x1800) setsockopt$packet_buf(r8, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:24 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x41}, 0x10) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x2}, 0x10) sendmsg$tipc(r1, 0x0, 0x0) 03:48:24 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000200)={{0x48b3ccb3, 0x1}, 'port0\x00', 0x63, 0x41821, 0xfff, 0x6dc, 0x3, 0x4, 0x0, 0x0, 0x4, 0x1}) write$sndseq(r0, &(0x7f0000000000)=[{0x5, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) 03:48:24 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) init_module(&(0x7f0000000140)='vboxnet0\x13mime_typewlan0-:@vmnet0eth1mime_type\x00', 0xfff7d, &(0x7f0000000180)='mounts\x00') 03:48:24 executing program 3: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b2", 0x3d}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489", 0xc4}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r6 = fcntl$getown(r5, 0x9) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r6}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9", 0x2f) 03:48:24 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100}) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(r6, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:24 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000200)={{0x48b3ccb3, 0x1}, 'port0\x00', 0x63, 0x41821, 0xfff, 0x6dc, 0x3, 0x4, 0x0, 0x0, 0x4, 0x1}) write$sndseq(r0, &(0x7f0000000000)=[{0x5, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) 03:48:24 executing program 1: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r3, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x20}, 0xf) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d66", 0xb9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489abcd69fcc7154d066c7ff2e07b", 0xd1}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b07", 0x65}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, 0x0, 0x0) dup3(r5, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r7 = fcntl$getown(r6, 0x9) fcntl$lock(r6, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r7}) r8 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) pipe2(&(0x7f0000000140), 0x1800) setsockopt$packet_buf(r8, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:24 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) init_module(&(0x7f0000000140)='vboxnet0\x13mime_typewlan0-:@vmnet0eth1mime_type\x00', 0xfff7d, &(0x7f0000000180)='mounts\x00') 03:48:24 executing program 3: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b2", 0x3d}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489", 0xc4}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r6 = fcntl$getown(r5, 0x9) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r6}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9", 0x2f) 03:48:24 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000200)={{0x48b3ccb3, 0x1}, 'port0\x00', 0x63, 0x41821, 0xfff, 0x6dc, 0x3, 0x4, 0x0, 0x0, 0x4, 0x1}) write$sndseq(r0, &(0x7f0000000000)=[{0x5, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) 03:48:24 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) init_module(&(0x7f0000000140)='vboxnet0\x13mime_typewlan0-:@vmnet0eth1mime_type\x00', 0xfff7d, &(0x7f0000000180)='mounts\x00') 03:48:24 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x2, &(0x7f0000000080)=0x0) r2 = eventfd(0x0) read$eventfd(r2, &(0x7f0000000000), 0x8) io_submit(r1, 0x1, &(0x7f0000000800)=[&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x100000000000, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x1, r2}]) 03:48:24 executing program 5: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e4359", 0x9d}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100}) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(r6, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:24 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000200)={{0x48b3ccb3, 0x1}, 'port0\x00', 0x63, 0x41821, 0xfff, 0x6dc, 0x3, 0x4, 0x0, 0x0, 0x4, 0x1}) write$sndseq(r0, &(0x7f0000000000)=[{0x5, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) 03:48:25 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) init_module(&(0x7f0000000140)='vboxnet0\x13mime_typewlan0-:@vmnet0eth1mime_type\x00', 0xfff7d, &(0x7f0000000180)='mounts\x00') 03:48:25 executing program 1: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r3, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x20}, 0xf) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d66", 0xb9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489abcd69fcc7154d066c7ff2e07b", 0xd1}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b07", 0x65}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, 0x0, 0x0) dup3(r5, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r7 = fcntl$getown(r6, 0x9) fcntl$lock(r6, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r7}) r8 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) pipe2(&(0x7f0000000140), 0x1800) setsockopt$packet_buf(r8, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:25 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000200)={{0x48b3ccb3, 0x1}, 'port0\x00', 0x63, 0x41821, 0xfff, 0x6dc, 0x3, 0x4, 0x0, 0x0, 0x4, 0x1}) write$sndseq(r0, &(0x7f0000000000)=[{0x5, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) 03:48:25 executing program 3: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b2", 0x3d}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489", 0xc4}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r6 = fcntl$getown(r5, 0x9) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r6}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9", 0x2f) 03:48:25 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) init_module(&(0x7f0000000140)='vboxnet0\x13mime_typewlan0-:@vmnet0eth1mime_type\x00', 0xfff7d, &(0x7f0000000180)='mounts\x00') 03:48:25 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') preadv(r1, &(0x7f00000003c0)=[{&(0x7f00000004c0)=""/96, 0x60}], 0x1, 0x0) [ 3414.587695][ T852] FS-Cache: Duplicate cookie detected [ 3414.593275][ T852] FS-Cache: O-cookie c=00000000eead7ec9 [p=000000008669d53b fl=222 nc=0 na=1] [ 3414.602294][ T852] FS-Cache: O-cookie d=00000000531d9e7f n=000000004a203968 [ 3414.609745][ T852] FS-Cache: O-key=[10] '02000200000002000000' [ 3414.616386][ T852] FS-Cache: N-cookie c=000000002eaf2384 [p=000000008669d53b fl=2 nc=0 na=1] [ 3414.625369][ T852] FS-Cache: N-cookie d=00000000531d9e7f n=00000000330c0351 [ 3414.632725][ T852] FS-Cache: N-key=[10] '02000200000002000000' 03:48:25 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) write$sndseq(r0, &(0x7f0000000000)=[{0x5, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) 03:48:25 executing program 1: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r3, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x20}, 0xf) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d66", 0xb9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489abcd69fcc7154d066c7ff2e07b", 0xd1}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b07", 0x65}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, 0x0, 0x0) dup3(r5, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r7 = fcntl$getown(r6, 0x9) fcntl$lock(r6, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r7}) r8 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) pipe2(&(0x7f0000000140), 0x1800) setsockopt$packet_buf(r8, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:25 executing program 5: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e4359", 0x9d}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r3, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) fcntl$lock(r4, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100}) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(r5, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:25 executing program 2: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) init_module(&(0x7f0000000140)='vboxnet0\x13mime_typewlan0-:@vmnet0eth1mime_type\x00', 0xfff7d, &(0x7f0000000180)='mounts\x00') 03:48:25 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') preadv(r1, &(0x7f00000003c0)=[{&(0x7f00000004c0)=""/96, 0x60}], 0x1, 0x0) 03:48:25 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) write$sndseq(r0, &(0x7f0000000000)=[{0x5, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) 03:48:25 executing program 2: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) init_module(&(0x7f0000000140)='vboxnet0\x13mime_typewlan0-:@vmnet0eth1mime_type\x00', 0xfff7d, &(0x7f0000000180)='mounts\x00') 03:48:25 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') preadv(r1, &(0x7f00000003c0)=[{&(0x7f00000004c0)=""/96, 0x60}], 0x1, 0x0) 03:48:25 executing program 1: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r3, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x20}, 0xf) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d66", 0xb9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489abcd69fcc7154d066c7ff2e07b", 0xd1}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b07", 0x65}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(0xffffffffffffffff, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r6 = fcntl$getown(r5, 0x9) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r6}) r7 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) pipe2(&(0x7f0000000140), 0x1800) setsockopt$packet_buf(r7, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:26 executing program 3: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b2", 0x3d}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489", 0xc4}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r6 = fcntl$getown(r5, 0x9) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r6}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e", 0x46) 03:48:26 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) write$sndseq(r0, &(0x7f0000000000)=[{0x5, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) 03:48:26 executing program 2: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) init_module(&(0x7f0000000140)='vboxnet0\x13mime_typewlan0-:@vmnet0eth1mime_type\x00', 0xfff7d, &(0x7f0000000180)='mounts\x00') 03:48:26 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') preadv(r1, &(0x7f00000003c0)=[{&(0x7f00000004c0)=""/96, 0x60}], 0x1, 0x0) 03:48:26 executing program 5: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e4359", 0x9d}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r3, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) fcntl$lock(r4, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100}) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(r5, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:26 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) init_module(&(0x7f0000000140)='vboxnet0\x13mime_typewlan0-:@vmnet0eth1mime_type\x00', 0xfff7d, &(0x7f0000000180)='mounts\x00') 03:48:26 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000200)={{0x0, 0x1}, 'port0\x00', 0x63, 0x41821, 0xfff, 0x6dc, 0x3, 0x4, 0x0, 0x0, 0x4, 0x1}) write$sndseq(r0, &(0x7f0000000000)=[{0x5, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) 03:48:26 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f00000004c0)=""/96, 0x60}], 0x1, 0x0) 03:48:26 executing program 3: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b2", 0x3d}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489", 0xc4}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r6 = fcntl$getown(r5, 0x9) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r6}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e", 0x46) 03:48:26 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) init_module(&(0x7f0000000140)='vboxnet0\x13mime_typewlan0-:@vmnet0eth1mime_type\x00', 0xfff7d, &(0x7f0000000180)='mounts\x00') 03:48:26 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000200)={{}, 'port0\x00', 0x63, 0x41821, 0xfff, 0x6dc, 0x3, 0x4, 0x0, 0x0, 0x4, 0x1}) write$sndseq(r0, &(0x7f0000000000)=[{0x5, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) 03:48:26 executing program 1: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r3, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x20}, 0xf) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d66", 0xb9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489abcd69fcc7154d066c7ff2e07b", 0xd1}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b07", 0x65}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(0xffffffffffffffff, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r6 = fcntl$getown(r5, 0x9) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r6}) r7 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) pipe2(&(0x7f0000000140), 0x1800) setsockopt$packet_buf(r7, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:26 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f00000004c0)=""/96, 0x60}], 0x1, 0x0) 03:48:26 executing program 5: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e4359", 0x9d}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r3, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) fcntl$lock(r4, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100}) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(r5, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:26 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000200)={{}, 'port0\x00', 0x0, 0x41821, 0xfff, 0x6dc, 0x3, 0x4, 0x0, 0x0, 0x4, 0x1}) write$sndseq(r0, &(0x7f0000000000)=[{0x5, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) 03:48:26 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) init_module(&(0x7f0000000140)='vboxnet0\x13mime_typewlan0-:@vmnet0eth1mime_type\x00', 0xfff7d, &(0x7f0000000180)='mounts\x00') [ 3415.890835][ T1607] FS-Cache: Duplicate cookie detected [ 3415.896624][ T1607] FS-Cache: O-cookie c=00000000a623b332 [p=000000008669d53b fl=222 nc=0 na=1] [ 3415.906233][ T1607] FS-Cache: O-cookie d=00000000531d9e7f n=0000000009857298 [ 3415.913825][ T1607] FS-Cache: O-key=[10] '02000200000002000000' [ 3415.920203][ T1607] FS-Cache: N-cookie c=000000006342e175 [p=000000008669d53b fl=2 nc=0 na=1] [ 3415.929430][ T1607] FS-Cache: N-cookie d=00000000531d9e7f n=00000000be07cbaa 03:48:26 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f00000004c0)=""/96, 0x60}], 0x1, 0x0) [ 3415.936785][ T1607] FS-Cache: N-key=[10] '02000200000002000000' 03:48:26 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) init_module(&(0x7f0000000140)='vboxnet0\x13mime_typewlan0-:@vmnet0eth1mime_type\x00', 0xfff7d, &(0x7f0000000180)='mounts\x00') 03:48:26 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000200)={{}, 'port0\x00', 0x0, 0x0, 0xfff, 0x6dc, 0x3, 0x4, 0x0, 0x0, 0x4, 0x1}) write$sndseq(r0, &(0x7f0000000000)=[{0x5, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) 03:48:26 executing program 3: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b2", 0x3d}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489", 0xc4}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r6 = fcntl$getown(r5, 0x9) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r6}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e", 0x46) 03:48:27 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000004c0)=""/96, 0x60}], 0x1, 0x0) 03:48:27 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000200)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x6dc, 0x3, 0x4, 0x0, 0x0, 0x4, 0x1}) write$sndseq(r0, &(0x7f0000000000)=[{0x5, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) 03:48:27 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) init_module(&(0x7f0000000140)='vboxnet0\x13mime_typewlan0-:@vmnet0eth1mime_type\x00', 0xfff7d, &(0x7f0000000180)='mounts\x00') 03:48:27 executing program 1: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r3, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x20}, 0xf) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d66", 0xb9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489abcd69fcc7154d066c7ff2e07b", 0xd1}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b07", 0x65}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(0xffffffffffffffff, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r6 = fcntl$getown(r5, 0x9) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r6}) r7 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) pipe2(&(0x7f0000000140), 0x1800) setsockopt$packet_buf(r7, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:27 executing program 5: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e4359", 0x9d}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r3, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) fcntl$lock(r4, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100}) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(r5, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:27 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000004c0)=""/96, 0x60}], 0x1, 0x0) 03:48:27 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000200)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x6dc, 0x3, 0x4, 0x0, 0x0, 0x4, 0x1}) write$sndseq(r0, &(0x7f0000000000)=[{0x5, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) 03:48:27 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000004c0)=""/96, 0x60}], 0x1, 0x0) [ 3416.582624][ T2026] FS-Cache: Duplicate cookie detected [ 3416.588302][ T2026] FS-Cache: O-cookie c=000000005fb70e2c [p=000000008669d53b fl=222 nc=0 na=1] [ 3416.597737][ T2026] FS-Cache: O-cookie d=00000000531d9e7f n=000000009783aa0c [ 3416.605204][ T2026] FS-Cache: O-key=[10] '02000200000002000000' [ 3416.611692][ T2026] FS-Cache: N-cookie c=00000000e1797d1c [p=000000008669d53b fl=2 nc=0 na=1] [ 3416.620658][ T2026] FS-Cache: N-cookie d=00000000531d9e7f n=0000000014212657 03:48:27 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) init_module(&(0x7f0000000140)='vboxnet0\x13mime_typewlan0-:@vmnet0eth1mime_type\x00', 0xfff7d, &(0x7f0000000180)='mounts\x00') [ 3416.628090][ T2026] FS-Cache: N-key=[10] '02000200000002000000' 03:48:27 executing program 3: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b2", 0x3d}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489", 0xc4}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r6 = fcntl$getown(r5, 0x9) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r6}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea299", 0x52) 03:48:27 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) init_module(0x0, 0x0, &(0x7f0000000180)='mounts\x00') 03:48:27 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000004c0)=""/96, 0x60}], 0x1, 0x0) 03:48:27 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000200)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x6dc, 0x3, 0x4, 0x0, 0x0, 0x4, 0x1}) write$sndseq(r0, &(0x7f0000000000)=[{0x5, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) 03:48:27 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) init_module(0x0, 0x0, &(0x7f0000000180)='mounts\x00') 03:48:27 executing program 5: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e4359", 0x9d}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r3, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) fcntl$lock(r4, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100}) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(r5, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:28 executing program 1: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r3, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x20}, 0xf) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d66", 0xb9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489abcd69fcc7154d066c7ff2e07b", 0xd1}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b07", 0x65}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r5, 0xffffffffffffffff, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r7 = fcntl$getown(r6, 0x9) fcntl$lock(r6, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r7}) r8 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) pipe2(&(0x7f0000000140), 0x1800) setsockopt$packet_buf(r8, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:28 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000200)={{}, 'port0\x00', 0x0, 0x0, 0xfff, 0x0, 0x3, 0x4, 0x0, 0x0, 0x4, 0x1}) write$sndseq(r0, &(0x7f0000000000)=[{0x5, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) 03:48:28 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000004c0)=""/96, 0x60}], 0x1, 0x0) 03:48:28 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) init_module(0x0, 0x0, &(0x7f0000000180)='mounts\x00') 03:48:28 executing program 3: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b2", 0x3d}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489", 0xc4}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r6 = fcntl$getown(r5, 0x9) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r6}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea299", 0x52) 03:48:28 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000200)={{}, 'port0\x00', 0x0, 0x0, 0xfff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4, 0x1}) write$sndseq(r0, &(0x7f0000000000)=[{0x5, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) 03:48:28 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000004c0)=""/96, 0x60}], 0x1, 0x0) 03:48:28 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) init_module(&(0x7f0000000140)='vboxnet0\x13mime_typewlan0-:@vmnet0eth1mime_type\x00', 0x2e, 0x0) 03:48:28 executing program 5: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e4359", 0x9d}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r3, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) fcntl$lock(r4, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100}) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(r5, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) [ 3417.482116][ T2624] FS-Cache: Duplicate cookie detected [ 3417.487913][ T2624] FS-Cache: O-cookie c=00000000257b9baa [p=000000008669d53b fl=222 nc=0 na=1] [ 3417.497122][ T2624] FS-Cache: O-cookie d=00000000531d9e7f n=0000000088e3c766 [ 3417.504747][ T2624] FS-Cache: O-key=[10] '02000200000002000000' [ 3417.511504][ T2624] FS-Cache: N-cookie c=000000001d7d887a [p=000000008669d53b fl=2 nc=0 na=1] [ 3417.520707][ T2624] FS-Cache: N-cookie d=00000000531d9e7f n=00000000567f4bf3 03:48:28 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') preadv(r1, &(0x7f00000003c0)=[{&(0x7f00000004c0)=""/96, 0x60}], 0x1, 0x0) [ 3417.528053][ T2624] FS-Cache: N-key=[10] '02000200000002000000' 03:48:28 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) init_module(&(0x7f0000000140)='vboxnet0\x13mime_typewlan0-:@vmnet0eth1mime_type\x00', 0x2e, 0x0) 03:48:28 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000200)={{}, 'port0\x00', 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1}) write$sndseq(r0, &(0x7f0000000000)=[{0x5, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) 03:48:28 executing program 1: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r3, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x20}, 0xf) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d66", 0xb9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489abcd69fcc7154d066c7ff2e07b", 0xd1}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b07", 0x65}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r5, 0xffffffffffffffff, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r7 = fcntl$getown(r6, 0x9) fcntl$lock(r6, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r7}) r8 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) pipe2(&(0x7f0000000140), 0x1800) setsockopt$packet_buf(r8, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:28 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') preadv(r1, &(0x7f00000003c0)=[{&(0x7f00000004c0)=""/96, 0x60}], 0x1, 0x0) 03:48:28 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) init_module(&(0x7f0000000140)='vboxnet0\x13mime_typewlan0-:@vmnet0eth1mime_type\x00', 0x2e, 0x0) 03:48:28 executing program 5: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e4359", 0x9d}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r3, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) fcntl$lock(r4, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100}) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(r5, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:28 executing program 3: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b2", 0x3d}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489", 0xc4}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r6 = fcntl$getown(r5, 0x9) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r6}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea299", 0x52) 03:48:28 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000200)={{}, 'port0\x00', 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) write$sndseq(r0, &(0x7f0000000000)=[{0x5, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) 03:48:28 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') preadv(r1, &(0x7f00000003c0)=[{&(0x7f00000004c0)=""/96, 0x60}], 0x1, 0x0) 03:48:28 executing program 2: r0 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f00000002c0)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b465abb4c921955fb6086244113182b8f313593c4f226eb613cd116ca4a388", 0x5c, 0xfffffffffffffffd) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f00000006c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000700)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 03:48:28 executing program 1: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r3, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x20}, 0xf) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d66", 0xb9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489abcd69fcc7154d066c7ff2e07b", 0xd1}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b07", 0x65}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r5, 0xffffffffffffffff, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r7 = fcntl$getown(r6, 0x9) fcntl$lock(r6, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r7}) r8 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) pipe2(&(0x7f0000000140), 0x1800) setsockopt$packet_buf(r8, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:28 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000200)={{}, 'port0\x00', 0x0, 0x0, 0xfff}) write$sndseq(r0, &(0x7f0000000000)=[{0x5, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) 03:48:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000004c0)=""/96, 0x60}], 0x1, 0x0) 03:48:29 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000200)={{}, 'port0\x00', 0x0, 0x0, 0xfff}) write$sndseq(0xffffffffffffffff, &(0x7f0000000000)=[{0x5, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) 03:48:29 executing program 3: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b2", 0x3d}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489", 0xc4}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r6 = fcntl$getown(r5, 0x9) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r6}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248", 0x58) 03:48:29 executing program 1: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r3, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x20}, 0xf) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d66", 0xb9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489abcd69fcc7154d066c7ff2e07b", 0xd1}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b07", 0x65}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r5, r0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r7 = fcntl$getown(r6, 0x9) fcntl$lock(r6, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r7}) r8 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) pipe2(&(0x7f0000000140), 0x1800) setsockopt$packet_buf(r8, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:29 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) socket$kcm(0x2b, 0x1, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000002c0)=ANY=[@ANYBLOB="a1c1"]) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000ec600000000000000000000000000000400000000005f00"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.\\G10I\xb8\x8f8\x00\x15o\x1e\xc98\x7f\xcb\xecA\xf3\xbf\x9c\xd8R\xa2|\xef\xe3\x8b\x05\x94\xf9Gx\x1f\xfdi\x9b\x83`\xb8Y\x1aV\xbe\xeb\xb3\xd3v\xb9\x0fs\x90\xb6\xaa`\xe8\x12\xc3\"\x87\xbf\xab\x80h\x97\x89C\t\x84\x9d\xed\xa5ED\xb5P\xde\xa65\xf7\xa1\x1eW\xb3n\xd1\x0f\xeaa\xe2\xcf:\xb6\xa0+\x12W\x9e\x13\x15\xdb\xf6T#\x83\xe59\x04', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000640)=ANY=[@ANYRES32=0x0], 0x0, 0x4, 0x0, 0xffffffffffffbfff}, 0x20) r5 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r6 = gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000540)=r6, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) 03:48:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000004c0)=""/96, 0x60}], 0x1, 0x0) 03:48:29 executing program 5: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e4359", 0x9d}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r3, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) fcntl$lock(r4, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100}) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(r5, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:29 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000200)={{}, 'port0\x00', 0x0, 0x0, 0xfff}) write$sndseq(0xffffffffffffffff, &(0x7f0000000000)=[{0x5, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) [ 3418.667576][ T3474] FS-Cache: Duplicate cookie detected [ 3418.675006][ T3474] FS-Cache: O-cookie c=0000000034c02356 [p=000000008669d53b fl=222 nc=0 na=1] [ 3418.684122][ T3474] FS-Cache: O-cookie d=00000000531d9e7f n=0000000019dba407 [ 3418.691518][ T3474] FS-Cache: O-key=[10] '02000200000002000000' [ 3418.698126][ T3474] FS-Cache: N-cookie c=0000000016035527 [p=000000008669d53b fl=2 nc=0 na=1] [ 3418.707132][ T3474] FS-Cache: N-cookie d=00000000531d9e7f n=000000003d10fe67 [ 3418.714561][ T3474] FS-Cache: N-key=[10] '02000200000002000000' [ 3418.722201][ T3478] FS-Cache: Duplicate cookie detected [ 3418.729030][ T3478] FS-Cache: O-cookie c=0000000034c02356 [p=000000008669d53b fl=222 nc=0 na=1] [ 3418.738123][ T3478] FS-Cache: O-cookie d=00000000531d9e7f n=0000000019dba407 [ 3418.745550][ T3478] FS-Cache: O-key=[10] '02000200000002000000' [ 3418.752226][ T3478] FS-Cache: N-cookie c=000000003d015d96 [p=000000008669d53b fl=2 nc=0 na=1] 03:48:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000004c0)=""/96, 0x60}], 0x1, 0x0) 03:48:29 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000200)={{}, 'port0\x00', 0x0, 0x0, 0xfff}) write$sndseq(0xffffffffffffffff, &(0x7f0000000000)=[{0x5, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) [ 3418.761073][ T3478] FS-Cache: N-cookie d=00000000531d9e7f n=00000000209c7dec [ 3418.768411][ T3478] FS-Cache: N-key=[10] '02000200000002000000' 03:48:29 executing program 3: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b2", 0x3d}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489", 0xc4}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r6 = fcntl$getown(r5, 0x9) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r6}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248", 0x58) 03:48:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000004c0)=""/96, 0x60}], 0x1, 0x0) 03:48:29 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000200)={{}, 'port0\x00', 0x0, 0x0, 0xfff}) write$sndseq(r0, 0x0, 0x0) 03:48:29 executing program 1: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r3, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x20}, 0xf) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d66", 0xb9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489abcd69fcc7154d066c7ff2e07b", 0xd1}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b07", 0x65}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r5, r0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r7 = fcntl$getown(r6, 0x9) fcntl$lock(r6, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r7}) r8 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) pipe2(&(0x7f0000000140), 0x1800) setsockopt$packet_buf(r8, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:30 executing program 5: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e4359", 0x9d}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r2, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) fcntl$lock(r3, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100}) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(r4, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:30 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000004c0)=""/96, 0x60}], 0x1, 0x0) [ 3419.356687][ T3770] FS-Cache: Duplicate cookie detected [ 3419.362397][ T3770] FS-Cache: O-cookie c=0000000062c3e866 [p=000000008669d53b fl=222 nc=0 na=1] [ 3419.372457][ T3770] FS-Cache: O-cookie d=00000000531d9e7f n=0000000082927a9a [ 3419.379978][ T3770] FS-Cache: O-key=[10] '02000200000002000000' [ 3419.386637][ T3770] FS-Cache: N-cookie c=000000007ccc241b [p=000000008669d53b fl=2 nc=0 na=1] [ 3419.395512][ T3770] FS-Cache: N-cookie d=00000000531d9e7f n=0000000093ccd101 [ 3419.402910][ T3770] FS-Cache: N-key=[10] '02000200000002000000' [ 3419.656370][ T3472] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3419.668114][ T3472] CPU: 0 PID: 3472 Comm: syz-executor.2 Not tainted 5.3.0-rc1+ #49 [ 3419.676016][ T3472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3419.686069][ T3472] Call Trace: [ 3419.686154][ T3472] dump_stack+0x1d8/0x2f8 [ 3419.686172][ T3472] dump_header+0xd8/0x960 [ 3419.686188][ T3472] oom_kill_process+0xcd/0x350 [ 3419.686202][ T3472] out_of_memory+0x5ce/0x890 [ 3419.686216][ T3472] ? unregister_oom_notifier+0x20/0x20 [ 3419.686231][ T3472] ? __kasan_check_read+0x11/0x20 [ 3419.686247][ T3472] try_charge+0x137d/0x1a60 [ 3419.686281][ T3472] ? __memcg_kmem_charge_memcg+0xf0/0xf0 [ 3419.698197][ T3472] ? __lock_acquire+0x4750/0x4750 [ 3419.698219][ T3472] ? rcu_lock_release+0x15/0x20 [ 3419.738102][ T3472] ? get_mem_cgroup_from_mm+0x15b/0x170 [ 3419.743631][ T3472] mem_cgroup_try_charge+0x20c/0x680 [ 3419.748939][ T3472] mem_cgroup_try_charge_delay+0x25/0xa0 [ 3419.754593][ T3472] handle_mm_fault+0x31f3/0x6070 [ 3419.759544][ T3472] ? finish_fault+0x230/0x230 [ 3419.764216][ T3472] ? __up_read+0x5b0/0x5b0 [ 3419.768611][ T3472] ? vmacache_find+0x566/0x5b0 [ 3419.773349][ T3472] ? vmacache_update+0xb7/0x120 [ 3419.778195][ T3472] do_user_addr_fault+0x589/0xaf0 [ 3419.783230][ T3472] __do_page_fault+0xd3/0x1f0 [ 3419.787887][ T3472] do_page_fault+0x99/0xb0 [ 3419.792284][ T3472] page_fault+0x39/0x40 [ 3419.796420][ T3472] RIP: 0033:0x41116f [ 3419.800296][ T3472] Code: 0f 84 c8 02 00 00 48 83 bd 78 ff ff ff 00 0f 84 f9 04 00 00 48 8b 95 68 ff ff ff 44 89 95 38 ff ff ff 4c 8d ac 10 00 f7 ff ff <49> 89 85 90 06 00 00 49 8d 85 10 03 00 00 49 89 95 98 06 00 00 41 [ 3419.819899][ T3472] RSP: 002b:00007ffe3df91b00 EFLAGS: 00010206 [ 3419.825962][ T3472] RAX: 00007f668f209000 RBX: 0000000000020000 RCX: 000000000045987a [ 3419.833937][ T3472] RDX: 0000000000021000 RSI: 0000000000021000 RDI: 0000000000000000 [ 3419.841897][ T3472] RBP: 00007ffe3df91be0 R08: ffffffffffffffff R09: 0000000000000000 [ 3419.849863][ T3472] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffe3df91cd0 [ 3419.857814][ T3472] R13: 00007f668f229700 R14: 0000000000000001 R15: 000000000075bfd4 [ 3419.869150][ T3472] memory: usage 88248kB, limit 0kB, failcnt 8 [ 3419.879341][ T3472] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3419.886313][ T3472] Memory cgroup stats for /syz2: [ 3419.886644][ T3472] anon 66441216 [ 3419.886644][ T3472] file 155648 [ 3419.886644][ T3472] kernel_stack 1048576 [ 3419.886644][ T3472] slab 18493440 [ 3419.886644][ T3472] sock 0 [ 3419.886644][ T3472] shmem 126976 [ 3419.886644][ T3472] file_mapped 0 [ 3419.886644][ T3472] file_dirty 0 [ 3419.886644][ T3472] file_writeback 0 [ 3419.886644][ T3472] anon_thp 62914560 [ 3419.886644][ T3472] inactive_anon 98304 [ 3419.886644][ T3472] active_anon 66375680 [ 3419.886644][ T3472] inactive_file 0 [ 3419.886644][ T3472] active_file 0 [ 3419.886644][ T3472] unevictable 131072 [ 3419.886644][ T3472] slab_reclaimable 5406720 [ 3419.886644][ T3472] slab_unreclaimable 13086720 [ 3419.886644][ T3472] pgfault 501930 [ 3419.886644][ T3472] pgmajfault 0 [ 3419.886644][ T3472] workingset_refault 0 [ 3419.886644][ T3472] workingset_activate 0 [ 3419.886644][ T3472] workingset_nodereclaim 0 [ 3419.886644][ T3472] pgrefill 35 [ 3419.886644][ T3472] pgscan 0 [ 3419.886644][ T3472] pgsteal 0 [ 3419.979896][ T3472] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=7853,uid=0 [ 3419.997507][ T3472] Memory cgroup out of memory: Killed process 7853 (syz-executor.2) total-vm:72704kB, anon-rss:2204kB, file-rss:35812kB, shmem-rss:0kB [ 3420.014385][ T1056] oom_reaper: reaped process 7853 (syz-executor.2), now anon-rss:0kB, file-rss:34852kB, shmem-rss:0kB [ 3420.022561][ T3472] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3420.035937][ T3472] CPU: 0 PID: 3472 Comm: syz-executor.2 Not tainted 5.3.0-rc1+ #49 [ 3420.043840][ T3472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3420.053887][ T3472] Call Trace: [ 3420.057181][ T3472] dump_stack+0x1d8/0x2f8 [ 3420.061518][ T3472] dump_header+0xd8/0x960 [ 3420.065848][ T3472] oom_kill_process+0xcd/0x350 [ 3420.070616][ T3472] out_of_memory+0x5ce/0x890 [ 3420.075232][ T3472] ? unregister_oom_notifier+0x20/0x20 [ 3420.080684][ T3472] ? __kasan_check_read+0x11/0x20 [ 3420.085707][ T3472] try_charge+0x137d/0x1a60 [ 3420.090237][ T3472] ? __memcg_kmem_charge_memcg+0xf0/0xf0 [ 3420.095879][ T3472] ? __lock_acquire+0x4750/0x4750 [ 3420.100913][ T3472] ? rcu_lock_release+0x15/0x20 [ 3420.105760][ T3472] ? get_mem_cgroup_from_mm+0x15b/0x170 [ 3420.111303][ T3472] mem_cgroup_try_charge+0x20c/0x680 [ 3420.116587][ T3472] mem_cgroup_try_charge_delay+0x25/0xa0 [ 3420.122214][ T3472] handle_mm_fault+0x31f3/0x6070 [ 3420.127162][ T3472] ? finish_fault+0x230/0x230 [ 3420.131843][ T3472] ? __up_read+0x5b0/0x5b0 [ 3420.136255][ T3472] ? vmacache_find+0x566/0x5b0 [ 3420.141008][ T3472] ? vmacache_update+0xb7/0x120 [ 3420.145869][ T3472] do_user_addr_fault+0x589/0xaf0 [ 3420.150900][ T3472] __do_page_fault+0xd3/0x1f0 [ 3420.155572][ T3472] do_page_fault+0x99/0xb0 [ 3420.159982][ T3472] page_fault+0x39/0x40 [ 3420.164127][ T3472] RIP: 0033:0x41116f [ 3420.168012][ T3472] Code: 0f 84 c8 02 00 00 48 83 bd 78 ff ff ff 00 0f 84 f9 04 00 00 48 8b 95 68 ff ff ff 44 89 95 38 ff ff ff 4c 8d ac 10 00 f7 ff ff <49> 89 85 90 06 00 00 49 8d 85 10 03 00 00 49 89 95 98 06 00 00 41 [ 3420.187618][ T3472] RSP: 002b:00007ffe3df91b00 EFLAGS: 00010206 [ 3420.193677][ T3472] RAX: 00007f668f209000 RBX: 0000000000020000 RCX: 000000000045987a [ 3420.201691][ T3472] RDX: 0000000000021000 RSI: 0000000000021000 RDI: 0000000000000000 [ 3420.209661][ T3472] RBP: 00007ffe3df91be0 R08: ffffffffffffffff R09: 0000000000000000 [ 3420.218167][ T3472] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffe3df91cd0 [ 3420.226152][ T3472] R13: 00007f668f229700 R14: 0000000000000001 R15: 000000000075bfd4 [ 3420.235219][ T3472] memory: usage 85908kB, limit 0kB, failcnt 14 [ 3420.241444][ T3472] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3420.249895][ T3472] Memory cgroup stats for /syz2: [ 3420.249983][ T3472] anon 64159744 [ 3420.249983][ T3472] file 155648 [ 3420.249983][ T3472] kernel_stack 983040 [ 3420.249983][ T3472] slab 18493440 [ 3420.249983][ T3472] sock 0 [ 3420.249983][ T3472] shmem 126976 [ 3420.249983][ T3472] file_mapped 0 [ 3420.249983][ T3472] file_dirty 0 [ 3420.249983][ T3472] file_writeback 0 [ 3420.249983][ T3472] anon_thp 60817408 [ 3420.249983][ T3472] inactive_anon 98304 [ 3420.249983][ T3472] active_anon 64163840 [ 3420.249983][ T3472] inactive_file 0 [ 3420.249983][ T3472] active_file 0 [ 3420.249983][ T3472] unevictable 131072 [ 3420.249983][ T3472] slab_reclaimable 5406720 [ 3420.249983][ T3472] slab_unreclaimable 13086720 [ 3420.249983][ T3472] pgfault 501930 [ 3420.249983][ T3472] pgmajfault 0 [ 3420.249983][ T3472] workingset_refault 0 [ 3420.249983][ T3472] workingset_activate 0 [ 3420.249983][ T3472] workingset_nodereclaim 0 [ 3420.249983][ T3472] pgrefill 35 [ 3420.249983][ T3472] pgscan 0 [ 3420.249983][ T3472] pgsteal 0 [ 3420.249983][ T3472] pgactivate 0 [ 3420.346344][ T3472] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=7708,uid=0 [ 3420.361907][ T3472] Memory cgroup out of memory: Killed process 7708 (syz-executor.2) total-vm:72704kB, anon-rss:2204kB, file-rss:35812kB, shmem-rss:0kB [ 3420.378174][ T1056] oom_reaper: reaped process 7708 (syz-executor.2), now anon-rss:0kB, file-rss:34852kB, shmem-rss:0kB [ 3420.385792][ T3475] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3420.403058][ T3475] CPU: 1 PID: 3475 Comm: syz-executor.2 Not tainted 5.3.0-rc1+ #49 [ 3420.410956][ T3475] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3420.421010][ T3475] Call Trace: [ 3420.424283][ T3475] dump_stack+0x1d8/0x2f8 [ 3420.428590][ T3475] dump_header+0xd8/0x960 [ 3420.432915][ T3475] oom_kill_process+0xcd/0x350 [ 3420.437670][ T3475] out_of_memory+0x5ce/0x890 [ 3420.442249][ T3475] ? unregister_oom_notifier+0x20/0x20 [ 3420.447693][ T3475] ? _raw_spin_unlock_irqrestore+0xbc/0xe0 [ 3420.453519][ T3475] memory_max_write+0x537/0x6a0 [ 3420.458375][ T3475] ? lockdep_hardirqs_on+0x3c5/0x7d0 [ 3420.463675][ T3475] ? memory_max_show+0xa0/0xa0 [ 3420.469113][ T3475] ? memory_max_show+0xa0/0xa0 [ 3420.473966][ T3475] ? cgroup_file_write+0x1a6/0x6e0 [ 3420.479099][ T3475] ? cgroup_file_write+0x267/0x6e0 [ 3420.484230][ T3475] ? memory_max_show+0xa0/0xa0 [ 3420.488984][ T3475] cgroup_file_write+0x27b/0x6e0 [ 3420.493920][ T3475] ? cgroup_seqfile_stop+0xc0/0xc0 [ 3420.499037][ T3475] ? cgroup_seqfile_stop+0xc0/0xc0 [ 3420.504153][ T3475] kernfs_fop_write+0x3e4/0x4f0 [ 3420.508981][ T3475] ? kernfs_fop_read+0x580/0x580 [ 3420.513927][ T3475] __vfs_write+0xf9/0x7d0 [ 3420.518259][ T3475] ? __kernel_write+0x350/0x350 [ 3420.523103][ T3475] ? __sb_start_write+0x403/0x4c0 [ 3420.528102][ T3475] ? __kasan_check_read+0x11/0x20 [ 3420.533100][ T3475] vfs_write+0x275/0x590 [ 3420.537319][ T3475] ksys_write+0x16b/0x2a0 [ 3420.541644][ T3475] ? __ia32_sys_read+0x90/0x90 [ 3420.546394][ T3475] ? retint_kernel+0x2b/0x2b [ 3420.550985][ T3475] __x64_sys_write+0x7b/0x90 [ 3420.555581][ T3475] do_syscall_64+0xfe/0x140 [ 3420.560058][ T3475] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3420.565925][ T3475] RIP: 0033:0x459829 [ 3420.569808][ T3475] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3420.589411][ T3475] RSP: 002b:00007f668f249c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3420.597793][ T3475] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829 [ 3420.605743][ T3475] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 3420.613693][ T3475] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3420.621642][ T3475] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f668f24a6d4 [ 3420.629598][ T3475] R13: 00000000004c9774 R14: 00000000004e0b70 R15: 00000000ffffffff [ 3420.638148][ T3475] memory: usage 83564kB, limit 0kB, failcnt 20 [ 3420.644405][ T3475] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3420.651247][ T3475] Memory cgroup stats for /syz2: [ 3420.651483][ T3475] anon 61939712 [ 3420.651483][ T3475] file 155648 [ 3420.651483][ T3475] kernel_stack 983040 [ 3420.651483][ T3475] slab 17797120 [ 3420.651483][ T3475] sock 0 [ 3420.651483][ T3475] shmem 126976 [ 3420.651483][ T3475] file_mapped 0 [ 3420.651483][ T3475] file_dirty 0 [ 3420.651483][ T3475] file_writeback 0 [ 3420.651483][ T3475] anon_thp 58720256 [ 3420.651483][ T3475] inactive_anon 98304 [ 3420.651483][ T3475] active_anon 61943808 [ 3420.651483][ T3475] inactive_file 0 [ 3420.651483][ T3475] active_file 0 [ 3420.651483][ T3475] unevictable 131072 [ 3420.651483][ T3475] slab_reclaimable 5271552 [ 3420.651483][ T3475] slab_unreclaimable 12525568 [ 3420.651483][ T3475] pgfault 501930 [ 3420.651483][ T3475] pgmajfault 0 [ 3420.651483][ T3475] workingset_refault 0 [ 3420.651483][ T3475] workingset_activate 0 [ 3420.651483][ T3475] workingset_nodereclaim 0 [ 3420.651483][ T3475] pgrefill 35 [ 3420.651483][ T3475] pgscan 0 [ 3420.651483][ T3475] pgsteal 0 [ 3420.651483][ T3475] pgactivate 0 [ 3420.748813][ T3475] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=9530,uid=0 [ 3420.765883][ T3475] Memory cgroup out of memory: Killed process 9530 (syz-executor.2) total-vm:72572kB, anon-rss:2196kB, file-rss:35816kB, shmem-rss:0kB [ 3420.782306][ T1056] oom_reaper: reaped process 9530 (syz-executor.2), now anon-rss:0kB, file-rss:34856kB, shmem-rss:0kB [ 3420.787148][ T3472] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3420.809796][ T3472] CPU: 0 PID: 3472 Comm: syz-executor.2 Not tainted 5.3.0-rc1+ #49 [ 3420.817688][ T3472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3420.827720][ T3472] Call Trace: [ 3420.830990][ T3472] dump_stack+0x1d8/0x2f8 [ 3420.835300][ T3472] dump_header+0xd8/0x960 [ 3420.839609][ T3472] oom_kill_process+0xcd/0x350 [ 3420.844354][ T3472] out_of_memory+0x5ce/0x890 [ 3420.848923][ T3472] ? unregister_oom_notifier+0x20/0x20 [ 3420.854360][ T3472] ? __kasan_check_read+0x11/0x20 [ 3420.859362][ T3472] try_charge+0x137d/0x1a60 [ 3420.863856][ T3472] ? __memcg_kmem_charge_memcg+0xf0/0xf0 [ 3420.869486][ T3472] ? __lock_acquire+0x4750/0x4750 [ 3420.874524][ T3472] ? rcu_lock_release+0x15/0x20 [ 3420.879353][ T3472] ? get_mem_cgroup_from_mm+0x15b/0x170 [ 3420.884876][ T3472] mem_cgroup_try_charge+0x20c/0x680 [ 3420.890143][ T3472] mem_cgroup_try_charge_delay+0x25/0xa0 [ 3420.895752][ T3472] handle_mm_fault+0x31f3/0x6070 [ 3420.900687][ T3472] ? finish_fault+0x230/0x230 [ 3420.905372][ T3472] ? __up_read+0x5b0/0x5b0 [ 3420.909781][ T3472] ? vmacache_find+0x566/0x5b0 [ 3420.914526][ T3472] ? vmacache_update+0xb7/0x120 [ 3420.919355][ T3472] do_user_addr_fault+0x589/0xaf0 [ 3420.924364][ T3472] __do_page_fault+0xd3/0x1f0 [ 3420.929031][ T3472] do_page_fault+0x99/0xb0 [ 3420.933426][ T3472] page_fault+0x39/0x40 [ 3420.937558][ T3472] RIP: 0033:0x41116f [ 3420.941429][ T3472] Code: 0f 84 c8 02 00 00 48 83 bd 78 ff ff ff 00 0f 84 f9 04 00 00 48 8b 95 68 ff ff ff 44 89 95 38 ff ff ff 4c 8d ac 10 00 f7 ff ff <49> 89 85 90 06 00 00 49 8d 85 10 03 00 00 49 89 95 98 06 00 00 41 [ 3420.961012][ T3472] RSP: 002b:00007ffe3df91b00 EFLAGS: 00010206 [ 3420.967057][ T3472] RAX: 00007f668f209000 RBX: 0000000000020000 RCX: 000000000045987a [ 3420.975040][ T3472] RDX: 0000000000021000 RSI: 0000000000021000 RDI: 0000000000000000 [ 3420.982990][ T3472] RBP: 00007ffe3df91be0 R08: ffffffffffffffff R09: 0000000000000000 [ 3420.990942][ T3472] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffe3df91cd0 [ 3420.998897][ T3472] R13: 00007f668f229700 R14: 0000000000000001 R15: 000000000075bfd4 [ 3421.009150][ T3472] memory: usage 80560kB, limit 0kB, failcnt 20 [ 3421.015362][ T3472] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3421.022197][ T3472] Memory cgroup stats for /syz2: [ 3421.022249][ T3472] anon 59723776 [ 3421.022249][ T3472] file 155648 [ 3421.022249][ T3472] kernel_stack 917504 [ 3421.022249][ T3472] slab 17797120 [ 3421.022249][ T3472] sock 0 [ 3421.022249][ T3472] shmem 126976 [ 3421.022249][ T3472] file_mapped 0 [ 3421.022249][ T3472] file_dirty 0 [ 3421.022249][ T3472] file_writeback 0 [ 3421.022249][ T3472] anon_thp 56623104 [ 3421.022249][ T3472] inactive_anon 98304 [ 3421.022249][ T3472] active_anon 59727872 [ 3421.022249][ T3472] inactive_file 0 [ 3421.022249][ T3472] active_file 0 [ 3421.022249][ T3472] unevictable 131072 [ 3421.022249][ T3472] slab_reclaimable 5271552 [ 3421.022249][ T3472] slab_unreclaimable 12525568 [ 3421.022249][ T3472] pgfault 501930 [ 3421.022249][ T3472] pgmajfault 0 [ 3421.022249][ T3472] workingset_refault 0 [ 3421.022249][ T3472] workingset_activate 0 [ 3421.022249][ T3472] workingset_nodereclaim 0 [ 3421.022249][ T3472] pgrefill 35 [ 3421.022249][ T3472] pgscan 0 [ 3421.022249][ T3472] pgsteal 0 [ 3421.022249][ T3472] pgactivate 0 [ 3421.118556][ T3472] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=4033,uid=0 [ 3421.134778][ T3472] Memory cgroup out of memory: Killed process 4033 (syz-executor.2) total-vm:72572kB, anon-rss:2196kB, file-rss:35816kB, shmem-rss:0kB [ 3421.152121][ T3472] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3421.155629][ T1056] oom_reaper: reaped process 4033 (syz-executor.2), now anon-rss:0kB, file-rss:34856kB, shmem-rss:0kB [ 3421.162457][ T3472] CPU: 0 PID: 3472 Comm: syz-executor.2 Not tainted 5.3.0-rc1+ #49 [ 3421.181112][ T3472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3421.191173][ T3472] Call Trace: [ 3421.194463][ T3472] dump_stack+0x1d8/0x2f8 [ 3421.198833][ T3472] dump_header+0xd8/0x960 [ 3421.203174][ T3472] oom_kill_process+0xcd/0x350 [ 3421.207942][ T3472] out_of_memory+0x5ce/0x890 [ 3421.212529][ T3472] ? unregister_oom_notifier+0x20/0x20 [ 3421.217993][ T3472] ? __kasan_check_read+0x11/0x20 [ 3421.223017][ T3472] try_charge+0x137d/0x1a60 [ 3421.227539][ T3472] ? __memcg_kmem_charge_memcg+0xf0/0xf0 [ 3421.233183][ T3472] ? __lock_acquire+0x4750/0x4750 [ 3421.238226][ T3472] ? rcu_lock_release+0x15/0x20 [ 3421.243082][ T3472] ? get_mem_cgroup_from_mm+0x15b/0x170 [ 3421.248632][ T3472] mem_cgroup_try_charge+0x20c/0x680 [ 3421.253935][ T3472] mem_cgroup_try_charge_delay+0x25/0xa0 [ 3421.259572][ T3472] handle_mm_fault+0x31f3/0x6070 [ 3421.264551][ T3472] ? finish_fault+0x230/0x230 [ 3421.269235][ T3472] ? __up_read+0x5b0/0x5b0 [ 3421.273647][ T3472] ? vmacache_find+0x566/0x5b0 [ 3421.278404][ T3472] ? vmacache_update+0xb7/0x120 [ 3421.283266][ T3472] do_user_addr_fault+0x589/0xaf0 [ 3421.288298][ T3472] __do_page_fault+0xd3/0x1f0 [ 3421.292974][ T3472] do_page_fault+0x99/0xb0 [ 3421.297389][ T3472] page_fault+0x39/0x40 [ 3421.301541][ T3472] RIP: 0033:0x41116f [ 3421.305429][ T3472] Code: 0f 84 c8 02 00 00 48 83 bd 78 ff ff ff 00 0f 84 f9 04 00 00 48 8b 95 68 ff ff ff 44 89 95 38 ff ff ff 4c 8d ac 10 00 f7 ff ff <49> 89 85 90 06 00 00 49 8d 85 10 03 00 00 49 89 95 98 06 00 00 41 [ 3421.325399][ T3472] RSP: 002b:00007ffe3df91b00 EFLAGS: 00010206 [ 3421.331460][ T3472] RAX: 00007f668f209000 RBX: 0000000000020000 RCX: 000000000045987a [ 3421.339438][ T3472] RDX: 0000000000021000 RSI: 0000000000021000 RDI: 0000000000000000 [ 3421.347403][ T3472] RBP: 00007ffe3df91be0 R08: ffffffffffffffff R09: 0000000000000000 [ 3421.355370][ T3472] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffe3df91cd0 [ 3421.363345][ T3472] R13: 00007f668f229700 R14: 0000000000000001 R15: 000000000075bfd4 [ 3421.372452][ T3472] memory: usage 78216kB, limit 0kB, failcnt 26 [ 3421.378687][ T3472] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3421.385641][ T3472] Memory cgroup stats for /syz2: [ 3421.385717][ T3472] anon 57503744 [ 3421.385717][ T3472] file 155648 [ 3421.385717][ T3472] kernel_stack 917504 [ 3421.385717][ T3472] slab 17797120 [ 3421.385717][ T3472] sock 0 [ 3421.385717][ T3472] shmem 126976 [ 3421.385717][ T3472] file_mapped 0 [ 3421.385717][ T3472] file_dirty 0 [ 3421.385717][ T3472] file_writeback 0 [ 3421.385717][ T3472] anon_thp 54525952 [ 3421.385717][ T3472] inactive_anon 98304 [ 3421.385717][ T3472] active_anon 57507840 [ 3421.385717][ T3472] inactive_file 0 [ 3421.385717][ T3472] active_file 0 [ 3421.385717][ T3472] unevictable 131072 [ 3421.385717][ T3472] slab_reclaimable 5271552 [ 3421.385717][ T3472] slab_unreclaimable 12525568 [ 3421.385717][ T3472] pgfault 501930 [ 3421.385717][ T3472] pgmajfault 0 [ 3421.385717][ T3472] workingset_refault 0 [ 3421.385717][ T3472] workingset_activate 0 [ 3421.385717][ T3472] workingset_nodereclaim 0 [ 3421.385717][ T3472] pgrefill 35 [ 3421.385717][ T3472] pgscan 0 [ 3421.385717][ T3472] pgsteal 0 [ 3421.385717][ T3472] pgactivate 0 [ 3421.482296][ T3472] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=11731,uid=0 [ 3421.498748][ T3472] Memory cgroup out of memory: Killed process 11731 (syz-executor.2) total-vm:72704kB, anon-rss:2204kB, file-rss:35796kB, shmem-rss:0kB [ 3421.514565][ T1056] oom_reaper: reaped process 11731 (syz-executor.2), now anon-rss:0kB, file-rss:34836kB, shmem-rss:0kB [ 3421.516415][ T3475] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3421.536446][ T3475] CPU: 0 PID: 3475 Comm: syz-executor.2 Not tainted 5.3.0-rc1+ #49 [ 3421.544341][ T3475] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3421.554386][ T3475] Call Trace: [ 3421.557655][ T3475] dump_stack+0x1d8/0x2f8 [ 3421.561965][ T3475] dump_header+0xd8/0x960 [ 3421.566286][ T3475] oom_kill_process+0xcd/0x350 [ 3421.571044][ T3475] out_of_memory+0x5ce/0x890 [ 3421.575612][ T3475] ? unregister_oom_notifier+0x20/0x20 [ 3421.581047][ T3475] ? _raw_spin_unlock_irqrestore+0xbc/0xe0 [ 3421.587456][ T3475] memory_max_write+0x537/0x6a0 [ 3421.592298][ T3475] ? lockdep_hardirqs_on+0x3c5/0x7d0 [ 3421.597565][ T3475] ? memory_max_show+0xa0/0xa0 [ 3421.602332][ T3475] ? memory_max_show+0xa0/0xa0 [ 3421.607093][ T3475] ? cgroup_file_write+0x1a6/0x6e0 [ 3421.612191][ T3475] ? cgroup_file_write+0x267/0x6e0 [ 3421.617280][ T3475] ? memory_max_show+0xa0/0xa0 [ 3421.622019][ T3475] cgroup_file_write+0x27b/0x6e0 [ 3421.626946][ T3475] ? cgroup_seqfile_stop+0xc0/0xc0 [ 3421.632053][ T3475] ? cgroup_seqfile_stop+0xc0/0xc0 [ 3421.637149][ T3475] kernfs_fop_write+0x3e4/0x4f0 [ 3421.641989][ T3475] ? kernfs_fop_read+0x580/0x580 [ 3421.646918][ T3475] __vfs_write+0xf9/0x7d0 [ 3421.651239][ T3475] ? __kernel_write+0x350/0x350 [ 3421.656083][ T3475] ? __sb_start_write+0x403/0x4c0 [ 3421.661146][ T3475] ? __kasan_check_read+0x11/0x20 [ 3421.666157][ T3475] vfs_write+0x275/0x590 [ 3421.670409][ T3475] ksys_write+0x16b/0x2a0 [ 3421.674736][ T3475] ? __ia32_sys_read+0x90/0x90 [ 3421.679488][ T3475] ? retint_kernel+0x2b/0x2b [ 3421.684079][ T3475] __x64_sys_write+0x7b/0x90 [ 3421.688670][ T3475] do_syscall_64+0xfe/0x140 [ 3421.693171][ T3475] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3421.699041][ T3475] RIP: 0033:0x459829 [ 3421.702911][ T3475] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3421.722507][ T3475] RSP: 002b:00007f668f249c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3421.730911][ T3475] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829 [ 3421.738872][ T3475] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 3421.746815][ T3475] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3421.754777][ T3475] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f668f24a6d4 [ 3421.762731][ T3475] R13: 00000000004c9774 R14: 00000000004e0b70 R15: 00000000ffffffff [ 3421.771779][ T3475] memory: usage 75820kB, limit 0kB, failcnt 41 [ 3421.778096][ T3475] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3421.785042][ T3475] Memory cgroup stats for /syz2: [ 3421.785194][ T3475] anon 55291904 [ 3421.785194][ T3475] file 155648 [ 3421.785194][ T3475] kernel_stack 851968 [ 3421.785194][ T3475] slab 17797120 [ 3421.785194][ T3475] sock 0 [ 3421.785194][ T3475] shmem 126976 [ 3421.785194][ T3475] file_mapped 0 [ 3421.785194][ T3475] file_dirty 0 [ 3421.785194][ T3475] file_writeback 0 [ 3421.785194][ T3475] anon_thp 52428800 [ 3421.785194][ T3475] inactive_anon 98304 [ 3421.785194][ T3475] active_anon 55296000 [ 3421.785194][ T3475] inactive_file 0 [ 3421.785194][ T3475] active_file 0 [ 3421.785194][ T3475] unevictable 131072 [ 3421.785194][ T3475] slab_reclaimable 5271552 [ 3421.785194][ T3475] slab_unreclaimable 12525568 [ 3421.785194][ T3475] pgfault 501930 [ 3421.785194][ T3475] pgmajfault 0 [ 3421.785194][ T3475] workingset_refault 0 [ 3421.785194][ T3475] workingset_activate 0 [ 3421.785194][ T3475] workingset_nodereclaim 0 [ 3421.785194][ T3475] pgrefill 35 [ 3421.785194][ T3475] pgscan 0 [ 3421.785194][ T3475] pgsteal 0 [ 3421.785194][ T3475] pgactivate 0 [ 3421.881442][ T3475] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=9209,uid=0 [ 3421.897740][ T3475] Memory cgroup out of memory: Killed process 9209 (syz-executor.2) total-vm:72572kB, anon-rss:2196kB, file-rss:35804kB, shmem-rss:0kB [ 3421.916010][ T1056] oom_reaper: reaped process 9209 (syz-executor.2), now anon-rss:0kB, file-rss:34844kB, shmem-rss:0kB [ 3421.927398][ T8475] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 3421.937756][ T8475] CPU: 1 PID: 8475 Comm: syz-executor.2 Not tainted 5.3.0-rc1+ #49 [ 3421.945654][ T8475] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3421.955715][ T8475] Call Trace: [ 3421.959008][ T8475] dump_stack+0x1d8/0x2f8 [ 3421.963313][ T8475] dump_header+0xd8/0x960 [ 3421.967619][ T8475] oom_kill_process+0xcd/0x350 [ 3421.972373][ T8475] out_of_memory+0x5ce/0x890 [ 3421.976941][ T8475] ? unregister_oom_notifier+0x20/0x20 [ 3421.982374][ T8475] ? __kasan_check_read+0x11/0x20 [ 3421.987392][ T8475] try_charge+0x137d/0x1a60 [ 3421.991886][ T8475] ? __memcg_kmem_charge_memcg+0xf0/0xf0 [ 3421.997495][ T8475] ? __lock_acquire+0x4750/0x4750 [ 3422.002498][ T8475] ? rcu_lock_release+0x15/0x20 [ 3422.007344][ T8475] ? get_mem_cgroup_from_mm+0x15b/0x170 [ 3422.012898][ T8475] mem_cgroup_try_charge+0x20c/0x680 [ 3422.018180][ T8475] mem_cgroup_try_charge_delay+0x25/0xa0 [ 3422.023793][ T8475] wp_page_copy+0x394/0x1960 [ 3422.028365][ T8475] ? rcu_lock_release+0x30/0x30 [ 3422.033190][ T8475] ? __lock_acquire+0x4750/0x4750 [ 3422.038208][ T8475] ? __kasan_check_read+0x11/0x20 [ 3422.043223][ T8475] ? do_raw_spin_unlock+0x49/0x260 [ 3422.048343][ T8475] do_wp_page+0x2c9/0x1ce0 [ 3422.052752][ T8475] ? __rwlock_init+0x130/0x130 [ 3422.057600][ T8475] ? count_memcg_event_mm+0x300/0x300 [ 3422.062974][ T8475] handle_mm_fault+0x2bd9/0x6070 [ 3422.067922][ T8475] ? finish_fault+0x230/0x230 [ 3422.072595][ T8475] ? __up_read+0x5b0/0x5b0 [ 3422.077010][ T8475] ? __x64_sys_newfstat+0x151/0x1b0 [ 3422.082177][ T8475] ? vmacache_find+0x251/0x5b0 [ 3422.086922][ T8475] do_user_addr_fault+0x589/0xaf0 [ 3422.091937][ T8475] __do_page_fault+0xd3/0x1f0 [ 3422.096599][ T8475] do_page_fault+0x99/0xb0 [ 3422.100995][ T8475] page_fault+0x39/0x40 [ 3422.105134][ T8475] RIP: 0033:0x43090a [ 3422.109029][ T8475] Code: 48 29 e8 31 c9 48 81 fb 40 56 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 48 89 4a 08 <48> 89 46 08 48 8d 4a 10 8b 05 5c 46 64 00 85 c0 0f 84 3a f7 ff ff [ 3422.128632][ T8475] RSP: 002b:00007ffe3df91c00 EFLAGS: 00010206 [ 3422.134676][ T8475] RAX: 0000000000018691 RBX: 0000000000715640 RCX: 0000000000008041 [ 3422.142648][ T8475] RDX: 0000555556f6f930 RSI: 0000555556f77970 RDI: 0000000000000003 [ 3422.150600][ T8475] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000555556f6e940 [ 3422.158553][ T8475] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000715698 [ 3422.166516][ T8475] R13: 0000000000715698 R14: 0000000000342986 R15: 0000000000002710 [ 3422.176434][ T8475] memory: usage 71172kB, limit 0kB, failcnt 41 [ 3422.182606][ T8475] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3422.189533][ T8475] Memory cgroup stats for /syz2: [ 3422.189639][ T8475] anon 51044352 [ 3422.189639][ T8475] file 155648 [ 3422.189639][ T8475] kernel_stack 786432 [ 3422.189639][ T8475] slab 17797120 [ 3422.189639][ T8475] sock 0 [ 3422.189639][ T8475] shmem 126976 [ 3422.189639][ T8475] file_mapped 0 [ 3422.189639][ T8475] file_dirty 0 [ 3422.189639][ T8475] file_writeback 0 [ 3422.189639][ T8475] anon_thp 48234496 [ 3422.189639][ T8475] inactive_anon 98304 [ 3422.189639][ T8475] active_anon 50978816 [ 3422.189639][ T8475] inactive_file 0 [ 3422.189639][ T8475] active_file 0 [ 3422.189639][ T8475] unevictable 131072 [ 3422.189639][ T8475] slab_reclaimable 5271552 [ 3422.189639][ T8475] slab_unreclaimable 12525568 [ 3422.189639][ T8475] pgfault 501930 [ 3422.189639][ T8475] pgmajfault 0 [ 3422.189639][ T8475] workingset_refault 0 [ 3422.189639][ T8475] workingset_activate 0 [ 3422.189639][ T8475] workingset_nodereclaim 0 [ 3422.189639][ T8475] pgrefill 35 [ 3422.189639][ T8475] pgscan 0 [ 3422.189639][ T8475] pgsteal 0 [ 3422.189639][ T8475] pgactivate 0 [ 3422.287006][ T8475] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=14224,uid=0 [ 3422.302654][ T8475] Memory cgroup out of memory: Killed process 14224 (syz-executor.2) total-vm:72572kB, anon-rss:2196kB, file-rss:35796kB, shmem-rss:0kB [ 3422.318347][ T1056] oom_reaper: reaped process 14224 (syz-executor.2), now anon-rss:0kB, file-rss:34836kB, shmem-rss:0kB [ 3422.322456][ T8475] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 3422.341042][ T8475] CPU: 0 PID: 8475 Comm: syz-executor.2 Not tainted 5.3.0-rc1+ #49 [ 3422.348943][ T8475] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3422.358990][ T8475] Call Trace: [ 3422.362263][ T8475] dump_stack+0x1d8/0x2f8 [ 3422.366573][ T8475] dump_header+0xd8/0x960 [ 3422.370887][ T8475] oom_kill_process+0xcd/0x350 [ 3422.375643][ T8475] out_of_memory+0x5ce/0x890 [ 3422.380222][ T8475] ? unregister_oom_notifier+0x20/0x20 [ 3422.385670][ T8475] ? __kasan_check_read+0x11/0x20 [ 3422.390683][ T8475] try_charge+0x137d/0x1a60 [ 3422.395198][ T8475] ? __memcg_kmem_charge_memcg+0xf0/0xf0 [ 3422.400832][ T8475] ? __lock_acquire+0x4750/0x4750 [ 3422.405853][ T8475] ? rcu_lock_release+0x15/0x20 [ 3422.410721][ T8475] ? get_mem_cgroup_from_mm+0x15b/0x170 [ 3422.416249][ T8475] mem_cgroup_try_charge+0x20c/0x680 [ 3422.421526][ T8475] mem_cgroup_try_charge_delay+0x25/0xa0 [ 3422.427138][ T8475] wp_page_copy+0x394/0x1960 [ 3422.431707][ T8475] ? rcu_lock_release+0x30/0x30 [ 3422.436566][ T8475] ? __lock_acquire+0x4750/0x4750 [ 3422.441584][ T8475] ? __kasan_check_read+0x11/0x20 [ 3422.446600][ T8475] ? do_raw_spin_unlock+0x49/0x260 [ 3422.451687][ T8475] do_wp_page+0x2c9/0x1ce0 [ 3422.456115][ T8475] ? __rwlock_init+0x130/0x130 [ 3422.460901][ T8475] ? count_memcg_event_mm+0x300/0x300 [ 3422.466268][ T8475] handle_mm_fault+0x2bd9/0x6070 [ 3422.471200][ T8475] ? finish_fault+0x230/0x230 [ 3422.475873][ T8475] ? __up_read+0x5b0/0x5b0 [ 3422.480275][ T8475] ? __x64_sys_newfstat+0x151/0x1b0 [ 3422.485463][ T8475] ? vmacache_find+0x251/0x5b0 [ 3422.490222][ T8475] do_user_addr_fault+0x589/0xaf0 [ 3422.495267][ T8475] __do_page_fault+0xd3/0x1f0 [ 3422.499968][ T8475] do_page_fault+0x99/0xb0 [ 3422.504385][ T8475] page_fault+0x39/0x40 [ 3422.508537][ T8475] RIP: 0033:0x43090a [ 3422.512404][ T8475] Code: 48 29 e8 31 c9 48 81 fb 40 56 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 48 89 4a 08 <48> 89 46 08 48 8d 4a 10 8b 05 5c 46 64 00 85 c0 0f 84 3a f7 ff ff [ 3422.531992][ T8475] RSP: 002b:00007ffe3df91c00 EFLAGS: 00010206 [ 3422.538036][ T8475] RAX: 0000000000018691 RBX: 0000000000715640 RCX: 0000000000008041 [ 3422.545994][ T8475] RDX: 0000555556f6f930 RSI: 0000555556f77970 RDI: 0000000000000003 [ 3422.553966][ T8475] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000555556f6e940 [ 3422.561937][ T8475] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000715698 [ 3422.569896][ T8475] R13: 0000000000715698 R14: 0000000000342986 R15: 0000000000002710 [ 3422.579248][ T8475] memory: usage 68840kB, limit 0kB, failcnt 47 [ 3422.585523][ T8475] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3422.592361][ T8475] Memory cgroup stats for /syz2: [ 3422.592415][ T8475] anon 48836608 [ 3422.592415][ T8475] file 155648 [ 3422.592415][ T8475] kernel_stack 786432 [ 3422.592415][ T8475] slab 17797120 [ 3422.592415][ T8475] sock 0 [ 3422.592415][ T8475] shmem 126976 [ 3422.592415][ T8475] file_mapped 0 [ 3422.592415][ T8475] file_dirty 0 [ 3422.592415][ T8475] file_writeback 0 [ 3422.592415][ T8475] anon_thp 46137344 [ 3422.592415][ T8475] inactive_anon 98304 [ 3422.592415][ T8475] active_anon 48771072 [ 3422.592415][ T8475] inactive_file 0 [ 3422.592415][ T8475] active_file 0 [ 3422.592415][ T8475] unevictable 131072 [ 3422.592415][ T8475] slab_reclaimable 5271552 [ 3422.592415][ T8475] slab_unreclaimable 12525568 [ 3422.592415][ T8475] pgfault 501930 [ 3422.592415][ T8475] pgmajfault 0 [ 3422.592415][ T8475] workingset_refault 0 [ 3422.592415][ T8475] workingset_activate 0 [ 3422.592415][ T8475] workingset_nodereclaim 0 [ 3422.592415][ T8475] pgrefill 35 [ 3422.592415][ T8475] pgscan 0 [ 3422.592415][ T8475] pgsteal 0 [ 3422.592415][ T8475] pgactivate 0 [ 3422.688873][ T8475] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=14025,uid=0 [ 3422.704461][ T8475] Memory cgroup out of memory: Killed process 14025 (syz-executor.2) total-vm:72572kB, anon-rss:2196kB, file-rss:35796kB, shmem-rss:0kB [ 3422.720430][ T1056] oom_reaper: reaped process 14025 (syz-executor.2), now anon-rss:0kB, file-rss:34836kB, shmem-rss:0kB [ 3422.731057][ T8475] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 3422.747289][ T8475] CPU: 1 PID: 8475 Comm: syz-executor.2 Not tainted 5.3.0-rc1+ #49 [ 3422.755210][ T8475] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3422.765368][ T8475] Call Trace: [ 3422.768645][ T8475] dump_stack+0x1d8/0x2f8 [ 3422.772953][ T8475] dump_header+0xd8/0x960 [ 3422.777288][ T8475] oom_kill_process+0xcd/0x350 [ 3422.782050][ T8475] out_of_memory+0x5ce/0x890 [ 3422.786634][ T8475] ? unregister_oom_notifier+0x20/0x20 [ 3422.792084][ T8475] ? __kasan_check_read+0x11/0x20 [ 3422.797097][ T8475] try_charge+0x137d/0x1a60 [ 3422.801629][ T8475] ? __memcg_kmem_charge_memcg+0xf0/0xf0 [ 3422.807257][ T8475] ? __lock_acquire+0x4750/0x4750 [ 3422.812275][ T8475] ? rcu_lock_release+0x15/0x20 [ 3422.817132][ T8475] ? get_mem_cgroup_from_mm+0x15b/0x170 [ 3422.822670][ T8475] mem_cgroup_try_charge+0x20c/0x680 [ 3422.827946][ T8475] mem_cgroup_try_charge_delay+0x25/0xa0 [ 3422.833596][ T8475] wp_page_copy+0x394/0x1960 [ 3422.838217][ T8475] ? rcu_lock_release+0x30/0x30 [ 3422.843060][ T8475] ? __lock_acquire+0x4750/0x4750 [ 3422.848090][ T8475] ? __kasan_check_read+0x11/0x20 [ 3422.853112][ T8475] ? do_raw_spin_unlock+0x49/0x260 [ 3422.858215][ T8475] do_wp_page+0x2c9/0x1ce0 [ 3422.862608][ T8475] ? __rwlock_init+0x130/0x130 [ 3422.867350][ T8475] ? count_memcg_event_mm+0x300/0x300 [ 3422.872699][ T8475] handle_mm_fault+0x2bd9/0x6070 [ 3422.877618][ T8475] ? finish_fault+0x230/0x230 [ 3422.882295][ T8475] ? __up_read+0x5b0/0x5b0 [ 3422.886721][ T8475] ? __x64_sys_newfstat+0x151/0x1b0 [ 3422.891906][ T8475] ? vmacache_find+0x251/0x5b0 [ 3422.896655][ T8475] do_user_addr_fault+0x589/0xaf0 [ 3422.901666][ T8475] __do_page_fault+0xd3/0x1f0 [ 3422.906329][ T8475] do_page_fault+0x99/0xb0 [ 3422.910723][ T8475] page_fault+0x39/0x40 [ 3422.914877][ T8475] RIP: 0033:0x43090a [ 3422.918750][ T8475] Code: 48 29 e8 31 c9 48 81 fb 40 56 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 48 89 4a 08 <48> 89 46 08 48 8d 4a 10 8b 05 5c 46 64 00 85 c0 0f 84 3a f7 ff ff [ 3422.938351][ T8475] RSP: 002b:00007ffe3df91c00 EFLAGS: 00010206 [ 3422.944420][ T8475] RAX: 0000000000018691 RBX: 0000000000715640 RCX: 0000000000008041 [ 3422.952397][ T8475] RDX: 0000555556f6f930 RSI: 0000555556f77970 RDI: 0000000000000003 [ 3422.960358][ T8475] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000555556f6e940 [ 3422.968325][ T8475] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000715698 [ 3422.976275][ T8475] R13: 0000000000715698 R14: 0000000000342986 R15: 0000000000002710 [ 3422.984890][ T8475] memory: usage 66492kB, limit 0kB, failcnt 53 [ 3422.991085][ T8475] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3422.998120][ T8475] Memory cgroup stats for /syz2: [ 3422.998198][ T8475] anon 46628864 [ 3422.998198][ T8475] file 155648 [ 3422.998198][ T8475] kernel_stack 720896 [ 3422.998198][ T8475] slab 17797120 [ 3422.998198][ T8475] sock 0 [ 3422.998198][ T8475] shmem 126976 [ 3422.998198][ T8475] file_mapped 0 [ 3422.998198][ T8475] file_dirty 0 [ 3422.998198][ T8475] file_writeback 0 [ 3422.998198][ T8475] anon_thp 44040192 [ 3422.998198][ T8475] inactive_anon 98304 [ 3422.998198][ T8475] active_anon 46563328 [ 3422.998198][ T8475] inactive_file 0 [ 3422.998198][ T8475] active_file 0 [ 3422.998198][ T8475] unevictable 131072 [ 3422.998198][ T8475] slab_reclaimable 5271552 [ 3422.998198][ T8475] slab_unreclaimable 12525568 [ 3422.998198][ T8475] pgfault 501930 [ 3422.998198][ T8475] pgmajfault 0 [ 3422.998198][ T8475] workingset_refault 0 [ 3422.998198][ T8475] workingset_activate 0 [ 3422.998198][ T8475] workingset_nodereclaim 0 [ 3422.998198][ T8475] pgrefill 35 [ 3422.998198][ T8475] pgscan 0 [ 3422.998198][ T8475] pgsteal 0 [ 3422.998198][ T8475] pgactivate 0 [ 3423.094510][ T8475] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=13577,uid=0 [ 3423.110039][ T8475] Memory cgroup out of memory: Killed process 13577 (syz-executor.2) total-vm:72572kB, anon-rss:2196kB, file-rss:35796kB, shmem-rss:0kB [ 3423.124832][ T1056] oom_reaper: reaped process 13577 (syz-executor.2), now anon-rss:0kB, file-rss:34836kB, shmem-rss:0kB [ 3423.129338][ T8475] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 3423.147496][ T8475] CPU: 0 PID: 8475 Comm: syz-executor.2 Not tainted 5.3.0-rc1+ #49 [ 3423.155413][ T8475] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3423.165483][ T8475] Call Trace: [ 3423.168757][ T8475] dump_stack+0x1d8/0x2f8 [ 3423.173090][ T8475] dump_header+0xd8/0x960 [ 3423.177411][ T8475] oom_kill_process+0xcd/0x350 [ 3423.182194][ T8475] out_of_memory+0x5ce/0x890 [ 3423.186769][ T8475] ? unregister_oom_notifier+0x20/0x20 [ 3423.192214][ T8475] ? __kasan_check_read+0x11/0x20 [ 3423.197232][ T8475] try_charge+0x137d/0x1a60 [ 3423.201761][ T8475] ? __memcg_kmem_charge_memcg+0xf0/0xf0 [ 3423.207392][ T8475] ? __lock_acquire+0x4750/0x4750 [ 3423.212394][ T8475] ? rcu_lock_release+0x15/0x20 [ 3423.217228][ T8475] ? get_mem_cgroup_from_mm+0x15b/0x170 [ 3423.222763][ T8475] mem_cgroup_try_charge+0x20c/0x680 [ 3423.228031][ T8475] mem_cgroup_try_charge_delay+0x25/0xa0 [ 3423.233651][ T8475] wp_page_copy+0x394/0x1960 [ 3423.238254][ T8475] ? rcu_lock_release+0x30/0x30 [ 3423.243134][ T8475] ? __lock_acquire+0x4750/0x4750 [ 3423.248140][ T8475] ? __kasan_check_read+0x11/0x20 [ 3423.253138][ T8475] ? do_raw_spin_unlock+0x49/0x260 [ 3423.258266][ T8475] do_wp_page+0x2c9/0x1ce0 [ 3423.262678][ T8475] ? __rwlock_init+0x130/0x130 [ 3423.267421][ T8475] ? count_memcg_event_mm+0x300/0x300 [ 3423.272773][ T8475] handle_mm_fault+0x2bd9/0x6070 [ 3423.277714][ T8475] ? finish_fault+0x230/0x230 [ 3423.282384][ T8475] ? __up_read+0x5b0/0x5b0 [ 3423.286776][ T8475] ? __x64_sys_newfstat+0x151/0x1b0 [ 3423.291946][ T8475] ? vmacache_find+0x251/0x5b0 [ 3423.296707][ T8475] do_user_addr_fault+0x589/0xaf0 [ 3423.301722][ T8475] __do_page_fault+0xd3/0x1f0 [ 3423.306398][ T8475] do_page_fault+0x99/0xb0 [ 3423.310796][ T8475] page_fault+0x39/0x40 [ 3423.314948][ T8475] RIP: 0033:0x43090a [ 3423.318832][ T8475] Code: 48 29 e8 31 c9 48 81 fb 40 56 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 48 89 4a 08 <48> 89 46 08 48 8d 4a 10 8b 05 5c 46 64 00 85 c0 0f 84 3a f7 ff ff [ 3423.338745][ T8475] RSP: 002b:00007ffe3df91c00 EFLAGS: 00010206 [ 3423.344805][ T8475] RAX: 0000000000018691 RBX: 0000000000715640 RCX: 0000000000008041 [ 3423.352752][ T8475] RDX: 0000555556f6f930 RSI: 0000555556f77970 RDI: 0000000000000003 [ 3423.360701][ T8475] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000555556f6e940 [ 3423.368651][ T8475] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000715698 [ 3423.376625][ T8475] R13: 0000000000715698 R14: 0000000000342986 R15: 0000000000002710 [ 3423.385669][ T8475] memory: usage 64164kB, limit 0kB, failcnt 59 [ 3423.391842][ T8475] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3423.398782][ T8475] Memory cgroup stats for /syz2: [ 3423.398869][ T8475] anon 44408832 [ 3423.398869][ T8475] file 155648 [ 3423.398869][ T8475] kernel_stack 655360 [ 3423.398869][ T8475] slab 17797120 [ 3423.398869][ T8475] sock 0 [ 3423.398869][ T8475] shmem 126976 [ 3423.398869][ T8475] file_mapped 0 [ 3423.398869][ T8475] file_dirty 0 [ 3423.398869][ T8475] file_writeback 0 [ 3423.398869][ T8475] anon_thp 41943040 [ 3423.398869][ T8475] inactive_anon 98304 [ 3423.398869][ T8475] active_anon 44412928 [ 3423.398869][ T8475] inactive_file 0 [ 3423.398869][ T8475] active_file 0 [ 3423.398869][ T8475] unevictable 131072 [ 3423.398869][ T8475] slab_reclaimable 5271552 [ 3423.398869][ T8475] slab_unreclaimable 12525568 [ 3423.398869][ T8475] pgfault 501930 [ 3423.398869][ T8475] pgmajfault 0 [ 3423.398869][ T8475] workingset_refault 0 [ 3423.398869][ T8475] workingset_activate 0 [ 3423.398869][ T8475] workingset_nodereclaim 0 [ 3423.398869][ T8475] pgrefill 35 [ 3423.398869][ T8475] pgscan 0 [ 3423.398869][ T8475] pgsteal 0 [ 3423.398869][ T8475] pgactivate 0 [ 3423.495172][ T8475] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=12193,uid=0 [ 3423.510764][ T8475] Memory cgroup out of memory: Killed process 12193 (syz-executor.2) total-vm:72572kB, anon-rss:2196kB, file-rss:35796kB, shmem-rss:0kB [ 3423.528680][ T1056] oom_reaper: reaped process 12193 (syz-executor.2), now anon-rss:0kB, file-rss:34836kB, shmem-rss:0kB [ 3423.529328][ T8475] Memory cgroup out of memory: Killed process 11590 (syz-executor.2) total-vm:72572kB, anon-rss:2196kB, file-rss:35796kB, shmem-rss:0kB [ 3423.570679][ T8475] Memory cgroup out of memory: Killed process 11077 (syz-executor.2) total-vm:72572kB, anon-rss:2196kB, file-rss:35796kB, shmem-rss:0kB [ 3423.595303][ T8475] Memory cgroup out of memory: Killed process 9999 (syz-executor.2) total-vm:72572kB, anon-rss:2196kB, file-rss:35796kB, shmem-rss:0kB [ 3423.619610][ T8475] Memory cgroup out of memory: Killed process 14789 (syz-executor.2) total-vm:72572kB, anon-rss:2196kB, file-rss:35792kB, shmem-rss:0kB [ 3423.643926][ T8475] Memory cgroup out of memory: Killed process 14738 (syz-executor.2) total-vm:72572kB, anon-rss:2196kB, file-rss:35792kB, shmem-rss:0kB [ 3423.668009][ T8475] Memory cgroup out of memory: Killed process 14414 (syz-executor.2) total-vm:72572kB, anon-rss:2196kB, file-rss:35792kB, shmem-rss:0kB [ 3423.691306][ T8475] Memory cgroup out of memory: Killed process 13730 (syz-executor.2) total-vm:72572kB, anon-rss:2196kB, file-rss:35792kB, shmem-rss:0kB [ 3423.714345][ T8475] Memory cgroup out of memory: Killed process 13159 (syz-executor.2) total-vm:72572kB, anon-rss:2196kB, file-rss:35792kB, shmem-rss:0kB [ 3423.743128][ T8475] Memory cgroup out of memory: Killed process 12791 (syz-executor.2) total-vm:72572kB, anon-rss:2196kB, file-rss:35792kB, shmem-rss:0kB [ 3423.766925][ T8475] Memory cgroup out of memory: Killed process 12610 (syz-executor.2) total-vm:72572kB, anon-rss:2196kB, file-rss:35792kB, shmem-rss:0kB [ 3423.787603][ T1056] oom_reaper: reaped process 12610 (syz-executor.2), now anon-rss:0kB, file-rss:34832kB, shmem-rss:0kB [ 3423.796552][ T8475] Memory cgroup out of memory: Killed process 12569 (syz-executor.2) total-vm:72572kB, anon-rss:2196kB, file-rss:35792kB, shmem-rss:0kB [ 3423.827121][ T8475] Memory cgroup out of memory: Killed process 11940 (syz-executor.2) total-vm:72572kB, anon-rss:2196kB, file-rss:35792kB, shmem-rss:0kB [ 3423.842405][ T1056] oom_reaper: reaped process 11940 (syz-executor.2), now anon-rss:0kB, file-rss:34832kB, shmem-rss:0kB [ 3423.844857][ T8475] Memory cgroup out of memory: Killed process 10916 (syz-executor.2) total-vm:72572kB, anon-rss:2196kB, file-rss:35792kB, shmem-rss:0kB [ 3423.885300][ T8475] Memory cgroup out of memory: Killed process 10853 (syz-executor.2) total-vm:72572kB, anon-rss:2196kB, file-rss:35792kB, shmem-rss:0kB [ 3423.901201][ T1056] oom_reaper: reaped process 10853 (syz-executor.2), now anon-rss:0kB, file-rss:34832kB, shmem-rss:0kB [ 3423.902567][ T8475] Memory cgroup out of memory: Killed process 10163 (syz-executor.2) total-vm:72572kB, anon-rss:2196kB, file-rss:35792kB, shmem-rss:0kB [ 3423.940845][ T8475] Memory cgroup out of memory: Killed process 10083 (syz-executor.2) total-vm:72572kB, anon-rss:2196kB, file-rss:35792kB, shmem-rss:0kB [ 3423.964818][ T8475] Memory cgroup out of memory: Killed process 9696 (syz-executor.2) total-vm:72572kB, anon-rss:2196kB, file-rss:35792kB, shmem-rss:0kB [ 3423.988643][ T8475] Memory cgroup out of memory: Killed process 10723 (syz-executor.2) total-vm:72704kB, anon-rss:2204kB, file-rss:35784kB, shmem-rss:0kB [ 3424.010181][ T1056] oom_reaper: reaped process 10723 (syz-executor.2), now anon-rss:0kB, file-rss:34824kB, shmem-rss:0kB [ 3424.012895][ T8475] Memory cgroup out of memory: Killed process 13017 (syz-executor.2) total-vm:72704kB, anon-rss:2204kB, file-rss:35784kB, shmem-rss:0kB [ 3424.052269][ T8475] Memory cgroup out of memory: Killed process 8475 (syz-executor.2) total-vm:72440kB, anon-rss:104kB, file-rss:35776kB, shmem-rss:0kB [ 3424.067129][ T1056] oom_reaper: reaped process 8475 (syz-executor.2), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 03:48:35 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) socket$kcm(0x2b, 0x1, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000002c0)=ANY=[@ANYBLOB="a1c1"]) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000ec600000000000000000000000000000400000000005f00"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.\\G10I\xb8\x8f8\x00\x15o\x1e\xc98\x7f\xcb\xecA\xf3\xbf\x9c\xd8R\xa2|\xef\xe3\x8b\x05\x94\xf9Gx\x1f\xfdi\x9b\x83`\xb8Y\x1aV\xbe\xeb\xb3\xd3v\xb9\x0fs\x90\xb6\xaa`\xe8\x12\xc3\"\x87\xbf\xab\x80h\x97\x89C\t\x84\x9d\xed\xa5ED\xb5P\xde\xa65\xf7\xa1\x1eW\xb3n\xd1\x0f\xeaa\xe2\xcf:\xb6\xa0+\x12W\x9e\x13\x15\xdb\xf6T#\x83\xe59\x04', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000640)=ANY=[@ANYRES32=0x0], 0x0, 0x4, 0x0, 0xffffffffffffbfff}, 0x20) r5 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r6 = gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000540)=r6, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) 03:48:35 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000200)={{}, 'port0\x00', 0x0, 0x0, 0xfff}) write$sndseq(r0, 0x0, 0x0) 03:48:35 executing program 3: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b2", 0x3d}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489", 0xc4}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r6 = fcntl$getown(r5, 0x9) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r6}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248", 0x58) 03:48:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000004c0)=""/96, 0x60}], 0x1, 0x0) 03:48:35 executing program 1: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r3, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x20}, 0xf) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d66", 0xb9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489abcd69fcc7154d066c7ff2e07b", 0xd1}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b07", 0x65}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r5, r0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r7 = fcntl$getown(r6, 0x9) fcntl$lock(r6, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r7}) r8 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) pipe2(&(0x7f0000000140), 0x1800) setsockopt$packet_buf(r8, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:35 executing program 5: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e4359", 0x9d}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r2, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) fcntl$lock(r3, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100}) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(r4, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) [ 3424.523147][ T4040] FS-Cache: Duplicate cookie detected [ 3424.527073][ T4039] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3424.528931][ T4040] FS-Cache: O-cookie c=0000000082c8a639 [p=000000008669d53b fl=222 nc=0 na=1] [ 3424.547306][ T4040] FS-Cache: O-cookie d=00000000531d9e7f n=000000005b1879c2 [ 3424.555152][ T4040] FS-Cache: O-key=[10] '02000200000002000000' [ 3424.561598][ T4040] FS-Cache: N-cookie c=00000000b805c428 [p=000000008669d53b fl=2 nc=0 na=1] 03:48:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') preadv(r1, &(0x7f00000003c0)=[{&(0x7f00000004c0)=""/96, 0x60}], 0x1, 0x0) 03:48:35 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000200)={{}, 'port0\x00', 0x0, 0x0, 0xfff}) write$sndseq(r0, 0x0, 0x0) [ 3424.570488][ T4040] FS-Cache: N-cookie d=00000000531d9e7f n=0000000074f3b8f6 [ 3424.577934][ T4040] FS-Cache: N-key=[10] '02000200000002000000' 03:48:35 executing program 3: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b2", 0x3d}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489", 0xc4}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r6 = fcntl$getown(r5, 0x9) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r6}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d10", 0x5b) 03:48:35 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) socket$kcm(0x2b, 0x1, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000002c0)=ANY=[@ANYBLOB="a1c1"]) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000ec600000000000000000000000000000400000000005f00"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.\\G10I\xb8\x8f8\x00\x15o\x1e\xc98\x7f\xcb\xecA\xf3\xbf\x9c\xd8R\xa2|\xef\xe3\x8b\x05\x94\xf9Gx\x1f\xfdi\x9b\x83`\xb8Y\x1aV\xbe\xeb\xb3\xd3v\xb9\x0fs\x90\xb6\xaa`\xe8\x12\xc3\"\x87\xbf\xab\x80h\x97\x89C\t\x84\x9d\xed\xa5ED\xb5P\xde\xa65\xf7\xa1\x1eW\xb3n\xd1\x0f\xeaa\xe2\xcf:\xb6\xa0+\x12W\x9e\x13\x15\xdb\xf6T#\x83\xe59\x04', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000640)=ANY=[@ANYRES32=0x0], 0x0, 0x4, 0x0, 0xffffffffffffbfff}, 0x20) r5 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r6 = gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000540)=r6, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) 03:48:35 executing program 1: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r2, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x20}, 0xf) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r3 = socket$inet(0x10, 0x3, 0xc) sendmsg(r3, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) sendmmsg$inet6(r2, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d66", 0xb9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489abcd69fcc7154d066c7ff2e07b", 0xd1}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b07", 0x65}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r6 = fcntl$getown(r5, 0x9) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r6}) r7 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) pipe2(&(0x7f0000000140), 0x1800) setsockopt$packet_buf(r7, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') preadv(r1, &(0x7f00000003c0)=[{&(0x7f00000004c0)=""/96, 0x60}], 0x1, 0x0) 03:48:35 executing program 3: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b2", 0x3d}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489", 0xc4}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r6 = fcntl$getown(r5, 0x9) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r6}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d10", 0x5b) 03:48:35 executing program 5: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e4359", 0x9d}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r2, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) fcntl$lock(r3, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100}) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(r4, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') preadv(r1, &(0x7f00000003c0)=[{&(0x7f00000004c0)=""/96, 0x60}], 0x1, 0x0) 03:48:36 executing program 1: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r2, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x20}, 0xf) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r3 = socket$inet(0x10, 0x3, 0xc) sendmsg(r3, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) sendmmsg$inet6(r2, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d66", 0xb9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489abcd69fcc7154d066c7ff2e07b", 0xd1}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b07", 0x65}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r6 = fcntl$getown(r5, 0x9) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r6}) r7 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) pipe2(&(0x7f0000000140), 0x1800) setsockopt$packet_buf(r7, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:36 executing program 5: r0 = socket$isdn(0x22, 0x3, 0x26) socket$netlink(0x10, 0x3, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e4359", 0x9d}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r2, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) fcntl$lock(r3, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100}) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(r4, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, 0x0) preadv(r1, &(0x7f00000003c0)=[{&(0x7f00000004c0)=""/96, 0x60}], 0x1, 0x0) [ 3425.497361][ T4626] FS-Cache: Duplicate cookie detected [ 3425.503119][ T4626] FS-Cache: O-cookie c=0000000031b9e73a [p=000000008669d53b fl=222 nc=0 na=1] [ 3425.512495][ T4626] FS-Cache: O-cookie d=00000000531d9e7f n=0000000054517943 [ 3425.520262][ T4626] FS-Cache: O-key=[10] '02000200000002000000' [ 3425.526850][ T4626] FS-Cache: N-cookie c=000000002ef4bd3b [p=000000008669d53b fl=2 nc=0 na=1] [ 3425.538434][ T4626] FS-Cache: N-cookie d=00000000531d9e7f n=0000000037ff0dc2 03:48:36 executing program 3: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b2", 0x3d}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489", 0xc4}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r6 = fcntl$getown(r5, 0x9) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r6}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d10", 0x5b) [ 3425.545871][ T4626] FS-Cache: N-key=[10] '02000200000002000000' 03:48:36 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000200)={{}, 'port0\x00', 0x0, 0x0, 0xfff}) write$sndseq(r0, &(0x7f0000000000), 0x0) 03:48:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, 0x0) preadv(r1, &(0x7f00000003c0)=[{&(0x7f00000004c0)=""/96, 0x60}], 0x1, 0x0) [ 3427.076684][T24359] device bridge_slave_1 left promiscuous mode [ 3427.083806][T24359] bridge0: port 2(bridge_slave_1) entered disabled state [ 3427.158728][T24359] device bridge_slave_0 left promiscuous mode [ 3427.165065][T24359] bridge0: port 1(bridge_slave_0) entered disabled state [ 3428.934474][T24359] device hsr_slave_0 left promiscuous mode [ 3429.013882][T24359] device hsr_slave_1 left promiscuous mode [ 3429.091907][T24359] team0 (unregistering): Port device team_slave_1 removed [ 3429.106573][T24359] team0 (unregistering): Port device team_slave_0 removed [ 3429.119544][T24359] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3429.160225][T24359] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3429.228349][T24359] bond0 (unregistering): Released all slaves [ 3429.342417][ T5110] IPVS: ftp: loaded support on port[0] = 21 [ 3429.413166][ T5110] chnl_net:caif_netlink_parms(): no params data found [ 3429.446539][ T5110] bridge0: port 1(bridge_slave_0) entered blocking state [ 3429.453811][ T5110] bridge0: port 1(bridge_slave_0) entered disabled state [ 3429.461744][ T5110] device bridge_slave_0 entered promiscuous mode [ 3429.469775][ T5110] bridge0: port 2(bridge_slave_1) entered blocking state [ 3429.476991][ T5110] bridge0: port 2(bridge_slave_1) entered disabled state [ 3429.484973][ T5110] device bridge_slave_1 entered promiscuous mode [ 3429.555437][ T5110] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3429.567487][ T5110] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3429.589068][ T5110] team0: Port device team_slave_0 added [ 3429.596658][ T5110] team0: Port device team_slave_1 added [ 3429.656536][ T5110] device hsr_slave_0 entered promiscuous mode [ 3429.694097][ T5110] device hsr_slave_1 entered promiscuous mode [ 3429.743752][ T5110] debugfs: Directory 'hsr0' with parent '/' already present! [ 3429.770026][ T5110] bridge0: port 2(bridge_slave_1) entered blocking state [ 3429.777212][ T5110] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3429.784732][ T5110] bridge0: port 1(bridge_slave_0) entered blocking state [ 3429.791819][ T5110] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3429.858615][ T5110] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3429.873353][T20447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3429.883032][T20447] bridge0: port 1(bridge_slave_0) entered disabled state [ 3429.899191][T20447] bridge0: port 2(bridge_slave_1) entered disabled state [ 3429.915863][ T5110] 8021q: adding VLAN 0 to HW filter on device team0 [ 3429.934987][T20447] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3429.950560][T20447] bridge0: port 1(bridge_slave_0) entered blocking state [ 3429.957731][T20447] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3429.992623][T31788] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3430.002237][T31788] bridge0: port 2(bridge_slave_1) entered blocking state [ 3430.009373][T31788] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3430.028116][T31788] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3430.051461][ T5110] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3430.070436][ T5110] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3430.084839][T20447] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3430.100812][T20447] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3430.109837][T20447] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3430.126369][T20447] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3430.150694][ T5110] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3430.161444][T31246] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3430.391121][ T5118] oom_kill_process: 20 callbacks suppressed [ 3430.391161][ T5118] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3430.410391][ T5118] CPU: 1 PID: 5118 Comm: syz-executor.2 Not tainted 5.3.0-rc1+ #49 [ 3430.418321][ T5118] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3430.428390][ T5118] Call Trace: [ 3430.431695][ T5118] dump_stack+0x1d8/0x2f8 [ 3430.436038][ T5118] dump_header+0xd8/0x960 [ 3430.440383][ T5118] oom_kill_process+0xcd/0x350 [ 3430.445151][ T5118] out_of_memory+0x5ce/0x890 [ 3430.449742][ T5118] ? unregister_oom_notifier+0x20/0x20 [ 3430.455212][ T5118] ? _raw_spin_unlock_irqrestore+0xd1/0xe0 [ 3430.461018][ T5118] memory_max_write+0x537/0x6a0 [ 3430.465877][ T5118] ? memory_max_show+0xa0/0xa0 [ 3430.470639][ T5118] ? trace_lock_acquire+0x159/0x1d0 [ 3430.475830][ T5118] ? lock_acquire+0x158/0x250 [ 3430.480512][ T5118] ? kernfs_fop_write+0x22e/0x4f0 [ 3430.485532][ T5118] ? memory_max_show+0xa0/0xa0 [ 3430.490283][ T5118] cgroup_file_write+0x27b/0x6e0 [ 3430.495228][ T5118] ? cgroup_seqfile_stop+0xc0/0xc0 [ 3430.500365][ T5118] ? cgroup_seqfile_stop+0xc0/0xc0 [ 3430.505464][ T5118] kernfs_fop_write+0x3e4/0x4f0 [ 3430.510299][ T5118] ? kernfs_fop_read+0x580/0x580 [ 3430.515316][ T5118] __vfs_write+0xf9/0x7d0 [ 3430.519652][ T5118] ? __kernel_write+0x350/0x350 [ 3430.524622][ T5118] ? __sb_start_write+0x403/0x4c0 [ 3430.529629][ T5118] ? __kasan_check_read+0x11/0x20 [ 3430.534653][ T5118] vfs_write+0x275/0x590 [ 3430.538903][ T5118] ksys_write+0x16b/0x2a0 [ 3430.543227][ T5118] ? __ia32_sys_read+0x90/0x90 [ 3430.547971][ T5118] ? check_preemption_disabled+0xb7/0x2a0 [ 3430.553689][ T5118] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 3430.559158][ T5118] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 3430.564890][ T5118] ? do_syscall_64+0x1d/0x140 [ 3430.569577][ T5118] __x64_sys_write+0x7b/0x90 [ 3430.574174][ T5118] do_syscall_64+0xfe/0x140 [ 3430.578682][ T5118] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3430.584600][ T5118] RIP: 0033:0x459829 [ 3430.588593][ T5118] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3430.608362][ T5118] RSP: 002b:00007f0790d9cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3430.616772][ T5118] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829 [ 3430.624753][ T5118] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 3430.632712][ T5118] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3430.640694][ T5118] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0790d9d6d4 [ 3430.648656][ T5118] R13: 00000000004c9774 R14: 00000000004e0b70 R15: 00000000ffffffff [ 3430.657881][ T5118] memory: usage 14496kB, limit 0kB, failcnt 180 [ 3430.664496][ T5118] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3430.671447][ T5118] Memory cgroup stats for /syz2: [ 3430.671934][ T5118] anon 2129920 [ 3430.671934][ T5118] file 155648 [ 3430.671934][ T5118] kernel_stack 65536 [ 3430.671934][ T5118] slab 12496896 [ 3430.671934][ T5118] sock 0 [ 3430.671934][ T5118] shmem 126976 [ 3430.671934][ T5118] file_mapped 0 [ 3430.671934][ T5118] file_dirty 0 [ 3430.671934][ T5118] file_writeback 0 [ 3430.671934][ T5118] anon_thp 2097152 [ 3430.671934][ T5118] inactive_anon 98304 [ 3430.671934][ T5118] active_anon 2129920 [ 3430.671934][ T5118] inactive_file 0 [ 3430.671934][ T5118] active_file 0 [ 3430.671934][ T5118] unevictable 131072 [ 3430.671934][ T5118] slab_reclaimable 5136384 [ 3430.671934][ T5118] slab_unreclaimable 7360512 [ 3430.671934][ T5118] pgfault 501963 [ 3430.671934][ T5118] pgmajfault 0 [ 3430.671934][ T5118] workingset_refault 0 [ 3430.671934][ T5118] workingset_activate 0 [ 3430.671934][ T5118] workingset_nodereclaim 0 [ 3430.671934][ T5118] pgrefill 35 [ 3430.671934][ T5118] pgscan 0 [ 3430.671934][ T5118] pgsteal 0 [ 3430.671934][ T5118] pgactivate 0 [ 3430.769966][ T5118] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=5116,uid=0 [ 3430.786079][ T5118] Memory cgroup out of memory: Killed process 5116 (syz-executor.2) total-vm:72576kB, anon-rss:2184kB, file-rss:35808kB, shmem-rss:0kB [ 3430.803231][ T1056] oom_reaper: reaped process 5116 (syz-executor.2), now anon-rss:0kB, file-rss:34848kB, shmem-rss:0kB 03:48:41 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) socket$kcm(0x2b, 0x1, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000002c0)=ANY=[@ANYBLOB="a1c1"]) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000ec600000000000000000000000000000400000000005f00"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.\\G10I\xb8\x8f8\x00\x15o\x1e\xc98\x7f\xcb\xecA\xf3\xbf\x9c\xd8R\xa2|\xef\xe3\x8b\x05\x94\xf9Gx\x1f\xfdi\x9b\x83`\xb8Y\x1aV\xbe\xeb\xb3\xd3v\xb9\x0fs\x90\xb6\xaa`\xe8\x12\xc3\"\x87\xbf\xab\x80h\x97\x89C\t\x84\x9d\xed\xa5ED\xb5P\xde\xa65\xf7\xa1\x1eW\xb3n\xd1\x0f\xeaa\xe2\xcf:\xb6\xa0+\x12W\x9e\x13\x15\xdb\xf6T#\x83\xe59\x04', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000640)=ANY=[@ANYRES32=0x0], 0x0, 0x4, 0x0, 0xffffffffffffbfff}, 0x20) r5 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r6 = gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000540)=r6, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) 03:48:41 executing program 1: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r2, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x20}, 0xf) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r3 = socket$inet(0x10, 0x3, 0xc) sendmsg(r3, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) sendmmsg$inet6(r2, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d66", 0xb9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489abcd69fcc7154d066c7ff2e07b", 0xd1}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b07", 0x65}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r6 = fcntl$getown(r5, 0x9) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r6}) r7 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) pipe2(&(0x7f0000000140), 0x1800) setsockopt$packet_buf(r7, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:41 executing program 3: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b2", 0x3d}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489", 0xc4}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r6 = fcntl$getown(r5, 0x9) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r6}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f", 0x5c) 03:48:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, 0x0) preadv(r1, &(0x7f00000003c0)=[{&(0x7f00000004c0)=""/96, 0x60}], 0x1, 0x0) 03:48:41 executing program 5: r0 = socket$isdn(0x22, 0x3, 0x26) socket$netlink(0x10, 0x3, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e4359", 0x9d}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r2, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) fcntl$lock(r3, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100}) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(r4, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:41 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000200)={{}, 'port0\x00', 0x0, 0x0, 0xfff}) write$sndseq(r0, &(0x7f0000000000), 0x0) [ 3431.014284][ T5110] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 3431.032191][ T5110] CPU: 0 PID: 5110 Comm: syz-executor.2 Not tainted 5.3.0-rc1+ #49 [ 3431.040114][ T5110] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3431.050167][ T5110] Call Trace: [ 3431.053459][ T5110] dump_stack+0x1d8/0x2f8 [ 3431.057797][ T5110] dump_header+0xd8/0x960 [ 3431.062142][ T5110] oom_kill_process+0xcd/0x350 [ 3431.066919][ T5110] out_of_memory+0x5ce/0x890 [ 3431.071518][ T5110] ? unregister_oom_notifier+0x20/0x20 [ 3431.076989][ T5110] ? __kasan_check_read+0x11/0x20 [ 3431.082057][ T5110] try_charge+0x137d/0x1a60 [ 3431.086594][ T5110] ? __memcg_kmem_charge_memcg+0xf0/0xf0 [ 3431.092244][ T5110] ? __lock_acquire+0x4750/0x4750 [ 3431.097282][ T5110] ? rcu_lock_release+0x15/0x20 [ 3431.102131][ T5110] ? get_mem_cgroup_from_mm+0x15b/0x170 [ 3431.107686][ T5110] mem_cgroup_try_charge+0x20c/0x680 [ 3431.112981][ T5110] mem_cgroup_try_charge_delay+0x25/0xa0 [ 3431.118511][ T5126] FS-Cache: Duplicate cookie detected [ 3431.118660][ T5110] wp_page_copy+0x394/0x1960 [ 3431.118692][ T5110] ? rcu_lock_release+0x30/0x30 [ 3431.124153][ T5126] FS-Cache: O-cookie c=000000003f4014a0 [p=000000008669d53b fl=222 nc=0 na=1] [ 3431.128657][ T5110] ? __lock_acquire+0x4750/0x4750 [ 3431.128676][ T5110] ? __kasan_check_read+0x11/0x20 [ 3431.128688][ T5110] ? do_raw_spin_unlock+0x49/0x260 [ 3431.128711][ T5110] do_wp_page+0x2c9/0x1ce0 [ 3431.133694][ T5126] FS-Cache: O-cookie d=00000000531d9e7f n=000000009e850148 [ 3431.142397][ T5110] ? __rwlock_init+0x130/0x130 [ 3431.142409][ T5110] ? count_memcg_event_mm+0x300/0x300 [ 3431.142429][ T5110] handle_mm_fault+0x2bd9/0x6070 [ 3431.142456][ T5110] ? finish_fault+0x230/0x230 [ 3431.142479][ T5110] ? __up_read+0x5b0/0x5b0 [ 3431.142494][ T5110] ? vmacache_find+0x251/0x5b0 [ 3431.147632][ T5126] FS-Cache: O-key=[10] '02000200000002000000' [ 3431.152536][ T5110] do_user_addr_fault+0x589/0xaf0 03:48:42 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') preadv(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f00000004c0)=""/96, 0x60}], 0x1, 0x0) [ 3431.152563][ T5110] __do_page_fault+0xd3/0x1f0 [ 3431.152576][ T5110] do_page_fault+0x99/0xb0 [ 3431.152598][ T5110] page_fault+0x39/0x40 [ 3431.157868][ T5126] FS-Cache: N-cookie c=00000000519ad43a [p=000000008669d53b fl=2 nc=0 na=1] [ 3431.162126][ T5110] RIP: 0033:0x4034f2 [ 3431.162139][ T5110] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 59 8d 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 79 42 05 00 48 [ 3431.162151][ T5110] RSP: 002b:00007ffd823cfdc0 EFLAGS: 00010246 [ 3431.169475][ T5126] FS-Cache: N-cookie d=00000000531d9e7f n=000000003e031bc4 [ 3431.174104][ T5110] RAX: 0000000000000000 RBX: 00000000003457c1 RCX: 0000000000413430 [ 3431.174111][ T5110] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007ffd823d0ef0 [ 3431.174117][ T5110] RBP: 0000000000000002 R08: 0000000000000001 R09: 000055555636b940 [ 3431.174123][ T5110] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffd823d0ef0 [ 3431.174128][ T5110] R13: 00007ffd823d0ee0 R14: 0000000000000000 R15: 00007ffd823d0ef0 [ 3431.178274][ T5110] memory: usage 12168kB, limit 0kB, failcnt 188 [ 3431.179638][ T5126] FS-Cache: N-key=[10] '02000200000002000000' [ 3431.184696][ T5110] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3431.184701][ T5110] Memory cgroup stats for /syz2: [ 3431.184803][ T5110] anon 28672 [ 3431.184803][ T5110] file 155648 [ 3431.184803][ T5110] kernel_stack 65536 [ 3431.184803][ T5110] slab 12496896 [ 3431.184803][ T5110] sock 0 [ 3431.184803][ T5110] shmem 126976 [ 3431.184803][ T5110] file_mapped 0 [ 3431.184803][ T5110] file_dirty 0 [ 3431.184803][ T5110] file_writeback 0 03:48:42 executing program 1: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r3, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x20}, 0xf) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d66", 0xb9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489abcd69fcc7154d066c7ff2e07b", 0xd1}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b07", 0x65}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r5, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, 0x0) r7 = fcntl$getown(r6, 0x9) fcntl$lock(r6, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r7}) r8 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) pipe2(&(0x7f0000000140), 0x1800) setsockopt$packet_buf(r8, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) [ 3431.184803][ T5110] anon_thp 0 [ 3431.184803][ T5110] inactive_anon 98304 [ 3431.184803][ T5110] active_anon 28672 [ 3431.184803][ T5110] inactive_file 0 [ 3431.184803][ T5110] active_file 0 [ 3431.184803][ T5110] unevictable 131072 [ 3431.184803][ T5110] slab_reclaimable 5136384 [ 3431.184803][ T5110] slab_unreclaimable 7360512 [ 3431.184803][ T5110] pgfault 501996 [ 3431.184803][ T5110] pgmajfault 0 [ 3431.184803][ T5110] workingset_refault 0 [ 3431.184803][ T5110] workingset_activate 0 [ 3431.184803][ T5110] workingset_nodereclaim 0 03:48:42 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000200)={{}, 'port0\x00', 0x0, 0x0, 0xfff}) write$sndseq(r0, &(0x7f0000000000), 0x0) [ 3431.184803][ T5110] pgrefill 35 [ 3431.184803][ T5110] pgscan 0 [ 3431.184803][ T5110] pgsteal 0 [ 3431.184803][ T5110] pgactivate 0 [ 3431.184823][ T5110] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=5110,uid=0 [ 3431.185577][ T5110] Memory cgroup out of memory: Killed process 5110 (syz-executor.2) total-vm:72444kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB 03:48:42 executing program 5: r0 = socket$isdn(0x22, 0x3, 0x26) socket$netlink(0x10, 0x3, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e4359", 0x9d}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r2, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) fcntl$lock(r3, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100}) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(r4, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:42 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') preadv(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f00000004c0)=""/96, 0x60}], 0x1, 0x0) 03:48:42 executing program 3: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b2", 0x3d}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489", 0xc4}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r6 = fcntl$getown(r5, 0x9) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r6}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f", 0x5c) [ 3431.659446][ T5432] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 03:48:43 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) socket$kcm(0x2b, 0x1, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000002c0)=ANY=[@ANYBLOB="a1c1"]) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000ec600000000000000000000000000000400000000005f00"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.\\G10I\xb8\x8f8\x00\x15o\x1e\xc98\x7f\xcb\xecA\xf3\xbf\x9c\xd8R\xa2|\xef\xe3\x8b\x05\x94\xf9Gx\x1f\xfdi\x9b\x83`\xb8Y\x1aV\xbe\xeb\xb3\xd3v\xb9\x0fs\x90\xb6\xaa`\xe8\x12\xc3\"\x87\xbf\xab\x80h\x97\x89C\t\x84\x9d\xed\xa5ED\xb5P\xde\xa65\xf7\xa1\x1eW\xb3n\xd1\x0f\xeaa\xe2\xcf:\xb6\xa0+\x12W\x9e\x13\x15\xdb\xf6T#\x83\xe59\x04', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000640)=ANY=[@ANYRES32=0x0], 0x0, 0x4, 0x0, 0xffffffffffffbfff}, 0x20) r5 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r6 = gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000540)=r6, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) 03:48:43 executing program 1: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r3, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x20}, 0xf) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d66", 0xb9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489abcd69fcc7154d066c7ff2e07b", 0xd1}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b07", 0x65}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r5, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, 0x0) r7 = fcntl$getown(r6, 0x9) fcntl$lock(r6, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r7}) r8 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) pipe2(&(0x7f0000000140), 0x1800) setsockopt$packet_buf(r8, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:43 executing program 5: r0 = socket$isdn(0x22, 0x3, 0x26) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e4359", 0x9d}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r2, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) fcntl$lock(r3, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100}) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(r4, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:43 executing program 3: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b2", 0x3d}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489", 0xc4}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r6 = fcntl$getown(r5, 0x9) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r6}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f", 0x5c) 03:48:43 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000200)={{}, 'port0\x00', 0x0, 0x0, 0xfff}) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) 03:48:43 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') preadv(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f00000004c0)=""/96, 0x60}], 0x1, 0x0) 03:48:43 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') preadv(r1, 0x0, 0x0, 0x0) [ 3432.356090][ T5868] FS-Cache: Duplicate cookie detected [ 3432.361775][ T5868] FS-Cache: O-cookie c=000000003a0d4887 [p=000000008669d53b fl=222 nc=0 na=1] [ 3432.371318][ T5868] FS-Cache: O-cookie d=00000000531d9e7f n=00000000ef630be6 [ 3432.379086][ T5868] FS-Cache: O-key=[10] '02000200000002000000' [ 3432.385632][ T5868] FS-Cache: N-cookie c=0000000075a9c521 [p=000000008669d53b fl=2 nc=0 na=1] [ 3432.394758][ T5868] FS-Cache: N-cookie d=00000000531d9e7f n=00000000b771cf1b 03:48:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, &(0x7f0000000180)=""/4096, 0x1000, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) recvfrom$inet(r1, 0x0, 0xa1720495f3f7f40, 0x0, 0x0, 0x800e00516) shutdown(r0, 0x0) r3 = fcntl$dupfd(r2, 0x3, 0xffffffffffffffff) getsockopt$inet6_tcp_buf(r3, 0x6, 0x0, 0x0, 0x0) recvfrom$inet(r1, 0x0, 0xfefc, 0x0, 0x0, 0x800e00510) shutdown(r1, 0x0) [ 3432.402026][ T5868] FS-Cache: N-key=[10] '02000200000002000000' 03:48:43 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) socket$kcm(0x2b, 0x1, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000002c0)=ANY=[@ANYBLOB="a1c1"]) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000ec600000000000000000000000000000400000000005f00"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.\\G10I\xb8\x8f8\x00\x15o\x1e\xc98\x7f\xcb\xecA\xf3\xbf\x9c\xd8R\xa2|\xef\xe3\x8b\x05\x94\xf9Gx\x1f\xfdi\x9b\x83`\xb8Y\x1aV\xbe\xeb\xb3\xd3v\xb9\x0fs\x90\xb6\xaa`\xe8\x12\xc3\"\x87\xbf\xab\x80h\x97\x89C\t\x84\x9d\xed\xa5ED\xb5P\xde\xa65\xf7\xa1\x1eW\xb3n\xd1\x0f\xeaa\xe2\xcf:\xb6\xa0+\x12W\x9e\x13\x15\xdb\xf6T#\x83\xe59\x04', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000640)=ANY=[@ANYRES32=0x0], 0x0, 0x4, 0x0, 0xffffffffffffbfff}, 0x20) r5 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r6 = gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000540)=r6, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) 03:48:43 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') preadv(r1, 0x0, 0x0, 0x0) 03:48:43 executing program 1: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r3, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x20}, 0xf) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d66", 0xb9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489abcd69fcc7154d066c7ff2e07b", 0xd1}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b07", 0x65}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r5, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, 0x0) r7 = fcntl$getown(r6, 0x9) fcntl$lock(r6, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r7}) r8 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) pipe2(&(0x7f0000000140), 0x1800) setsockopt$packet_buf(r8, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:43 executing program 5: r0 = socket$isdn(0x22, 0x3, 0x26) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e4359", 0x9d}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r2, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) fcntl$lock(r3, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100}) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(r4, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:43 executing program 0: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) poll(&(0x7f0000000140)=[{r0, 0x2012}], 0x1, 0x8000000000049) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x4e, 0x0, 0x0, 0x800e004de) r2 = dup(r1) recvfrom$inet(r1, 0x0, 0x1000001ab, 0x0, 0x0, 0x800e004e1) shutdown(r2, 0x0) 03:48:43 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') preadv(r1, 0x0, 0x0, 0x0) 03:48:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, &(0x7f0000000180)=""/4096, 0x1000, 0x0, 0x0, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xa1720495f3f7f40, 0x0, 0x0, 0x800e00516) shutdown(r1, 0x0) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, &(0x7f0000000080), 0x8) shutdown(r2, 0x0) 03:48:43 executing program 5: r0 = socket$isdn(0x22, 0x3, 0x26) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e4359", 0x9d}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r2, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) fcntl$lock(r3, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100}) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(r4, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, &(0x7f0000000180)=""/4096, 0x1000, 0x0, 0x0, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xa1720495f3f7f40, 0x0, 0x0, 0x800e00516) shutdown(r1, 0x0) dup2(r2, r1) recvfrom$inet(r2, 0x0, 0xfefc, 0x0, 0x0, 0x800e00510) shutdown(r2, 0x0) [ 3433.095988][ T6229] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 03:48:44 executing program 3: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000200)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r0, &(0x7f0000000140)="1f0000000104fffffd3b59c007110000f30501000b000300006872cc0200cf", 0x1f) 03:48:44 executing program 1: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r3, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x20}, 0xf) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d66", 0xb9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489abcd69fcc7154d066c7ff2e07b", 0xd1}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b07", 0x65}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r5, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0x0, 0x100}) r7 = fcntl$getown(r6, 0x9) fcntl$lock(r6, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r7}) r8 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) pipe2(&(0x7f0000000140), 0x1800) setsockopt$packet_buf(r8, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_ifreq(r0, 0x400000000089f6, &(0x7f0000000500)={'sit0\x00', @ifru_addrs=@in={0x2, 0x4e20}}) [ 3433.429244][ T6713] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3433.519054][ T6713] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 3433.552630][ T6713] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3434.824381][T24359] device bridge_slave_1 left promiscuous mode [ 3434.831266][T24359] bridge0: port 2(bridge_slave_1) entered disabled state [ 3434.894367][T24359] device bridge_slave_0 left promiscuous mode [ 3434.900501][T24359] bridge0: port 1(bridge_slave_0) entered disabled state [ 3436.694177][T24359] device hsr_slave_0 left promiscuous mode [ 3436.763762][T24359] device hsr_slave_1 left promiscuous mode [ 3436.822932][T24359] team0 (unregistering): Port device team_slave_1 removed [ 3436.837078][T24359] team0 (unregistering): Port device team_slave_0 removed [ 3436.847723][T24359] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3436.886623][T24359] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3436.990437][T24359] bond0 (unregistering): Released all slaves [ 3437.103040][ T7026] IPVS: ftp: loaded support on port[0] = 21 [ 3437.181627][ T7026] chnl_net:caif_netlink_parms(): no params data found [ 3437.256522][ T7026] bridge0: port 1(bridge_slave_0) entered blocking state [ 3437.269882][ T7026] bridge0: port 1(bridge_slave_0) entered disabled state [ 3437.277902][ T7026] device bridge_slave_0 entered promiscuous mode [ 3437.292273][ T7026] bridge0: port 2(bridge_slave_1) entered blocking state [ 3437.299509][ T7026] bridge0: port 2(bridge_slave_1) entered disabled state [ 3437.313763][ T7026] device bridge_slave_1 entered promiscuous mode [ 3437.342244][ T7026] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3437.359163][ T7026] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3437.390574][ T7026] team0: Port device team_slave_0 added [ 3437.402511][ T7026] team0: Port device team_slave_1 added [ 3437.476682][ T7026] device hsr_slave_0 entered promiscuous mode [ 3437.544049][ T7026] device hsr_slave_1 entered promiscuous mode [ 3437.593772][ T7026] debugfs: Directory 'hsr0' with parent '/' already present! [ 3437.620578][ T7026] bridge0: port 2(bridge_slave_1) entered blocking state [ 3437.627745][ T7026] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3437.635142][ T7026] bridge0: port 1(bridge_slave_0) entered blocking state [ 3437.642203][ T7026] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3437.711208][ T7026] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3437.730334][T24822] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3437.742173][T24822] bridge0: port 1(bridge_slave_0) entered disabled state [ 3437.752394][T24822] bridge0: port 2(bridge_slave_1) entered disabled state [ 3437.772737][ T7026] 8021q: adding VLAN 0 to HW filter on device team0 [ 3437.786787][T24822] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3437.795803][T24822] bridge0: port 1(bridge_slave_0) entered blocking state [ 3437.802879][T24822] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3437.822967][T22778] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3437.831522][T22778] bridge0: port 2(bridge_slave_1) entered blocking state [ 3437.838625][T22778] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3437.867607][T29750] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3437.876729][T29750] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3437.892395][ T7026] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3437.904405][ T7026] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3437.916970][T29750] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3437.925825][T29750] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3437.934660][T29750] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3437.954983][ T7026] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3437.962447][T29750] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3438.151184][ T7035] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3438.161744][ T7035] CPU: 0 PID: 7035 Comm: syz-executor.2 Not tainted 5.3.0-rc1+ #49 [ 3438.169616][ T7035] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3438.179652][ T7035] Call Trace: [ 3438.182932][ T7035] dump_stack+0x1d8/0x2f8 [ 3438.187253][ T7035] dump_header+0xd8/0x960 [ 3438.191577][ T7035] oom_kill_process+0xcd/0x350 [ 3438.196332][ T7035] out_of_memory+0x5ce/0x890 [ 3438.203701][ T7035] ? unregister_oom_notifier+0x20/0x20 [ 3438.209154][ T7035] ? _raw_spin_unlock_irqrestore+0xd1/0xe0 [ 3438.214987][ T7035] memory_max_write+0x537/0x6a0 [ 3438.220325][ T7035] ? lock_acquire+0x158/0x250 [ 3438.225000][ T7035] ? memory_max_show+0xa0/0xa0 [ 3438.229797][ T7035] ? trace_lock_acquire+0x159/0x1d0 [ 3438.234984][ T7035] ? lock_acquire+0x158/0x250 [ 3438.239655][ T7035] ? kernfs_fop_write+0x22e/0x4f0 [ 3438.244670][ T7035] ? memory_max_show+0xa0/0xa0 [ 3438.249411][ T7035] cgroup_file_write+0x27b/0x6e0 [ 3438.254338][ T7035] ? cgroup_seqfile_stop+0xc0/0xc0 [ 3438.259450][ T7035] ? cgroup_seqfile_stop+0xc0/0xc0 [ 3438.264551][ T7035] kernfs_fop_write+0x3e4/0x4f0 [ 3438.269394][ T7035] ? kernfs_fop_read+0x580/0x580 [ 3438.274317][ T7035] __vfs_write+0xf9/0x7d0 [ 3438.278651][ T7035] ? __kernel_write+0x350/0x350 [ 3438.283524][ T7035] ? __sb_start_write+0x403/0x4c0 [ 3438.288548][ T7035] vfs_write+0x275/0x590 [ 3438.292781][ T7035] ksys_write+0x16b/0x2a0 [ 3438.297186][ T7035] ? __ia32_sys_read+0x90/0x90 [ 3438.301948][ T7035] ? prepare_exit_to_usermode+0x1f7/0x580 [ 3438.307662][ T7035] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 3438.313376][ T7035] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 3438.318822][ T7035] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 3438.324544][ T7035] ? do_syscall_64+0x1d/0x140 [ 3438.329204][ T7035] __x64_sys_write+0x7b/0x90 [ 3438.333779][ T7035] do_syscall_64+0xfe/0x140 [ 3438.338287][ T7035] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3438.344165][ T7035] RIP: 0033:0x459829 [ 3438.348037][ T7035] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3438.367622][ T7035] RSP: 002b:00007fbf6b51ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3438.376032][ T7035] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829 [ 3438.383988][ T7035] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 3438.391936][ T7035] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3438.399893][ T7035] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbf6b51f6d4 [ 3438.407851][ T7035] R13: 00000000004c9774 R14: 00000000004e0b70 R15: 00000000ffffffff [ 3438.422930][ T7035] memory: usage 13000kB, limit 0kB, failcnt 189 [ 3438.430601][ T7035] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3438.439831][ T7035] Memory cgroup stats for /syz2: [ 3438.441240][ T7035] anon 2174976 [ 3438.441240][ T7035] file 155648 [ 3438.441240][ T7035] kernel_stack 65536 [ 3438.441240][ T7035] slab 10854400 [ 3438.441240][ T7035] sock 0 [ 3438.441240][ T7035] shmem 126976 [ 3438.441240][ T7035] file_mapped 0 [ 3438.441240][ T7035] file_dirty 0 [ 3438.441240][ T7035] file_writeback 0 [ 3438.441240][ T7035] anon_thp 2097152 [ 3438.441240][ T7035] inactive_anon 98304 [ 3438.441240][ T7035] active_anon 2174976 [ 3438.441240][ T7035] inactive_file 0 [ 3438.441240][ T7035] active_file 0 [ 3438.441240][ T7035] unevictable 131072 [ 3438.441240][ T7035] slab_reclaimable 5136384 [ 3438.441240][ T7035] slab_unreclaimable 5718016 [ 3438.441240][ T7035] pgfault 502062 [ 3438.441240][ T7035] pgmajfault 0 [ 3438.441240][ T7035] workingset_refault 0 [ 3438.441240][ T7035] workingset_activate 0 [ 3438.441240][ T7035] workingset_nodereclaim 0 [ 3438.441240][ T7035] pgrefill 35 [ 3438.441240][ T7035] pgscan 0 [ 3438.441240][ T7035] pgsteal 0 [ 3438.441240][ T7035] pgactivate 0 [ 3438.551054][ T7035] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=7032,uid=0 [ 3438.569454][ T7035] Memory cgroup out of memory: Killed process 7032 (syz-executor.2) total-vm:72576kB, anon-rss:2140kB, file-rss:34816kB, shmem-rss:0kB [ 3438.587656][ T1056] oom_reaper: reaped process 7032 (syz-executor.2), now anon-rss:0kB, file-rss:34848kB, shmem-rss:0kB 03:48:49 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) socket$kcm(0x2b, 0x1, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000002c0)=ANY=[@ANYBLOB="a1c1"]) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000ec600000000000000000000000000000400000000005f00"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.\\G10I\xb8\x8f8\x00\x15o\x1e\xc98\x7f\xcb\xecA\xf3\xbf\x9c\xd8R\xa2|\xef\xe3\x8b\x05\x94\xf9Gx\x1f\xfdi\x9b\x83`\xb8Y\x1aV\xbe\xeb\xb3\xd3v\xb9\x0fs\x90\xb6\xaa`\xe8\x12\xc3\"\x87\xbf\xab\x80h\x97\x89C\t\x84\x9d\xed\xa5ED\xb5P\xde\xa65\xf7\xa1\x1eW\xb3n\xd1\x0f\xeaa\xe2\xcf:\xb6\xa0+\x12W\x9e\x13\x15\xdb\xf6T#\x83\xe59\x04', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000640)=ANY=[@ANYRES32=0x0], 0x0, 0x4, 0x0, 0xffffffffffffbfff}, 0x20) openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r5 = gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000540)=r5, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) 03:48:49 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e4359", 0x9d}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r2, 0xffffffffffffffff, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) fcntl$lock(r3, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100}) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(r4, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:49 executing program 1: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r3, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x20}, 0xf) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d66", 0xb9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489abcd69fcc7154d066c7ff2e07b", 0xd1}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b07", 0x65}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r5, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0x0, 0x100}) r7 = fcntl$getown(r6, 0x9) fcntl$lock(r6, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r7}) r8 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) pipe2(&(0x7f0000000140), 0x1800) setsockopt$packet_buf(r8, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:49 executing program 3: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000200)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r0, &(0x7f0000000140)="1f0000000104fffffd3b59c007110000f30501000b000300006872cc0200cf", 0x1f) 03:48:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x3) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shutdown(r1, 0x2) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x3, 0x0, 0x0) ftruncate(r0, 0x3) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x24}}, 0x14) 03:48:49 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') preadv(r1, &(0x7f00000003c0), 0x0, 0x0) [ 3438.757597][ T7037] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3438.765014][ T7026] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 3438.801451][ T7026] CPU: 0 PID: 7026 Comm: syz-executor.2 Not tainted 5.3.0-rc1+ #49 [ 3438.809379][ T7026] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3438.819600][ T7026] Call Trace: [ 3438.822890][ T7026] dump_stack+0x1d8/0x2f8 [ 3438.827226][ T7026] dump_header+0xd8/0x960 [ 3438.831560][ T7026] oom_kill_process+0xcd/0x350 [ 3438.836329][ T7026] out_of_memory+0x5ce/0x890 [ 3438.839229][ T7043] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3438.840922][ T7026] ? unregister_oom_notifier+0x20/0x20 [ 3438.840938][ T7026] ? __kasan_check_read+0x11/0x20 [ 3438.840956][ T7026] try_charge+0x137d/0x1a60 [ 3438.840988][ T7026] ? __memcg_kmem_charge_memcg+0xf0/0xf0 [ 3438.870810][ T7026] ? __lock_acquire+0x4750/0x4750 [ 3438.875856][ T7026] ? rcu_lock_release+0x15/0x20 [ 3438.880721][ T7026] ? get_mem_cgroup_from_mm+0x15b/0x170 [ 3438.886269][ T7026] mem_cgroup_try_charge+0x20c/0x680 [ 3438.891559][ T7026] mem_cgroup_try_charge_delay+0x25/0xa0 [ 3438.897193][ T7026] wp_page_copy+0x394/0x1960 [ 3438.901805][ T7026] ? rcu_lock_release+0x30/0x30 [ 3438.906672][ T7026] ? __lock_acquire+0x4750/0x4750 [ 3438.911702][ T7026] ? __kasan_check_read+0x11/0x20 [ 3438.916723][ T7026] ? do_raw_spin_unlock+0x49/0x260 [ 3438.921833][ T7026] do_wp_page+0x2c9/0x1ce0 [ 3438.926256][ T7026] ? __rwlock_init+0x130/0x130 [ 3438.931015][ T7026] ? count_memcg_event_mm+0x300/0x300 [ 3438.936392][ T7026] handle_mm_fault+0x2bd9/0x6070 [ 3438.941341][ T7026] ? finish_fault+0x230/0x230 [ 3438.946026][ T7026] ? __up_read+0x5b0/0x5b0 [ 3438.950452][ T7026] ? __x64_sys_newfstat+0x151/0x1b0 [ 3438.955677][ T7026] ? vmacache_find+0x566/0x5b0 [ 3438.960446][ T7026] ? vmacache_update+0xb7/0x120 [ 3438.965300][ T7026] do_user_addr_fault+0x589/0xaf0 [ 3438.970335][ T7026] __do_page_fault+0xd3/0x1f0 [ 3438.975015][ T7026] do_page_fault+0x99/0xb0 [ 3438.979431][ T7026] page_fault+0x39/0x40 [ 3438.983579][ T7026] RIP: 0033:0x430906 [ 3438.987475][ T7026] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 56 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 5c 46 64 00 85 c0 0f 84 [ 3439.007071][ T7026] RSP: 002b:00007fff5d1dc7b0 EFLAGS: 00010206 [ 3439.013161][ T7026] RAX: 0000000000019691 RBX: 0000000000715640 RCX: 0000000000008041 [ 3439.021128][ T7026] RDX: 00005555559b6930 RSI: 00005555559be970 RDI: 0000000000000003 [ 3439.029121][ T7026] RBP: 0000000000008041 R08: 0000000000000001 R09: 00005555559b5940 [ 3439.037120][ T7026] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000715698 03:48:49 executing program 1: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r3, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x20}, 0xf) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d66", 0xb9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489abcd69fcc7154d066c7ff2e07b", 0xd1}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b07", 0x65}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r5, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0x0, 0x100}) r7 = fcntl$getown(r6, 0x9) fcntl$lock(r6, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r7}) r8 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) pipe2(&(0x7f0000000140), 0x1800) setsockopt$packet_buf(r8, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:49 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') preadv(r1, &(0x7f00000003c0), 0x0, 0x0) 03:48:49 executing program 3: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000200)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r0, &(0x7f0000000140)="1f0000000104fffffd3b59c007110000f30501000b000300006872cc0200cf", 0x1f) [ 3439.045125][ T7026] R13: 0000000000715698 R14: 0000000000000000 R15: 0000000000002710 [ 3439.124170][ T7026] memory: usage 10220kB, limit 0kB, failcnt 197 [ 3439.130542][ T7026] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3439.139343][ T7227] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 3439.187794][ T7026] Memory cgroup stats for /syz2: [ 3439.188438][ T7026] anon 73728 [ 3439.188438][ T7026] file 155648 [ 3439.188438][ T7026] kernel_stack 0 [ 3439.188438][ T7026] slab 10567680 [ 3439.188438][ T7026] sock 0 [ 3439.188438][ T7026] shmem 126976 [ 3439.188438][ T7026] file_mapped 0 [ 3439.188438][ T7026] file_dirty 0 [ 3439.188438][ T7026] file_writeback 0 [ 3439.188438][ T7026] anon_thp 0 [ 3439.188438][ T7026] inactive_anon 98304 [ 3439.188438][ T7026] active_anon 73728 [ 3439.188438][ T7026] inactive_file 0 03:48:50 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e4359", 0x9d}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r2, 0xffffffffffffffff, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) fcntl$lock(r3, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100}) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(r4, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:50 executing program 3: r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000021002551075c0165ff0ffc020200000000100f0207e1000c08000a0003000000", 0x24) 03:48:50 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') preadv(r1, &(0x7f00000003c0), 0x0, 0x0) [ 3439.188438][ T7026] active_file 0 [ 3439.188438][ T7026] unevictable 131072 [ 3439.188438][ T7026] slab_reclaimable 5136384 [ 3439.188438][ T7026] slab_unreclaimable 5431296 [ 3439.188438][ T7026] pgfault 502062 [ 3439.188438][ T7026] pgmajfault 0 [ 3439.188438][ T7026] workingset_refault 0 [ 3439.188438][ T7026] workingset_activate 0 [ 3439.188438][ T7026] workingset_nodereclaim 0 [ 3439.188438][ T7026] pgrefill 35 [ 3439.188438][ T7026] pgscan 0 [ 3439.188438][ T7026] pgsteal 0 [ 3439.188438][ T7026] pgactivate 0 [ 3439.503107][ T7026] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=7026,uid=0 [ 3439.598324][ T7026] Memory cgroup out of memory: Killed process 7026 (syz-executor.2) total-vm:72444kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB [ 3439.620373][ T1056] oom_reaper: reaped process 7026 (syz-executor.2), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB 03:48:50 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') preadv(r1, &(0x7f00000003c0)=[{0x0}], 0x1, 0x0) 03:48:50 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) socket$kcm(0x2b, 0x1, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000002c0)=ANY=[@ANYBLOB="a1c1"]) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000ec600000000000000000000000000000400000000005f00"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.\\G10I\xb8\x8f8\x00\x15o\x1e\xc98\x7f\xcb\xecA\xf3\xbf\x9c\xd8R\xa2|\xef\xe3\x8b\x05\x94\xf9Gx\x1f\xfdi\x9b\x83`\xb8Y\x1aV\xbe\xeb\xb3\xd3v\xb9\x0fs\x90\xb6\xaa`\xe8\x12\xc3\"\x87\xbf\xab\x80h\x97\x89C\t\x84\x9d\xed\xa5ED\xb5P\xde\xa65\xf7\xa1\x1eW\xb3n\xd1\x0f\xeaa\xe2\xcf:\xb6\xa0+\x12W\x9e\x13\x15\xdb\xf6T#\x83\xe59\x04', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000640)=ANY=[@ANYRES32=0x0], 0x0, 0x4, 0x0, 0xffffffffffffbfff}, 0x20) openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r5 = gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000540)=r5, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) 03:48:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x3) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shutdown(r1, 0x2) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x3, 0x0, 0x0) ftruncate(r0, 0x3) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x24}}, 0x14) 03:48:50 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb3) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:48:50 executing program 1: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r3, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x20}, 0xf) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d66", 0xb9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489abcd69fcc7154d066c7ff2e07b", 0xd1}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b07", 0x65}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r5, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa}) r7 = fcntl$getown(r6, 0x9) fcntl$lock(r6, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r7}) r8 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) pipe2(&(0x7f0000000140), 0x1800) setsockopt$packet_buf(r8, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:50 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e4359", 0x9d}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r2, 0xffffffffffffffff, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) fcntl$lock(r3, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100}) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(r4, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:50 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') preadv(r1, &(0x7f00000003c0)=[{0x0}], 0x1, 0x0) [ 3440.023220][ T7485] FS-Cache: Duplicate cookie detected [ 3440.029794][ T7485] FS-Cache: O-cookie c=000000002eaf2384 [p=000000008669d53b fl=222 nc=0 na=1] [ 3440.038820][ T7485] FS-Cache: O-cookie d=00000000531d9e7f n=000000004a203968 [ 3440.046161][ T7485] FS-Cache: O-key=[10] '02000200000002000000' [ 3440.052932][ T7485] FS-Cache: N-cookie c=00000000b51e6f8d [p=000000008669d53b fl=2 nc=0 na=1] [ 3440.062063][ T7485] FS-Cache: N-cookie d=00000000531d9e7f n=00000000cbcb0f3f [ 3440.069440][ T7485] FS-Cache: N-key=[10] '02000200000002000000' 03:48:51 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') preadv(r1, &(0x7f00000003c0), 0x0, 0x0) 03:48:51 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) socket$kcm(0x2b, 0x1, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000002c0)=ANY=[@ANYBLOB="a1c1"]) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000ec600000000000000000000000000000400000000005f00"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.\\G10I\xb8\x8f8\x00\x15o\x1e\xc98\x7f\xcb\xecA\xf3\xbf\x9c\xd8R\xa2|\xef\xe3\x8b\x05\x94\xf9Gx\x1f\xfdi\x9b\x83`\xb8Y\x1aV\xbe\xeb\xb3\xd3v\xb9\x0fs\x90\xb6\xaa`\xe8\x12\xc3\"\x87\xbf\xab\x80h\x97\x89C\t\x84\x9d\xed\xa5ED\xb5P\xde\xa65\xf7\xa1\x1eW\xb3n\xd1\x0f\xeaa\xe2\xcf:\xb6\xa0+\x12W\x9e\x13\x15\xdb\xf6T#\x83\xe59\x04', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000640)=ANY=[@ANYRES32=0x0], 0x0, 0x4, 0x0, 0xffffffffffffbfff}, 0x20) openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r5 = gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000540)=r5, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) 03:48:51 executing program 1: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r3, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x20}, 0xf) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d66", 0xb9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489abcd69fcc7154d066c7ff2e07b", 0xd1}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b07", 0x65}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r5, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa}) r7 = fcntl$getown(r6, 0x9) fcntl$lock(r6, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r7}) r8 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) pipe2(&(0x7f0000000140), 0x1800) setsockopt$packet_buf(r8, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x3) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shutdown(r1, 0x2) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x3, 0x0, 0x0) ftruncate(r0, 0x3) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x24}}, 0x14) 03:48:51 executing program 5: r0 = socket$isdn(0x22, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e4359", 0x9d}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r3, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) fcntl$lock(r4, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100}) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(r5, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:51 executing program 1: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r3, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x20}, 0xf) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d66", 0xb9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489abcd69fcc7154d066c7ff2e07b", 0xd1}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b07", 0x65}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r5, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa}) r7 = fcntl$getown(r6, 0x9) fcntl$lock(r6, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r7}) r8 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) pipe2(&(0x7f0000000140), 0x1800) setsockopt$packet_buf(r8, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:52 executing program 1: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r3, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x20}, 0xf) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d66", 0xb9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489abcd69fcc7154d066c7ff2e07b", 0xd1}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b07", 0x65}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r5, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r7 = fcntl$getown(0xffffffffffffffff, 0x9) fcntl$lock(r6, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r7}) r8 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) pipe2(&(0x7f0000000140), 0x1800) setsockopt$packet_buf(r8, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:52 executing program 5: r0 = socket$isdn(0x22, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e4359", 0x9d}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r3, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) fcntl$lock(r4, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100}) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(r5, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:52 executing program 0: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r3, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x20}, 0xf) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d66", 0xb9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489abcd69fcc7154d066c7ff2e07b", 0xd1}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b07", 0x65}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r5, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0x0, 0x100}) r7 = fcntl$getown(r6, 0x9) fcntl$lock(r6, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r7}) r8 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) pipe2(&(0x7f0000000140), 0x1800) setsockopt$packet_buf(r8, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) [ 3441.331325][ T8560] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 03:48:52 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') preadv(r1, &(0x7f00000003c0), 0x0, 0x0) 03:48:52 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') preadv(r1, &(0x7f00000003c0)=[{0x0}], 0x1, 0x0) 03:48:52 executing program 1: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r3, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x20}, 0xf) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d66", 0xb9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489abcd69fcc7154d066c7ff2e07b", 0xd1}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b07", 0x65}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r5, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r7 = fcntl$getown(0xffffffffffffffff, 0x9) fcntl$lock(r6, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r7}) r8 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) pipe2(&(0x7f0000000140), 0x1800) setsockopt$packet_buf(r8, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) [ 3441.654068][ T8574] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 03:48:52 executing program 5: r0 = socket$isdn(0x22, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e4359", 0x9d}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r3, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) fcntl$lock(r4, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100}) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(r5, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) [ 3441.821289][ T8838] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3442.839833][ T8896] IPVS: ftp: loaded support on port[0] = 21 [ 3442.846399][ T24] device bridge_slave_1 left promiscuous mode [ 3442.852627][ T24] bridge0: port 2(bridge_slave_1) entered disabled state [ 3442.914838][ T24] device bridge_slave_0 left promiscuous mode [ 3442.920996][ T24] bridge0: port 1(bridge_slave_0) entered disabled state [ 3444.754011][ T24] device hsr_slave_0 left promiscuous mode [ 3444.804356][ T24] device hsr_slave_1 left promiscuous mode [ 3444.853063][ T24] team0 (unregistering): Port device team_slave_1 removed [ 3444.866997][ T24] team0 (unregistering): Port device team_slave_0 removed [ 3444.878531][ T24] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3444.918726][ T24] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3445.005470][ T24] bond0 (unregistering): Released all slaves [ 3445.156597][ T8896] chnl_net:caif_netlink_parms(): no params data found [ 3445.189803][ T8896] bridge0: port 1(bridge_slave_0) entered blocking state [ 3445.197208][ T8896] bridge0: port 1(bridge_slave_0) entered disabled state [ 3445.205271][ T8896] device bridge_slave_0 entered promiscuous mode [ 3445.212997][ T8896] bridge0: port 2(bridge_slave_1) entered blocking state [ 3445.220172][ T8896] bridge0: port 2(bridge_slave_1) entered disabled state [ 3445.227874][ T8896] device bridge_slave_1 entered promiscuous mode [ 3445.248273][ T8896] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3445.258982][ T8896] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3445.278375][ T8896] team0: Port device team_slave_0 added [ 3445.285833][ T8896] team0: Port device team_slave_1 added [ 3445.356498][ T8896] device hsr_slave_0 entered promiscuous mode [ 3445.394045][ T8896] device hsr_slave_1 entered promiscuous mode [ 3445.437701][ T8896] debugfs: Directory 'hsr0' with parent '/' already present! [ 3445.513307][ T8896] bridge0: port 2(bridge_slave_1) entered blocking state [ 3445.520434][ T8896] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3445.527851][ T8896] bridge0: port 1(bridge_slave_0) entered blocking state [ 3445.534949][ T8896] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3445.609782][ T8896] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3445.631383][T29750] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3445.641543][T29750] bridge0: port 1(bridge_slave_0) entered disabled state [ 3445.655132][T29750] bridge0: port 2(bridge_slave_1) entered disabled state [ 3445.675172][ T8896] 8021q: adding VLAN 0 to HW filter on device team0 [ 3445.693986][T24822] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3445.702889][T24822] bridge0: port 1(bridge_slave_0) entered blocking state [ 3445.710007][T24822] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3445.740866][T22778] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3445.751012][T22778] bridge0: port 2(bridge_slave_1) entered blocking state [ 3445.758127][T22778] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3445.790502][T22778] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3445.800178][T22778] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3445.815413][T22778] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3445.832586][ T8896] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3445.850197][ T8896] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3445.860582][T24822] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3445.875442][T24822] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3445.903001][ T8896] 8021q: adding VLAN 0 to HW filter on device batadv0 03:48:56 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) socket$kcm(0x2b, 0x1, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000002c0)=ANY=[@ANYBLOB="a1c1"]) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000ec600000000000000000000000000000400000000005f00"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.\\G10I\xb8\x8f8\x00\x15o\x1e\xc98\x7f\xcb\xecA\xf3\xbf\x9c\xd8R\xa2|\xef\xe3\x8b\x05\x94\xf9Gx\x1f\xfdi\x9b\x83`\xb8Y\x1aV\xbe\xeb\xb3\xd3v\xb9\x0fs\x90\xb6\xaa`\xe8\x12\xc3\"\x87\xbf\xab\x80h\x97\x89C\t\x84\x9d\xed\xa5ED\xb5P\xde\xa65\xf7\xa1\x1eW\xb3n\xd1\x0f\xeaa\xe2\xcf:\xb6\xa0+\x12W\x9e\x13\x15\xdb\xf6T#\x83\xe59\x04', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000640)=ANY=[@ANYRES32=0x0], 0x0, 0x4, 0x0, 0xffffffffffffbfff}, 0x20) r5 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r6 = gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000540)=r6, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_int(r5, 0x0, 0x0) 03:48:56 executing program 0: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e4359", 0x9d}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r3, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) fcntl$lock(r4, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100}) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(r5, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:56 executing program 5: r0 = socket$isdn(0x22, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e4359", 0x9d}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r2, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) fcntl$lock(r3, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100}) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(r4, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:56 executing program 1: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r3, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x20}, 0xf) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d66", 0xb9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489abcd69fcc7154d066c7ff2e07b", 0xd1}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b07", 0x65}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r5, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r7 = fcntl$getown(0xffffffffffffffff, 0x9) fcntl$lock(r6, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r7}) r8 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) pipe2(&(0x7f0000000140), 0x1800) setsockopt$packet_buf(r8, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:56 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') preadv(r1, &(0x7f00000003c0), 0x0, 0x0) 03:48:56 executing program 4: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b2", 0x3d}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489", 0xc4}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r6 = fcntl$getown(r5, 0x9) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r6}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e", 0x46) [ 3446.227479][ T8906] FS-Cache: Duplicate cookie detected [ 3446.233166][ T8906] FS-Cache: O-cookie c=0000000002ccf5ad [p=000000008669d53b fl=222 nc=0 na=1] [ 3446.244134][ T8906] FS-Cache: O-cookie d=00000000531d9e7f n=00000000b4e7225c [ 3446.251528][ T8906] FS-Cache: O-key=[10] '02000200000002000000' [ 3446.257847][ T8906] FS-Cache: N-cookie c=00000000e1797d1c [p=000000008669d53b fl=2 nc=0 na=1] [ 3446.266712][ T8906] FS-Cache: N-cookie d=00000000531d9e7f n=00000000b383d83d [ 3446.274100][ T8906] FS-Cache: N-key=[10] '02000200000002000000' [ 3446.280985][ T8915] FS-Cache: Duplicate cookie detected [ 3446.286675][ T8915] FS-Cache: O-cookie c=0000000002ccf5ad [p=000000008669d53b fl=222 nc=0 na=1] [ 3446.295879][ T8915] FS-Cache: O-cookie d=00000000531d9e7f n=00000000b4e7225c [ 3446.303195][ T8915] FS-Cache: O-key=[10] '02000200000002000000' [ 3446.309755][ T8915] FS-Cache: N-cookie c=000000005fdb4e84 [p=000000008669d53b fl=2 nc=0 na=1] [ 3446.318749][ T8915] FS-Cache: N-cookie d=00000000531d9e7f n=00000000fa8484b0 03:48:57 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) socket$kcm(0x2b, 0x1, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000002c0)=ANY=[@ANYBLOB="a1c1"]) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000ec600000000000000000000000000000400000000005f00"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.\\G10I\xb8\x8f8\x00\x15o\x1e\xc98\x7f\xcb\xecA\xf3\xbf\x9c\xd8R\xa2|\xef\xe3\x8b\x05\x94\xf9Gx\x1f\xfdi\x9b\x83`\xb8Y\x1aV\xbe\xeb\xb3\xd3v\xb9\x0fs\x90\xb6\xaa`\xe8\x12\xc3\"\x87\xbf\xab\x80h\x97\x89C\t\x84\x9d\xed\xa5ED\xb5P\xde\xa65\xf7\xa1\x1eW\xb3n\xd1\x0f\xeaa\xe2\xcf:\xb6\xa0+\x12W\x9e\x13\x15\xdb\xf6T#\x83\xe59\x04', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000640)=ANY=[@ANYRES32=0x0], 0x0, 0x4, 0x0, 0xffffffffffffbfff}, 0x20) openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r5 = gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000540)=r5, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) [ 3446.326153][ T8915] FS-Cache: N-key=[10] '02000200000002000000' [ 3446.334493][ T8910] FS-Cache: Duplicate cookie detected [ 3446.340016][ T8910] FS-Cache: O-cookie c=0000000002ccf5ad [p=000000008669d53b fl=222 nc=0 na=1] [ 3446.348985][ T8910] FS-Cache: O-cookie d=00000000531d9e7f n=00000000b4e7225c [ 3446.357451][ T8910] FS-Cache: O-key=[10] '02000200000002000000' [ 3446.364307][ T8910] FS-Cache: N-cookie c=000000006dfbbbca [p=000000008669d53b fl=2 nc=0 na=1] [ 3446.373143][ T8910] FS-Cache: N-cookie d=00000000531d9e7f n=0000000031421cf3 [ 3446.380541][ T8910] FS-Cache: N-key=[10] '02000200000002000000' 03:48:57 executing program 0: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e4359", 0x9d}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r3, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) fcntl$lock(r4, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100}) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(r5, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:57 executing program 1: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r3, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x20}, 0xf) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d66", 0xb9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489abcd69fcc7154d066c7ff2e07b", 0xd1}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b07", 0x65}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r5, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r7 = fcntl$getown(r6, 0x9) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r7}) r8 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) pipe2(&(0x7f0000000140), 0x1800) setsockopt$packet_buf(r8, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) [ 3446.567155][ T8918] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3446.622565][ T8918] CPU: 0 PID: 8918 Comm: syz-executor.2 Not tainted 5.3.0-rc1+ #49 [ 3446.630491][ T8918] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3446.630502][ T8918] Call Trace: [ 3446.643839][ T8918] dump_stack+0x1d8/0x2f8 [ 3446.648172][ T8918] dump_header+0xd8/0x960 [ 3446.652500][ T8918] oom_kill_process+0xcd/0x350 [ 3446.657263][ T8918] out_of_memory+0x5ce/0x890 [ 3446.661851][ T8918] ? unregister_oom_notifier+0x20/0x20 [ 3446.661874][ T8918] memory_max_write+0x537/0x6a0 [ 3446.661889][ T8918] ? lock_acquire+0x158/0x250 [ 3446.676846][ T8918] ? memory_max_show+0xa0/0xa0 [ 3446.681620][ T8918] ? trace_lock_acquire+0x159/0x1d0 [ 3446.686815][ T8918] ? lock_acquire+0x158/0x250 [ 3446.686828][ T8918] ? kernfs_fop_write+0x22e/0x4f0 [ 3446.686838][ T8918] ? memory_max_show+0xa0/0xa0 [ 3446.686852][ T8918] cgroup_file_write+0x27b/0x6e0 [ 3446.686868][ T8918] ? cgroup_seqfile_stop+0xc0/0xc0 [ 3446.686887][ T8918] ? cgroup_seqfile_stop+0xc0/0xc0 [ 3446.716399][ T8918] kernfs_fop_write+0x3e4/0x4f0 [ 3446.716414][ T8918] ? kernfs_fop_read+0x580/0x580 [ 3446.716445][ T8918] __vfs_write+0xf9/0x7d0 [ 3446.730526][ T8918] ? __kernel_write+0x350/0x350 [ 3446.735378][ T8918] ? trace_lock_acquire+0x159/0x1d0 [ 3446.740593][ T8918] ? __sb_start_write+0x403/0x4c0 [ 3446.745619][ T8918] vfs_write+0x275/0x590 [ 3446.749866][ T8918] ksys_write+0x16b/0x2a0 [ 3446.754194][ T8918] ? __ia32_sys_read+0x90/0x90 [ 3446.758948][ T8918] ? check_preemption_disabled+0xb7/0x2a0 [ 3446.764665][ T8918] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 3446.770121][ T8918] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 3446.775834][ T8918] ? do_syscall_64+0x1d/0x140 [ 3446.780523][ T8918] __x64_sys_write+0x7b/0x90 [ 3446.785114][ T8918] do_syscall_64+0xfe/0x140 [ 3446.789622][ T8918] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3446.795507][ T8918] RIP: 0033:0x459829 [ 3446.799403][ T8918] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:48:57 executing program 3: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b2", 0x3d}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489", 0xc4}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r6 = fcntl$getown(r5, 0x9) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r6}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9", 0x2f) [ 3446.819077][ T8918] RSP: 002b:00007fb764b12c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3446.827486][ T8918] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829 [ 3446.835459][ T8918] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 3446.843419][ T8918] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3446.851379][ T8918] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb764b136d4 [ 3446.859349][ T8918] R13: 00000000004c9774 R14: 00000000004e0b70 R15: 00000000ffffffff [ 3446.876738][ T8918] memory: usage 11384kB, limit 0kB, failcnt 198 [ 3446.916588][ T8918] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3446.919947][ T9335] FS-Cache: Duplicate cookie detected [ 3446.929254][ T9335] FS-Cache: O-cookie c=00000000ba5243d9 [p=000000008669d53b fl=222 nc=0 na=1] [ 3446.938203][ T9335] FS-Cache: O-cookie d=00000000531d9e7f n=00000000a1bd53d4 [ 3446.945546][ T9335] FS-Cache: O-key=[10] '02000200000002000000' [ 3446.951830][ T9335] FS-Cache: N-cookie c=0000000074c04f9f [p=000000008669d53b fl=2 nc=0 na=1] [ 3446.960740][ T9335] FS-Cache: N-cookie d=00000000531d9e7f n=00000000f424db59 [ 3446.968231][ T9335] FS-Cache: N-key=[10] '02000200000002000000' 03:48:57 executing program 4: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b2", 0x3d}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489", 0xc4}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r6 = fcntl$getown(r5, 0x9) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r6}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e", 0x46) [ 3446.989415][ T8918] Memory cgroup stats for /syz2: [ 3446.993273][ T8918] anon 2207744 [ 3446.993273][ T8918] file 155648 [ 3446.993273][ T8918] kernel_stack 0 [ 3446.993273][ T8918] slab 9326592 [ 3446.993273][ T8918] sock 0 [ 3446.993273][ T8918] shmem 126976 [ 3446.993273][ T8918] file_mapped 0 [ 3446.993273][ T8918] file_dirty 0 [ 3446.993273][ T8918] file_writeback 0 [ 3446.993273][ T8918] anon_thp 2097152 [ 3446.993273][ T8918] inactive_anon 98304 [ 3446.993273][ T8918] active_anon 2179072 [ 3446.993273][ T8918] inactive_file 0 [ 3446.993273][ T8918] active_file 0 [ 3446.993273][ T8918] unevictable 131072 [ 3446.993273][ T8918] slab_reclaimable 4866048 [ 3446.993273][ T8918] slab_unreclaimable 4460544 [ 3446.993273][ T8918] pgfault 502161 [ 3446.993273][ T8918] pgmajfault 0 [ 3446.993273][ T8918] workingset_refault 0 [ 3446.993273][ T8918] workingset_activate 0 [ 3446.993273][ T8918] workingset_nodereclaim 0 [ 3446.993273][ T8918] pgrefill 35 [ 3446.993273][ T8918] pgscan 0 [ 3446.993273][ T8918] pgsteal 0 [ 3446.993273][ T8918] pgactivate 0 [ 3447.024217][ T9343] FS-Cache: Duplicate cookie detected [ 3447.094955][ T9343] FS-Cache: O-cookie c=00000000ba5243d9 [p=000000008669d53b fl=222 nc=0 na=1] [ 3447.103952][ T9343] FS-Cache: O-cookie d=00000000531d9e7f n=00000000a1bd53d4 [ 3447.111297][ T9343] FS-Cache: O-key=[10] '02000200000002000000' [ 3447.118394][ T9343] FS-Cache: N-cookie c=00000000257b9baa [p=000000008669d53b fl=2 nc=0 na=1] [ 3447.127241][ T9343] FS-Cache: N-cookie d=00000000531d9e7f n=000000009659d05a [ 3447.134610][ T9343] FS-Cache: N-key=[10] '02000200000002000000' 03:48:58 executing program 5: r0 = socket$isdn(0x22, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e4359", 0x9d}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r2, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) fcntl$lock(r3, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100}) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(r4, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) [ 3447.455212][ T8918] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=8917,uid=0 [ 3447.477372][ T8918] Memory cgroup out of memory: Killed process 8918 (syz-executor.2) total-vm:72572kB, anon-rss:2188kB, file-rss:35792kB, shmem-rss:0kB 03:48:58 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) socket$kcm(0x2b, 0x1, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000002c0)=ANY=[@ANYBLOB="a1c1"]) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000ec600000000000000000000000000000400000000005f00"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.\\G10I\xb8\x8f8\x00\x15o\x1e\xc98\x7f\xcb\xecA\xf3\xbf\x9c\xd8R\xa2|\xef\xe3\x8b\x05\x94\xf9Gx\x1f\xfdi\x9b\x83`\xb8Y\x1aV\xbe\xeb\xb3\xd3v\xb9\x0fs\x90\xb6\xaa`\xe8\x12\xc3\"\x87\xbf\xab\x80h\x97\x89C\t\x84\x9d\xed\xa5ED\xb5P\xde\xa65\xf7\xa1\x1eW\xb3n\xd1\x0f\xeaa\xe2\xcf:\xb6\xa0+\x12W\x9e\x13\x15\xdb\xf6T#\x83\xe59\x04', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000640)=ANY=[@ANYRES32=0x0], 0x0, 0x4, 0x0, 0xffffffffffffbfff}, 0x20) r5 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r6 = gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000540)=r6, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_int(r5, 0x0, 0x0) 03:48:58 executing program 1: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r3, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x20}, 0xf) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d66", 0xb9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489abcd69fcc7154d066c7ff2e07b", 0xd1}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b07", 0x65}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r5, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r7 = fcntl$getown(r6, 0x9) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r7}) r8 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) pipe2(&(0x7f0000000140), 0x1800) setsockopt$packet_buf(r8, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:58 executing program 4: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b2", 0x3d}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489", 0xc4}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r6 = fcntl$getown(r5, 0x9) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r6}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x17, &(0x7f0000000080), 0x0) 03:48:58 executing program 0: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e4359", 0x9d}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r3, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) fcntl$lock(r4, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100}) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(r5, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:58 executing program 5: r0 = socket$isdn(0x22, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e4359", 0x9d}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r2, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) fcntl$lock(r3, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100}) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(r4, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:58 executing program 3: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b2", 0x3d}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489", 0xc4}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r6 = fcntl$getown(r5, 0x9) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r6}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9", 0x2f) [ 3447.638094][ T8896] syz-executor.2 invoked oom-killer: gfp_mask=0x40cc0(GFP_KERNEL|__GFP_COMP), order=1, oom_score_adj=0 [ 3447.668953][ T9668] FS-Cache: Duplicate cookie detected [ 3447.675391][ T9668] FS-Cache: O-cookie c=0000000064e8ff0a [p=000000008669d53b fl=222 nc=0 na=1] [ 3447.684507][ T9668] FS-Cache: O-cookie d=00000000531d9e7f n=0000000087224b69 [ 3447.691915][ T9668] FS-Cache: O-key=[10] '02000200000002000000' [ 3447.698621][ T9668] FS-Cache: N-cookie c=00000000659d3804 [p=000000008669d53b fl=2 nc=0 na=1] [ 3447.707497][ T9668] FS-Cache: N-cookie d=00000000531d9e7f n=00000000969dfc4c [ 3447.714912][ T9668] FS-Cache: N-key=[10] '02000200000002000000' [ 3447.716103][ T8896] CPU: 1 PID: 8896 Comm: syz-executor.2 Not tainted 5.3.0-rc1+ #49 [ 3447.729040][ T8896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3447.739085][ T8896] Call Trace: [ 3447.741505][ T9667] FS-Cache: Duplicate cookie detected [ 3447.742375][ T8896] dump_stack+0x1d8/0x2f8 [ 3447.742392][ T8896] dump_header+0xd8/0x960 [ 3447.742409][ T8896] oom_kill_process+0xcd/0x350 [ 3447.742422][ T8896] out_of_memory+0x5ce/0x890 [ 3447.742436][ T8896] ? unregister_oom_notifier+0x20/0x20 [ 3447.742452][ T8896] ? __kasan_check_read+0x11/0x20 [ 3447.742469][ T8896] try_charge+0x137d/0x1a60 [ 3447.748054][ T9667] FS-Cache: O-cookie c=0000000064e8ff0a [p=000000008669d53b fl=222 nc=0 na=1] [ 3447.752151][ T8896] ? prep_compound_page+0x157/0x1d0 [ 3447.752179][ T8896] ? __memcg_kmem_charge_memcg+0xf0/0xf0 [ 3447.756810][ T9667] FS-Cache: O-cookie d=00000000531d9e7f n=0000000087224b69 [ 3447.761230][ T8896] ? trace_mm_page_alloc+0x18c/0x1f0 [ 3447.761256][ T8896] ? rcu_lock_acquire+0x30/0x30 [ 3447.761278][ T8896] __memcg_kmem_charge_memcg+0x75/0xf0 [ 3447.765967][ T9667] FS-Cache: O-key=[10] '02000200000002000000' [ 3447.771298][ T8896] ? memcg_kmem_put_cache+0x170/0x170 [ 3447.771309][ T8896] ? kmem_freepages+0x590/0x590 [ 3447.771321][ T8896] ? check_preemption_disabled+0x47/0x2a0 [ 3447.771342][ T8896] kmem_getpages+0x459/0xa20 [ 3447.771358][ T8896] cache_grow_begin+0x7e/0x2c0 [ 3447.776493][ T9667] FS-Cache: N-cookie c=000000005d5913ed [p=000000008669d53b fl=2 nc=0 na=1] [ 3447.780968][ T8896] ? __cpuset_node_allowed+0x195/0x510 [ 3447.780985][ T8896] fallback_alloc+0x134/0x1c0 [ 3447.781002][ T8896] ____cache_alloc_node+0x22a/0x250 [ 3447.781027][ T8896] kmem_cache_alloc_node_trace+0x169/0x2d0 [ 3447.790032][ T9667] FS-Cache: N-cookie d=00000000531d9e7f n=000000005c8d7ec1 [ 3447.795031][ T8896] ? __kmalloc_node+0x3c/0x60 [ 3447.795048][ T8896] __kmalloc_node+0x3c/0x60 [ 3447.795063][ T8896] kvmalloc_node+0xcc/0x130 [ 3447.795077][ T8896] xt_alloc_table_info+0x45/0xb0 [ 3447.795090][ T8896] do_ip6t_set_ctl+0x285/0x5b0 [ 3447.795102][ T8896] ? mutex_lock_io_nested+0x60/0x60 [ 3447.795115][ T8896] ? cleanup_entry+0x4d0/0x4d0 [ 3447.795125][ T8896] ? __mutex_unlock_slowpath+0x18c/0x630 [ 3447.795154][ T8896] nf_setsockopt+0x286/0x2b0 [ 3447.800807][ T9667] FS-Cache: N-key=[10] '02000200000002000000' [ 3447.807941][ T8896] ipv6_setsockopt+0x9e/0x170 [ 3447.807956][ T8896] tcp_setsockopt+0xbe/0xd0 [ 3447.807975][ T8896] sock_common_setsockopt+0x99/0xb0 [ 3447.807986][ T8896] ? sock_common_recvmsg+0x240/0x240 [ 3447.807999][ T8896] __sys_setsockopt+0x683/0x870 [ 3447.808019][ T8896] ? rcu_lock_release+0x30/0x30 [ 3447.808030][ T8896] ? up_read+0x22/0x30 [ 3447.808044][ T8896] ? check_preemption_disabled+0xb7/0x2a0 [ 3447.808058][ T8896] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 3447.808070][ T8896] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 3447.808085][ T8896] __x64_sys_setsockopt+0xbf/0xd0 [ 3447.808099][ T8896] do_syscall_64+0xfe/0x140 [ 3447.808116][ T8896] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3447.808126][ T8896] RIP: 0033:0x45c35a [ 3447.808138][ T8896] Code: 49 89 ca b8 37 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ba 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 49 89 ca b8 36 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 3447.808145][ T8896] RSP: 002b:00007fff86085a88 EFLAGS: 00000206 ORIG_RAX: 0000000000000036 [ 3447.808155][ T8896] RAX: ffffffffffffffda RBX: 00007fff86085ab0 RCX: 000000000045c35a [ 3447.808162][ T8896] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000003 [ 3447.808168][ T8896] RBP: 0000000000712cc0 R08: 00000000000003b8 R09: 0000000000004000 [ 3447.808174][ T8896] R10: 0000000000710b60 R11: 0000000000000206 R12: 0000000000000003 [ 3447.808180][ T8896] R13: 0000000000000000 R14: 0000000000000029 R15: 0000000000710b00 [ 3448.087930][ T9670] FS-Cache: Duplicate cookie detected [ 3448.092310][ T8896] memory: usage 8860kB, limit 0kB, failcnt 210 [ 3448.093457][ T9670] FS-Cache: O-cookie c=0000000064e8ff0a [p=000000008669d53b fl=212 nc=0 na=0] [ 3448.102730][ T8896] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3448.108807][ T9670] FS-Cache: O-cookie d=00000000cec42d18 n=00000000cec42d18 [ 3448.123252][ T9670] FS-Cache: O-key=[10] '02000200000002000000' [ 3448.129808][ T9670] FS-Cache: N-cookie c=00000000209691e1 [p=000000008669d53b fl=2 nc=0 na=1] [ 3448.133889][ T8896] Memory cgroup stats for /syz2: [ 3448.134182][ T8896] anon 16384 [ 3448.134182][ T8896] file 155648 [ 3448.134182][ T8896] kernel_stack 0 [ 3448.134182][ T8896] slab 9191424 [ 3448.134182][ T8896] sock 0 [ 3448.134182][ T8896] shmem 126976 [ 3448.134182][ T8896] file_mapped 0 [ 3448.134182][ T8896] file_dirty 0 [ 3448.134182][ T8896] file_writeback 0 [ 3448.134182][ T8896] anon_thp 0 [ 3448.134182][ T8896] inactive_anon 98304 [ 3448.134182][ T8896] active_anon 16384 [ 3448.134182][ T8896] inactive_file 0 [ 3448.134182][ T8896] active_file 0 [ 3448.134182][ T8896] unevictable 131072 [ 3448.134182][ T8896] slab_reclaimable 4866048 [ 3448.134182][ T8896] slab_unreclaimable 4325376 [ 3448.134182][ T8896] pgfault 502161 [ 3448.134182][ T8896] pgmajfault 0 [ 3448.134182][ T8896] workingset_refault 0 [ 3448.134182][ T8896] workingset_activate 0 [ 3448.134182][ T8896] workingset_nodereclaim 0 [ 3448.134182][ T8896] pgrefill 35 [ 3448.134182][ T8896] pgscan 0 [ 3448.134182][ T8896] pgsteal 0 [ 3448.134182][ T8896] pgactivate 0 [ 3448.138726][ T9670] FS-Cache: N-cookie d=00000000531d9e7f n=00000000b00cbd6d [ 3448.143480][ T8896] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=8896,uid=0 [ 3448.236644][ T9670] FS-Cache: N-key=[10] '02000200000002000000' 03:48:59 executing program 4: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b2", 0x3d}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489", 0xc4}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r6 = fcntl$getown(r5, 0x9) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r6}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x17, &(0x7f0000000080), 0x0) [ 3448.293284][ T8896] Memory cgroup out of memory: Killed process 8896 (syz-executor.2) total-vm:72440kB, anon-rss:96kB, file-rss:35776kB, shmem-rss:0kB [ 3448.321406][ T1056] oom_reaper: reaped process 8896 (syz-executor.2), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 03:48:59 executing program 5: r0 = socket$isdn(0x22, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e4359", 0x9d}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r3, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) fcntl$lock(r4, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100}) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(r5, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:59 executing program 1: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r3, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x20}, 0xf) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d66", 0xb9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489abcd69fcc7154d066c7ff2e07b", 0xd1}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b07", 0x65}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r5, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r7 = fcntl$getown(r6, 0x9) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r7}) r8 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) pipe2(&(0x7f0000000140), 0x1800) setsockopt$packet_buf(r8, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:48:59 executing program 3: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b2", 0x3d}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489", 0xc4}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r6 = fcntl$getown(r5, 0x9) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r6}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9", 0x2f) 03:48:59 executing program 4: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b2", 0x3d}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489", 0xc4}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r6 = fcntl$getown(r5, 0x9) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r6}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x17, &(0x7f0000000080), 0x0) [ 3448.813039][T10335] FS-Cache: Duplicate cookie detected [ 3448.818848][T10335] FS-Cache: O-cookie c=000000004854d7fa [p=000000008669d53b fl=222 nc=0 na=1] [ 3448.828522][T10335] FS-Cache: O-cookie d=00000000531d9e7f n=00000000c4df11af [ 3448.836009][T10335] FS-Cache: O-key=[10] '02000200000002000000' [ 3448.842598][T10335] FS-Cache: N-cookie c=00000000f2fd2092 [p=000000008669d53b fl=2 nc=0 na=1] [ 3448.851536][T10335] FS-Cache: N-cookie d=00000000531d9e7f n=000000008427a612 [ 3448.858991][T10335] FS-Cache: N-key=[10] '02000200000002000000' 03:48:59 executing program 0: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) socket$kcm(0x2b, 0x1, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000002c0)=ANY=[@ANYBLOB="a1c1"]) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000ec600000000000000000000000000000400000000005f00"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.\\G10I\xb8\x8f8\x00\x15o\x1e\xc98\x7f\xcb\xecA\xf3\xbf\x9c\xd8R\xa2|\xef\xe3\x8b\x05\x94\xf9Gx\x1f\xfdi\x9b\x83`\xb8Y\x1aV\xbe\xeb\xb3\xd3v\xb9\x0fs\x90\xb6\xaa`\xe8\x12\xc3\"\x87\xbf\xab\x80h\x97\x89C\t\x84\x9d\xed\xa5ED\xb5P\xde\xa65\xf7\xa1\x1eW\xb3n\xd1\x0f\xeaa\xe2\xcf:\xb6\xa0+\x12W\x9e\x13\x15\xdb\xf6T#\x83\xe59\x04', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000640)=ANY=[@ANYRES32=0x0], 0x0, 0x4, 0x0, 0xffffffffffffbfff}, 0x20) r5 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r6 = gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000540)=r6, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_int(r5, 0x0, 0x0) 03:49:00 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) socket$kcm(0x2b, 0x1, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000002c0)=ANY=[@ANYBLOB="a1c1"]) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000ec600000000000000000000000000000400000000005f00"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.\\G10I\xb8\x8f8\x00\x15o\x1e\xc98\x7f\xcb\xecA\xf3\xbf\x9c\xd8R\xa2|\xef\xe3\x8b\x05\x94\xf9Gx\x1f\xfdi\x9b\x83`\xb8Y\x1aV\xbe\xeb\xb3\xd3v\xb9\x0fs\x90\xb6\xaa`\xe8\x12\xc3\"\x87\xbf\xab\x80h\x97\x89C\t\x84\x9d\xed\xa5ED\xb5P\xde\xa65\xf7\xa1\x1eW\xb3n\xd1\x0f\xeaa\xe2\xcf:\xb6\xa0+\x12W\x9e\x13\x15\xdb\xf6T#\x83\xe59\x04', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000640)=ANY=[@ANYRES32=0x0], 0x0, 0x4, 0x0, 0xffffffffffffbfff}, 0x20) r5 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r6 = gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000540)=r6, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_int(r5, 0x0, 0x0) 03:49:00 executing program 5: r0 = socket$isdn(0x22, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e4359", 0x9d}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r3, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) fcntl$lock(r4, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100}) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(r5, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:49:00 executing program 1: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r3, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x20}, 0xf) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d66", 0xb9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489abcd69fcc7154d066c7ff2e07b", 0xd1}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b07", 0x65}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r5, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r7 = fcntl$getown(r6, 0x9) fcntl$lock(r6, 0x0, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r7}) r8 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) pipe2(&(0x7f0000000140), 0x1800) setsockopt$packet_buf(r8, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:49:00 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) socket$kcm(0x2b, 0x1, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000002c0)=ANY=[@ANYBLOB="a1c1"]) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000ec600000000000000000000000000000400000000005f00"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.\\G10I\xb8\x8f8\x00\x15o\x1e\xc98\x7f\xcb\xecA\xf3\xbf\x9c\xd8R\xa2|\xef\xe3\x8b\x05\x94\xf9Gx\x1f\xfdi\x9b\x83`\xb8Y\x1aV\xbe\xeb\xb3\xd3v\xb9\x0fs\x90\xb6\xaa`\xe8\x12\xc3\"\x87\xbf\xab\x80h\x97\x89C\t\x84\x9d\xed\xa5ED\xb5P\xde\xa65\xf7\xa1\x1eW\xb3n\xd1\x0f\xeaa\xe2\xcf:\xb6\xa0+\x12W\x9e\x13\x15\xdb\xf6T#\x83\xe59\x04', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000640)=ANY=[@ANYRES32=0x0], 0x0, 0x4, 0x0, 0xffffffffffffbfff}, 0x20) r5 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r6 = gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000540)=r6, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_int(r5, 0x0, 0x0) 03:49:00 executing program 4: r0 = socket$isdn(0x22, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e4359", 0x9d}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r2, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) fcntl$lock(r3, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100}) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(r4, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) [ 3449.618110][T10727] FS-Cache: Duplicate cookie detected [ 3449.624604][T10727] FS-Cache: O-cookie c=000000003d015d96 [p=000000008669d53b fl=222 nc=0 na=1] [ 3449.633641][T10727] FS-Cache: O-cookie d=00000000531d9e7f n=0000000036f30522 [ 3449.641000][T10727] FS-Cache: O-key=[10] '02000200000002000000' [ 3449.647875][T10727] FS-Cache: N-cookie c=0000000034c02356 [p=000000008669d53b fl=2 nc=0 na=1] [ 3449.656784][T10727] FS-Cache: N-cookie d=00000000531d9e7f n=0000000072389966 [ 3449.664059][T10727] FS-Cache: N-key=[10] '02000200000002000000' 03:49:00 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) socket$kcm(0x2b, 0x1, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000002c0)=ANY=[@ANYBLOB="a1c1"]) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000ec600000000000000000000000000000400000000005f00"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.\\G10I\xb8\x8f8\x00\x15o\x1e\xc98\x7f\xcb\xecA\xf3\xbf\x9c\xd8R\xa2|\xef\xe3\x8b\x05\x94\xf9Gx\x1f\xfdi\x9b\x83`\xb8Y\x1aV\xbe\xeb\xb3\xd3v\xb9\x0fs\x90\xb6\xaa`\xe8\x12\xc3\"\x87\xbf\xab\x80h\x97\x89C\t\x84\x9d\xed\xa5ED\xb5P\xde\xa65\xf7\xa1\x1eW\xb3n\xd1\x0f\xeaa\xe2\xcf:\xb6\xa0+\x12W\x9e\x13\x15\xdb\xf6T#\x83\xe59\x04', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000640)=ANY=[@ANYRES32=0x0], 0x0, 0x4, 0x0, 0xffffffffffffbfff}, 0x20) r5 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r6 = gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000540)=r6, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) socketpair(0x5, 0x3, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) [ 3449.830253][T10729] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3449.872334][T10729] CPU: 0 PID: 10729 Comm: syz-executor.3 Not tainted 5.3.0-rc1+ #49 [ 3449.880333][T10729] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3449.890376][T10729] Call Trace: [ 3449.893671][T10729] dump_stack+0x1d8/0x2f8 [ 3449.898017][T10729] dump_header+0xd8/0x960 [ 3449.902356][T10729] oom_kill_process+0xcd/0x350 [ 3449.907135][T10729] out_of_memory+0x5ce/0x890 [ 3449.911730][T10729] ? unregister_oom_notifier+0x20/0x20 [ 3449.917188][T10729] ? _raw_spin_unlock_irqrestore+0xd1/0xe0 [ 3449.923003][T10729] memory_max_write+0x537/0x6a0 [ 3449.927851][T10729] ? lock_acquire+0x158/0x250 [ 3449.932533][T10729] ? memory_max_show+0xa0/0xa0 [ 3449.937299][T10729] ? trace_lock_acquire+0x159/0x1d0 [ 3449.942492][T10729] ? lock_acquire+0x158/0x250 [ 3449.947167][T10729] ? kernfs_fop_write+0x22e/0x4f0 [ 3449.952188][T10729] ? memory_max_show+0xa0/0xa0 [ 3449.956954][T10729] cgroup_file_write+0x27b/0x6e0 [ 3449.961913][T10729] ? cgroup_seqfile_stop+0xc0/0xc0 [ 3449.967037][T10729] ? cgroup_seqfile_stop+0xc0/0xc0 [ 3449.972158][T10729] kernfs_fop_write+0x3e4/0x4f0 [ 3449.977032][T10729] ? kernfs_fop_read+0x580/0x580 [ 3449.981982][T10729] __vfs_write+0xf9/0x7d0 [ 3449.986331][T10729] ? __kernel_write+0x350/0x350 [ 3449.991180][T10729] ? rcu_is_watching+0x57/0xa0 [ 3449.995952][T10729] ? __sb_start_write+0x403/0x4c0 [ 3450.000979][T10729] vfs_write+0x275/0x590 [ 3450.005227][T10729] ksys_write+0x16b/0x2a0 [ 3450.009565][T10729] ? __ia32_sys_read+0x90/0x90 [ 3450.014333][T10729] ? retint_kernel+0x2b/0x2b [ 3450.018936][T10729] __x64_sys_write+0x7b/0x90 [ 3450.023532][T10729] do_syscall_64+0xfe/0x140 [ 3450.028045][T10729] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3450.033930][T10729] RIP: 0033:0x459829 [ 3450.037821][T10729] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3450.057415][T10729] RSP: 002b:00007f08de21fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 03:49:00 executing program 1: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r3, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x20}, 0xf) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d66", 0xb9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489abcd69fcc7154d066c7ff2e07b", 0xd1}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b07", 0x65}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r5, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r7 = fcntl$getown(r6, 0x9) fcntl$lock(r6, 0x0, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r7}) r8 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) pipe2(&(0x7f0000000140), 0x1800) setsockopt$packet_buf(r8, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:49:00 executing program 0: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b2", 0x3d}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489", 0xc4}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r6 = fcntl$getown(r5, 0x9) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r6}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x17, 0x0, 0x0) 03:49:00 executing program 5: r0 = socket$isdn(0x22, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e4359", 0x9d}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r3, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) fcntl$lock(r4, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100}) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(r5, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) [ 3450.065826][T10729] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829 [ 3450.073798][T10729] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 3450.081762][T10729] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3450.081773][T10729] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f08de2206d4 [ 3450.097722][T10729] R13: 00000000004c9774 R14: 00000000004e0b70 R15: 00000000ffffffff 03:49:01 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x41}, 0x10) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, 0x0, 0x0) sendmsg$tipc(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) [ 3450.323766][T10729] memory: usage 92844kB, limit 0kB, failcnt 0 [ 3450.330274][T10729] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 03:49:01 executing program 4: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r3, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x20}, 0xf) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d66", 0xb9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489abcd69fcc7154d066c7ff2e07b", 0xd1}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b07", 0x65}], 0x5}}], 0x1, 0x0) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r5, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r7 = fcntl$getown(r6, 0x9) fcntl$lock(r6, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r7}) r8 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) pipe2(&(0x7f0000000140), 0x1800) setsockopt$packet_buf(r8, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:49:01 executing program 1: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r3, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x20}, 0xf) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d66", 0xb9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489abcd69fcc7154d066c7ff2e07b", 0xd1}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b07", 0x65}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r5, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r7 = fcntl$getown(r6, 0x9) fcntl$lock(r6, 0x0, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r7}) r8 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) pipe2(&(0x7f0000000140), 0x1800) setsockopt$packet_buf(r8, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:49:01 executing program 4: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r3, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x20}, 0xf) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d66", 0xb9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489abcd69fcc7154d066c7ff2e07b", 0xd1}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b07", 0x65}], 0x5}}], 0x1, 0x0) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r5, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r7 = fcntl$getown(r6, 0x9) fcntl$lock(r6, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r7}) r8 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) pipe2(&(0x7f0000000140), 0x1800) setsockopt$packet_buf(r8, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:49:01 executing program 5: r0 = socket$isdn(0x22, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e4359", 0x9d}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r3, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) fcntl$lock(r4, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100}) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(r5, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) [ 3450.752947][T11185] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3450.858423][T10729] Memory cgroup stats for /syz3: [ 3450.858522][T10729] anon 66605056 [ 3450.858522][T10729] file 303104 [ 3450.858522][T10729] kernel_stack 983040 [ 3450.858522][T10729] slab 22802432 [ 3450.858522][T10729] sock 0 [ 3450.858522][T10729] shmem 196608 [ 3450.858522][T10729] file_mapped 135168 [ 3450.858522][T10729] file_dirty 0 [ 3450.858522][T10729] file_writeback 0 [ 3450.858522][T10729] anon_thp 62914560 [ 3450.858522][T10729] inactive_anon 73728 [ 3450.858522][T10729] active_anon 66539520 [ 3450.858522][T10729] inactive_file 0 [ 3450.858522][T10729] active_file 24576 [ 3450.858522][T10729] unevictable 32768 [ 3450.858522][T10729] slab_reclaimable 4460544 [ 3450.858522][T10729] slab_unreclaimable 18341888 [ 3450.858522][T10729] pgfault 483318 [ 3450.858522][T10729] pgmajfault 0 [ 3450.858522][T10729] workingset_refault 0 [ 3450.858522][T10729] workingset_activate 0 [ 3450.858522][T10729] workingset_nodereclaim 0 [ 3450.858522][T10729] pgrefill 63 [ 3450.858522][T10729] pgscan 33 [ 3450.858522][T10729] pgsteal 35 03:49:01 executing program 1: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r3, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x20}, 0xf) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d66", 0xb9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489abcd69fcc7154d066c7ff2e07b", 0xd1}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b07", 0x65}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r5, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) fcntl$getown(r6, 0x9) fcntl$lock(r6, 0x26, 0x0) r7 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) pipe2(&(0x7f0000000140), 0x1800) setsockopt$packet_buf(r7, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) [ 3451.170627][T10729] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=28970,uid=0 [ 3451.197857][T10729] Memory cgroup out of memory: Killed process 28970 (syz-executor.3) total-vm:72704kB, anon-rss:2204kB, file-rss:35816kB, shmem-rss:0kB [ 3451.255159][T11475] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3451.267745][ T8470] syz-executor.0 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 3451.290321][ T8470] CPU: 1 PID: 8470 Comm: syz-executor.0 Not tainted 5.3.0-rc1+ #49 [ 3451.298213][ T8470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3451.308263][ T8470] Call Trace: [ 3451.311560][ T8470] dump_stack+0x1d8/0x2f8 [ 3451.315905][ T8470] dump_header+0xd8/0x960 [ 3451.320239][ T8470] oom_kill_process+0xcd/0x350 [ 3451.325512][ T8470] out_of_memory+0x5ce/0x890 [ 3451.330118][ T8470] ? unregister_oom_notifier+0x20/0x20 [ 3451.335581][ T8470] ? __kasan_check_read+0x11/0x20 [ 3451.340621][ T8470] try_charge+0x137d/0x1a60 [ 3451.345149][ T8470] ? __memcg_kmem_charge_memcg+0xf0/0xf0 [ 3451.350812][ T8470] ? __lock_acquire+0x4750/0x4750 03:49:02 executing program 3: r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000100)={0x41}, 0x10) socket$tipc(0x1e, 0x5, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x2}, 0x10) sendmsg$tipc(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 03:49:02 executing program 5: r0 = socket$isdn(0x22, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e4359", 0x9d}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r3, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) fcntl$lock(r4, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100}) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(r5, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) [ 3451.355844][ T8470] ? rcu_lock_release+0x15/0x20 [ 3451.360695][ T8470] ? get_mem_cgroup_from_mm+0x15b/0x170 [ 3451.366259][ T8470] __memcg_kmem_charge+0x195/0x5b0 [ 3451.366273][ T8470] ? cancel_charge+0x1d0/0x1d0 [ 3451.366295][ T8470] __alloc_pages_nodemask+0x377/0x790 [ 3451.366313][ T8470] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 3451.366326][ T8470] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 3451.366345][ T8470] ? copy_process+0x59f/0x5bc0 [ 3451.366360][ T8470] copy_process+0x62c/0x5bc0 [ 3451.366382][ T8470] ? __rwlock_init+0x130/0x130 [ 3451.406937][ T8470] ? count_memcg_event_mm+0x300/0x300 [ 3451.412326][ T8470] ? fork_idle+0x290/0x290 [ 3451.416754][ T8470] ? __lock_acquire+0x4750/0x4750 [ 3451.421781][ T8470] ? lock_acquire+0x158/0x250 [ 3451.426458][ T8470] _do_fork+0x179/0x630 [ 3451.430619][ T8470] ? dup_mm+0x340/0x340 [ 3451.434776][ T8470] ? __kasan_check_read+0x11/0x20 [ 3451.434788][ T8470] ? _copy_to_user+0x104/0x150 [ 3451.434803][ T8470] ? put_timespec64+0x106/0x150 [ 3451.434814][ T8470] ? check_preemption_disabled+0xb7/0x2a0 [ 3451.434828][ T8470] __x64_sys_clone+0x247/0x2b0 [ 3451.434842][ T8470] ? __ia32_sys_vfork+0x110/0x110 [ 3451.434854][ T8470] ? prepare_exit_to_usermode+0x1f7/0x580 [ 3451.434871][ T8470] ? do_syscall_64+0x1d/0x140 [ 3451.434889][ T8470] do_syscall_64+0xfe/0x140 [ 3451.434904][ T8470] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3451.434914][ T8470] RIP: 0033:0x457dfa [ 3451.434924][ T8470] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 3451.434929][ T8470] RSP: 002b:00007ffe80448dc0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 3451.434940][ T8470] RAX: ffffffffffffffda RBX: 00007ffe80448dc0 RCX: 0000000000457dfa [ 3451.434947][ T8470] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 3451.434953][ T8470] RBP: 00007ffe80448e00 R08: 0000000000000001 R09: 00005555568fd940 [ 3451.434965][ T8470] R10: 00005555568fdc10 R11: 0000000000000246 R12: 0000000000000001 [ 3451.549549][ T8470] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe80448e50 [ 3451.561171][ T8470] memory: usage 87076kB, limit 0kB, failcnt 8 [ 3451.567325][ T8470] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3451.567330][ T8470] Memory cgroup stats for /syz0: [ 3451.567442][ T8470] anon 64368640 [ 3451.567442][ T8470] file 176128 [ 3451.567442][ T8470] kernel_stack 983040 [ 3451.567442][ T8470] slab 19468288 [ 3451.567442][ T8470] sock 0 [ 3451.567442][ T8470] shmem 131072 [ 3451.567442][ T8470] file_mapped 0 [ 3451.567442][ T8470] file_dirty 0 [ 3451.567442][ T8470] file_writeback 0 [ 3451.567442][ T8470] anon_thp 60817408 [ 3451.567442][ T8470] inactive_anon 135168 [ 3451.567442][ T8470] active_anon 64303104 [ 3451.567442][ T8470] inactive_file 0 [ 3451.567442][ T8470] active_file 86016 [ 3451.567442][ T8470] unevictable 135168 [ 3451.567442][ T8470] slab_reclaimable 5136384 [ 3451.567442][ T8470] slab_unreclaimable 14331904 [ 3451.567442][ T8470] pgfault 551760 [ 3451.567442][ T8470] pgmajfault 0 [ 3451.567442][ T8470] workingset_refault 0 [ 3451.567442][ T8470] workingset_activate 0 [ 3451.567442][ T8470] workingset_nodereclaim 0 [ 3451.567442][ T8470] pgrefill 45 [ 3451.567442][ T8470] pgscan 34 [ 3451.567442][ T8470] pgsteal 33 [ 3451.669039][ T8470] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=8804,uid=0 [ 3451.686166][ T8470] Memory cgroup out of memory: Killed process 8804 (syz-executor.0) total-vm:72704kB, anon-rss:2216kB, file-rss:35820kB, shmem-rss:0kB [ 3451.718034][ T8470] syz-executor.0 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 3451.729989][ T8470] CPU: 1 PID: 8470 Comm: syz-executor.0 Not tainted 5.3.0-rc1+ #49 [ 3451.737873][ T8470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3451.747921][ T8470] Call Trace: [ 3451.751212][ T8470] dump_stack+0x1d8/0x2f8 [ 3451.755545][ T8470] dump_header+0xd8/0x960 [ 3451.759885][ T8470] oom_kill_process+0xcd/0x350 [ 3451.764645][ T8470] out_of_memory+0x5ce/0x890 [ 3451.769239][ T8470] ? unregister_oom_notifier+0x20/0x20 [ 3451.774693][ T8470] ? __kasan_check_read+0x11/0x20 [ 3451.779729][ T8470] try_charge+0x137d/0x1a60 [ 3451.784258][ T8470] ? __memcg_kmem_charge_memcg+0xf0/0xf0 [ 3451.789897][ T8470] ? __lock_acquire+0x4750/0x4750 [ 3451.794928][ T8470] ? rcu_lock_release+0x15/0x20 [ 3451.799775][ T8470] ? get_mem_cgroup_from_mm+0x15b/0x170 [ 3451.805332][ T8470] __memcg_kmem_charge+0x195/0x5b0 [ 3451.810441][ T8470] ? cancel_charge+0x1d0/0x1d0 [ 3451.815387][ T8470] __alloc_pages_nodemask+0x377/0x790 [ 3451.820766][ T8470] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 3451.826313][ T8470] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 3451.832038][ T8470] ? copy_process+0x59f/0x5bc0 [ 3451.836802][ T8470] copy_process+0x62c/0x5bc0 [ 3451.841402][ T8470] ? __rwlock_init+0x130/0x130 [ 3451.846162][ T8470] ? count_memcg_event_mm+0x300/0x300 [ 3451.851540][ T8470] ? fork_idle+0x290/0x290 [ 3451.855954][ T8470] ? __lock_acquire+0x4750/0x4750 [ 3451.855964][ T8470] ? lock_acquire+0x158/0x250 [ 3451.855988][ T8470] _do_fork+0x179/0x630 [ 3451.856001][ T8470] ? dup_mm+0x340/0x340 [ 3451.856017][ T8470] ? __kasan_check_read+0x11/0x20 [ 3451.856043][ T8470] ? _copy_to_user+0x104/0x150 [ 3451.856069][ T8470] ? put_timespec64+0x106/0x150 [ 3451.856096][ T8470] ? check_preemption_disabled+0xb7/0x2a0 [ 3451.856108][ T8470] __x64_sys_clone+0x247/0x2b0 [ 3451.856119][ T8470] ? __ia32_sys_vfork+0x110/0x110 [ 3451.856128][ T8470] ? prepare_exit_to_usermode+0x1f7/0x580 [ 3451.856142][ T8470] ? do_syscall_64+0x1d/0x140 [ 3451.884068][ T8470] do_syscall_64+0xfe/0x140 [ 3451.884085][ T8470] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3451.884095][ T8470] RIP: 0033:0x457dfa [ 3451.884106][ T8470] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 3451.884112][ T8470] RSP: 002b:00007ffe80448dc0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 3451.884122][ T8470] RAX: ffffffffffffffda RBX: 00007ffe80448dc0 RCX: 0000000000457dfa [ 3451.884128][ T8470] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 3451.884135][ T8470] RBP: 00007ffe80448e00 R08: 0000000000000001 R09: 00005555568fd940 [ 3451.884146][ T8470] R10: 00005555568fdc10 R11: 0000000000000246 R12: 0000000000000001 [ 3451.894692][ T8470] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe80448e50 [ 3451.903681][ T8470] memory: usage 84732kB, limit 0kB, failcnt 14 [ 3451.960970][ T8470] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3451.973940][ T8470] Memory cgroup stats for /syz0: [ 3451.974034][ T8470] anon 62103552 [ 3451.974034][ T8470] file 176128 [ 3451.974034][ T8470] kernel_stack 917504 [ 3451.974034][ T8470] slab 19468288 [ 3451.974034][ T8470] sock 0 [ 3451.974034][ T8470] shmem 131072 [ 3451.974034][ T8470] file_mapped 0 [ 3451.974034][ T8470] file_dirty 0 [ 3451.974034][ T8470] file_writeback 0 [ 3451.974034][ T8470] anon_thp 58720256 [ 3451.974034][ T8470] inactive_anon 135168 [ 3451.974034][ T8470] active_anon 62107648 [ 3451.974034][ T8470] inactive_file 0 [ 3451.974034][ T8470] active_file 86016 [ 3451.974034][ T8470] unevictable 135168 [ 3451.974034][ T8470] slab_reclaimable 5136384 [ 3451.974034][ T8470] slab_unreclaimable 14331904 [ 3451.974034][ T8470] pgfault 551760 [ 3451.974034][ T8470] pgmajfault 0 [ 3451.974034][ T8470] workingset_refault 0 [ 3451.974034][ T8470] workingset_activate 0 [ 3451.974034][ T8470] workingset_nodereclaim 0 [ 3451.974034][ T8470] pgrefill 45 [ 3451.974034][ T8470] pgscan 34 [ 3451.974034][ T8470] pgsteal 33 [ 3452.002802][ T8470] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=8568,uid=0 [ 3452.118014][ T8470] Memory cgroup out of memory: Killed process 8568 (syz-executor.0) total-vm:72704kB, anon-rss:2216kB, file-rss:35820kB, shmem-rss:0kB [ 3452.138872][ T8477] syz-executor.3 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 3452.145076][ T1056] oom_reaper: reaped process 8568 (syz-executor.0), now anon-rss:0kB, file-rss:34860kB, shmem-rss:0kB [ 3452.152182][ T8477] CPU: 1 PID: 8477 Comm: syz-executor.3 Not tainted 5.3.0-rc1+ #49 [ 3452.169488][ T8477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3452.179545][ T8477] Call Trace: [ 3452.182826][ T8477] dump_stack+0x1d8/0x2f8 [ 3452.187147][ T8477] dump_header+0xd8/0x960 [ 3452.191482][ T8477] oom_kill_process+0xcd/0x350 [ 3452.196250][ T8477] out_of_memory+0x5ce/0x890 [ 3452.200850][ T8477] ? unregister_oom_notifier+0x20/0x20 [ 3452.206313][ T8477] ? __kasan_check_read+0x11/0x20 [ 3452.211342][ T8477] try_charge+0x137d/0x1a60 [ 3452.216482][ T8477] ? __memcg_kmem_charge_memcg+0xf0/0xf0 [ 3452.222112][ T8477] ? __lock_acquire+0x4750/0x4750 [ 3452.227145][ T8477] ? rcu_lock_release+0x15/0x20 [ 3452.231995][ T8477] ? get_mem_cgroup_from_mm+0x15b/0x170 [ 3452.237543][ T8477] __memcg_kmem_charge+0x195/0x5b0 [ 3452.242654][ T8477] ? cancel_charge+0x1d0/0x1d0 [ 3452.247437][ T8477] __alloc_pages_nodemask+0x377/0x790 [ 3452.252819][ T8477] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 3452.258369][ T8477] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 3452.264095][ T8477] ? copy_process+0x59f/0x5bc0 [ 3452.264111][ T8477] copy_process+0x62c/0x5bc0 [ 3452.264135][ T8477] ? __rwlock_init+0x130/0x130 [ 3452.264151][ T8477] ? count_memcg_event_mm+0x300/0x300 [ 3452.273499][ T8477] ? fork_idle+0x290/0x290 [ 3452.283605][ T8477] ? __lock_acquire+0x4750/0x4750 [ 3452.283627][ T8477] ? lock_acquire+0x158/0x250 [ 3452.283639][ T8477] _do_fork+0x179/0x630 [ 3452.283669][ T8477] ? dup_mm+0x340/0x340 [ 3452.291747][T11587] IPVS: ftp: loaded support on port[0] = 21 [ 3452.293118][ T8477] ? __kasan_check_read+0x11/0x20 [ 3452.306199][ T8477] ? _copy_to_user+0x104/0x150 [ 3452.306216][ T8477] ? put_timespec64+0x106/0x150 [ 3452.306227][ T8477] ? check_preemption_disabled+0xb7/0x2a0 [ 3452.306241][ T8477] __x64_sys_clone+0x247/0x2b0 [ 3452.306255][ T8477] ? __ia32_sys_vfork+0x110/0x110 [ 3452.306266][ T8477] ? prepare_exit_to_usermode+0x1f7/0x580 [ 3452.306282][ T8477] ? do_syscall_64+0x1d/0x140 [ 3452.306298][ T8477] do_syscall_64+0xfe/0x140 [ 3452.317461][ T8477] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3452.317472][ T8477] RIP: 0033:0x457dfa [ 3452.317483][ T8477] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 3452.317489][ T8477] RSP: 002b:00007ffd33f60280 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 3452.317499][ T8477] RAX: ffffffffffffffda RBX: 00007ffd33f60280 RCX: 0000000000457dfa [ 3452.317505][ T8477] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 3452.317511][ T8477] RBP: 00007ffd33f602c0 R08: 0000000000000001 R09: 000055555685d940 [ 3452.317518][ T8477] R10: 000055555685dc10 R11: 0000000000000246 R12: 0000000000000001 [ 3452.317524][ T8477] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffd33f60310 [ 3452.324417][ T8477] memory: usage 87192kB, limit 0kB, failcnt 8 [ 3452.333301][ T8477] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3452.349140][ T8477] Memory cgroup stats for /syz3: [ 3452.349236][ T8477] anon 62341120 [ 3452.349236][ T8477] file 303104 [ 3452.349236][ T8477] kernel_stack 983040 [ 3452.349236][ T8477] slab 22106112 [ 3452.349236][ T8477] sock 0 [ 3452.349236][ T8477] shmem 196608 [ 3452.349236][ T8477] file_mapped 135168 [ 3452.349236][ T8477] file_dirty 0 [ 3452.349236][ T8477] file_writeback 0 [ 3452.349236][ T8477] anon_thp 58720256 [ 3452.349236][ T8477] inactive_anon 73728 [ 3452.349236][ T8477] active_anon 62205952 [ 3452.349236][ T8477] inactive_file 0 [ 3452.349236][ T8477] active_file 24576 [ 3452.349236][ T8477] unevictable 32768 [ 3452.349236][ T8477] slab_reclaimable 4460544 [ 3452.349236][ T8477] slab_unreclaimable 17645568 [ 3452.349236][ T8477] pgfault 483318 [ 3452.349236][ T8477] pgmajfault 0 [ 3452.349236][ T8477] workingset_refault 0 [ 3452.349236][ T8477] workingset_activate 0 [ 3452.349236][ T8477] workingset_nodereclaim 0 [ 3452.349236][ T8477] pgrefill 63 [ 3452.349236][ T8477] pgscan 33 [ 3452.349236][ T8477] pgsteal 35 [ 3452.358275][ T8477] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=29686,uid=0 [ 3452.374108][ T8477] Memory cgroup out of memory: Killed process 29686 (syz-executor.3) total-vm:72704kB, anon-rss:2204kB, file-rss:35812kB, shmem-rss:0kB [ 3452.590310][ T8477] syz-executor.3 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 3452.608220][ T8477] CPU: 1 PID: 8477 Comm: syz-executor.3 Not tainted 5.3.0-rc1+ #49 [ 3452.616113][ T8477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3452.626159][ T8477] Call Trace: [ 3452.629442][ T8477] dump_stack+0x1d8/0x2f8 [ 3452.633773][ T8477] dump_header+0xd8/0x960 [ 3452.638100][ T8477] oom_kill_process+0xcd/0x350 [ 3452.642861][ T8477] out_of_memory+0x5ce/0x890 [ 3452.647448][ T8477] ? unregister_oom_notifier+0x20/0x20 [ 3452.652904][ T8477] ? __kasan_check_read+0x11/0x20 [ 3452.657927][ T8477] try_charge+0x137d/0x1a60 [ 3452.662451][ T8477] ? __memcg_kmem_charge_memcg+0xf0/0xf0 [ 3452.668090][ T8477] ? __lock_acquire+0x4750/0x4750 [ 3452.673117][ T8477] ? rcu_lock_release+0x15/0x20 [ 3452.677964][ T8477] ? get_mem_cgroup_from_mm+0x15b/0x170 [ 3452.683502][ T8477] __memcg_kmem_charge+0x195/0x5b0 [ 3452.688622][ T8477] ? cancel_charge+0x1d0/0x1d0 [ 3452.693390][ T8477] __alloc_pages_nodemask+0x377/0x790 [ 3452.698752][ T8477] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 3452.704282][ T8477] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 3452.709993][ T8477] ? copy_process+0x59f/0x5bc0 [ 3452.714743][ T8477] copy_process+0x62c/0x5bc0 [ 3452.719326][ T8477] ? __rwlock_init+0x130/0x130 [ 3452.724064][ T8477] ? count_memcg_event_mm+0x300/0x300 [ 3452.729453][ T8477] ? fork_idle+0x290/0x290 [ 3452.733851][ T8477] ? __lock_acquire+0x4750/0x4750 [ 3452.738856][ T8477] ? lock_acquire+0x158/0x250 [ 3452.743507][ T8477] _do_fork+0x179/0x630 [ 3452.747639][ T8477] ? dup_mm+0x340/0x340 [ 3452.751800][ T8477] ? __kasan_check_read+0x11/0x20 [ 3452.756798][ T8477] ? _copy_to_user+0x104/0x150 [ 3452.761536][ T8477] ? put_timespec64+0x106/0x150 [ 3452.766365][ T8477] ? check_preemption_disabled+0xb7/0x2a0 [ 3452.772056][ T8477] __x64_sys_clone+0x247/0x2b0 [ 3452.776792][ T8477] ? __ia32_sys_vfork+0x110/0x110 [ 3452.781792][ T8477] ? prepare_exit_to_usermode+0x1f7/0x580 [ 3452.787489][ T8477] ? do_syscall_64+0x1d/0x140 [ 3452.792139][ T8477] do_syscall_64+0xfe/0x140 [ 3452.796621][ T8477] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3452.802484][ T8477] RIP: 0033:0x457dfa [ 3452.806370][ T8477] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 3452.826103][ T8477] RSP: 002b:00007ffd33f60280 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 3452.834503][ T8477] RAX: ffffffffffffffda RBX: 00007ffd33f60280 RCX: 0000000000457dfa [ 3452.842460][ T8477] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 3452.850407][ T8477] RBP: 00007ffd33f602c0 R08: 0000000000000001 R09: 000055555685d940 [ 3452.858366][ T8477] R10: 000055555685dc10 R11: 0000000000000246 R12: 0000000000000001 [ 3452.866334][ T8477] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffd33f60310 [ 3452.874957][ T8477] memory: usage 84840kB, limit 0kB, failcnt 14 [ 3452.881159][ T8477] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3452.888517][ T8477] Memory cgroup stats for /syz3: [ 3452.888606][ T8477] anon 60051456 [ 3452.888606][ T8477] file 303104 [ 3452.888606][ T8477] kernel_stack 917504 [ 3452.888606][ T8477] slab 22106112 [ 3452.888606][ T8477] sock 0 [ 3452.888606][ T8477] shmem 196608 [ 3452.888606][ T8477] file_mapped 135168 [ 3452.888606][ T8477] file_dirty 0 [ 3452.888606][ T8477] file_writeback 0 [ 3452.888606][ T8477] anon_thp 56623104 [ 3452.888606][ T8477] inactive_anon 73728 [ 3452.888606][ T8477] active_anon 59985920 [ 3452.888606][ T8477] inactive_file 0 [ 3452.888606][ T8477] active_file 24576 [ 3452.888606][ T8477] unevictable 32768 [ 3452.888606][ T8477] slab_reclaimable 4460544 [ 3452.888606][ T8477] slab_unreclaimable 17645568 [ 3452.888606][ T8477] pgfault 483318 [ 3452.888606][ T8477] pgmajfault 0 [ 3452.888606][ T8477] workingset_refault 0 [ 3452.888606][ T8477] workingset_activate 0 [ 3452.888606][ T8477] workingset_nodereclaim 0 [ 3452.888606][ T8477] pgrefill 63 [ 3452.888606][ T8477] pgscan 33 [ 3452.888606][ T8477] pgsteal 35 [ 3452.893780][ T8477] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=29290,uid=0 [ 3453.009129][ T8477] Memory cgroup out of memory: Killed process 29290 (syz-executor.3) total-vm:72704kB, anon-rss:2204kB, file-rss:35812kB, shmem-rss:0kB [ 3453.053201][ T8470] syz-executor.0 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 3453.073619][ T8470] CPU: 0 PID: 8470 Comm: syz-executor.0 Not tainted 5.3.0-rc1+ #49 [ 3453.081508][ T8470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3453.091551][ T8470] Call Trace: [ 3453.094836][ T8470] dump_stack+0x1d8/0x2f8 [ 3453.099166][ T8470] dump_header+0xd8/0x960 [ 3453.103492][ T8470] oom_kill_process+0xcd/0x350 [ 3453.108259][ T8470] out_of_memory+0x5ce/0x890 [ 3453.112850][ T8470] ? unregister_oom_notifier+0x20/0x20 [ 3453.118304][ T8470] ? __kasan_check_read+0x11/0x20 [ 3453.123323][ T8470] try_charge+0x137d/0x1a60 [ 3453.127848][ T8470] ? __memcg_kmem_charge_memcg+0xf0/0xf0 [ 3453.133475][ T8470] ? __lock_acquire+0x4750/0x4750 [ 3453.138498][ T8470] ? rcu_lock_release+0x15/0x20 [ 3453.143360][ T8470] ? get_mem_cgroup_from_mm+0x15b/0x170 [ 3453.148879][ T8470] __memcg_kmem_charge+0x195/0x5b0 [ 3453.153964][ T8470] ? cancel_charge+0x1d0/0x1d0 [ 3453.158707][ T8470] __alloc_pages_nodemask+0x377/0x790 [ 3453.164058][ T8470] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 3453.169577][ T8470] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 3453.175271][ T8470] ? copy_process+0x59f/0x5bc0 [ 3453.180005][ T8470] copy_process+0x62c/0x5bc0 [ 3453.184573][ T8470] ? __rwlock_init+0x130/0x130 [ 3453.189332][ T8470] ? count_memcg_event_mm+0x300/0x300 [ 3453.194688][ T8470] ? fork_idle+0x290/0x290 [ 3453.199079][ T8470] ? __lock_acquire+0x4750/0x4750 [ 3453.204086][ T8470] ? lock_acquire+0x158/0x250 [ 3453.208736][ T8470] _do_fork+0x179/0x630 [ 3453.212868][ T8470] ? dup_mm+0x340/0x340 [ 3453.216997][ T8470] ? __kasan_check_read+0x11/0x20 [ 3453.221997][ T8470] ? _copy_to_user+0x104/0x150 [ 3453.226736][ T8470] ? put_timespec64+0x106/0x150 [ 3453.231571][ T8470] ? check_preemption_disabled+0xb7/0x2a0 [ 3453.237273][ T8470] __x64_sys_clone+0x247/0x2b0 [ 3453.242038][ T8470] ? __ia32_sys_vfork+0x110/0x110 [ 3453.247070][ T8470] ? prepare_exit_to_usermode+0x1f7/0x580 [ 3453.252800][ T8470] ? do_syscall_64+0x1d/0x140 [ 3453.257495][ T8470] do_syscall_64+0xfe/0x140 [ 3453.261973][ T8470] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3453.267837][ T8470] RIP: 0033:0x457dfa [ 3453.271702][ T8470] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 3453.291278][ T8470] RSP: 002b:00007ffe80448dc0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 3453.299708][ T8470] RAX: ffffffffffffffda RBX: 00007ffe80448dc0 RCX: 0000000000457dfa [ 3453.307657][ T8470] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 3453.315617][ T8470] RBP: 00007ffe80448e00 R08: 0000000000000001 R09: 00005555568fd940 [ 3453.323567][ T8470] R10: 00005555568fdc10 R11: 0000000000000246 R12: 0000000000000001 [ 3453.331523][ T8470] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe80448e50 [ 3453.342304][ T8470] memory: usage 82304kB, limit 0kB, failcnt 20 [ 3453.348554][ T8470] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3453.355875][ T8470] Memory cgroup stats for /syz0: [ 3453.355975][ T8470] anon 59949056 [ 3453.355975][ T8470] file 176128 [ 3453.355975][ T8470] kernel_stack 917504 [ 3453.355975][ T8470] slab 19468288 [ 3453.355975][ T8470] sock 0 [ 3453.355975][ T8470] shmem 131072 [ 3453.355975][ T8470] file_mapped 0 [ 3453.355975][ T8470] file_dirty 0 [ 3453.355975][ T8470] file_writeback 0 [ 3453.355975][ T8470] anon_thp 56623104 [ 3453.355975][ T8470] inactive_anon 135168 [ 3453.355975][ T8470] active_anon 59953152 [ 3453.355975][ T8470] inactive_file 0 [ 3453.355975][ T8470] active_file 86016 [ 3453.355975][ T8470] unevictable 135168 [ 3453.355975][ T8470] slab_reclaimable 5136384 [ 3453.355975][ T8470] slab_unreclaimable 14331904 [ 3453.355975][ T8470] pgfault 551760 [ 3453.355975][ T8470] pgmajfault 0 [ 3453.355975][ T8470] workingset_refault 0 [ 3453.355975][ T8470] workingset_activate 0 [ 3453.355975][ T8470] workingset_nodereclaim 0 [ 3453.355975][ T8470] pgrefill 45 [ 3453.355975][ T8470] pgscan 34 [ 3453.355975][ T8470] pgsteal 33 [ 3453.360940][ T8470] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=4156,uid=0 [ 3453.466129][ T8470] Memory cgroup out of memory: Killed process 4156 (syz-executor.0) total-vm:72704kB, anon-rss:2216kB, file-rss:35820kB, shmem-rss:0kB [ 3453.495023][ T8477] syz-executor.3 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 3453.510157][ T8477] CPU: 0 PID: 8477 Comm: syz-executor.3 Not tainted 5.3.0-rc1+ #49 [ 3453.518046][ T8477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3453.518055][ T8477] Call Trace: [ 3453.531378][ T8477] dump_stack+0x1d8/0x2f8 [ 3453.535705][ T8477] dump_header+0xd8/0x960 [ 3453.535721][ T8477] oom_kill_process+0xcd/0x350 [ 3453.535735][ T8477] out_of_memory+0x5ce/0x890 [ 3453.535763][ T8477] ? unregister_oom_notifier+0x20/0x20 [ 3453.544830][ T8477] ? __kasan_check_read+0x11/0x20 [ 3453.544848][ T8477] try_charge+0x137d/0x1a60 [ 3453.544883][ T8477] ? __memcg_kmem_charge_memcg+0xf0/0xf0 [ 3453.554894][ T8477] ? __lock_acquire+0x4750/0x4750 [ 3453.554916][ T8477] ? rcu_lock_release+0x15/0x20 [ 3453.564396][ T8477] ? get_mem_cgroup_from_mm+0x15b/0x170 [ 3453.564409][ T8477] __memcg_kmem_charge+0x195/0x5b0 [ 3453.564426][ T8477] ? cancel_charge+0x1d0/0x1d0 [ 3453.575152][ T8477] __alloc_pages_nodemask+0x377/0x790 [ 3453.575170][ T8477] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 3453.575189][ T8477] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 3453.585560][ T8477] ? copy_process+0x59f/0x5bc0 [ 3453.585575][ T8477] copy_process+0x62c/0x5bc0 [ 3453.585607][ T8477] ? __rwlock_init+0x130/0x130 [ 3453.595479][ T8477] ? count_memcg_event_mm+0x300/0x300 [ 3453.595499][ T8477] ? fork_idle+0x290/0x290 [ 3453.595519][ T8477] ? __lock_acquire+0x4750/0x4750 [ 3453.595532][ T8477] ? lock_acquire+0x158/0x250 [ 3453.606414][ T8477] _do_fork+0x179/0x630 [ 3453.606428][ T8477] ? dup_mm+0x340/0x340 [ 3453.606447][ T8477] ? __kasan_check_read+0x11/0x20 [ 3453.616893][ T8477] ? _copy_to_user+0x104/0x150 [ 3453.616907][ T8477] ? put_timespec64+0x106/0x150 [ 3453.616919][ T8477] ? check_preemption_disabled+0xb7/0x2a0 [ 3453.616933][ T8477] __x64_sys_clone+0x247/0x2b0 [ 3453.626251][ T8477] ? __ia32_sys_vfork+0x110/0x110 [ 3453.641020][ T8477] ? prepare_exit_to_usermode+0x1f7/0x580 [ 3453.649818][ T8477] ? do_syscall_64+0x1d/0x140 [ 3453.658964][ T8477] do_syscall_64+0xfe/0x140 [ 3453.668551][ T8477] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3453.679035][ T8477] RIP: 0033:0x457dfa [ 3453.689766][ T8477] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 3453.698901][ T8477] RSP: 002b:00007ffd33f60280 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 3453.708661][ T8477] RAX: ffffffffffffffda RBX: 00007ffd33f60280 RCX: 0000000000457dfa [ 3453.708673][ T8477] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 3453.736645][ T8477] RBP: 00007ffd33f602c0 R08: 0000000000000001 R09: 000055555685d940 [ 3453.736652][ T8477] R10: 000055555685dc10 R11: 0000000000000246 R12: 0000000000000001 [ 3453.736659][ T8477] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffd33f60310 [ 3453.738140][ T8477] memory: usage 82492kB, limit 0kB, failcnt 20 [ 3453.763650][ T8477] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3453.785264][ T8477] Memory cgroup stats for /syz3: [ 3453.785356][ T8477] anon 57827328 [ 3453.785356][ T8477] file 303104 [ 3453.785356][ T8477] kernel_stack 917504 [ 3453.785356][ T8477] slab 22106112 [ 3453.785356][ T8477] sock 0 [ 3453.785356][ T8477] shmem 196608 [ 3453.785356][ T8477] file_mapped 135168 [ 3453.785356][ T8477] file_dirty 0 [ 3453.785356][ T8477] file_writeback 0 [ 3453.785356][ T8477] anon_thp 54525952 [ 3453.785356][ T8477] inactive_anon 73728 [ 3453.785356][ T8477] active_anon 57761792 [ 3453.785356][ T8477] inactive_file 0 [ 3453.785356][ T8477] active_file 24576 [ 3453.785356][ T8477] unevictable 32768 [ 3453.785356][ T8477] slab_reclaimable 4460544 [ 3453.785356][ T8477] slab_unreclaimable 17645568 [ 3453.785356][ T8477] pgfault 483318 [ 3453.785356][ T8477] pgmajfault 0 [ 3453.785356][ T8477] workingset_refault 0 [ 3453.785356][ T8477] workingset_activate 0 [ 3453.785356][ T8477] workingset_nodereclaim 0 [ 3453.785356][ T8477] pgrefill 96 [ 3453.785356][ T8477] pgscan 33 [ 3453.785356][ T8477] pgsteal 35 [ 3453.798506][ T8477] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=24606,uid=0 [ 3453.907531][ T8477] Memory cgroup out of memory: Killed process 24606 (syz-executor.3) total-vm:72572kB, anon-rss:2196kB, file-rss:35820kB, shmem-rss:0kB [ 3453.943140][ T8470] syz-executor.0 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 3453.965298][ T8470] CPU: 0 PID: 8470 Comm: syz-executor.0 Not tainted 5.3.0-rc1+ #49 [ 3453.973186][ T8470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3453.983231][ T8470] Call Trace: [ 3453.986525][ T8470] dump_stack+0x1d8/0x2f8 [ 3453.990867][ T8470] dump_header+0xd8/0x960 [ 3453.995197][ T8470] oom_kill_process+0xcd/0x350 [ 3453.999949][ T8470] out_of_memory+0x5ce/0x890 [ 3454.004516][ T8470] ? unregister_oom_notifier+0x20/0x20 [ 3454.009975][ T8470] ? __kasan_check_read+0x11/0x20 [ 3454.014979][ T8470] try_charge+0x137d/0x1a60 [ 3454.019507][ T8470] ? __memcg_kmem_charge_memcg+0xf0/0xf0 [ 3454.025122][ T8470] ? __lock_acquire+0x4750/0x4750 [ 3454.030122][ T8470] ? rcu_lock_release+0x15/0x20 [ 3454.034946][ T8470] ? get_mem_cgroup_from_mm+0x15b/0x170 [ 3454.040464][ T8470] __memcg_kmem_charge+0x195/0x5b0 [ 3454.045552][ T8470] ? cancel_charge+0x1d0/0x1d0 [ 3454.050311][ T8470] __alloc_pages_nodemask+0x377/0x790 [ 3454.055675][ T8470] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 3454.061194][ T8470] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 3454.066888][ T8470] ? copy_process+0x59f/0x5bc0 [ 3454.071624][ T8470] copy_process+0x62c/0x5bc0 [ 3454.076195][ T8470] ? __rwlock_init+0x130/0x130 [ 3454.080931][ T8470] ? count_memcg_event_mm+0x300/0x300 [ 3454.086280][ T8470] ? fork_idle+0x290/0x290 [ 3454.090673][ T8470] ? __lock_acquire+0x4750/0x4750 [ 3454.095669][ T8470] ? lock_acquire+0x158/0x250 [ 3454.100335][ T8470] _do_fork+0x179/0x630 [ 3454.104467][ T8470] ? dup_mm+0x340/0x340 [ 3454.108596][ T8470] ? __kasan_check_read+0x11/0x20 [ 3454.113609][ T8470] ? _copy_to_user+0x104/0x150 [ 3454.118367][ T8470] ? put_timespec64+0x106/0x150 [ 3454.123220][ T8470] ? check_preemption_disabled+0xb7/0x2a0 [ 3454.128920][ T8470] __x64_sys_clone+0x247/0x2b0 [ 3454.133660][ T8470] ? __ia32_sys_vfork+0x110/0x110 [ 3454.138657][ T8470] ? prepare_exit_to_usermode+0x1f7/0x580 [ 3454.144367][ T8470] ? do_syscall_64+0x1d/0x140 [ 3454.149021][ T8470] do_syscall_64+0xfe/0x140 [ 3454.153496][ T8470] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3454.159361][ T8470] RIP: 0033:0x457dfa [ 3454.163230][ T8470] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 3454.182825][ T8470] RSP: 002b:00007ffe80448dc0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 3454.191207][ T8470] RAX: ffffffffffffffda RBX: 00007ffe80448dc0 RCX: 0000000000457dfa [ 3454.199167][ T8470] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 3454.207121][ T8470] RBP: 00007ffe80448e00 R08: 0000000000000001 R09: 00005555568fd940 [ 3454.215067][ T8470] R10: 00005555568fdc10 R11: 0000000000000246 R12: 0000000000000001 [ 3454.223011][ T8470] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe80448e50 [ 3454.233899][ T8470] memory: usage 79376kB, limit 0kB, failcnt 26 [ 3454.240113][ T8470] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3454.247587][ T8470] Memory cgroup stats for /syz0: [ 3454.247693][ T8470] anon 57729024 [ 3454.247693][ T8470] file 176128 [ 3454.247693][ T8470] kernel_stack 851968 [ 3454.247693][ T8470] slab 19050496 [ 3454.247693][ T8470] sock 0 [ 3454.247693][ T8470] shmem 131072 [ 3454.247693][ T8470] file_mapped 0 [ 3454.247693][ T8470] file_dirty 0 [ 3454.247693][ T8470] file_writeback 0 [ 3454.247693][ T8470] anon_thp 54525952 [ 3454.247693][ T8470] inactive_anon 135168 [ 3454.247693][ T8470] active_anon 57733120 [ 3454.247693][ T8470] inactive_file 0 [ 3454.247693][ T8470] active_file 86016 [ 3454.247693][ T8470] unevictable 135168 [ 3454.247693][ T8470] slab_reclaimable 5136384 [ 3454.247693][ T8470] slab_unreclaimable 13914112 [ 3454.247693][ T8470] pgfault 551760 [ 3454.247693][ T8470] pgmajfault 0 [ 3454.247693][ T8470] workingset_refault 0 [ 3454.247693][ T8470] workingset_activate 0 [ 3454.247693][ T8470] workingset_nodereclaim 0 [ 3454.247693][ T8470] pgrefill 45 [ 3454.247693][ T8470] pgscan 34 [ 3454.247693][ T8470] pgsteal 33 [ 3454.252638][ T8470] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=16264,uid=0 [ 3454.358036][ T8470] Memory cgroup out of memory: Killed process 16264 (syz-executor.0) total-vm:72704kB, anon-rss:2216kB, file-rss:35820kB, shmem-rss:0kB [ 3454.379792][ T8477] syz-executor.3 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 3454.392714][ T8477] CPU: 0 PID: 8477 Comm: syz-executor.3 Not tainted 5.3.0-rc1+ #49 [ 3454.400599][ T8477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3454.400604][ T8477] Call Trace: [ 3454.400620][ T8477] dump_stack+0x1d8/0x2f8 [ 3454.400636][ T8477] dump_header+0xd8/0x960 [ 3454.400651][ T8477] oom_kill_process+0xcd/0x350 [ 3454.400664][ T8477] out_of_memory+0x5ce/0x890 [ 3454.400678][ T8477] ? unregister_oom_notifier+0x20/0x20 [ 3454.414002][ T8477] ? __kasan_check_read+0x11/0x20 [ 3454.414020][ T8477] try_charge+0x137d/0x1a60 [ 3454.414057][ T8477] ? __memcg_kmem_charge_memcg+0xf0/0xf0 [ 3454.422684][ T8477] ? __lock_acquire+0x4750/0x4750 [ 3454.432007][ T8477] ? rcu_lock_release+0x15/0x20 [ 3454.442460][ T8477] ? get_mem_cgroup_from_mm+0x15b/0x170 [ 3454.452559][ T8477] __memcg_kmem_charge+0x195/0x5b0 [ 3454.462406][ T8477] ? cancel_charge+0x1d0/0x1d0 [ 3454.473042][ T8477] __alloc_pages_nodemask+0x377/0x790 [ 3454.483138][ T8477] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 3454.488680][ T8477] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 3454.488700][ T8477] ? copy_process+0x59f/0x5bc0 [ 3454.488715][ T8477] copy_process+0x62c/0x5bc0 [ 3454.488738][ T8477] ? __rwlock_init+0x130/0x130 [ 3454.499181][ T8477] ? count_memcg_event_mm+0x300/0x300 [ 3454.508498][ T8477] ? fork_idle+0x290/0x290 [ 3454.518254][ T8477] ? __lock_acquire+0x4750/0x4750 [ 3454.523268][ T8477] ? lock_acquire+0x158/0x250 [ 3454.527940][ T8477] _do_fork+0x179/0x630 [ 3454.532087][ T8477] ? dup_mm+0x340/0x340 [ 3454.536246][ T8477] ? __kasan_check_read+0x11/0x20 [ 3454.536258][ T8477] ? _copy_to_user+0x104/0x150 [ 3454.536272][ T8477] ? put_timespec64+0x106/0x150 [ 3454.536284][ T8477] ? check_preemption_disabled+0xb7/0x2a0 [ 3454.536298][ T8477] __x64_sys_clone+0x247/0x2b0 [ 3454.546051][ T8477] ? __ia32_sys_vfork+0x110/0x110 [ 3454.546064][ T8477] ? prepare_exit_to_usermode+0x1f7/0x580 [ 3454.546081][ T8477] ? do_syscall_64+0x1d/0x140 [ 3454.546106][ T8477] do_syscall_64+0xfe/0x140 [ 3454.556644][ T8477] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3454.556655][ T8477] RIP: 0033:0x457dfa [ 3454.556670][ T8477] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 3454.566416][ T8477] RSP: 002b:00007ffd33f60280 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 3454.566427][ T8477] RAX: ffffffffffffffda RBX: 00007ffd33f60280 RCX: 0000000000457dfa [ 3454.566433][ T8477] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 3454.566440][ T8477] RBP: 00007ffd33f602c0 R08: 0000000000000001 R09: 000055555685d940 [ 3454.566446][ T8477] R10: 000055555685dc10 R11: 0000000000000246 R12: 0000000000000001 [ 3454.566457][ T8477] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffd33f60310 [ 3454.591012][ T8477] memory: usage 80092kB, limit 0kB, failcnt 26 [ 3454.617102][ T8477] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3454.639563][ T8477] Memory cgroup stats for /syz3: [ 3454.639672][ T8477] anon 55607296 [ 3454.639672][ T8477] file 303104 [ 3454.639672][ T8477] kernel_stack 851968 [ 3454.639672][ T8477] slab 21970944 [ 3454.639672][ T8477] sock 0 [ 3454.639672][ T8477] shmem 196608 [ 3454.639672][ T8477] file_mapped 135168 [ 3454.639672][ T8477] file_dirty 0 [ 3454.639672][ T8477] file_writeback 0 [ 3454.639672][ T8477] anon_thp 52428800 [ 3454.639672][ T8477] inactive_anon 73728 [ 3454.639672][ T8477] active_anon 55541760 [ 3454.639672][ T8477] inactive_file 0 [ 3454.639672][ T8477] active_file 24576 [ 3454.639672][ T8477] unevictable 32768 [ 3454.639672][ T8477] slab_reclaimable 4460544 [ 3454.639672][ T8477] slab_unreclaimable 17510400 [ 3454.639672][ T8477] pgfault 483318 [ 3454.639672][ T8477] pgmajfault 0 [ 3454.639672][ T8477] workingset_refault 0 [ 3454.639672][ T8477] workingset_activate 0 [ 3454.639672][ T8477] workingset_nodereclaim 0 [ 3454.639672][ T8477] pgrefill 96 [ 3454.639672][ T8477] pgscan 33 [ 3454.639672][ T8477] pgsteal 35 [ 3454.652050][ T8477] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=29619,uid=0 [ 3454.671750][ T8477] Memory cgroup out of memory: Killed process 29619 (syz-executor.3) total-vm:72572kB, anon-rss:2196kB, file-rss:35816kB, shmem-rss:0kB [ 3454.811147][ T8470] syz-executor.0 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 3454.836240][ T8470] CPU: 0 PID: 8470 Comm: syz-executor.0 Not tainted 5.3.0-rc1+ #49 [ 3454.844136][ T8470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3454.854182][ T8470] Call Trace: [ 3454.857468][ T8470] dump_stack+0x1d8/0x2f8 [ 3454.861792][ T8470] dump_header+0xd8/0x960 [ 3454.866123][ T8470] oom_kill_process+0xcd/0x350 [ 3454.870879][ T8470] out_of_memory+0x5ce/0x890 [ 3454.875465][ T8470] ? unregister_oom_notifier+0x20/0x20 [ 3454.880919][ T8470] ? __kasan_check_read+0x11/0x20 [ 3454.885940][ T8470] try_charge+0x137d/0x1a60 [ 3454.890462][ T8470] ? __memcg_kmem_charge_memcg+0xf0/0xf0 [ 3454.896103][ T8470] ? __lock_acquire+0x4750/0x4750 [ 3454.901130][ T8470] ? rcu_lock_release+0x15/0x20 [ 3454.905973][ T8470] ? get_mem_cgroup_from_mm+0x15b/0x170 [ 3454.911513][ T8470] __memcg_kmem_charge+0x195/0x5b0 [ 3454.916619][ T8470] ? cancel_charge+0x1d0/0x1d0 [ 3454.921388][ T8470] __alloc_pages_nodemask+0x377/0x790 [ 3454.926759][ T8470] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 3454.932337][ T8470] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 3454.938055][ T8470] ? copy_process+0x59f/0x5bc0 [ 3454.942829][ T8470] copy_process+0x62c/0x5bc0 [ 3454.947421][ T8470] ? __rwlock_init+0x130/0x130 [ 3454.952163][ T8470] ? count_memcg_event_mm+0x300/0x300 [ 3454.957512][ T8470] ? fork_idle+0x290/0x290 [ 3454.961903][ T8470] ? __lock_acquire+0x4750/0x4750 [ 3454.966899][ T8470] ? lock_acquire+0x158/0x250 [ 3454.971561][ T8470] _do_fork+0x179/0x630 [ 3454.975692][ T8470] ? dup_mm+0x340/0x340 [ 3454.979821][ T8470] ? __kasan_check_read+0x11/0x20 [ 3454.984816][ T8470] ? _copy_to_user+0x104/0x150 [ 3454.989570][ T8470] ? put_timespec64+0x106/0x150 [ 3454.994396][ T8470] ? check_preemption_disabled+0xb7/0x2a0 [ 3455.000088][ T8470] __x64_sys_clone+0x247/0x2b0 [ 3455.004836][ T8470] ? __ia32_sys_vfork+0x110/0x110 [ 3455.009831][ T8470] ? prepare_exit_to_usermode+0x1f7/0x580 [ 3455.015525][ T8470] ? do_syscall_64+0x1d/0x140 [ 3455.020175][ T8470] do_syscall_64+0xfe/0x140 [ 3455.024671][ T8470] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3455.030553][ T8470] RIP: 0033:0x457dfa [ 3455.034423][ T8470] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 3455.054010][ T8470] RSP: 002b:00007ffe80448dc0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 3455.062410][ T8470] RAX: ffffffffffffffda RBX: 00007ffe80448dc0 RCX: 0000000000457dfa [ 3455.070358][ T8470] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 3455.078303][ T8470] RBP: 00007ffe80448e00 R08: 0000000000000001 R09: 00005555568fd940 [ 3455.086245][ T8470] R10: 00005555568fdc10 R11: 0000000000000246 R12: 0000000000000001 [ 3455.094188][ T8470] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe80448e50 [ 3455.103829][ T8470] memory: usage 76940kB, limit 0kB, failcnt 32 [ 3455.110017][ T8470] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3455.118402][ T8470] Memory cgroup stats for /syz0: [ 3455.118483][ T8470] anon 55492608 [ 3455.118483][ T8470] file 176128 [ 3455.118483][ T8470] kernel_stack 851968 [ 3455.118483][ T8470] slab 18915328 [ 3455.118483][ T8470] sock 0 [ 3455.118483][ T8470] shmem 131072 [ 3455.118483][ T8470] file_mapped 0 [ 3455.118483][ T8470] file_dirty 0 [ 3455.118483][ T8470] file_writeback 0 [ 3455.118483][ T8470] anon_thp 52428800 [ 3455.118483][ T8470] inactive_anon 135168 [ 3455.118483][ T8470] active_anon 55496704 [ 3455.118483][ T8470] inactive_file 0 [ 3455.118483][ T8470] active_file 86016 [ 3455.118483][ T8470] unevictable 135168 [ 3455.118483][ T8470] slab_reclaimable 5001216 [ 3455.118483][ T8470] slab_unreclaimable 13914112 [ 3455.118483][ T8470] pgfault 551760 [ 3455.118483][ T8470] pgmajfault 0 [ 3455.118483][ T8470] workingset_refault 0 [ 3455.118483][ T8470] workingset_activate 0 [ 3455.118483][ T8470] workingset_nodereclaim 0 [ 3455.118483][ T8470] pgrefill 45 [ 3455.118483][ T8470] pgscan 34 [ 3455.118483][ T8470] pgsteal 33 [ 3455.123435][ T8470] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=12808,uid=0 [ 3455.228773][ T8470] Memory cgroup out of memory: Killed process 12808 (syz-executor.0) total-vm:72704kB, anon-rss:2216kB, file-rss:35816kB, shmem-rss:0kB [ 3455.244012][ T8477] syz-executor.3 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 3455.250053][ T1056] oom_reaper: reaped process 12808 (syz-executor.0), now anon-rss:0kB, file-rss:34856kB, shmem-rss:0kB [ 3455.260375][ T8477] CPU: 1 PID: 8477 Comm: syz-executor.3 Not tainted 5.3.0-rc1+ #49 [ 3455.275657][ T8477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3455.285984][ T8477] Call Trace: [ 3455.286009][ T8477] dump_stack+0x1d8/0x2f8 [ 3455.286024][ T8477] dump_header+0xd8/0x960 [ 3455.286037][ T8477] oom_kill_process+0xcd/0x350 [ 3455.286048][ T8477] out_of_memory+0x5ce/0x890 [ 3455.286060][ T8477] ? unregister_oom_notifier+0x20/0x20 [ 3455.286073][ T8477] ? __kasan_check_read+0x11/0x20 [ 3455.286088][ T8477] try_charge+0x137d/0x1a60 [ 3455.286121][ T8477] ? __memcg_kmem_charge_memcg+0xf0/0xf0 [ 3455.286148][ T8477] ? __lock_acquire+0x4750/0x4750 [ 3455.286169][ T8477] ? rcu_lock_release+0x15/0x20 [ 3455.286180][ T8477] ? get_mem_cgroup_from_mm+0x15b/0x170 [ 3455.286197][ T8477] __memcg_kmem_charge+0x195/0x5b0 [ 3455.293793][ T8477] ? cancel_charge+0x1d0/0x1d0 [ 3455.302854][ T8477] __alloc_pages_nodemask+0x377/0x790 [ 3455.312871][ T8477] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 3455.322874][ T8477] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 3455.339982][ T8477] ? copy_process+0x59f/0x5bc0 [ 3455.350615][ T8477] copy_process+0x62c/0x5bc0 [ 3455.366255][ T8477] ? __rwlock_init+0x130/0x130 [ 3455.366270][ T8477] ? count_memcg_event_mm+0x300/0x300 [ 3455.366290][ T8477] ? fork_idle+0x290/0x290 [ 3455.366310][ T8477] ? __lock_acquire+0x4750/0x4750 [ 3455.366319][ T8477] ? lock_acquire+0x158/0x250 [ 3455.366332][ T8477] _do_fork+0x179/0x630 [ 3455.366347][ T8477] ? dup_mm+0x340/0x340 [ 3455.376808][ T8477] ? __kasan_check_read+0x11/0x20 [ 3455.386127][ T8477] ? _copy_to_user+0x104/0x150 [ 3455.386142][ T8477] ? put_timespec64+0x106/0x150 [ 3455.386152][ T8477] ? check_preemption_disabled+0xb7/0x2a0 [ 3455.386167][ T8477] __x64_sys_clone+0x247/0x2b0 [ 3455.386179][ T8477] ? __ia32_sys_vfork+0x110/0x110 [ 3455.386190][ T8477] ? prepare_exit_to_usermode+0x1f7/0x580 [ 3455.386206][ T8477] ? do_syscall_64+0x1d/0x140 [ 3455.386223][ T8477] do_syscall_64+0xfe/0x140 [ 3455.401010][ T8477] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3455.409803][ T8477] RIP: 0033:0x457dfa [ 3455.468523][ T8477] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 3455.488174][ T8477] RSP: 002b:00007ffd33f60280 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 3455.496578][ T8477] RAX: ffffffffffffffda RBX: 00007ffd33f60280 RCX: 0000000000457dfa [ 3455.504552][ T8477] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 3455.512514][ T8477] RBP: 00007ffd33f602c0 R08: 0000000000000001 R09: 000055555685d940 [ 3455.520471][ T8477] R10: 000055555685dc10 R11: 0000000000000246 R12: 0000000000000001 [ 3455.528423][ T8477] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffd33f60310 [ 3455.536812][ T8477] memory: usage 77760kB, limit 0kB, failcnt 32 [ 3455.543032][ T8477] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3455.549977][ T8477] Memory cgroup stats for /syz3: [ 3455.550085][ T8477] anon 53366784 [ 3455.550085][ T8477] file 303104 [ 3455.550085][ T8477] kernel_stack 786432 [ 3455.550085][ T8477] slab 21970944 [ 3455.550085][ T8477] sock 0 [ 3455.550085][ T8477] shmem 196608 [ 3455.550085][ T8477] file_mapped 135168 [ 3455.550085][ T8477] file_dirty 0 [ 3455.550085][ T8477] file_writeback 0 [ 3455.550085][ T8477] anon_thp 50331648 [ 3455.550085][ T8477] inactive_anon 73728 [ 3455.550085][ T8477] active_anon 53370880 [ 3455.550085][ T8477] inactive_file 0 [ 3455.550085][ T8477] active_file 24576 [ 3455.550085][ T8477] unevictable 32768 [ 3455.550085][ T8477] slab_reclaimable 4460544 [ 3455.550085][ T8477] slab_unreclaimable 17510400 [ 3455.550085][ T8477] pgfault 483318 [ 3455.550085][ T8477] pgmajfault 0 [ 3455.550085][ T8477] workingset_refault 0 [ 3455.550085][ T8477] workingset_activate 0 [ 3455.550085][ T8477] workingset_nodereclaim 0 [ 3455.550085][ T8477] pgrefill 96 [ 3455.550085][ T8477] pgscan 33 [ 3455.550085][ T8477] pgsteal 35 [ 3455.555092][ T8477] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=29097,uid=0 [ 3455.555193][ T8477] Memory cgroup out of memory: Killed process 29097 (syz-executor.3) total-vm:72572kB, anon-rss:2196kB, file-rss:35816kB, shmem-rss:0kB [ 3455.692145][T11587] chnl_net:caif_netlink_parms(): no params data found [ 3455.703889][ T8470] syz-executor.0 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 3455.719745][ T8470] CPU: 1 PID: 8470 Comm: syz-executor.0 Not tainted 5.3.0-rc1+ #49 [ 3455.727647][ T8470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3455.737966][ T8470] Call Trace: [ 3455.741294][ T8470] dump_stack+0x1d8/0x2f8 [ 3455.745643][ T8470] dump_header+0xd8/0x960 [ 3455.749980][ T8470] oom_kill_process+0xcd/0x350 [ 3455.754748][ T8470] out_of_memory+0x5ce/0x890 [ 3455.759335][ T8470] ? unregister_oom_notifier+0x20/0x20 [ 3455.764812][ T8470] ? __kasan_check_read+0x11/0x20 [ 3455.769836][ T8470] try_charge+0x137d/0x1a60 [ 3455.774363][ T8470] ? __memcg_kmem_charge_memcg+0xf0/0xf0 [ 3455.780521][ T8470] ? __lock_acquire+0x4750/0x4750 [ 3455.785552][ T8470] ? rcu_lock_release+0x15/0x20 [ 3455.790400][ T8470] ? get_mem_cgroup_from_mm+0x15b/0x170 [ 3455.795946][ T8470] __memcg_kmem_charge+0x195/0x5b0 [ 3455.801065][ T8470] ? cancel_charge+0x1d0/0x1d0 [ 3455.805843][ T8470] __alloc_pages_nodemask+0x377/0x790 [ 3455.811220][ T8470] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 3455.816759][ T8470] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 3455.822567][ T8470] ? copy_process+0x59f/0x5bc0 [ 3455.827341][ T8470] copy_process+0x62c/0x5bc0 [ 3455.831943][ T8470] ? __rwlock_init+0x130/0x130 [ 3455.836703][ T8470] ? count_memcg_event_mm+0x300/0x300 [ 3455.842078][ T8470] ? fork_idle+0x290/0x290 [ 3455.846491][ T8470] ? __lock_acquire+0x4750/0x4750 [ 3455.851489][ T8470] ? lock_acquire+0x158/0x250 [ 3455.856153][ T8470] _do_fork+0x179/0x630 [ 3455.860339][ T8470] ? dup_mm+0x340/0x340 [ 3455.864491][ T8470] ? __kasan_check_read+0x11/0x20 [ 3455.869503][ T8470] ? _copy_to_user+0x104/0x150 [ 3455.874268][ T8470] ? put_timespec64+0x106/0x150 [ 3455.879109][ T8470] ? check_preemption_disabled+0xb7/0x2a0 [ 3455.884810][ T8470] __x64_sys_clone+0x247/0x2b0 [ 3455.889557][ T8470] ? __ia32_sys_vfork+0x110/0x110 [ 3455.894570][ T8470] ? prepare_exit_to_usermode+0x1f7/0x580 [ 3455.900320][ T8470] ? do_syscall_64+0x1d/0x140 [ 3455.904983][ T8470] do_syscall_64+0xfe/0x140 [ 3455.909463][ T8470] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3455.915339][ T8470] RIP: 0033:0x457dfa [ 3455.919229][ T8470] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 3455.938820][ T8470] RSP: 002b:00007ffe80448dc0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 3455.947211][ T8470] RAX: ffffffffffffffda RBX: 00007ffe80448dc0 RCX: 0000000000457dfa [ 3455.955169][ T8470] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 3455.963134][ T8470] RBP: 00007ffe80448e00 R08: 0000000000000001 R09: 00005555568fd940 [ 3455.971087][ T8470] R10: 00005555568fdc10 R11: 0000000000000246 R12: 0000000000000001 [ 3455.979034][ T8470] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe80448e50 [ 3455.987307][ T8470] memory: usage 74596kB, limit 0kB, failcnt 38 [ 3455.993492][ T8470] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3456.000448][ T8470] Memory cgroup stats for /syz0: [ 3456.000534][ T8470] anon 53272576 [ 3456.000534][ T8470] file 176128 [ 3456.000534][ T8470] kernel_stack 851968 [ 3456.000534][ T8470] slab 18915328 [ 3456.000534][ T8470] sock 0 [ 3456.000534][ T8470] shmem 131072 [ 3456.000534][ T8470] file_mapped 0 [ 3456.000534][ T8470] file_dirty 0 [ 3456.000534][ T8470] file_writeback 0 [ 3456.000534][ T8470] anon_thp 50331648 [ 3456.000534][ T8470] inactive_anon 135168 [ 3456.000534][ T8470] active_anon 53276672 [ 3456.000534][ T8470] inactive_file 0 [ 3456.000534][ T8470] active_file 86016 [ 3456.000534][ T8470] unevictable 135168 [ 3456.000534][ T8470] slab_reclaimable 5001216 [ 3456.000534][ T8470] slab_unreclaimable 13914112 [ 3456.000534][ T8470] pgfault 551760 [ 3456.000534][ T8470] pgmajfault 0 [ 3456.000534][ T8470] workingset_refault 0 [ 3456.000534][ T8470] workingset_activate 0 [ 3456.000534][ T8470] workingset_nodereclaim 0 [ 3456.000534][ T8470] pgrefill 45 [ 3456.000534][ T8470] pgscan 34 [ 3456.000534][ T8470] pgsteal 33 [ 3456.005547][ T8470] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=12207,uid=0 [ 3456.109775][ T8470] Memory cgroup out of memory: Killed process 12207 (syz-executor.0) total-vm:72704kB, anon-rss:2216kB, file-rss:35816kB, shmem-rss:0kB [ 3456.134242][ T8477] Memory cgroup out of memory: Killed process 29789 (syz-executor.3) total-vm:72572kB, anon-rss:2196kB, file-rss:35812kB, shmem-rss:0kB [ 3456.135086][ T1056] oom_reaper: reaped process 12207 (syz-executor.0), now anon-rss:0kB, file-rss:34856kB, shmem-rss:0kB [ 3456.192770][ T8477] Memory cgroup out of memory: Killed process 29762 (syz-executor.3) total-vm:72572kB, anon-rss:2196kB, file-rss:35812kB, shmem-rss:0kB [ 3456.225928][ T8470] Memory cgroup out of memory: Killed process 11941 (syz-executor.0) total-vm:72704kB, anon-rss:2216kB, file-rss:35816kB, shmem-rss:0kB [ 3456.258276][ T8477] Memory cgroup out of memory: Killed process 29586 (syz-executor.3) total-vm:72572kB, anon-rss:2196kB, file-rss:35812kB, shmem-rss:0kB [ 3456.277786][ T1056] oom_reaper: reaped process 29586 (syz-executor.3), now anon-rss:0kB, file-rss:34852kB, shmem-rss:0kB [ 3456.289204][ T8470] Memory cgroup out of memory: Killed process 9978 (syz-executor.0) total-vm:72572kB, anon-rss:2208kB, file-rss:35824kB, shmem-rss:0kB [ 3456.308205][ T1056] oom_reaper: reaped process 9978 (syz-executor.0), now anon-rss:0kB, file-rss:34864kB, shmem-rss:0kB [ 3456.319646][ T8477] Memory cgroup out of memory: Killed process 26349 (syz-executor.3) total-vm:72704kB, anon-rss:2204kB, file-rss:35796kB, shmem-rss:0kB [ 3456.352566][ T8470] Memory cgroup out of memory: Killed process 7381 (syz-executor.0) total-vm:72704kB, anon-rss:2216kB, file-rss:35816kB, shmem-rss:0kB [ 3456.374430][ T1056] oom_reaper: reaped process 7381 (syz-executor.0), now anon-rss:0kB, file-rss:34856kB, shmem-rss:0kB [ 3456.385803][ T8477] Memory cgroup out of memory: Killed process 26106 (syz-executor.3) total-vm:72704kB, anon-rss:2204kB, file-rss:35796kB, shmem-rss:0kB [ 3456.417848][ T8470] Memory cgroup out of memory: Killed process 14573 (syz-executor.0) total-vm:72704kB, anon-rss:2216kB, file-rss:35812kB, shmem-rss:0kB [ 3456.417971][T11587] bridge0: port 1(bridge_slave_0) entered blocking state [ 3456.439228][T11587] bridge0: port 1(bridge_slave_0) entered disabled state [ 3456.447336][ T8477] Memory cgroup out of memory: Killed process 26084 (syz-executor.3) total-vm:72704kB, anon-rss:2204kB, file-rss:35796kB, shmem-rss:0kB [ 3456.462140][T11587] device bridge_slave_0 entered promiscuous mode [ 3456.470946][T11587] bridge0: port 2(bridge_slave_1) entered blocking state [ 3456.481525][T11587] bridge0: port 2(bridge_slave_1) entered disabled state [ 3456.496941][T11587] device bridge_slave_1 entered promiscuous mode [ 3456.502698][ T8477] Memory cgroup out of memory: Killed process 25759 (syz-executor.3) total-vm:72704kB, anon-rss:2204kB, file-rss:35796kB, shmem-rss:0kB [ 3456.532543][ T8470] Memory cgroup out of memory: Killed process 13181 (syz-executor.0) total-vm:72704kB, anon-rss:2216kB, file-rss:35812kB, shmem-rss:0kB [ 3456.549631][ T8477] Memory cgroup out of memory: Killed process 25213 (syz-executor.3) total-vm:72704kB, anon-rss:2204kB, file-rss:35796kB, shmem-rss:0kB [ 3456.570484][ T1056] oom_reaper: reaped process 25213 (syz-executor.3), now anon-rss:0kB, file-rss:34836kB, shmem-rss:0kB [ 3456.582424][ T8470] Memory cgroup out of memory: Killed process 3169 (syz-executor.0) total-vm:72704kB, anon-rss:2216kB, file-rss:35812kB, shmem-rss:0kB [ 3456.615670][ T8477] Memory cgroup out of memory: Killed process 24946 (syz-executor.3) total-vm:72704kB, anon-rss:2204kB, file-rss:35796kB, shmem-rss:0kB [ 3456.647695][ T8470] Memory cgroup out of memory: Killed process 14541 (syz-executor.0) total-vm:72572kB, anon-rss:2208kB, file-rss:35816kB, shmem-rss:0kB [ 3456.666372][ T1056] oom_reaper: reaped process 14541 (syz-executor.0), now anon-rss:0kB, file-rss:34856kB, shmem-rss:0kB [ 3456.678538][ T8477] Memory cgroup out of memory: Killed process 24731 (syz-executor.3) total-vm:72704kB, anon-rss:2204kB, file-rss:35796kB, shmem-rss:0kB [ 3456.697665][ T1056] oom_reaper: reaped process 24731 (syz-executor.3), now anon-rss:0kB, file-rss:34836kB, shmem-rss:0kB [ 3456.709271][ T8470] Memory cgroup out of memory: Killed process 11922 (syz-executor.0) total-vm:72572kB, anon-rss:2208kB, file-rss:35816kB, shmem-rss:0kB [ 3456.741727][ T8477] oom_kill_process: 18 callbacks suppressed [ 3456.741741][ T8477] syz-executor.3 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 3456.763418][ T8477] CPU: 0 PID: 8477 Comm: syz-executor.3 Not tainted 5.3.0-rc1+ #49 [ 3456.771389][ T8477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3456.781419][ T8477] Call Trace: [ 3456.784683][ T8477] dump_stack+0x1d8/0x2f8 [ 3456.788989][ T8477] dump_header+0xd8/0x960 [ 3456.793294][ T8477] oom_kill_process+0xcd/0x350 [ 3456.798034][ T8477] out_of_memory+0x5ce/0x890 [ 3456.802594][ T8477] ? unregister_oom_notifier+0x20/0x20 [ 3456.808029][ T8477] ? __kasan_check_read+0x11/0x20 [ 3456.813030][ T8477] try_charge+0x137d/0x1a60 [ 3456.817517][ T8477] ? __memcg_kmem_charge_memcg+0xf0/0xf0 [ 3456.823124][ T8477] ? __lock_acquire+0x4750/0x4750 [ 3456.828127][ T8477] ? rcu_lock_release+0x15/0x20 [ 3456.832965][ T8477] ? get_mem_cgroup_from_mm+0x15b/0x170 [ 3456.838485][ T8477] __memcg_kmem_charge+0x195/0x5b0 [ 3456.843577][ T8477] ? cancel_charge+0x1d0/0x1d0 [ 3456.848333][ T8477] __alloc_pages_nodemask+0x377/0x790 [ 3456.853681][ T8477] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 3456.859200][ T8477] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 3456.864912][ T8477] ? copy_process+0x59f/0x5bc0 [ 3456.869651][ T8477] copy_process+0x62c/0x5bc0 [ 3456.874223][ T8477] ? __rwlock_init+0x130/0x130 [ 3456.878960][ T8477] ? count_memcg_event_mm+0x300/0x300 [ 3456.884309][ T8477] ? fork_idle+0x290/0x290 [ 3456.888720][ T8477] ? __lock_acquire+0x4750/0x4750 [ 3456.893805][ T8477] ? lock_acquire+0x158/0x250 [ 3456.898469][ T8477] _do_fork+0x179/0x630 [ 3456.902602][ T8477] ? dup_mm+0x340/0x340 [ 3456.906737][ T8477] ? __kasan_check_read+0x11/0x20 [ 3456.911748][ T8477] ? _copy_to_user+0x104/0x150 [ 3456.916491][ T8477] ? put_timespec64+0x106/0x150 [ 3456.921313][ T8477] ? check_preemption_disabled+0xb7/0x2a0 [ 3456.927009][ T8477] __x64_sys_clone+0x247/0x2b0 [ 3456.931742][ T8477] ? __ia32_sys_vfork+0x110/0x110 [ 3456.936740][ T8477] ? prepare_exit_to_usermode+0x1f7/0x580 [ 3456.942449][ T8477] ? do_syscall_64+0x1d/0x140 [ 3456.947117][ T8477] do_syscall_64+0xfe/0x140 [ 3456.951620][ T8477] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3456.957483][ T8477] RIP: 0033:0x457dfa [ 3456.961366][ T8477] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 3456.980941][ T8477] RSP: 002b:00007ffd33f60280 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 3456.989338][ T8477] RAX: ffffffffffffffda RBX: 00007ffd33f60280 RCX: 0000000000457dfa [ 3456.997284][ T8477] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 3457.005231][ T8477] RBP: 00007ffd33f602c0 R08: 0000000000000001 R09: 000055555685d940 [ 3457.013176][ T8477] R10: 000055555685dc10 R11: 0000000000000246 R12: 0000000000000001 [ 3457.021122][ T8477] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffd33f60310 [ 3457.030608][ T8477] memory: usage 51828kB, limit 0kB, failcnt 98 [ 3457.037137][ T8477] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3457.044067][ T8477] Memory cgroup stats for /syz3: [ 3457.044160][ T8477] anon 28946432 [ 3457.044160][ T8477] file 303104 [ 3457.044160][ T8477] kernel_stack 458752 [ 3457.044160][ T8477] slab 21835776 [ 3457.044160][ T8477] sock 0 [ 3457.044160][ T8477] shmem 196608 [ 3457.044160][ T8477] file_mapped 135168 [ 3457.044160][ T8477] file_dirty 0 [ 3457.044160][ T8477] file_writeback 0 [ 3457.044160][ T8477] anon_thp 27262976 [ 3457.044160][ T8477] inactive_anon 73728 [ 3457.044160][ T8477] active_anon 28950528 [ 3457.044160][ T8477] inactive_file 0 [ 3457.044160][ T8477] active_file 24576 [ 3457.044160][ T8477] unevictable 32768 [ 3457.044160][ T8477] slab_reclaimable 4460544 [ 3457.044160][ T8477] slab_unreclaimable 17375232 [ 3457.044160][ T8477] pgfault 483318 [ 3457.044160][ T8477] pgmajfault 0 [ 3457.044160][ T8477] workingset_refault 0 [ 3457.044160][ T8477] workingset_activate 0 [ 3457.044160][ T8477] workingset_nodereclaim 0 [ 3457.044160][ T8477] pgrefill 96 [ 3457.044160][ T8477] pgscan 33 [ 3457.044160][ T8477] pgsteal 35 [ 3457.049122][ T8477] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=26203,uid=0 [ 3457.153664][ T8477] Memory cgroup out of memory: Killed process 26203 (syz-executor.3) total-vm:72572kB, anon-rss:2196kB, file-rss:35796kB, shmem-rss:0kB [ 3457.168726][ T1056] oom_reaper: reaped process 26203 (syz-executor.3), now anon-rss:0kB, file-rss:34836kB, shmem-rss:0kB [ 3457.179958][ T8470] syz-executor.0 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 3457.194788][ T8470] CPU: 0 PID: 8470 Comm: syz-executor.0 Not tainted 5.3.0-rc1+ #49 [ 3457.202676][ T8470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3457.202685][ T8470] Call Trace: [ 3457.216522][ T8470] dump_stack+0x1d8/0x2f8 [ 3457.220852][ T8470] dump_header+0xd8/0x960 [ 3457.225182][ T8470] oom_kill_process+0xcd/0x350 [ 3457.229946][ T8470] out_of_memory+0x5ce/0x890 [ 3457.234538][ T8470] ? unregister_oom_notifier+0x20/0x20 [ 3457.239991][ T8470] ? __kasan_check_read+0x11/0x20 [ 3457.245015][ T8470] try_charge+0x137d/0x1a60 [ 3457.245050][ T8470] ? __memcg_kmem_charge_memcg+0xf0/0xf0 [ 3457.245071][ T8470] ? __lock_acquire+0x4750/0x4750 [ 3457.255182][ T8470] ? rcu_lock_release+0x15/0x20 [ 3457.255196][ T8470] ? get_mem_cgroup_from_mm+0x15b/0x170 [ 3457.255209][ T8470] __memcg_kmem_charge+0x195/0x5b0 [ 3457.255228][ T8470] ? cancel_charge+0x1d0/0x1d0 [ 3457.265084][ T8470] __alloc_pages_nodemask+0x377/0x790 [ 3457.265110][ T8470] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 3457.265125][ T8470] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 3457.275754][ T8470] ? copy_process+0x59f/0x5bc0 [ 3457.275770][ T8470] copy_process+0x62c/0x5bc0 [ 3457.275795][ T8470] ? __rwlock_init+0x130/0x130 [ 3457.285884][ T8470] ? count_memcg_event_mm+0x300/0x300 [ 3457.285903][ T8470] ? fork_idle+0x290/0x290 [ 3457.285923][ T8470] ? __lock_acquire+0x4750/0x4750 [ 3457.297158][ T8470] ? lock_acquire+0x158/0x250 [ 3457.306479][ T8470] _do_fork+0x179/0x630 [ 3457.306493][ T8470] ? dup_mm+0x340/0x340 [ 3457.306509][ T8470] ? __kasan_check_read+0x11/0x20 [ 3457.306520][ T8470] ? _copy_to_user+0x104/0x150 [ 3457.306536][ T8470] ? put_timespec64+0x106/0x150 [ 3457.316651][ T8470] ? check_preemption_disabled+0xb7/0x2a0 [ 3457.316665][ T8470] __x64_sys_clone+0x247/0x2b0 [ 3457.316690][ T8470] ? __ia32_sys_vfork+0x110/0x110 [ 3457.316702][ T8470] ? prepare_exit_to_usermode+0x1f7/0x580 [ 3457.316717][ T8470] ? do_syscall_64+0x1d/0x140 [ 3457.326414][ T8470] do_syscall_64+0xfe/0x140 [ 3457.326432][ T8470] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3457.326442][ T8470] RIP: 0033:0x457dfa [ 3457.326459][ T8470] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 3457.335248][ T8470] RSP: 002b:00007ffe80448dc0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 3457.335260][ T8470] RAX: ffffffffffffffda RBX: 00007ffe80448dc0 RCX: 0000000000457dfa [ 3457.335266][ T8470] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 3457.335272][ T8470] RBP: 00007ffe80448e00 R08: 0000000000000001 R09: 00005555568fd940 [ 3457.335278][ T8470] R10: 00005555568fdc10 R11: 0000000000000246 R12: 0000000000000001 [ 3457.335290][ T8470] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe80448e50 [ 3457.345478][ T8470] memory: usage 53424kB, limit 0kB, failcnt 110 [ 3457.362576][ T8470] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3457.369968][ T8470] Memory cgroup stats for /syz0: [ 3457.370053][ T8470] anon 33325056 [ 3457.370053][ T8470] file 176128 [ 3457.370053][ T8470] kernel_stack 524288 [ 3457.370053][ T8470] slab 18780160 [ 3457.370053][ T8470] sock 0 [ 3457.370053][ T8470] shmem 131072 [ 3457.370053][ T8470] file_mapped 0 [ 3457.370053][ T8470] file_dirty 0 [ 3457.370053][ T8470] file_writeback 0 [ 3457.370053][ T8470] anon_thp 31457280 [ 3457.370053][ T8470] inactive_anon 135168 [ 3457.370053][ T8470] active_anon 33329152 [ 3457.370053][ T8470] inactive_file 0 [ 3457.370053][ T8470] active_file 86016 [ 3457.370053][ T8470] unevictable 135168 [ 3457.370053][ T8470] slab_reclaimable 5001216 [ 3457.370053][ T8470] slab_unreclaimable 13778944 [ 3457.370053][ T8470] pgfault 551760 [ 3457.370053][ T8470] pgmajfault 0 [ 3457.370053][ T8470] workingset_refault 0 [ 3457.370053][ T8470] workingset_activate 0 [ 3457.370053][ T8470] workingset_nodereclaim 0 [ 3457.370053][ T8470] pgrefill 45 [ 3457.370053][ T8470] pgscan 34 [ 3457.370053][ T8470] pgsteal 33 [ 3457.385005][ T8470] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=10738,uid=0 [ 3457.394924][ T8470] Memory cgroup out of memory: Killed process 10738 (syz-executor.0) total-vm:72572kB, anon-rss:2208kB, file-rss:35816kB, shmem-rss:0kB [ 3457.403962][ T8477] syz-executor.3 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 3457.431892][ T8477] CPU: 0 PID: 8477 Comm: syz-executor.3 Not tainted 5.3.0-rc1+ #49 [ 3457.447052][ T8477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3457.447058][ T8477] Call Trace: [ 3457.447075][ T8477] dump_stack+0x1d8/0x2f8 [ 3457.447092][ T8477] dump_header+0xd8/0x960 [ 3457.447114][ T8477] oom_kill_process+0xcd/0x350 [ 3457.463030][ T8477] out_of_memory+0x5ce/0x890 [ 3457.476080][ T8477] ? unregister_oom_notifier+0x20/0x20 [ 3457.476103][ T8477] ? __kasan_check_read+0x11/0x20 [ 3457.476122][ T8477] try_charge+0x137d/0x1a60 [ 3457.569708][ T8477] ? __memcg_kmem_charge_memcg+0xf0/0xf0 [ 3457.569727][ T8477] ? __lock_acquire+0x4750/0x4750 [ 3457.569744][ T8477] ? rcu_lock_release+0x15/0x20 [ 3457.569755][ T8477] ? get_mem_cgroup_from_mm+0x15b/0x170 [ 3457.569770][ T8477] __memcg_kmem_charge+0x195/0x5b0 [ 3457.599015][ T8477] ? cancel_charge+0x1d0/0x1d0 [ 3457.599039][ T8477] __alloc_pages_nodemask+0x377/0x790 [ 3457.599057][ T8477] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 3457.599072][ T8477] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 3457.618745][ T8477] ? copy_process+0x59f/0x5bc0 [ 3457.618760][ T8477] copy_process+0x62c/0x5bc0 [ 3457.618799][ T8477] ? __rwlock_init+0x130/0x130 [ 3457.632111][ T8477] ? count_memcg_event_mm+0x300/0x300 [ 3457.640734][ T8477] ? fork_idle+0x290/0x290 [ 3457.650058][ T8477] ? __lock_acquire+0x4750/0x4750 [ 3457.660500][ T8477] ? lock_acquire+0x158/0x250 [ 3457.670612][ T8477] _do_fork+0x179/0x630 [ 3457.680489][ T8477] ? dup_mm+0x340/0x340 [ 3457.691130][ T8477] ? __kasan_check_read+0x11/0x20 [ 3457.701247][ T8477] ? _copy_to_user+0x104/0x150 [ 3457.712477][ T8477] ? put_timespec64+0x106/0x150 [ 3457.721796][ T8477] ? check_preemption_disabled+0xb7/0x2a0 [ 3457.731896][ T8477] __x64_sys_clone+0x247/0x2b0 [ 3457.741301][ T8477] ? __ia32_sys_vfork+0x110/0x110 [ 3457.750102][ T8477] ? prepare_exit_to_usermode+0x1f7/0x580 [ 3457.750121][ T8477] ? do_syscall_64+0x1d/0x140 [ 3457.759263][ T8477] do_syscall_64+0xfe/0x140 [ 3457.768859][ T8477] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3457.779309][ T8477] RIP: 0033:0x457dfa [ 3457.779323][ T8477] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 3457.790021][ T8477] RSP: 002b:00007ffd33f60280 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 3457.799173][ T8477] RAX: ffffffffffffffda RBX: 00007ffd33f60280 RCX: 0000000000457dfa [ 3457.799185][ T8477] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 3457.805798][T11587] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3457.808933][ T8477] RBP: 00007ffd33f602c0 R08: 0000000000000001 R09: 000055555685d940 [ 3457.836939][ T8477] R10: 000055555685dc10 R11: 0000000000000246 R12: 0000000000000001 [ 3457.836946][ T8477] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffd33f60310 [ 3457.838904][ T8477] memory: usage 49496kB, limit 0kB, failcnt 104 [ 3457.862912][ T8477] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3457.870509][T11587] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3457.886372][ T8477] Memory cgroup stats for /syz3: [ 3457.886459][ T8477] anon 26734592 [ 3457.886459][ T8477] file 303104 [ 3457.886459][ T8477] kernel_stack 458752 [ 3457.886459][ T8477] slab 21835776 [ 3457.886459][ T8477] sock 0 [ 3457.886459][ T8477] shmem 196608 [ 3457.886459][ T8477] file_mapped 135168 [ 3457.886459][ T8477] file_dirty 0 [ 3457.886459][ T8477] file_writeback 0 [ 3457.886459][ T8477] anon_thp 25165824 [ 3457.886459][ T8477] inactive_anon 73728 [ 3457.886459][ T8477] active_anon 26738688 [ 3457.886459][ T8477] inactive_file 0 [ 3457.886459][ T8477] active_file 24576 [ 3457.886459][ T8477] unevictable 32768 [ 3457.886459][ T8477] slab_reclaimable 4460544 [ 3457.886459][ T8477] slab_unreclaimable 17375232 [ 3457.886459][ T8477] pgfault 483318 [ 3457.886459][ T8477] pgmajfault 0 [ 3457.886459][ T8477] workingset_refault 0 [ 3457.886459][ T8477] workingset_activate 0 [ 3457.886459][ T8477] workingset_nodereclaim 0 [ 3457.886459][ T8477] pgrefill 96 [ 3457.886459][ T8477] pgscan 33 [ 3457.886459][ T8477] pgsteal 35 [ 3458.003393][ T8477] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=25341,uid=0 [ 3458.019876][ T8477] Memory cgroup out of memory: Killed process 25341 (syz-executor.3) total-vm:72572kB, anon-rss:2196kB, file-rss:35796kB, shmem-rss:0kB [ 3458.049659][ T8470] syz-executor.0 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 3458.064466][ T8470] CPU: 0 PID: 8470 Comm: syz-executor.0 Not tainted 5.3.0-rc1+ #49 [ 3458.072357][ T8470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3458.082405][ T8470] Call Trace: [ 3458.085693][ T8470] dump_stack+0x1d8/0x2f8 [ 3458.090022][ T8470] dump_header+0xd8/0x960 [ 3458.094362][ T8470] oom_kill_process+0xcd/0x350 [ 3458.099135][ T8470] out_of_memory+0x5ce/0x890 [ 3458.103729][ T8470] ? unregister_oom_notifier+0x20/0x20 [ 3458.109177][ T8470] ? __kasan_check_read+0x11/0x20 [ 3458.114214][ T8470] try_charge+0x137d/0x1a60 [ 3458.118730][ T8470] ? __memcg_kmem_charge_memcg+0xf0/0xf0 [ 3458.124378][ T8470] ? __lock_acquire+0x4750/0x4750 [ 3458.129396][ T8470] ? rcu_lock_release+0x15/0x20 [ 3458.134220][ T8470] ? get_mem_cgroup_from_mm+0x15b/0x170 [ 3458.139734][ T8470] __memcg_kmem_charge+0x195/0x5b0 [ 3458.144819][ T8470] ? cancel_charge+0x1d0/0x1d0 [ 3458.149571][ T8470] __alloc_pages_nodemask+0x377/0x790 [ 3458.154919][ T8470] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 3458.160449][ T8470] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 3458.166153][ T8470] ? copy_process+0x59f/0x5bc0 [ 3458.170888][ T8470] copy_process+0x62c/0x5bc0 [ 3458.175458][ T8470] ? __rwlock_init+0x130/0x130 [ 3458.180199][ T8470] ? count_memcg_event_mm+0x300/0x300 [ 3458.185548][ T8470] ? fork_idle+0x290/0x290 [ 3458.189937][ T8470] ? __lock_acquire+0x4750/0x4750 [ 3458.194937][ T8470] ? lock_acquire+0x158/0x250 [ 3458.199599][ T8470] _do_fork+0x179/0x630 [ 3458.203741][ T8470] ? dup_mm+0x340/0x340 [ 3458.207875][ T8470] ? __kasan_check_read+0x11/0x20 [ 3458.212890][ T8470] ? _copy_to_user+0x104/0x150 [ 3458.217648][ T8470] ? put_timespec64+0x106/0x150 [ 3458.222490][ T8470] ? check_preemption_disabled+0xb7/0x2a0 [ 3458.228193][ T8470] __x64_sys_clone+0x247/0x2b0 [ 3458.232932][ T8470] ? __ia32_sys_vfork+0x110/0x110 [ 3458.237930][ T8470] ? prepare_exit_to_usermode+0x1f7/0x580 [ 3458.243629][ T8470] ? do_syscall_64+0x1d/0x140 [ 3458.248282][ T8470] do_syscall_64+0xfe/0x140 [ 3458.252761][ T8470] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3458.258632][ T8470] RIP: 0033:0x457dfa [ 3458.262499][ T8470] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 3458.282075][ T8470] RSP: 002b:00007ffe80448dc0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 3458.290480][ T8470] RAX: ffffffffffffffda RBX: 00007ffe80448dc0 RCX: 0000000000457dfa [ 3458.298441][ T8470] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 3458.306384][ T8470] RBP: 00007ffe80448e00 R08: 0000000000000001 R09: 00005555568fd940 [ 3458.314331][ T8470] R10: 00005555568fdc10 R11: 0000000000000246 R12: 0000000000000001 [ 3458.322273][ T8470] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe80448e50 [ 3458.331516][ T8470] memory: usage 51092kB, limit 0kB, failcnt 116 [ 3458.337853][ T8470] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3458.345337][ T8470] Memory cgroup stats for /syz0: [ 3458.345425][ T8470] anon 31117312 [ 3458.345425][ T8470] file 176128 [ 3458.345425][ T8470] kernel_stack 524288 [ 3458.345425][ T8470] slab 18780160 [ 3458.345425][ T8470] sock 0 [ 3458.345425][ T8470] shmem 131072 [ 3458.345425][ T8470] file_mapped 0 [ 3458.345425][ T8470] file_dirty 0 [ 3458.345425][ T8470] file_writeback 0 [ 3458.345425][ T8470] anon_thp 29360128 [ 3458.345425][ T8470] inactive_anon 135168 [ 3458.345425][ T8470] active_anon 31121408 [ 3458.345425][ T8470] inactive_file 0 [ 3458.345425][ T8470] active_file 86016 [ 3458.345425][ T8470] unevictable 135168 [ 3458.345425][ T8470] slab_reclaimable 5001216 [ 3458.345425][ T8470] slab_unreclaimable 13778944 [ 3458.345425][ T8470] pgfault 551760 [ 3458.345425][ T8470] pgmajfault 0 [ 3458.345425][ T8470] workingset_refault 0 [ 3458.345425][ T8470] workingset_activate 0 [ 3458.345425][ T8470] workingset_nodereclaim 0 [ 3458.345425][ T8470] pgrefill 45 [ 3458.345425][ T8470] pgscan 34 [ 3458.345425][ T8470] pgsteal 33 [ 3458.350370][ T8470] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=13622,uid=0 [ 3458.457016][ T8470] Memory cgroup out of memory: Killed process 13622 (syz-executor.0) total-vm:72572kB, anon-rss:2208kB, file-rss:35812kB, shmem-rss:0kB [ 3458.472766][ T1056] oom_reaper: reaped process 13622 (syz-executor.0), now anon-rss:0kB, file-rss:34852kB, shmem-rss:0kB [ 3458.484523][ T8477] syz-executor.3 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 3458.499880][ T8477] CPU: 0 PID: 8477 Comm: syz-executor.3 Not tainted 5.3.0-rc1+ #49 [ 3458.507786][ T8477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3458.507791][ T8477] Call Trace: [ 3458.507809][ T8477] dump_stack+0x1d8/0x2f8 [ 3458.507825][ T8477] dump_header+0xd8/0x960 [ 3458.507841][ T8477] oom_kill_process+0xcd/0x350 [ 3458.507854][ T8477] out_of_memory+0x5ce/0x890 [ 3458.507867][ T8477] ? unregister_oom_notifier+0x20/0x20 [ 3458.507880][ T8477] ? __kasan_check_read+0x11/0x20 [ 3458.507897][ T8477] try_charge+0x137d/0x1a60 [ 3458.507932][ T8477] ? __memcg_kmem_charge_memcg+0xf0/0xf0 [ 3458.507953][ T8477] ? __lock_acquire+0x4750/0x4750 [ 3458.507973][ T8477] ? rcu_lock_release+0x15/0x20 [ 3458.507985][ T8477] ? get_mem_cgroup_from_mm+0x15b/0x170 [ 3458.507997][ T8477] __memcg_kmem_charge+0x195/0x5b0 [ 3458.508012][ T8477] ? cancel_charge+0x1d0/0x1d0 [ 3458.521349][ T8477] __alloc_pages_nodemask+0x377/0x790 [ 3458.530010][ T8477] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 3458.539350][ T8477] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 3458.601542][ T8477] ? copy_process+0x59f/0x5bc0 [ 3458.606278][ T8477] copy_process+0x62c/0x5bc0 [ 3458.610848][ T8477] ? __rwlock_init+0x130/0x130 [ 3458.615620][ T8477] ? count_memcg_event_mm+0x300/0x300 [ 3458.620974][ T8477] ? fork_idle+0x290/0x290 [ 3458.625384][ T8477] ? __lock_acquire+0x4750/0x4750 [ 3458.630376][ T8477] ? lock_acquire+0x158/0x250 [ 3458.635027][ T8477] _do_fork+0x179/0x630 [ 3458.639154][ T8477] ? dup_mm+0x340/0x340 [ 3458.643281][ T8477] ? __kasan_check_read+0x11/0x20 [ 3458.648278][ T8477] ? _copy_to_user+0x104/0x150 [ 3458.653015][ T8477] ? put_timespec64+0x106/0x150 [ 3458.657863][ T8477] ? check_preemption_disabled+0xb7/0x2a0 [ 3458.663564][ T8477] __x64_sys_clone+0x247/0x2b0 [ 3458.668315][ T8477] ? __ia32_sys_vfork+0x110/0x110 [ 3458.673310][ T8477] ? prepare_exit_to_usermode+0x1f7/0x580 [ 3458.679008][ T8477] ? do_syscall_64+0x1d/0x140 [ 3458.683666][ T8477] do_syscall_64+0xfe/0x140 [ 3458.688146][ T8477] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3458.694014][ T8477] RIP: 0033:0x457dfa [ 3458.697893][ T8477] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 3458.717467][ T8477] RSP: 002b:00007ffd33f60280 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 3458.725867][ T8477] RAX: ffffffffffffffda RBX: 00007ffd33f60280 RCX: 0000000000457dfa [ 3458.733813][ T8477] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 3458.741781][ T8477] RBP: 00007ffd33f602c0 R08: 0000000000000001 R09: 000055555685d940 [ 3458.749724][ T8477] R10: 000055555685dc10 R11: 0000000000000246 R12: 0000000000000001 [ 3458.757679][ T8477] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffd33f60310 [ 3458.769090][ T8477] memory: usage 47132kB, limit 0kB, failcnt 110 [ 3458.775464][ T8477] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3458.775469][ T8477] Memory cgroup stats for /syz3: [ 3458.775559][ T8477] anon 24473600 [ 3458.775559][ T8477] file 303104 [ 3458.775559][ T8477] kernel_stack 393216 [ 3458.775559][ T8477] slab 21835776 [ 3458.775559][ T8477] sock 0 [ 3458.775559][ T8477] shmem 196608 [ 3458.775559][ T8477] file_mapped 135168 [ 3458.775559][ T8477] file_dirty 0 [ 3458.775559][ T8477] file_writeback 0 [ 3458.775559][ T8477] anon_thp 23068672 [ 3458.775559][ T8477] inactive_anon 73728 [ 3458.775559][ T8477] active_anon 24477696 [ 3458.775559][ T8477] inactive_file 0 [ 3458.775559][ T8477] active_file 24576 [ 3458.775559][ T8477] unevictable 32768 [ 3458.775559][ T8477] slab_reclaimable 4460544 [ 3458.775559][ T8477] slab_unreclaimable 17375232 [ 3458.775559][ T8477] pgfault 483318 [ 3458.775559][ T8477] pgmajfault 0 [ 3458.775559][ T8477] workingset_refault 0 [ 3458.775559][ T8477] workingset_activate 0 [ 3458.775559][ T8477] workingset_nodereclaim 0 [ 3458.775559][ T8477] pgrefill 96 [ 3458.775559][ T8477] pgscan 33 [ 3458.775559][ T8477] pgsteal 35 [ 3458.775574][ T8477] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=26301,uid=0 [ 3458.775669][ T8477] Memory cgroup out of memory: Killed process 26301 (syz-executor.3) total-vm:72572kB, anon-rss:2196kB, file-rss:35792kB, shmem-rss:0kB [ 3458.801182][ T8470] syz-executor.0 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 3458.906096][ T8470] CPU: 0 PID: 8470 Comm: syz-executor.0 Not tainted 5.3.0-rc1+ #49 [ 3458.918842][ T8470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3458.918848][ T8470] Call Trace: [ 3458.918865][ T8470] dump_stack+0x1d8/0x2f8 [ 3458.918881][ T8470] dump_header+0xd8/0x960 [ 3458.918896][ T8470] oom_kill_process+0xcd/0x350 [ 3458.918909][ T8470] out_of_memory+0x5ce/0x890 [ 3458.918923][ T8470] ? unregister_oom_notifier+0x20/0x20 [ 3458.918939][ T8470] ? __kasan_check_read+0x11/0x20 [ 3458.936859][ T8470] try_charge+0x137d/0x1a60 [ 3458.936895][ T8470] ? __memcg_kmem_charge_memcg+0xf0/0xf0 [ 3458.936916][ T8470] ? __lock_acquire+0x4750/0x4750 [ 3458.944540][ T8470] ? rcu_lock_release+0x15/0x20 [ 3458.944564][ T8470] ? get_mem_cgroup_from_mm+0x15b/0x170 [ 3458.944589][ T8470] __memcg_kmem_charge+0x195/0x5b0 [ 3458.944601][ T8470] ? cancel_charge+0x1d0/0x1d0 [ 3458.944623][ T8470] __alloc_pages_nodemask+0x377/0x790 [ 3458.953681][ T8470] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 3458.953695][ T8470] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 3458.953713][ T8470] ? copy_process+0x59f/0x5bc0 [ 3458.953727][ T8470] copy_process+0x62c/0x5bc0 [ 3458.963756][ T8470] ? __rwlock_init+0x130/0x130 [ 3458.963769][ T8470] ? count_memcg_event_mm+0x300/0x300 [ 3458.963790][ T8470] ? fork_idle+0x290/0x290 [ 3458.973289][ T8470] ? __lock_acquire+0x4750/0x4750 [ 3458.983909][ T8470] ? lock_acquire+0x158/0x250 [ 3458.983925][ T8470] _do_fork+0x179/0x630 [ 3458.983939][ T8470] ? dup_mm+0x340/0x340 [ 3458.983959][ T8470] ? __kasan_check_read+0x11/0x20 [ 3458.994321][ T8470] ? _copy_to_user+0x104/0x150 [ 3458.994336][ T8470] ? put_timespec64+0x106/0x150 [ 3458.994348][ T8470] ? check_preemption_disabled+0xb7/0x2a0 [ 3458.994368][ T8470] __x64_sys_clone+0x247/0x2b0 [ 3459.004213][ T8470] ? __ia32_sys_vfork+0x110/0x110 [ 3459.004225][ T8470] ? prepare_exit_to_usermode+0x1f7/0x580 [ 3459.004242][ T8470] ? do_syscall_64+0x1d/0x140 [ 3459.004260][ T8470] do_syscall_64+0xfe/0x140 [ 3459.015150][ T8470] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3459.015161][ T8470] RIP: 0033:0x457dfa [ 3459.015173][ T8470] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 3459.015179][ T8470] RSP: 002b:00007ffe80448dc0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 3459.015194][ T8470] RAX: ffffffffffffffda RBX: 00007ffe80448dc0 RCX: 0000000000457dfa [ 3459.025636][ T8470] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 3459.025644][ T8470] RBP: 00007ffe80448e00 R08: 0000000000000001 R09: 00005555568fd940 [ 3459.025651][ T8470] R10: 00005555568fdc10 R11: 0000000000000246 R12: 0000000000000001 [ 3459.025657][ T8470] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe80448e50 [ 3459.035029][ T8470] memory: usage 48684kB, limit 0kB, failcnt 122 [ 3459.035037][ T8470] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3459.035041][ T8470] Memory cgroup stats for /syz0: [ 3459.035529][ T8470] anon 28909568 [ 3459.035529][ T8470] file 176128 [ 3459.035529][ T8470] kernel_stack 458752 [ 3459.035529][ T8470] slab 18644992 [ 3459.035529][ T8470] sock 0 [ 3459.035529][ T8470] shmem 131072 [ 3459.035529][ T8470] file_mapped 0 [ 3459.035529][ T8470] file_dirty 0 [ 3459.035529][ T8470] file_writeback 0 [ 3459.035529][ T8470] anon_thp 27262976 [ 3459.035529][ T8470] inactive_anon 135168 [ 3459.035529][ T8470] active_anon 28913664 [ 3459.035529][ T8470] inactive_file 0 [ 3459.035529][ T8470] active_file 86016 [ 3459.035529][ T8470] unevictable 135168 [ 3459.035529][ T8470] slab_reclaimable 5001216 [ 3459.035529][ T8470] slab_unreclaimable 13643776 [ 3459.035529][ T8470] pgfault 551760 [ 3459.035529][ T8470] pgmajfault 0 [ 3459.035529][ T8470] workingset_refault 0 [ 3459.035529][ T8470] workingset_activate 0 [ 3459.035529][ T8470] workingset_nodereclaim 0 [ 3459.035529][ T8470] pgrefill 45 [ 3459.035529][ T8470] pgscan 34 [ 3459.035529][ T8470] pgsteal 33 [ 3459.050266][ T8470] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=12967,uid=0 [ 3459.061602][ T8470] Memory cgroup out of memory: Killed process 12967 (syz-executor.0) total-vm:72572kB, anon-rss:2208kB, file-rss:35812kB, shmem-rss:0kB [ 3459.324624][ T24] device bridge_slave_1 left promiscuous mode [ 3459.330845][ T24] bridge0: port 2(bridge_slave_1) entered disabled state [ 3459.339916][ T1056] oom_reaper: reaped process 12967 (syz-executor.0), now anon-rss:0kB, file-rss:34852kB, shmem-rss:0kB [ 3459.343086][ T8470] syz-executor.0 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 3459.363436][ T8470] CPU: 0 PID: 8470 Comm: syz-executor.0 Not tainted 5.3.0-rc1+ #49 [ 3459.371323][ T8470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3459.381395][ T8470] Call Trace: [ 3459.384685][ T8470] dump_stack+0x1d8/0x2f8 [ 3459.389032][ T8470] dump_header+0xd8/0x960 [ 3459.393340][ T8470] oom_kill_process+0xcd/0x350 [ 3459.398105][ T8470] out_of_memory+0x5ce/0x890 [ 3459.402669][ T8470] ? unregister_oom_notifier+0x20/0x20 [ 3459.408148][ T8470] ? __kasan_check_read+0x11/0x20 [ 3459.413147][ T8470] try_charge+0x137d/0x1a60 [ 3459.417639][ T8470] ? __memcg_kmem_charge_memcg+0xf0/0xf0 [ 3459.423252][ T8470] ? __lock_acquire+0x4750/0x4750 [ 3459.428252][ T8470] ? rcu_lock_release+0x15/0x20 [ 3459.433076][ T8470] ? get_mem_cgroup_from_mm+0x15b/0x170 [ 3459.438595][ T8470] __memcg_kmem_charge+0x195/0x5b0 [ 3459.443683][ T8470] ? cancel_charge+0x1d0/0x1d0 [ 3459.448442][ T8470] __alloc_pages_nodemask+0x377/0x790 [ 3459.453806][ T8470] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 3459.459324][ T8470] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 3459.465021][ T8470] ? copy_process+0x59f/0x5bc0 [ 3459.469758][ T8470] copy_process+0x62c/0x5bc0 [ 3459.474326][ T8470] ? __rwlock_init+0x130/0x130 [ 3459.479076][ T8470] ? count_memcg_event_mm+0x300/0x300 [ 3459.484431][ T8470] ? fork_idle+0x290/0x290 [ 3459.488842][ T8470] ? __lock_acquire+0x4750/0x4750 [ 3459.493839][ T8470] ? lock_acquire+0x158/0x250 [ 3459.498502][ T8470] _do_fork+0x179/0x630 [ 3459.502628][ T8470] ? dup_mm+0x340/0x340 [ 3459.506775][ T8470] ? __kasan_check_read+0x11/0x20 [ 3459.511775][ T8470] ? _copy_to_user+0x104/0x150 [ 3459.516515][ T8470] ? put_timespec64+0x106/0x150 [ 3459.521337][ T8470] ? check_preemption_disabled+0xb7/0x2a0 [ 3459.527029][ T8470] __x64_sys_clone+0x247/0x2b0 [ 3459.531785][ T8470] ? __ia32_sys_vfork+0x110/0x110 [ 3459.536786][ T8470] ? prepare_exit_to_usermode+0x1f7/0x580 [ 3459.542481][ T8470] ? do_syscall_64+0x1d/0x140 [ 3459.547133][ T8470] do_syscall_64+0xfe/0x140 [ 3459.551614][ T8470] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3459.557481][ T8470] RIP: 0033:0x457dfa [ 3459.561347][ T8470] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 3459.580924][ T8470] RSP: 002b:00007ffe80448dc0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 3459.589306][ T8470] RAX: ffffffffffffffda RBX: 00007ffe80448dc0 RCX: 0000000000457dfa [ 3459.597253][ T8470] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 3459.605197][ T8470] RBP: 00007ffe80448e00 R08: 0000000000000001 R09: 00005555568fd940 [ 3459.613139][ T8470] R10: 00005555568fdc10 R11: 0000000000000246 R12: 0000000000000001 [ 3459.621082][ T8470] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe80448e50 [ 3459.630392][ T8470] memory: usage 46352kB, limit 0kB, failcnt 128 [ 3459.639168][ T24] device bridge_slave_0 left promiscuous mode [ 3459.644691][ T8470] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3459.645751][ T24] bridge0: port 1(bridge_slave_0) entered disabled state [ 3459.652073][ T8470] Memory cgroup stats for /syz0: [ 3459.652158][ T8470] anon 26701824 [ 3459.652158][ T8470] file 176128 [ 3459.652158][ T8470] kernel_stack 458752 [ 3459.652158][ T8470] slab 18644992 [ 3459.652158][ T8470] sock 0 [ 3459.652158][ T8470] shmem 131072 [ 3459.652158][ T8470] file_mapped 0 [ 3459.652158][ T8470] file_dirty 0 [ 3459.652158][ T8470] file_writeback 0 [ 3459.652158][ T8470] anon_thp 25165824 [ 3459.652158][ T8470] inactive_anon 135168 [ 3459.652158][ T8470] active_anon 26705920 [ 3459.652158][ T8470] inactive_file 0 [ 3459.652158][ T8470] active_file 86016 [ 3459.652158][ T8470] unevictable 135168 [ 3459.652158][ T8470] slab_reclaimable 5001216 [ 3459.652158][ T8470] slab_unreclaimable 13643776 [ 3459.652158][ T8470] pgfault 551760 [ 3459.652158][ T8470] pgmajfault 0 [ 3459.652158][ T8470] workingset_refault 0 [ 3459.652158][ T8470] workingset_activate 0 [ 3459.652158][ T8470] workingset_nodereclaim 0 [ 3459.652158][ T8470] pgrefill 45 [ 3459.652158][ T8470] pgscan 34 [ 3459.652158][ T8470] pgsteal 33 [ 3459.753190][ T8470] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=10897,uid=0 [ 3459.768704][ T8470] Memory cgroup out of memory: Killed process 10897 (syz-executor.0) total-vm:72572kB, anon-rss:2208kB, file-rss:35812kB, shmem-rss:0kB [ 3459.783023][ T8477] syz-executor.3 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 3459.785272][ T1056] oom_reaper: reaped process 10897 (syz-executor.0), now anon-rss:0kB, file-rss:34852kB, shmem-rss:0kB [ 3459.798275][ T8477] CPU: 1 PID: 8477 Comm: syz-executor.3 Not tainted 5.3.0-rc1+ #49 [ 3459.813778][ T8477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3459.823949][ T8477] Call Trace: [ 3459.827243][ T8477] dump_stack+0x1d8/0x2f8 [ 3459.831698][ T8477] dump_header+0xd8/0x960 [ 3459.836116][ T8477] oom_kill_process+0xcd/0x350 [ 3459.840910][ T8477] out_of_memory+0x5ce/0x890 [ 3459.845488][ T8477] ? unregister_oom_notifier+0x20/0x20 [ 3459.850951][ T8477] ? __kasan_check_read+0x11/0x20 [ 3459.855952][ T8477] try_charge+0x137d/0x1a60 [ 3459.860450][ T8477] ? __memcg_kmem_charge_memcg+0xf0/0xf0 [ 3459.866085][ T8477] ? __lock_acquire+0x4750/0x4750 [ 3459.871107][ T8477] ? rcu_lock_release+0x15/0x20 [ 3459.875935][ T8477] ? get_mem_cgroup_from_mm+0x15b/0x170 [ 3459.881452][ T8477] __memcg_kmem_charge+0x195/0x5b0 [ 3459.886552][ T8477] ? cancel_charge+0x1d0/0x1d0 [ 3459.891317][ T8477] __alloc_pages_nodemask+0x377/0x790 [ 3459.896672][ T8477] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 3459.902191][ T8477] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 3459.907903][ T8477] ? copy_process+0x59f/0x5bc0 [ 3459.912655][ T8477] copy_process+0x62c/0x5bc0 [ 3459.917228][ T8477] ? __rwlock_init+0x130/0x130 [ 3459.921967][ T8477] ? count_memcg_event_mm+0x300/0x300 [ 3459.927328][ T8477] ? fork_idle+0x290/0x290 [ 3459.931735][ T8477] ? __lock_acquire+0x4750/0x4750 [ 3459.936730][ T8477] ? lock_acquire+0x158/0x250 [ 3459.941389][ T8477] _do_fork+0x179/0x630 [ 3459.945525][ T8477] ? dup_mm+0x340/0x340 [ 3459.949682][ T8477] ? __kasan_check_read+0x11/0x20 [ 3459.954691][ T8477] ? _copy_to_user+0x104/0x150 [ 3459.959433][ T8477] ? put_timespec64+0x106/0x150 [ 3459.964272][ T8477] ? check_preemption_disabled+0xb7/0x2a0 [ 3459.969980][ T8477] __x64_sys_clone+0x247/0x2b0 [ 3459.974717][ T8477] ? __ia32_sys_vfork+0x110/0x110 [ 3459.979712][ T8477] ? prepare_exit_to_usermode+0x1f7/0x580 [ 3459.985418][ T8477] ? do_syscall_64+0x1d/0x140 [ 3459.990083][ T8477] do_syscall_64+0xfe/0x140 [ 3459.994564][ T8477] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3460.000428][ T8477] RIP: 0033:0x457dfa [ 3460.004310][ T8477] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 3460.023936][ T8477] RSP: 002b:00007ffd33f60280 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 3460.032336][ T8477] RAX: ffffffffffffffda RBX: 00007ffd33f60280 RCX: 0000000000457dfa [ 3460.040282][ T8477] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 3460.048234][ T8477] RBP: 00007ffd33f602c0 R08: 0000000000000001 R09: 000055555685d940 [ 3460.056227][ T8477] R10: 000055555685dc10 R11: 0000000000000246 R12: 0000000000000001 [ 3460.064187][ T8477] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffd33f60310 [ 3460.073142][ T8477] memory: usage 44708kB, limit 0kB, failcnt 119 [ 3460.079445][ T8477] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3460.079454][ T8477] Memory cgroup stats for /syz3: [ 3460.079536][ T8477] anon 22261760 [ 3460.079536][ T8477] file 98304 [ 3460.079536][ T8477] kernel_stack 393216 [ 3460.079536][ T8477] slab 21835776 [ 3460.079536][ T8477] sock 0 [ 3460.079536][ T8477] shmem 196608 [ 3460.079536][ T8477] file_mapped 135168 [ 3460.079536][ T8477] file_dirty 0 [ 3460.079536][ T8477] file_writeback 0 [ 3460.079536][ T8477] anon_thp 20971520 [ 3460.079536][ T8477] inactive_anon 73728 [ 3460.079536][ T8477] active_anon 22265856 [ 3460.079536][ T8477] inactive_file 94208 [ 3460.079536][ T8477] active_file 24576 [ 3460.079536][ T8477] unevictable 32768 [ 3460.079536][ T8477] slab_reclaimable 4460544 [ 3460.079536][ T8477] slab_unreclaimable 17375232 [ 3460.079536][ T8477] pgfault 483318 [ 3460.079536][ T8477] pgmajfault 0 [ 3460.079536][ T8477] workingset_refault 0 [ 3460.079536][ T8477] workingset_activate 0 [ 3460.079536][ T8477] workingset_nodereclaim 0 [ 3460.079536][ T8477] pgrefill 96 [ 3460.079536][ T8477] pgscan 87 [ 3460.079536][ T8477] pgsteal 78 [ 3460.180715][ T8477] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=26274,uid=0 [ 3460.196265][ T8477] Memory cgroup out of memory: Killed process 26274 (syz-executor.3) total-vm:72572kB, anon-rss:2196kB, file-rss:35792kB, shmem-rss:0kB [ 3460.210557][ T8470] syz-executor.0 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 3460.215156][ T1056] oom_reaper: reaped process 26274 (syz-executor.3), now anon-rss:0kB, file-rss:34832kB, shmem-rss:0kB [ 3460.226459][ T8470] CPU: 1 PID: 8470 Comm: syz-executor.0 Not tainted 5.3.0-rc1+ #49 [ 3460.241666][ T8470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3460.241675][ T8470] Call Trace: [ 3460.254998][ T8470] dump_stack+0x1d8/0x2f8 [ 3460.255016][ T8470] dump_header+0xd8/0x960 [ 3460.255032][ T8470] oom_kill_process+0xcd/0x350 [ 3460.255043][ T8470] out_of_memory+0x5ce/0x890 [ 3460.263889][ T8470] ? unregister_oom_notifier+0x20/0x20 [ 3460.263904][ T8470] ? __kasan_check_read+0x11/0x20 [ 3460.263926][ T8470] try_charge+0x137d/0x1a60 [ 3460.273263][ T8470] ? __memcg_kmem_charge_memcg+0xf0/0xf0 [ 3460.283694][ T8470] ? __lock_acquire+0x4750/0x4750 [ 3460.283714][ T8470] ? rcu_lock_release+0x15/0x20 [ 3460.283729][ T8470] ? get_mem_cgroup_from_mm+0x15b/0x170 [ 3460.309298][ T8470] __memcg_kmem_charge+0x195/0x5b0 [ 3460.314410][ T8470] ? cancel_charge+0x1d0/0x1d0 [ 3460.319178][ T8470] __alloc_pages_nodemask+0x377/0x790 [ 3460.324541][ T8470] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 3460.330072][ T8470] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 3460.335770][ T8470] ? copy_process+0x59f/0x5bc0 [ 3460.340508][ T8470] copy_process+0x62c/0x5bc0 [ 3460.345092][ T8470] ? __rwlock_init+0x130/0x130 [ 3460.349840][ T8470] ? count_memcg_event_mm+0x300/0x300 [ 3460.355207][ T8470] ? fork_idle+0x290/0x290 [ 3460.359615][ T8470] ? __lock_acquire+0x4750/0x4750 [ 3460.364626][ T8470] ? lock_acquire+0x158/0x250 [ 3460.369287][ T8470] _do_fork+0x179/0x630 [ 3460.373417][ T8470] ? dup_mm+0x340/0x340 [ 3460.377550][ T8470] ? __kasan_check_read+0x11/0x20 [ 3460.382543][ T8470] ? _copy_to_user+0x104/0x150 [ 3460.387293][ T8470] ? put_timespec64+0x106/0x150 [ 3460.392127][ T8470] ? check_preemption_disabled+0xb7/0x2a0 [ 3460.397837][ T8470] __x64_sys_clone+0x247/0x2b0 [ 3460.402571][ T8470] ? __ia32_sys_vfork+0x110/0x110 [ 3460.407575][ T8470] ? prepare_exit_to_usermode+0x1f7/0x580 [ 3460.413283][ T8470] ? do_syscall_64+0x1d/0x140 [ 3460.417940][ T8470] do_syscall_64+0xfe/0x140 [ 3460.422420][ T8470] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3460.428289][ T8470] RIP: 0033:0x457dfa [ 3460.432166][ T8470] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 3460.451744][ T8470] RSP: 002b:00007ffe80448dc0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 3460.460124][ T8470] RAX: ffffffffffffffda RBX: 00007ffe80448dc0 RCX: 0000000000457dfa [ 3460.468075][ T8470] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 3460.476055][ T8470] RBP: 00007ffe80448e00 R08: 0000000000000001 R09: 00005555568fd940 [ 3460.484021][ T8470] R10: 00005555568fdc10 R11: 0000000000000246 R12: 0000000000000001 [ 3460.491988][ T8470] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe80448e50 [ 3460.503757][ T8470] memory: usage 43960kB, limit 0kB, failcnt 134 [ 3460.510008][ T8470] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3460.516929][ T8470] Memory cgroup stats for /syz0: [ 3460.517008][ T8470] anon 24530944 [ 3460.517008][ T8470] file 176128 [ 3460.517008][ T8470] kernel_stack 393216 [ 3460.517008][ T8470] slab 18644992 [ 3460.517008][ T8470] sock 0 [ 3460.517008][ T8470] shmem 131072 [ 3460.517008][ T8470] file_mapped 0 [ 3460.517008][ T8470] file_dirty 0 [ 3460.517008][ T8470] file_writeback 0 [ 3460.517008][ T8470] anon_thp 23068672 [ 3460.517008][ T8470] inactive_anon 135168 [ 3460.517008][ T8470] active_anon 24535040 [ 3460.517008][ T8470] inactive_file 0 [ 3460.517008][ T8470] active_file 86016 [ 3460.517008][ T8470] unevictable 135168 [ 3460.517008][ T8470] slab_reclaimable 5001216 [ 3460.517008][ T8470] slab_unreclaimable 13643776 [ 3460.517008][ T8470] pgfault 551760 [ 3460.517008][ T8470] pgmajfault 0 [ 3460.517008][ T8470] workingset_refault 0 [ 3460.517008][ T8470] workingset_activate 0 [ 3460.517008][ T8470] workingset_nodereclaim 0 [ 3460.517008][ T8470] pgrefill 45 [ 3460.517008][ T8470] pgscan 34 [ 3460.517008][ T8470] pgsteal 33 [ 3460.610759][ T8470] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=10013,uid=0 [ 3460.626325][ T8470] Memory cgroup out of memory: Killed process 10013 (syz-executor.0) total-vm:72572kB, anon-rss:2208kB, file-rss:35812kB, shmem-rss:0kB [ 3460.655208][ T8477] syz-executor.3 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 3460.670681][ T8477] CPU: 1 PID: 8477 Comm: syz-executor.3 Not tainted 5.3.0-rc1+ #49 [ 3460.678581][ T8477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3460.688729][ T8477] Call Trace: [ 3460.692016][ T8477] dump_stack+0x1d8/0x2f8 [ 3460.696342][ T8477] dump_header+0xd8/0x960 [ 3460.700679][ T8477] oom_kill_process+0xcd/0x350 [ 3460.705459][ T8477] out_of_memory+0x5ce/0x890 [ 3460.710047][ T8477] ? unregister_oom_notifier+0x20/0x20 [ 3460.715504][ T8477] ? __kasan_check_read+0x11/0x20 [ 3460.720536][ T8477] try_charge+0x137d/0x1a60 [ 3460.725060][ T8477] ? __memcg_kmem_charge_memcg+0xf0/0xf0 [ 3460.730702][ T8477] ? __lock_acquire+0x4750/0x4750 [ 3460.735737][ T8477] ? rcu_lock_release+0x15/0x20 [ 3460.740581][ T8477] ? get_mem_cgroup_from_mm+0x15b/0x170 [ 3460.747857][ T8477] __memcg_kmem_charge+0x195/0x5b0 [ 3460.752964][ T8477] ? cancel_charge+0x1d0/0x1d0 [ 3460.757734][ T8477] __alloc_pages_nodemask+0x377/0x790 [ 3460.763111][ T8477] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 3460.768656][ T8477] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 3460.774384][ T8477] ? copy_process+0x59f/0x5bc0 [ 3460.779143][ T8477] copy_process+0x62c/0x5bc0 [ 3460.783738][ T8477] ? __rwlock_init+0x130/0x130 [ 3460.788532][ T8477] ? count_memcg_event_mm+0x300/0x300 [ 3460.793905][ T8477] ? fork_idle+0x290/0x290 [ 3460.798324][ T8477] ? __lock_acquire+0x4750/0x4750 [ 3460.803336][ T8477] ? lock_acquire+0x158/0x250 [ 3460.808006][ T8477] _do_fork+0x179/0x630 [ 3460.812155][ T8477] ? dup_mm+0x340/0x340 [ 3460.816309][ T8477] ? __kasan_check_read+0x11/0x20 [ 3460.821327][ T8477] ? _copy_to_user+0x104/0x150 [ 3460.826087][ T8477] ? put_timespec64+0x106/0x150 [ 3460.830929][ T8477] ? check_preemption_disabled+0xb7/0x2a0 [ 3460.836637][ T8477] __x64_sys_clone+0x247/0x2b0 [ 3460.841392][ T8477] ? __ia32_sys_vfork+0x110/0x110 [ 3460.846506][ T8477] ? prepare_exit_to_usermode+0x1f7/0x580 [ 3460.852235][ T8477] ? do_syscall_64+0x1d/0x140 [ 3460.856934][ T8477] do_syscall_64+0xfe/0x140 [ 3460.861433][ T8477] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3460.867318][ T8477] RIP: 0033:0x457dfa [ 3460.871209][ T8477] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 3460.890807][ T8477] RSP: 002b:00007ffd33f60280 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 3460.899219][ T8477] RAX: ffffffffffffffda RBX: 00007ffd33f60280 RCX: 0000000000457dfa [ 3460.907184][ T8477] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 3460.915150][ T8477] RBP: 00007ffd33f602c0 R08: 0000000000000001 R09: 000055555685d940 [ 3460.923111][ T8477] R10: 000055555685dc10 R11: 0000000000000246 R12: 0000000000000001 [ 3460.931078][ T8477] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffd33f60310 [ 3460.946047][ T8477] memory: usage 42252kB, limit 0kB, failcnt 125 [ 3460.952318][ T8477] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3460.968297][ T8477] Memory cgroup stats for /syz3: [ 3460.968397][ T8477] anon 20049920 [ 3460.968397][ T8477] file 98304 [ 3460.968397][ T8477] kernel_stack 327680 [ 3460.968397][ T8477] slab 21700608 [ 3460.968397][ T8477] sock 0 [ 3460.968397][ T8477] shmem 196608 [ 3460.968397][ T8477] file_mapped 135168 [ 3460.968397][ T8477] file_dirty 0 [ 3460.968397][ T8477] file_writeback 0 [ 3460.968397][ T8477] anon_thp 18874368 [ 3460.968397][ T8477] inactive_anon 73728 [ 3460.968397][ T8477] active_anon 20054016 [ 3460.968397][ T8477] inactive_file 94208 [ 3460.968397][ T8477] active_file 24576 [ 3460.968397][ T8477] unevictable 32768 [ 3460.968397][ T8477] slab_reclaimable 4460544 [ 3460.968397][ T8477] slab_unreclaimable 17240064 [ 3460.968397][ T8477] pgfault 483318 [ 3460.968397][ T8477] pgmajfault 0 [ 3460.968397][ T8477] workingset_refault 0 [ 3460.968397][ T8477] workingset_activate 0 [ 3460.968397][ T8477] workingset_nodereclaim 0 [ 3460.968397][ T8477] pgrefill 96 [ 3460.968397][ T8477] pgscan 87 [ 3460.968397][ T8477] pgsteal 78 [ 3461.070707][ T8477] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=26250,uid=0 [ 3461.098059][ T8477] Memory cgroup out of memory: Killed process 26250 (syz-executor.3) total-vm:72572kB, anon-rss:2196kB, file-rss:35792kB, shmem-rss:0kB [ 3461.120688][ T1056] oom_reaper: reaped process 26250 (syz-executor.3), now anon-rss:0kB, file-rss:34832kB, shmem-rss:0kB [ 3461.132995][ T8470] Memory cgroup out of memory: Killed process 9379 (syz-executor.0) total-vm:72572kB, anon-rss:2208kB, file-rss:35812kB, shmem-rss:0kB [ 3461.170010][ T8477] Memory cgroup out of memory: Killed process 26228 (syz-executor.3) total-vm:72572kB, anon-rss:2196kB, file-rss:35792kB, shmem-rss:0kB [ 3461.203857][ T8470] Memory cgroup out of memory: Killed process 7826 (syz-executor.0) total-vm:72572kB, anon-rss:2208kB, file-rss:35812kB, shmem-rss:0kB [ 3461.243508][ T8477] Memory cgroup out of memory: Killed process 26182 (syz-executor.3) total-vm:72572kB, anon-rss:2196kB, file-rss:35792kB, shmem-rss:0kB [ 3461.279656][ T1056] oom_reaper: reaped process 26182 (syz-executor.3), now anon-rss:0kB, file-rss:34832kB, shmem-rss:0kB [ 3461.283768][ T8470] Memory cgroup out of memory: Killed process 14038 (syz-executor.0) total-vm:72572kB, anon-rss:2208kB, file-rss:35808kB, shmem-rss:0kB [ 3461.306892][ T8477] Memory cgroup out of memory: Killed process 26154 (syz-executor.3) total-vm:72572kB, anon-rss:2196kB, file-rss:35792kB, shmem-rss:0kB [ 3461.340430][ T8470] Memory cgroup out of memory: Killed process 10133 (syz-executor.0) total-vm:72572kB, anon-rss:2208kB, file-rss:35808kB, shmem-rss:0kB [ 3461.361324][ T1056] oom_reaper: reaped process 10133 (syz-executor.0), now anon-rss:0kB, file-rss:34848kB, shmem-rss:0kB [ 3461.379862][ T8477] Memory cgroup out of memory: Killed process 26135 (syz-executor.3) total-vm:72572kB, anon-rss:2196kB, file-rss:35792kB, shmem-rss:0kB [ 3461.403347][ T8470] Memory cgroup out of memory: Killed process 9845 (syz-executor.0) total-vm:72572kB, anon-rss:2208kB, file-rss:35808kB, shmem-rss:0kB [ 3461.415258][ T1056] oom_reaper: reaped process 26135 (syz-executor.3), now anon-rss:0kB, file-rss:34832kB, shmem-rss:0kB [ 3461.445989][ T8477] Memory cgroup out of memory: Killed process 25937 (syz-executor.3) total-vm:72572kB, anon-rss:2196kB, file-rss:35792kB, shmem-rss:0kB [ 3461.512507][ T8470] Memory cgroup out of memory: Killed process 9211 (syz-executor.0) total-vm:72572kB, anon-rss:2208kB, file-rss:35808kB, shmem-rss:0kB [ 3461.537968][ T8477] Memory cgroup out of memory: Killed process 25506 (syz-executor.3) total-vm:72572kB, anon-rss:2196kB, file-rss:35792kB, shmem-rss:0kB [ 3461.539220][ T1056] oom_reaper: reaped process 9211 (syz-executor.0), now anon-rss:0kB, file-rss:34848kB, shmem-rss:0kB [ 3461.584988][ T8470] Memory cgroup out of memory: Killed process 9093 (syz-executor.0) total-vm:72572kB, anon-rss:2208kB, file-rss:35808kB, shmem-rss:0kB [ 3461.637086][ T8477] Memory cgroup out of memory: Killed process 25468 (syz-executor.3) total-vm:72572kB, anon-rss:2196kB, file-rss:35792kB, shmem-rss:0kB [ 3461.683745][ T8470] Memory cgroup out of memory: Killed process 7940 (syz-executor.0) total-vm:72572kB, anon-rss:2208kB, file-rss:35808kB, shmem-rss:0kB [ 3461.703887][ T8477] Memory cgroup out of memory: Killed process 27643 (syz-executor.3) total-vm:72572kB, anon-rss:2196kB, file-rss:35788kB, shmem-rss:0kB [ 3461.742478][ T8470] Memory cgroup out of memory: Killed process 4056 (syz-executor.0) total-vm:72572kB, anon-rss:2208kB, file-rss:35808kB, shmem-rss:0kB [ 3461.786946][ T8477] oom_kill_process: 17 callbacks suppressed [ 3461.786961][ T8477] syz-executor.3 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 3461.805046][ T8477] CPU: 1 PID: 8477 Comm: syz-executor.3 Not tainted 5.3.0-rc1+ #49 [ 3461.812933][ T8477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3461.823151][ T8477] Call Trace: [ 3461.826442][ T8477] dump_stack+0x1d8/0x2f8 [ 3461.830770][ T8477] dump_header+0xd8/0x960 [ 3461.835100][ T8477] oom_kill_process+0xcd/0x350 [ 3461.839861][ T8477] out_of_memory+0x5ce/0x890 [ 3461.844446][ T8477] ? unregister_oom_notifier+0x20/0x20 [ 3461.849897][ T8477] ? __kasan_check_read+0x11/0x20 [ 3461.854921][ T8477] try_charge+0x137d/0x1a60 [ 3461.859443][ T8477] ? __memcg_kmem_charge_memcg+0xf0/0xf0 [ 3461.865114][ T8477] ? __lock_acquire+0x4750/0x4750 [ 3461.870152][ T8477] ? rcu_lock_release+0x15/0x20 [ 3461.875003][ T8477] ? get_mem_cgroup_from_mm+0x15b/0x170 [ 3461.880544][ T8477] __memcg_kmem_charge+0x195/0x5b0 [ 3461.885655][ T8477] ? cancel_charge+0x1d0/0x1d0 [ 3461.890423][ T8477] __alloc_pages_nodemask+0x377/0x790 [ 3461.895794][ T8477] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 3461.901340][ T8477] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 3461.907060][ T8477] ? copy_process+0x59f/0x5bc0 [ 3461.911822][ T8477] copy_process+0x62c/0x5bc0 [ 3461.916419][ T8477] ? __rwlock_init+0x130/0x130 [ 3461.921179][ T8477] ? count_memcg_event_mm+0x300/0x300 [ 3461.926551][ T8477] ? fork_idle+0x290/0x290 [ 3461.930974][ T8477] ? __lock_acquire+0x4750/0x4750 [ 3461.935989][ T8477] ? lock_acquire+0x158/0x250 [ 3461.940662][ T8477] _do_fork+0x179/0x630 [ 3461.944814][ T8477] ? dup_mm+0x340/0x340 [ 3461.948975][ T8477] ? __kasan_check_read+0x11/0x20 [ 3461.953989][ T8477] ? _copy_to_user+0x104/0x150 [ 3461.958750][ T8477] ? put_timespec64+0x106/0x150 [ 3461.963594][ T8477] ? check_preemption_disabled+0xb7/0x2a0 [ 3461.969316][ T8477] __x64_sys_clone+0x247/0x2b0 [ 3461.974080][ T8477] ? __ia32_sys_vfork+0x110/0x110 [ 3461.979094][ T8477] ? prepare_exit_to_usermode+0x1f7/0x580 [ 3461.984811][ T8477] ? do_syscall_64+0x1d/0x140 [ 3461.989486][ T8477] do_syscall_64+0xfe/0x140 [ 3461.993993][ T8477] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3461.999885][ T8477] RIP: 0033:0x457dfa [ 3462.003775][ T8477] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 3462.023366][ T8477] RSP: 002b:00007ffd33f60280 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 3462.031773][ T8477] RAX: ffffffffffffffda RBX: 00007ffd33f60280 RCX: 0000000000457dfa [ 3462.039728][ T8477] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 3462.047702][ T8477] RBP: 00007ffd33f602c0 R08: 0000000000000001 R09: 000055555685d940 [ 3462.055666][ T8477] R10: 000055555685dc10 R11: 0000000000000246 R12: 0000000000000001 [ 3462.063638][ T8477] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffd33f60310 [ 3462.073189][ T8477] memory: usage 21168kB, limit 0kB, failcnt 209 [ 3462.079520][ T8477] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3462.086904][ T8477] Memory cgroup stats for /syz3: [ 3462.086987][ T8477] anon 143360 [ 3462.086987][ T8477] file 98304 [ 3462.086987][ T8477] kernel_stack 65536 [ 3462.086987][ T8477] slab 21700608 [ 3462.086987][ T8477] sock 0 [ 3462.086987][ T8477] shmem 196608 [ 3462.086987][ T8477] file_mapped 135168 [ 3462.086987][ T8477] file_dirty 0 [ 3462.086987][ T8477] file_writeback 0 [ 3462.086987][ T8477] anon_thp 0 [ 3462.086987][ T8477] inactive_anon 73728 [ 3462.086987][ T8477] active_anon 147456 [ 3462.086987][ T8477] inactive_file 94208 [ 3462.086987][ T8477] active_file 24576 [ 3462.086987][ T8477] unevictable 32768 [ 3462.086987][ T8477] slab_reclaimable 4460544 [ 3462.086987][ T8477] slab_unreclaimable 17240064 [ 3462.086987][ T8477] pgfault 483318 [ 3462.086987][ T8477] pgmajfault 0 [ 3462.086987][ T8477] workingset_refault 0 [ 3462.086987][ T8477] workingset_activate 0 [ 3462.086987][ T8477] workingset_nodereclaim 0 [ 3462.086987][ T8477] pgrefill 96 [ 3462.086987][ T8477] pgscan 87 [ 3462.086987][ T8477] pgsteal 78 [ 3462.180883][ T8477] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=8477,uid=0 [ 3462.196664][ T8477] Memory cgroup out of memory: Killed process 8477 (syz-executor.3) total-vm:72440kB, anon-rss:104kB, file-rss:35776kB, shmem-rss:0kB [ 3462.211438][ T1056] oom_reaper: reaped process 8477 (syz-executor.3), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 3462.222924][ T8470] syz-executor.0 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 3462.242182][ T8470] CPU: 0 PID: 8470 Comm: syz-executor.0 Not tainted 5.3.0-rc1+ #49 [ 3462.250071][ T8470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3462.260123][ T8470] Call Trace: [ 3462.263408][ T8470] dump_stack+0x1d8/0x2f8 [ 3462.267739][ T8470] dump_header+0xd8/0x960 [ 3462.272066][ T8470] oom_kill_process+0xcd/0x350 [ 3462.276830][ T8470] out_of_memory+0x5ce/0x890 [ 3462.281413][ T8470] ? unregister_oom_notifier+0x20/0x20 [ 3462.286865][ T8470] ? __kasan_check_read+0x11/0x20 [ 3462.291885][ T8470] try_charge+0x137d/0x1a60 [ 3462.296430][ T8470] ? __memcg_kmem_charge_memcg+0xf0/0xf0 [ 3462.302065][ T8470] ? __lock_acquire+0x4750/0x4750 [ 3462.307091][ T8470] ? rcu_lock_release+0x15/0x20 [ 3462.311940][ T8470] ? get_mem_cgroup_from_mm+0x15b/0x170 [ 3462.317509][ T8470] __memcg_kmem_charge+0x195/0x5b0 [ 3462.322620][ T8470] ? cancel_charge+0x1d0/0x1d0 [ 3462.327395][ T8470] __alloc_pages_nodemask+0x377/0x790 [ 3462.332744][ T8470] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 3462.338265][ T8470] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 3462.343963][ T8470] ? copy_process+0x59f/0x5bc0 [ 3462.348735][ T8470] copy_process+0x62c/0x5bc0 [ 3462.353306][ T8470] ? __rwlock_init+0x130/0x130 [ 3462.358058][ T8470] ? count_memcg_event_mm+0x300/0x300 [ 3462.363403][ T8470] ? fork_idle+0x290/0x290 [ 3462.367796][ T8470] ? __lock_acquire+0x4750/0x4750 [ 3462.372804][ T8470] ? lock_acquire+0x158/0x250 [ 3462.377455][ T8470] _do_fork+0x179/0x630 [ 3462.381583][ T8470] ? dup_mm+0x340/0x340 [ 3462.385719][ T8470] ? __kasan_check_read+0x11/0x20 [ 3462.390719][ T8470] ? _copy_to_user+0x104/0x150 [ 3462.395488][ T8470] ? put_timespec64+0x106/0x150 [ 3462.400316][ T8470] ? check_preemption_disabled+0xb7/0x2a0 [ 3462.406010][ T8470] __x64_sys_clone+0x247/0x2b0 [ 3462.410770][ T8470] ? __ia32_sys_vfork+0x110/0x110 [ 3462.415767][ T8470] ? prepare_exit_to_usermode+0x1f7/0x580 [ 3462.421476][ T8470] ? do_syscall_64+0x1d/0x140 [ 3462.426129][ T8470] do_syscall_64+0xfe/0x140 [ 3462.430612][ T8470] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3462.436478][ T8470] RIP: 0033:0x457dfa [ 3462.440345][ T8470] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 3462.459919][ T8470] RSP: 002b:00007ffe80448dc0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 3462.468301][ T8470] RAX: ffffffffffffffda RBX: 00007ffe80448dc0 RCX: 0000000000457dfa [ 3462.476243][ T8470] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 3462.484360][ T8470] RBP: 00007ffe80448e00 R08: 0000000000000001 R09: 00005555568fd940 [ 3462.492404][ T8470] R10: 00005555568fdc10 R11: 0000000000000246 R12: 0000000000000001 [ 3462.500349][ T8470] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe80448e50 [ 3462.514888][ T8470] memory: usage 20604kB, limit 0kB, failcnt 194 [ 3462.521142][ T8470] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3462.528444][ T8470] Memory cgroup stats for /syz0: [ 3462.528530][ T8470] anon 2379776 [ 3462.528530][ T8470] file 176128 [ 3462.528530][ T8470] kernel_stack 65536 [ 3462.528530][ T8470] slab 18644992 [ 3462.528530][ T8470] sock 0 [ 3462.528530][ T8470] shmem 131072 [ 3462.528530][ T8470] file_mapped 0 [ 3462.528530][ T8470] file_dirty 0 [ 3462.528530][ T8470] file_writeback 0 [ 3462.528530][ T8470] anon_thp 2097152 [ 3462.528530][ T8470] inactive_anon 135168 [ 3462.528530][ T8470] active_anon 2383872 [ 3462.528530][ T8470] inactive_file 0 [ 3462.528530][ T8470] active_file 86016 [ 3462.528530][ T8470] unevictable 135168 [ 3462.528530][ T8470] slab_reclaimable 5001216 [ 3462.528530][ T8470] slab_unreclaimable 13643776 [ 3462.528530][ T8470] pgfault 551760 [ 3462.528530][ T8470] pgmajfault 0 [ 3462.528530][ T8470] workingset_refault 0 [ 3462.528530][ T8470] workingset_activate 0 [ 3462.528530][ T8470] workingset_nodereclaim 0 [ 3462.528530][ T8470] pgrefill 45 [ 3462.528530][ T8470] pgscan 34 [ 3462.528530][ T8470] pgsteal 33 [ 3462.622810][ T8470] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=29103,uid=0 [ 3462.641223][ T8470] Memory cgroup out of memory: Killed process 29103 (syz-executor.0) total-vm:72704kB, anon-rss:2208kB, file-rss:35788kB, shmem-rss:0kB [ 3462.672927][ T8470] syz-executor.0 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 3462.684890][ T8470] CPU: 1 PID: 8470 Comm: syz-executor.0 Not tainted 5.3.0-rc1+ #49 [ 3462.692779][ T8470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3462.702823][ T8470] Call Trace: [ 3462.706107][ T8470] dump_stack+0x1d8/0x2f8 [ 3462.710438][ T8470] dump_header+0xd8/0x960 [ 3462.714765][ T8470] oom_kill_process+0xcd/0x350 [ 3462.719544][ T8470] out_of_memory+0x5ce/0x890 [ 3462.724145][ T8470] ? unregister_oom_notifier+0x20/0x20 [ 3462.729598][ T8470] ? __kasan_check_read+0x11/0x20 [ 3462.734631][ T8470] try_charge+0x137d/0x1a60 [ 3462.739152][ T8470] ? __memcg_kmem_charge_memcg+0xf0/0xf0 [ 3462.744788][ T8470] ? __lock_acquire+0x4750/0x4750 [ 3462.749824][ T8470] ? rcu_lock_release+0x15/0x20 [ 3462.754666][ T8470] ? get_mem_cgroup_from_mm+0x15b/0x170 [ 3462.760206][ T8470] __memcg_kmem_charge+0x195/0x5b0 [ 3462.765315][ T8470] ? cancel_charge+0x1d0/0x1d0 [ 3462.770094][ T8470] __alloc_pages_nodemask+0x377/0x790 [ 3462.775464][ T8470] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 3462.781008][ T8470] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 3462.786725][ T8470] ? copy_process+0x59f/0x5bc0 [ 3462.791510][ T8470] copy_process+0x62c/0x5bc0 [ 3462.796101][ T8470] ? __rwlock_init+0x130/0x130 [ 3462.800861][ T8470] ? count_memcg_event_mm+0x300/0x300 [ 3462.806235][ T8470] ? fork_idle+0x290/0x290 [ 3462.810655][ T8470] ? __lock_acquire+0x4750/0x4750 [ 3462.815672][ T8470] ? lock_acquire+0x158/0x250 [ 3462.820343][ T8470] _do_fork+0x179/0x630 [ 3462.824492][ T8470] ? dup_mm+0x340/0x340 [ 3462.828648][ T8470] ? __kasan_check_read+0x11/0x20 [ 3462.833663][ T8470] ? _copy_to_user+0x104/0x150 [ 3462.838426][ T8470] ? put_timespec64+0x106/0x150 [ 3462.843268][ T8470] ? check_preemption_disabled+0xb7/0x2a0 [ 3462.848981][ T8470] __x64_sys_clone+0x247/0x2b0 [ 3462.853747][ T8470] ? __ia32_sys_vfork+0x110/0x110 [ 3462.858764][ T8470] ? prepare_exit_to_usermode+0x1f7/0x580 [ 3462.864479][ T8470] ? do_syscall_64+0x1d/0x140 [ 3462.869158][ T8470] do_syscall_64+0xfe/0x140 [ 3462.873655][ T8470] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3462.879539][ T8470] RIP: 0033:0x457dfa [ 3462.883422][ T8470] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 3462.903015][ T8470] RSP: 002b:00007ffe80448dc0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 3462.911416][ T8470] RAX: ffffffffffffffda RBX: 00007ffe80448dc0 RCX: 0000000000457dfa [ 3462.919381][ T8470] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 3462.927346][ T8470] RBP: 00007ffe80448e00 R08: 0000000000000001 R09: 00005555568fd940 [ 3462.935312][ T8470] R10: 00005555568fdc10 R11: 0000000000000246 R12: 0000000000000001 [ 3462.943277][ T8470] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe80448e50 [ 3462.955158][ T8470] memory: usage 18240kB, limit 0kB, failcnt 200 [ 3462.961406][ T8470] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3462.968862][ T8470] Memory cgroup stats for /syz0: [ 3462.968947][ T8470] anon 151552 [ 3462.968947][ T8470] file 176128 [ 3462.968947][ T8470] kernel_stack 0 [ 3462.968947][ T8470] slab 18644992 [ 3462.968947][ T8470] sock 0 [ 3462.968947][ T8470] shmem 131072 [ 3462.968947][ T8470] file_mapped 0 [ 3462.968947][ T8470] file_dirty 0 [ 3462.968947][ T8470] file_writeback 0 [ 3462.968947][ T8470] anon_thp 0 [ 3462.968947][ T8470] inactive_anon 135168 [ 3462.968947][ T8470] active_anon 155648 [ 3462.968947][ T8470] inactive_file 0 [ 3462.968947][ T8470] active_file 86016 [ 3462.968947][ T8470] unevictable 135168 [ 3462.968947][ T8470] slab_reclaimable 5001216 [ 3462.968947][ T8470] slab_unreclaimable 13643776 [ 3462.968947][ T8470] pgfault 551760 [ 3462.968947][ T8470] pgmajfault 0 [ 3462.968947][ T8470] workingset_refault 0 [ 3462.968947][ T8470] workingset_activate 0 [ 3462.968947][ T8470] workingset_nodereclaim 0 [ 3462.968947][ T8470] pgrefill 45 [ 3462.968947][ T8470] pgscan 34 [ 3462.968947][ T8470] pgsteal 33 [ 3462.968947][ T8470] pgactivate 0 [ 3463.066789][ T8470] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=8470,uid=0 [ 3463.089637][ T8470] Memory cgroup out of memory: Killed process 8470 (syz-executor.0) total-vm:72440kB, anon-rss:116kB, file-rss:35776kB, shmem-rss:0kB [ 3463.111803][ T1056] oom_reaper: reaped process 8470 (syz-executor.0), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 3463.963930][ T24] device hsr_slave_0 left promiscuous mode [ 3464.023740][ T24] device hsr_slave_1 left promiscuous mode [ 3464.085813][ T24] team0 (unregistering): Port device team_slave_1 removed [ 3464.099197][ T24] team0 (unregistering): Port device team_slave_0 removed [ 3464.110230][ T24] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3464.168073][ T24] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3464.270527][ T24] bond0 (unregistering): Released all slaves [ 3464.388971][T11587] team0: Port device team_slave_0 added [ 3464.562180][T11587] team0: Port device team_slave_1 added [ 3464.647497][T11587] device hsr_slave_0 entered promiscuous mode [ 3464.673855][T11587] device hsr_slave_1 entered promiscuous mode [ 3464.733722][T11587] debugfs: Directory 'hsr0' with parent '/' already present! [ 3464.879761][T11587] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3464.901515][T22778] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3464.916515][T22778] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3464.930887][T11587] 8021q: adding VLAN 0 to HW filter on device team0 [ 3464.941884][T22778] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3464.951077][T22778] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3464.960424][T22778] bridge0: port 1(bridge_slave_0) entered blocking state [ 3464.967622][T22778] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3464.986544][T29750] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3464.994895][T29750] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3465.004045][T29750] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3465.012469][T29750] bridge0: port 2(bridge_slave_1) entered blocking state [ 3465.019568][T29750] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3465.028799][T29750] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3465.037848][T29750] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3465.056832][T24822] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3465.065979][T24822] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3465.074798][T24822] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3465.083453][T24822] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3465.092662][T24822] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3465.105710][T11587] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3465.117408][T11587] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3465.127456][T29750] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3465.137214][T29750] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3465.178070][T11587] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3465.363525][T11597] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3465.374808][T11597] CPU: 1 PID: 11597 Comm: syz-executor.2 Not tainted 5.3.0-rc1+ #49 [ 3465.382782][T11597] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3465.392831][T11597] Call Trace: [ 3465.396125][T11597] dump_stack+0x1d8/0x2f8 [ 3465.400453][T11597] dump_header+0xd8/0x960 [ 3465.404782][T11597] oom_kill_process+0xcd/0x350 [ 3465.409560][T11597] out_of_memory+0x5ce/0x890 [ 3465.414152][T11597] ? unregister_oom_notifier+0x20/0x20 [ 3465.419617][T11597] ? _raw_spin_unlock_irqrestore+0xd1/0xe0 [ 3465.425440][T11597] memory_max_write+0x537/0x6a0 [ 3465.430292][T11597] ? lock_acquire+0x158/0x250 [ 3465.434972][T11597] ? memory_max_show+0xa0/0xa0 [ 3465.439736][T11597] ? trace_lock_acquire+0x159/0x1d0 [ 3465.444926][T11597] ? lock_acquire+0x158/0x250 [ 3465.449599][T11597] ? kernfs_fop_write+0x22e/0x4f0 [ 3465.454624][T11597] ? memory_max_show+0xa0/0xa0 [ 3465.459383][T11597] cgroup_file_write+0x27b/0x6e0 [ 3465.464319][T11597] ? cgroup_seqfile_stop+0xc0/0xc0 [ 3465.469431][T11597] ? cgroup_seqfile_stop+0xc0/0xc0 [ 3465.474539][T11597] kernfs_fop_write+0x3e4/0x4f0 [ 3465.479390][T11597] ? kernfs_fop_read+0x580/0x580 [ 3465.484327][T11597] __vfs_write+0xf9/0x7d0 [ 3465.488649][T11597] ? retint_kernel+0x2b/0x2b [ 3465.493231][T11597] ? __kernel_write+0x350/0x350 [ 3465.498076][T11597] ? trace_lock_acquire+0x159/0x1d0 [ 3465.503281][T11597] ? __sb_start_write+0x403/0x4c0 [ 3465.508298][T11597] ? __kasan_check_read+0x11/0x20 [ 3465.513322][T11597] vfs_write+0x275/0x590 [ 3465.517574][T11597] ksys_write+0x16b/0x2a0 [ 3465.521907][T11597] ? __ia32_sys_read+0x90/0x90 [ 3465.526701][T11597] ? retint_kernel+0x2b/0x2b [ 3465.531298][T11597] __x64_sys_write+0x7b/0x90 [ 3465.535885][T11597] do_syscall_64+0xfe/0x140 [ 3465.540389][T11597] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3465.546275][T11597] RIP: 0033:0x459829 [ 3465.550162][T11597] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3465.569768][T11597] RSP: 002b:00007f7846527c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3465.578182][T11597] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829 [ 3465.586160][T11597] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 3465.594131][T11597] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3465.602103][T11597] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f78465286d4 [ 3465.610074][T11597] R13: 00000000004c9774 R14: 00000000004e0b70 R15: 00000000ffffffff [ 3465.637438][T11597] memory: usage 4920kB, limit 0kB, failcnt 211 [ 3465.644309][T11597] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3465.651478][T11597] Memory cgroup stats for /syz2: [ 3465.652769][T11597] anon 2052096 [ 3465.652769][T11597] file 155648 [ 3465.652769][T11597] kernel_stack 65536 [ 3465.652769][T11597] slab 2523136 [ 3465.652769][T11597] sock 0 [ 3465.652769][T11597] shmem 126976 [ 3465.652769][T11597] file_mapped 0 [ 3465.652769][T11597] file_dirty 0 [ 3465.652769][T11597] file_writeback 0 [ 3465.652769][T11597] anon_thp 2097152 [ 3465.652769][T11597] inactive_anon 98304 [ 3465.652769][T11597] active_anon 2052096 [ 3465.652769][T11597] inactive_file 0 [ 3465.652769][T11597] active_file 0 [ 3465.652769][T11597] unevictable 131072 [ 3465.652769][T11597] slab_reclaimable 1081344 [ 3465.652769][T11597] slab_unreclaimable 1441792 [ 3465.652769][T11597] pgfault 502260 [ 3465.652769][T11597] pgmajfault 0 [ 3465.652769][T11597] workingset_refault 0 [ 3465.652769][T11597] workingset_activate 0 [ 3465.652769][T11597] workingset_nodereclaim 0 [ 3465.652769][T11597] pgrefill 35 [ 3465.652769][T11597] pgscan 0 [ 3465.652769][T11597] pgsteal 0 [ 3465.652769][T11597] pgactivate 0 [ 3465.776969][T11597] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=11596,uid=0 [ 3465.800778][T11597] Memory cgroup out of memory: Killed process 11596 (syz-executor.2) total-vm:72576kB, anon-rss:2140kB, file-rss:34816kB, shmem-rss:0kB [ 3465.824342][ T1056] oom_reaper: reaped process 11596 (syz-executor.2), now anon-rss:0kB, file-rss:34828kB, shmem-rss:0kB 03:49:16 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) socket$kcm(0x2b, 0x1, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000002c0)=ANY=[@ANYBLOB="a1c1"]) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000ec600000000000000000000000000000400000000005f00"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.\\G10I\xb8\x8f8\x00\x15o\x1e\xc98\x7f\xcb\xecA\xf3\xbf\x9c\xd8R\xa2|\xef\xe3\x8b\x05\x94\xf9Gx\x1f\xfdi\x9b\x83`\xb8Y\x1aV\xbe\xeb\xb3\xd3v\xb9\x0fs\x90\xb6\xaa`\xe8\x12\xc3\"\x87\xbf\xab\x80h\x97\x89C\t\x84\x9d\xed\xa5ED\xb5P\xde\xa65\xf7\xa1\x1eW\xb3n\xd1\x0f\xeaa\xe2\xcf:\xb6\xa0+\x12W\x9e\x13\x15\xdb\xf6T#\x83\xe59\x04', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000640)=ANY=[@ANYRES32=0x0], 0x0, 0x4, 0x0, 0xffffffffffffbfff}, 0x20) r5 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r6 = gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000540)=r6, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) socketpair(0x5, 0x3, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) 03:49:16 executing program 4: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r3, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x20}, 0xf) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d66", 0xb9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489abcd69fcc7154d066c7ff2e07b", 0xd1}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b07", 0x65}], 0x5}}], 0x1, 0x0) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r5, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r7 = fcntl$getown(r6, 0x9) fcntl$lock(r6, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r7}) r8 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) pipe2(&(0x7f0000000140), 0x1800) setsockopt$packet_buf(r8, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:49:16 executing program 5: r0 = socket$isdn(0x22, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e4359", 0x9d}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r3, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) fcntl$lock(r4, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100}) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(r5, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:49:16 executing program 1: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r3, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x20}, 0xf) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d66", 0xb9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489abcd69fcc7154d066c7ff2e07b", 0xd1}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b07", 0x65}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r5, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) fcntl$getown(r6, 0x9) fcntl$lock(r6, 0x26, 0x0) r7 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) pipe2(&(0x7f0000000140), 0x1800) setsockopt$packet_buf(r7, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:49:16 executing program 3: r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000100)={0x41}, 0x10) socket$tipc(0x1e, 0x5, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x2}, 0x10) sendmsg$tipc(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 03:49:16 executing program 0: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b2", 0x3d}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489", 0xc4}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r4, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r6 = fcntl$getown(r5, 0x9) fcntl$lock(r5, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100, r6}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x17, 0x0, 0x0) [ 3465.985535][T11587] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 3465.997573][T11587] CPU: 1 PID: 11587 Comm: syz-executor.2 Not tainted 5.3.0-rc1+ #49 [ 3466.005572][T11587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3466.015661][T11587] Call Trace: [ 3466.018962][T11587] dump_stack+0x1d8/0x2f8 [ 3466.023304][T11587] dump_header+0xd8/0x960 [ 3466.027679][T11587] oom_kill_process+0xcd/0x350 [ 3466.032449][T11587] out_of_memory+0x5ce/0x890 [ 3466.037050][T11587] ? unregister_oom_notifier+0x20/0x20 [ 3466.042516][T11587] ? __kasan_check_read+0x11/0x20 [ 3466.047562][T11587] try_charge+0x137d/0x1a60 [ 3466.052111][T11587] ? __memcg_kmem_charge_memcg+0xf0/0xf0 [ 3466.057746][T11587] ? __lock_acquire+0x4750/0x4750 [ 3466.062770][T11587] ? rcu_lock_release+0x15/0x20 [ 3466.067638][T11587] ? get_mem_cgroup_from_mm+0x15b/0x170 [ 3466.073192][T11587] mem_cgroup_try_charge+0x20c/0x680 [ 3466.078490][T11587] mem_cgroup_try_charge_delay+0x25/0xa0 [ 3466.084133][T11587] handle_mm_fault+0x31f3/0x6070 [ 3466.089089][T11587] ? finish_fault+0x230/0x230 [ 3466.093781][T11587] ? __up_read+0x5b0/0x5b0 [ 3466.098249][T11587] ? vmacache_find+0x251/0x5b0 [ 3466.103031][T11587] do_user_addr_fault+0x589/0xaf0 [ 3466.106722][T11601] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3466.108068][T11587] __do_page_fault+0xd3/0x1f0 [ 3466.108084][T11587] do_page_fault+0x99/0xb0 [ 3466.108100][T11587] page_fault+0x39/0x40 [ 3466.108110][T11587] RIP: 0033:0x4034f2 [ 3466.108121][T11587] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 59 8d 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 79 42 05 00 48 [ 3466.108127][T11587] RSP: 002b:00007ffe5ba7fe10 EFLAGS: 00010246 [ 3466.108137][T11587] RAX: 0000000000000000 RBX: 000000000034e04c RCX: 0000000000413430 [ 3466.108143][T11587] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007ffe5ba80f40 [ 3466.108156][T11587] RBP: 0000000000000002 R08: 0000000000000001 R09: 000055555597e940 03:49:17 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x9, &(0x7f0000000000)=ANY=[@ANYBLOB="a80000003f00000000000000"], &(0x7f0000000080)=0xfdd2) [ 3466.184058][T11587] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffe5ba80f40 [ 3466.192043][T11587] R13: 00007ffe5ba80f30 R14: 0000000000000000 R15: 00007ffe5ba80f40 [ 3466.273392][T11604] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 03:49:17 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000300)={0x0, 0xfe27, 0x0}) 03:49:17 executing program 1: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r3, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x20}, 0xf) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d66", 0xb9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489abcd69fcc7154d066c7ff2e07b", 0xd1}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b07", 0x65}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r5, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) fcntl$getown(r6, 0x9) fcntl$lock(r6, 0x26, 0x0) r7 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) pipe2(&(0x7f0000000140), 0x1800) setsockopt$packet_buf(r7, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) [ 3466.501206][T11587] memory: usage 2588kB, limit 0kB, failcnt 219 [ 3466.507577][T11587] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3466.515457][T11587] Memory cgroup stats for /syz2: [ 3466.515553][T11587] anon 0 [ 3466.515553][T11587] file 155648 [ 3466.515553][T11587] kernel_stack 0 [ 3466.515553][T11587] slab 2523136 [ 3466.515553][T11587] sock 0 [ 3466.515553][T11587] shmem 126976 [ 3466.515553][T11587] file_mapped 0 [ 3466.515553][T11587] file_dirty 0 [ 3466.515553][T11587] file_writeback 0 [ 3466.515553][T11587] anon_thp 0 [ 3466.515553][T11587] inactive_anon 98304 [ 3466.515553][T11587] active_anon 0 [ 3466.515553][T11587] inactive_file 0 [ 3466.515553][T11587] active_file 0 [ 3466.515553][T11587] unevictable 131072 [ 3466.515553][T11587] slab_reclaimable 1081344 [ 3466.515553][T11587] slab_unreclaimable 1441792 [ 3466.515553][T11587] pgfault 502260 [ 3466.515553][T11587] pgmajfault 0 [ 3466.515553][T11587] workingset_refault 0 [ 3466.515553][T11587] workingset_activate 0 [ 3466.515553][T11587] workingset_nodereclaim 0 [ 3466.515553][T11587] pgrefill 35 03:49:17 executing program 5: r0 = socket$isdn(0x22, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e4359", 0x9d}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r3, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) fcntl$lock(r4, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100}) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(r5, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) [ 3466.515553][T11587] pgscan 0 [ 3466.515553][T11587] pgsteal 0 [ 3466.515553][T11587] pgactivate 0 [ 3466.744703][T11587] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=11587,uid=0 03:49:17 executing program 1: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r3, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x20}, 0xf) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d66", 0xb9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489abcd69fcc7154d066c7ff2e07b", 0xd1}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b07", 0x65}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r5, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r7 = fcntl$getown(r6, 0x9) fcntl$lock(r6, 0x26, &(0x7f0000000040)={0x0, 0x0, 0xffffffffffffff8d, 0x100, r7}) r8 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) pipe2(&(0x7f0000000140), 0x1800) setsockopt$packet_buf(r8, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) [ 3466.820416][T11587] Memory cgroup out of memory: Killed process 11587 (syz-executor.2) total-vm:72444kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB 03:49:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000040)={@remote, @initdev, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(r1, &(0x7f0000005700)=[{{0x0, 0x0, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x1, 0x0) [ 3466.880579][ T1056] oom_reaper: reaped process 11587 (syz-executor.2), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB [ 3467.000773][T12077] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 03:49:18 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) socket$kcm(0x2b, 0x1, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000002c0)=ANY=[@ANYBLOB="a1c1"]) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000ec600000000000000000000000000000400000000005f00"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.\\G10I\xb8\x8f8\x00\x15o\x1e\xc98\x7f\xcb\xecA\xf3\xbf\x9c\xd8R\xa2|\xef\xe3\x8b\x05\x94\xf9Gx\x1f\xfdi\x9b\x83`\xb8Y\x1aV\xbe\xeb\xb3\xd3v\xb9\x0fs\x90\xb6\xaa`\xe8\x12\xc3\"\x87\xbf\xab\x80h\x97\x89C\t\x84\x9d\xed\xa5ED\xb5P\xde\xa65\xf7\xa1\x1eW\xb3n\xd1\x0f\xeaa\xe2\xcf:\xb6\xa0+\x12W\x9e\x13\x15\xdb\xf6T#\x83\xe59\x04', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000640)=ANY=[@ANYRES32=0x0], 0x0, 0x4, 0x0, 0xffffffffffffbfff}, 0x20) r5 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r6 = gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000540)=r6, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) socketpair(0x5, 0x3, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) 03:49:18 executing program 5: r0 = socket$isdn(0x22, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'gretap0\x00', 0x5100}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1, 0x3}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)="7ed424af3287824e559b4a6fffc495f8beaaab09396fe18547168f6c1e20d845c9ed36df588f80cbbc6bde92df2e11a0e6a7f7e84b6266516f3d5b44957aa45f8f7ac1c232165705866f08e2a645213b969f4c758c7d99ef4c576b111fec1777f8b4eb9616c5aaa4942591b45fbeca60546d206a93a6cfbd8893536df550b78d27365e4a0e27c459d6379f4ef3bf0729c968754906305ef2b2863f1368456317742515e431d0b5d75e20330b1ef94c014d2f090c645e9f2d77b6f4dd710b88116974b9913f6e6c5b70eddb9d25114182d875fcc9a431d138142a228889534b9a3fdc0af15b4810aaf196", 0xea}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d663b49137526432d3b36545a63b6675fceb3a350cb72a58977d3ccb49268947a1faaf0ec4d8003d72d02f45cd6a1af10a4944b4064f72db32167922c9135b94943", 0xf9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e4359", 0x9d}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b", 0x64}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r3, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) fcntl$lock(r4, 0x26, &(0x7f0000000040)={0x1, 0x0, 0xffffffffffffff8d, 0x100}) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) setsockopt$packet_buf(r5, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:49:18 executing program 1: r0 = socket$isdn(0x22, 0x3, 0x26) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00'}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x1, 0x400000) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r3, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x20}, 0xf) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) sendmmsg$inet6(r3, &(0x7f0000000980)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x7, @mcast1}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000500)}, {&(0x7f0000000600)="8f51220f333348e577e899a70ba9fab3f11cb8994d991b18f31018c01277b4448ab16e9554b9363a23ff4a0c5ebc2f458b322e38d7130407e1095311b3917f23c7e6ad666b9917541c2dfc32f60bd89dbf9fadd95ebfcf8be38dbe9937859e945915b141ea71859f81e80967a1338e6acb144009c9278c379bfc6303d89722c30ef08f55ae154beb57b8560cc273f648d591ceeb99d69559bc4f180f2c33de2a1e0534a9e3861da27d3016d22fe77bc38c8bce4684c8a56d66", 0xb9}, {&(0x7f0000000700)="e460842df14e74c79c9946efb62dd36160f9947abc015b2cedb21cc2010ab02eedde424c8b9d6109c8663946e5e799d4dcb997c7db7c09221ebb8307b23582ceecf8e84ca5d9ed21d898368d2e043cdb00", 0x51}, {&(0x7f0000000780)="e148418e196fc6dd50af1d7e9f02bf0f3651aab5889a9c48d219c05ff5e797477fd7ead6f01df808edd78353d6a1f824638abeec1303966ebce213f270f6b8fb09d8ddc63506a4ccb61324349ea1a107e8bb38c5d4e538fbaa2c8c7453c2ae8389ad80f56c169d74a703a01fb5d52d9cff222b1abb10453f5cb292b52494135aa434ea3ff17a7b120363d934052b3170e9cc41ec1e260f6337a73e435942d1bb65543953a7e4c973697bcceb8e58b635ddead008769765173bf6b38a644ca6e745667489abcd69fcc7154d066c7ff2e07b", 0xd1}, {&(0x7f0000000880)="385110bbf079c1a40c5feaca5df4121a9a07d4a6a255d5757201cbd94ab4f205ecc2ed5540c65fa556754b34e6e5b6f81234e146381f9abcfac2fe9f23045874c161553ec5ea56292799b6b02beeebf84ea3b29059ebd9d2d7a92c21f8ed6c3e8f26581b07", 0x65}], 0x5}}], 0x1, 0x40) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x26f8fd9c5653b583) dup3(r5, r0, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000240)={0xa, 0x100}) r7 = fcntl$getown(r6, 0x9) fcntl$lock(r6, 0x26, &(0x7f0000000040)={0x0, 0x0, 0xffffffffffffff8d, 0x100, r7}) r8 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) pipe2(&(0x7f0000000140), 0x1800) setsockopt$packet_buf(r8, 0x107, 0x17, &(0x7f0000000080)="a7eff2055b5f34962ebd2a904c5489aac0e066b32dc38521b1368000f46ebaa803efe51c2515cb95b1a07474f632d9c54d33db5a3e24879a148f8226952c1e8b95e1e1b28c3e93dd8c616aabb50ab4aea2999c2a68be1248705d100f32", 0x5d) 03:49:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000040)={@remote, @initdev, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(r1, &(0x7f0000005700)=[{{0x0, 0x0, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x1, 0x0) [ 3468.638797][T12549] IPVS: ftp: loaded support on port[0] = 21 [ 3468.778620][T12549] chnl_net:caif_netlink_parms(): no params data found [ 3468.810853][T12549] bridge0: port 1(bridge_slave_0) entered blocking state [ 3468.818160][T12549] bridge0: port 1(bridge_slave_0) entered disabled state [ 3468.826397][T12549] device bridge_slave_0 entered promiscuous mode [ 3468.965674][T12549] bridge0: port 2(bridge_slave_1) entered blocking state [ 3468.972871][T12549] bridge0: port 2(bridge_slave_1) entered disabled state [ 3468.980560][T12549] device bridge_slave_1 entered promiscuous mode [ 3468.997953][T12549] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3469.009608][T12549] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3469.031136][T12549] team0: Port device team_slave_0 added [ 3469.038552][T12549] team0: Port device team_slave_1 added [ 3469.226902][T12549] device hsr_slave_0 entered promiscuous mode [ 3469.270864][T12549] device hsr_slave_1 entered promiscuous mode [ 3469.323920][T12549] debugfs: Directory 'hsr0' with parent '/' already present! [ 3469.481103][T12549] bridge0: port 2(bridge_slave_1) entered blocking state [ 3469.481557][T12552] IPVS: ftp: loaded support on port[0] = 21 [ 3469.488256][T12549] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3469.488444][T12549] bridge0: port 1(bridge_slave_0) entered blocking state [ 3469.508513][T12549] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3469.755571][T12552] chnl_net:caif_netlink_parms(): no params data found [ 3469.923489][T31246] bridge0: port 1(bridge_slave_0) entered disabled state [ 3469.933726][T31246] bridge0: port 2(bridge_slave_1) entered disabled state [ 3469.962335][T12549] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3470.111171][T12552] bridge0: port 1(bridge_slave_0) entered blocking state [ 3470.118493][T12552] bridge0: port 1(bridge_slave_0) entered disabled state [ 3470.126650][T12552] device bridge_slave_0 entered promiscuous mode [ 3470.135587][T12552] bridge0: port 2(bridge_slave_1) entered blocking state [ 3470.142641][T12552] bridge0: port 2(bridge_slave_1) entered disabled state [ 3470.151165][T12552] device bridge_slave_1 entered promiscuous mode [ 3470.171083][T12552] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3470.182107][ T24] device bridge_slave_1 left promiscuous mode [ 3470.188713][ T24] bridge0: port 2(bridge_slave_1) entered disabled state [ 3470.244949][ T24] device bridge_slave_0 left promiscuous mode [ 3470.251194][ T24] bridge0: port 1(bridge_slave_0) entered disabled state [ 3470.315322][ T24] device bridge_slave_1 left promiscuous mode [ 3470.321486][ T24] bridge0: port 2(bridge_slave_1) entered disabled state [ 3470.364443][ T24] device bridge_slave_0 left promiscuous mode [ 3470.370586][ T24] bridge0: port 1(bridge_slave_0) entered disabled state [ 3470.438720][ T24] device bridge_slave_1 left promiscuous mode [ 3470.445383][ T24] bridge0: port 2(bridge_slave_1) entered disabled state [ 3470.494764][ T24] device bridge_slave_0 left promiscuous mode [ 3470.500961][ T24] bridge0: port 1(bridge_slave_0) entered disabled state [ 3474.158791][ T24] device hsr_slave_0 left promiscuous mode [ 3474.204726][ T24] device hsr_slave_1 left promiscuous mode [ 3474.254672][ T24] team0 (unregistering): Port device team_slave_1 removed [ 3474.266544][ T24] team0 (unregistering): Port device team_slave_0 removed [ 3474.277424][ T24] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3474.340098][ T24] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3474.445797][ T24] bond0 (unregistering): Released all slaves [ 3474.594728][ T24] device hsr_slave_0 left promiscuous mode [ 3474.653776][ T24] device hsr_slave_1 left promiscuous mode [ 3474.722457][ T24] team0 (unregistering): Port device team_slave_1 removed [ 3474.735316][ T24] team0 (unregistering): Port device team_slave_0 removed [ 3474.746801][ T24] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3474.800076][ T24] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3474.892554][ T24] bond0 (unregistering): Released all slaves [ 3475.044250][ T24] device hsr_slave_0 left promiscuous mode [ 3475.113951][ T24] device hsr_slave_1 left promiscuous mode [ 3475.190432][ T24] team0 (unregistering): Port device team_slave_1 removed [ 3475.205302][ T24] team0 (unregistering): Port device team_slave_0 removed [ 3475.217319][ T24] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3475.261776][ T24] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3475.338831][ T24] bond0 (unregistering): Released all slaves [ 3475.460851][T12552] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3475.475506][T12549] 8021q: adding VLAN 0 to HW filter on device team0 [ 3475.497388][T12343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3475.505571][T12343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3475.515457][T12552] team0: Port device team_slave_0 added [ 3475.532338][T12552] team0: Port device team_slave_1 added [ 3475.538199][T31246] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3475.547039][T31246] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3475.555496][T31246] bridge0: port 1(bridge_slave_0) entered blocking state [ 3475.562537][T31246] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3475.599798][T31246] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3475.609702][T31246] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3475.619282][T31246] bridge0: port 2(bridge_slave_1) entered blocking state [ 3475.626460][T31246] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3475.634672][T31246] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3475.643297][T31246] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3475.652300][T31246] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3475.661048][T31246] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3475.669667][T31246] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3475.678222][T31246] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3475.755407][T12552] device hsr_slave_0 entered promiscuous mode [ 3475.793990][T12552] device hsr_slave_1 entered promiscuous mode [ 3475.838082][T12549] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3475.852126][T12549] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3475.863472][T20447] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3475.871777][T20447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3475.880240][T20447] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3475.888672][T20447] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3475.901502][T20447] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3475.910061][T20447] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3475.932944][ T24] ------------[ cut here ]------------ [ 3475.936099][T12549] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3475.938455][ T24] ODEBUG: free active (active state 0) object type: timer_list hint: delayed_work_timer_fn+0x0/0x90 [ 3475.938699][ T24] WARNING: CPU: 1 PID: 24 at lib/debugobjects.c:484 debug_check_no_obj_freed+0x464/0x5b0 [ 3475.945691][T12549] kobject: 'vlan0' (00000000ad254117): kobject_add_internal: parent: 'mesh', set: '' [ 3475.956248][ T24] Kernel panic - not syncing: panic_on_warn set ... [ 3475.956264][ T24] CPU: 1 PID: 24 Comm: kworker/u4:2 Not tainted 5.3.0-rc1+ #49 [ 3475.956270][ T24] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3475.956285][ T24] Workqueue: netns cleanup_net [ 3475.956292][ T24] Call Trace: [ 3475.956308][ T24] dump_stack+0x1d8/0x2f8 [ 3475.956322][ T24] panic+0x29b/0x7d9 [ 3475.956335][ T24] ? __warn+0x126/0x230 [ 3475.956344][ T24] ? nmi_panic+0x97/0x97 [ 3475.956353][ T24] ? __probe_kernel_read+0x14b/0x1a0 [ 3475.956364][ T24] ? debug_check_no_obj_freed+0x464/0x5b0 [ 3475.956378][ T24] ? is_valid_bugaddr+0x81/0x100 [ 3475.956393][ T24] __warn+0x22f/0x230 [ 3476.020353][T12552] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3476.023595][ T24] ? debug_check_no_obj_freed+0x464/0x5b0 [ 3476.023616][ T24] report_bug+0x190/0x290 [ 3476.023628][ T24] ? debug_check_no_obj_freed+0x464/0x5b0 [ 3476.023648][ T24] do_error_trap+0xd7/0x440 [ 3476.023664][ T24] do_invalid_op+0x36/0x40 [ 3476.079029][ T24] ? debug_check_no_obj_freed+0x464/0x5b0 [ 3476.084735][ T24] invalid_op+0x23/0x30 [ 3476.088894][ T24] RIP: 0010:debug_check_no_obj_freed+0x464/0x5b0 [ 3476.095207][ T24] Code: 08 48 89 df e8 dd 00 4a fe 4c 8b 03 48 c7 c7 fa 25 88 88 48 c7 c6 8d a9 a0 88 4c 89 e2 44 89 f9 4d 89 e9 31 c0 e8 2c 6e e0 fd <0f> 0b 4c 8b 6d a8 ff 05 b4 7f 95 05 49 83 c5 30 4c 89 e8 48 c1 e8 [ 3476.114798][ T24] RSP: 0018:ffff8880a9a5f708 EFLAGS: 00010046 [ 3476.120864][ T24] RAX: add6082416f75200 RBX: ffffffff88cd9fc0 RCX: ffff8880a9a54680 [ 3476.128824][ T24] RDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000 [ 3476.136781][ T24] RBP: ffff8880a9a5f7a0 R08: ffffffff81606214 R09: ffffed1015d640c2 [ 3476.144736][ T24] R10: ffffed1015d640c2 R11: 0000000000000000 R12: ffffffff8893c08f [ 3476.152695][ T24] R13: ffffffff814f5fa0 R14: dffffc0000000000 R15: 0000000000000000 [ 3476.160669][ T24] ? queue_work_node+0x340/0x340 [ 3476.165630][ T24] ? vprintk_emit+0x2d4/0x3a0 [ 3476.170301][ T24] ? debug_check_no_obj_freed+0x464/0x5b0 [ 3476.176018][ T24] ? kvfree+0x47/0x50 [ 3476.179982][ T24] kfree+0x107/0x200 [ 3476.183861][ T24] kvfree+0x47/0x50 [ 3476.187656][ T24] netdev_freemem+0x3e/0x60 [ 3476.192150][ T24] netdev_release+0x79/0xa0 [ 3476.196643][ T24] ? netdev_uevent+0xa0/0xa0 [ 3476.208108][ T24] device_release+0x74/0x1a0 [ 3476.212697][ T24] kobject_cleanup+0x2f7/0x4c0 [ 3476.218272][ T24] kobject_put+0xad/0xe0 [ 3476.222498][ T24] netdev_run_todo+0xc6f/0xe20 [ 3476.227243][ T24] ? netdev_refcnt_read+0x1c0/0x1c0 [ 3476.232434][ T24] ? unregister_netdevice_queue+0x277/0x500 [ 3476.238316][ T24] ? alloc_netdev_mqs+0xe50/0xe50 [ 3476.243425][ T24] ? br_dev_delete+0x10d/0x120 [ 3476.248176][ T24] rtnl_unlock+0xe/0x10 [ 3476.252305][ T24] default_device_exit_batch+0x719/0x790 [ 3476.257924][ T24] ? default_device_exit+0x260/0x260 [ 3476.263203][ T24] ? wait_woken+0x2c0/0x2c0 [ 3476.267693][ T24] ? rtnl_unlock+0xe/0x10 [ 3476.271998][ T24] ? cfg802154_pernet_exit+0xdc/0xf0 [ 3476.277262][ T24] ? default_device_exit+0x260/0x260 [ 3476.282533][ T24] cleanup_net+0x77c/0xb30 [ 3476.286933][ T24] ? ops_free_list+0x360/0x360 [ 3476.291674][ T24] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 3476.297374][ T24] process_one_work+0x83b/0x1150 [ 3476.302307][ T24] ? rescuer_thread+0x14e0/0x14e0 [ 3476.307308][ T24] ? worker_thread+0x10de/0x1630 [ 3476.312227][ T24] worker_thread+0xc01/0x1630 [ 3476.316911][ T24] kthread+0x332/0x350 [ 3476.320955][ T24] ? rcu_lock_release+0x30/0x30 [ 3476.325806][ T24] ? kthread_blkcg+0xe0/0xe0 [ 3476.330388][ T24] ret_from_fork+0x24/0x30 [ 3476.335912][ T24] Kernel Offset: disabled [ 3476.340404][ T24] Rebooting in 86400 seconds..