00)={'nr0\x01\x00', 0x802}) ioctl$TUNGETFILTER(r1, 0x801054db, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f00000002c0)) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000009200)={0x1f, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xf, r2, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) write$cgroup_int(r1, &(0x7f00000000c0), 0x12) 10:38:39 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000b00000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:38:40 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-intel\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 10:38:40 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_NUM(r0, 0x8008af00, 0x0) [ 2521.395689][T24292] device nr0 entered promiscuous mode 10:38:40 executing program 2: r0 = socket(0x1e, 0x2000000005, 0x0) connect$tipc(r0, &(0x7f0000000140)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x2}}, 0x10) 10:38:40 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000d00000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:38:40 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000340)}, {&(0x7f00000004c0)}], 0x2, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000480)={0x9, 0x0, 0x8, 'queue1\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:38:40 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x1d, &(0x7f0000000040), 0x4) 10:38:40 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_NUM(r0, 0x8008af00, 0x0) 10:38:40 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000800e00000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:38:40 executing program 3: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x4001) io_setup(0x1001, &(0x7f00000003c0)=0x0) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ftruncate(r2, 0x8008200) io_submit(r1, 0x400000000000002a, &(0x7f0000000140)=[&(0x7f00000000c0)={0x0, 0x0, 0x12, 0x1, 0x0, r0, &(0x7f0000000000), 0x1d93612d0e59b030}]) [ 2522.241113][T24292] device nr0 entered promiscuous mode 10:38:41 executing program 5: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x80000) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) close(r3) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000001c0)={0x0, 0x1}, 0x8) r4 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, 0x0) 10:38:41 executing program 2: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r0 = socket(0x2, 0x803, 0xff) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1f}}, 0x10) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141046, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(r1, 0x10004) sendfile(r0, r1, 0x0, 0x72439a6b) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 10:38:41 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_NUM(r0, 0x8008af00, 0x0) 10:38:41 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007b40)=[{{&(0x7f0000000180)=@l2, 0x80}}], 0x1, 0x0) 10:38:41 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000002800000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:38:41 executing program 3: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x4001) io_setup(0x1001, &(0x7f00000003c0)=0x0) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ftruncate(r2, 0x8008200) io_submit(r1, 0x400000000000002a, &(0x7f0000000140)=[&(0x7f00000000c0)={0x0, 0x0, 0x12, 0x1, 0x0, r0, &(0x7f0000000000), 0x1d93612d0e59b030}]) 10:38:41 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_NUM(r0, 0x8008af00, 0x0) 10:38:41 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000803500000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:38:41 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000400)='./file1\x00', 0x0) r0 = getegid() getresgid(&(0x7f0000000280), 0x0, &(0x7f0000000300)=0x0) lsetxattr$system_posix_acl(&(0x7f0000000200)='./file1\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000340)={{}, {0x1, 0x4}, [], {0x4, 0x8000000000005}, [{0x8, 0x2, r0}, {0x8, 0x2}, {0x8, 0x0, r1}], {0x10, 0x5}}, 0x3c, 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000640)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x7, 0x0, 0x0, 0x0, 0x80000001, 0x7fff}}, 0x50) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000003c0)={0x3ff, 0x205, 0xb4b, 0x6, 0x0}, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000700)={r2, 0xbb41}, &(0x7f0000000740)=0x8) stat(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read'}}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}]}}) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(0x0, &(0x7f0000000380)={'syz'}, 0x0, 0xfffffffffffffff8) mount$overlay(0x400004, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x4000, 0x0) gettid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000d40)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000d80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000dc0)) gettid() getpgrp(0xffffffffffffffff) getpgid(0xffffffffffffffff) getpgrp(0x0) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001b00)={0x0, r4, 0x0, 0x0, 0x0}, 0x30) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001bc0)) fcntl$getownex(r4, 0x10, &(0x7f0000001c00)) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004940), &(0x7f0000004980)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000049c0)) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 10:38:41 executing program 1: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd302e8bd6efb120009000e0014240100000006001500fe80", 0x2e}], 0xcc, 0x0, 0x0, 0x2}, 0x0) [ 2522.637531][ T26] audit: type=1800 audit(1563964721.389:578): pid=24358 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file0" dev="sda1" ino=17169 res=0 10:38:41 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b800686dd", 0xe}], 0x1}, 0x0) 10:38:41 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000003a00000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) [ 2522.861230][T24373] overlayfs: conflicting lowerdir path [ 2522.914680][T24378] overlayfs: workdir and upperdir must reside under the same mount 10:38:42 executing program 5: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x80000) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) close(r3) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000001c0)={0x0, 0x1}, 0x8) r4 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, 0x0) 10:38:42 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000600)=@newpolicy={0xb8, 0x13, 0x101, 0x0, 0x0, {{@in6=@mcast2, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}, 0xb8}}, 0x0) 10:38:42 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000200)) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000000080), 0x40000002, 0x0) r0 = gettid() tkill(r0, 0x3b) 10:38:42 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003700000bfa30000000000000702000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000006502faff000000000404000001007d60b7031900e11000006a0a00fdfffff50085002b0026000000b7000000000000009500000000000000443d4438552942726fa8dd4f2b58db3be022f7d824e63abc7c3c937e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 10:38:42 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000003f00000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:38:42 executing program 3: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x4001) io_setup(0x1001, &(0x7f00000003c0)=0x0) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ftruncate(r2, 0x8008200) io_submit(r1, 0x400000000000002a, &(0x7f0000000140)=[&(0x7f00000000c0)={0x0, 0x0, 0x12, 0x1, 0x0, r0, &(0x7f0000000000), 0x1d93612d0e59b030}]) 10:38:42 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000600)=@newpolicy={0xb8, 0x13, 0x101, 0x0, 0x0, {{@in6=@mcast2, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}, 0xb8}}, 0x0) 10:38:42 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000004000000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:38:42 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000200)) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000000080), 0x40000002, 0x0) r0 = gettid() tkill(r0, 0x3b) 10:38:42 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000600)=@newpolicy={0xb8, 0x13, 0x101, 0x0, 0x0, {{@in6=@mcast2, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}, 0xb8}}, 0x0) 10:38:42 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003700000bfa30000000000000702000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000006502faff000000000404000001007d60b7031900e11000006a0a00fdfffff50085002b0026000000b7000000000000009500000000000000443d4438552942726fa8dd4f2b58db3be022f7d824e63abc7c3c937e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 10:38:42 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000200)) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000000080), 0x40000002, 0x0) r0 = gettid() tkill(r0, 0x3b) 10:38:43 executing program 5: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x80000) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) close(r3) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000001c0)={0x0, 0x1}, 0x8) r4 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, 0x0) 10:38:43 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000600)=@newpolicy={0xb8, 0x13, 0x101, 0x0, 0x0, {{@in6=@mcast2, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}, 0xb8}}, 0x0) 10:38:43 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000054300000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:38:43 executing program 3: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x4001) io_setup(0x1001, &(0x7f00000003c0)=0x0) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ftruncate(r2, 0x8008200) io_submit(r1, 0x400000000000002a, &(0x7f0000000140)=[&(0x7f00000000c0)={0x0, 0x0, 0x12, 0x1, 0x0, r0, &(0x7f0000000000), 0x1d93612d0e59b030}]) 10:38:43 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000200)) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000000080), 0x40000002, 0x0) r0 = gettid() tkill(r0, 0x3b) 10:38:43 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003700000bfa30000000000000702000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000006502faff000000000404000001007d60b7031900e11000006a0a00fdfffff50085002b0026000000b7000000000000009500000000000000443d4438552942726fa8dd4f2b58db3be022f7d824e63abc7c3c937e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 10:38:43 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000884700000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:38:43 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000001c0)=0xfffffffffffff001, 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xc, 0x4, 0x40000000004, 0x100000001, 0x0, r0}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 10:38:43 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='mem\x00\x01y7SwaS.\x06\x95r\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaaaa86dd60b409009430000000000000000000000000ffffe0"], 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:38:43 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003700000bfa30000000000000702000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000006502faff000000000404000001007d60b7031900e11000006a0a00fdfffff50085002b0026000000b7000000000000009500000000000000443d4438552942726fa8dd4f2b58db3be022f7d824e63abc7c3c937e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 10:38:43 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000884800000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:38:43 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000000040)={@local, @empty=[0x8906], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0xffffff88, 0x0, @remote={0xac, 0x70}, @dev}, @icmp=@parameter_prob={0x12, 0x2, 0x0, 0x0, 0x2, 0x6, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, 0x0) 10:38:44 executing program 5: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x80000) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) close(r3) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000001c0)={0x0, 0x1}, 0x8) r4 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, 0x0) 10:38:44 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000100)=""/59, 0x2f) getdents64(r0, &(0x7f0000000200)=""/116, 0x74) 10:38:44 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000006000000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:38:44 executing program 1: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fallocate(r0, 0x0, 0x0, 0xa001) r1 = open(&(0x7f0000000200)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1) write$P9_RREMOVE(r2, &(0x7f0000000180)={0x6e785e3d1cb434ee}, 0x14df) syncfs(r1) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000100)={0x0, r2}) fdatasync(r0) 10:38:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x3, 0x6) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg(r0, &(0x7f0000000500)={&(0x7f0000000080)=@in={0x2, 0x0, @multicast1}, 0x80, 0x0}, 0x0) write$selinux_attr(r1, &(0x7f0000000580)='system_u:object_r:fixed_disk_device_t:s0\xfe', 0x9990) 10:38:44 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e0000002700050ad25a80648c63940d0300fc00100003400a000000053582c137153e370900018004001700d1bd", 0x2e}], 0x1}, 0x0) [ 2525.416360][T24476] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 2525.480881][T24476] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 10:38:44 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000886400000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:38:44 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000100)=""/59, 0x2f) getdents64(r0, &(0x7f0000000200)=""/116, 0x74) 10:38:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x3, 0x6) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg(r0, &(0x7f0000000500)={&(0x7f0000000080)=@in={0x2, 0x0, @multicast1}, 0x80, 0x0}, 0x0) write$selinux_attr(r1, &(0x7f0000000580)='system_u:object_r:fixed_disk_device_t:s0\xfe', 0x9990) 10:38:44 executing program 2: sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x101, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r0, 0x800452d2, &(0x7f0000000100)) 10:38:44 executing program 1: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fallocate(r0, 0x0, 0x0, 0xa001) r1 = open(&(0x7f0000000200)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1) write$P9_RREMOVE(r2, &(0x7f0000000180)={0x6e785e3d1cb434ee}, 0x14df) syncfs(r1) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000100)={0x0, r2}) fdatasync(r0) 10:38:44 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a00000e8000000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:38:45 executing program 1: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fallocate(r0, 0x0, 0x0, 0xa001) r1 = open(&(0x7f0000000200)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1) write$P9_RREMOVE(r2, &(0x7f0000000180)={0x6e785e3d1cb434ee}, 0x14df) syncfs(r1) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000100)={0x0, r2}) fdatasync(r0) 10:38:45 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000100)=""/59, 0x2f) getdents64(r0, &(0x7f0000000200)=""/116, 0x74) 10:38:45 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xfffffffffffffffe, 0x31, 0xffffffffffffffff, 0x0) waitid(0x0, 0x0, &(0x7f0000002ff9), 0x0, 0x0) 10:38:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x3, 0x6) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg(r0, &(0x7f0000000500)={&(0x7f0000000080)=@in={0x2, 0x0, @multicast1}, 0x80, 0x0}, 0x0) write$selinux_attr(r1, &(0x7f0000000580)='system_u:object_r:fixed_disk_device_t:s0\xfe', 0x9990) 10:38:45 executing program 2: sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x101, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r0, 0x800452d2, &(0x7f0000000100)) 10:38:45 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000358000000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:38:45 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000100)=""/59, 0x2f) getdents64(r0, &(0x7f0000000200)=""/116, 0x74) 10:38:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x3, 0x6) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg(r0, &(0x7f0000000500)={&(0x7f0000000080)=@in={0x2, 0x0, @multicast1}, 0x80, 0x0}, 0x0) write$selinux_attr(r1, &(0x7f0000000580)='system_u:object_r:fixed_disk_device_t:s0\xfe', 0x9990) 10:38:45 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000008100000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:38:45 executing program 2: sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x101, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r0, 0x800452d2, &(0x7f0000000100)) 10:38:45 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clock_gettime(0xf7fffffffffffff0, &(0x7f00000000c0)) 10:38:45 executing program 1: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fallocate(r0, 0x0, 0x0, 0xa001) r1 = open(&(0x7f0000000200)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1) write$P9_RREMOVE(r2, &(0x7f0000000180)={0x6e785e3d1cb434ee}, 0x14df) syncfs(r1) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000100)={0x0, r2}) fdatasync(r0) 10:38:45 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x73) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) 10:38:45 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000478800000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:38:45 executing program 2: sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x101, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r0, 0x800452d2, &(0x7f0000000100)) 10:38:45 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0xa, 0x4, 0x1, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000140), 0x1c) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000080)={0x1b7}, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 10:38:45 executing program 4: syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x163882) syz_open_dev$sg(0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) rt_sigqueueinfo(r0, 0x15, &(0x7f0000000280)) 10:38:45 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = eventfd2(0x0, 0x0) io_setup(0xa3c, &(0x7f0000000240)=0x0) r3 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r1, &(0x7f0000000000)) io_submit(r2, 0x1, &(0x7f0000329fd8)=[&(0x7f00002a8000)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x1, r1}]) 10:38:45 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000488800000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:38:45 executing program 1: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="020a00401000000000000000000000000800120000000100000000000000000006051e7dabc56b523009000000000000e000000100000000060000000000020000000000000000f9ff0c20051d63da4f030001800000080002c70fee4394ffbbf000000000000000030005000000000002001d632b91c5200100000008000000"], 0x80}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="02090000020000000061395a6b9d12ab"], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x32bc45944b084a6, 0x0) 10:38:45 executing program 2: syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@norock='norock'}]}) 10:38:45 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000648800000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:38:46 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = eventfd2(0x0, 0x0) io_setup(0xa3c, &(0x7f0000000240)=0x0) r3 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r1, &(0x7f0000000000)) io_submit(r2, 0x1, &(0x7f0000329fd8)=[&(0x7f00002a8000)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x1, r1}]) 10:38:46 executing program 1: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="020a00401000000000000000000000000800120000000100000000000000000006051e7dabc56b523009000000000000e000000100000000060000000000020000000000000000f9ff0c20051d63da4f030001800000080002c70fee4394ffbbf000000000000000030005000000000002001d632b91c5200100000008000000"], 0x80}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="02090000020000000061395a6b9d12ab"], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x32bc45944b084a6, 0x0) 10:38:46 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000068900000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) [ 2527.524046][T24580] ISOFS: Unable to identify CD-ROM format. 10:38:46 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = eventfd2(0x0, 0x0) io_setup(0xa3c, &(0x7f0000000240)=0x0) r3 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r1, &(0x7f0000000000)) io_submit(r2, 0x1, &(0x7f0000329fd8)=[&(0x7f00002a8000)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x1, r1}]) 10:38:46 executing program 1: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="020a00401000000000000000000000000800120000000100000000000000000006051e7dabc56b523009000000000000e000000100000000060000000000020000000000000000f9ff0c20051d63da4f030001800000080002c70fee4394ffbbf000000000000000030005000000000002001d632b91c5200100000008000000"], 0x80}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="02090000020000000061395a6b9d12ab"], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x32bc45944b084a6, 0x0) [ 2527.687195][T24580] ISOFS: Unable to identify CD-ROM format. 10:38:46 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0xa, 0x4, 0x1, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000140), 0x1c) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000080)={0x1b7}, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 10:38:46 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a000000f000000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:38:46 executing program 2: syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@norock='norock'}]}) 10:38:46 executing program 1: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="020a00401000000000000000000000000800120000000100000000000000000006051e7dabc56b523009000000000000e000000100000000060000000000020000000000000000f9ff0c20051d63da4f030001800000080002c70fee4394ffbbf000000000000000030005000000000002001d632b91c5200100000008000000"], 0x80}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="02090000020000000061395a6b9d12ab"], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x32bc45944b084a6, 0x0) 10:38:46 executing program 4: syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x163882) syz_open_dev$sg(0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) rt_sigqueueinfo(r0, 0x15, &(0x7f0000000280)) 10:38:46 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = eventfd2(0x0, 0x0) io_setup(0xa3c, &(0x7f0000000240)=0x0) r3 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r1, &(0x7f0000000000)) io_submit(r2, 0x1, &(0x7f0000329fd8)=[&(0x7f00002a8000)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x1, r1}]) 10:38:46 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a000000ff00000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:38:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$rds(r1, &(0x7f0000001f00)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PUBL_GET(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000001c0)}, 0x4008080) 10:38:47 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) [ 2528.228856][T24617] ISOFS: Unable to identify CD-ROM format. 10:38:47 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000a00080000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:38:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000000e40)=[{{0x0, 0x4, 0x0}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f00000023c0)=""/4096, 0xfe19}], 0x10}}], 0x2, 0x0, 0x0) 10:38:47 executing program 2: syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@norock='norock'}]}) [ 2528.778460][T24646] ISOFS: Unable to identify CD-ROM format. 10:38:47 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0xa, 0x4, 0x1, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000140), 0x1c) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000080)={0x1b7}, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 10:38:47 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000fffff0000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:38:47 executing program 3: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000000)="1f0000000107fffffd3b000007110000f30501000b000400020423ca0000cf", 0x1f) 10:38:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000000e40)=[{{0x0, 0x4, 0x0}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f00000023c0)=""/4096, 0xfe19}], 0x10}}], 0x2, 0x0, 0x0) 10:38:47 executing program 2: syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@norock='norock'}]}) 10:38:47 executing program 4: syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x163882) syz_open_dev$sg(0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) rt_sigqueueinfo(r0, 0x15, &(0x7f0000000280)) 10:38:47 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x3, 0x0) open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) r0 = syz_open_dev$media(&(0x7f0000001800)='/dev/media#\x00', 0x0, 0x400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x16) lstat(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000240)={'nat\x00'}, &(0x7f00000001c0)=0x78) r1 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x800000000002b, 'pids'}]}, 0x6) write$cgroup_subtree(r2, &(0x7f0000000080)=ANY=[@ANYBLOB='-pids'], 0x5) 10:38:48 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000010000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) [ 2529.277129][T24658] ISOFS: Unable to identify CD-ROM format. 10:38:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000000e40)=[{{0x0, 0x4, 0x0}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f00000023c0)=""/4096, 0xfe19}], 0x10}}], 0x2, 0x0, 0x0) 10:38:48 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[], 0xfffffed5) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'rmd128\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x1ffffd, 0x0) 10:38:48 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000020000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:38:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000000e40)=[{{0x0, 0x4, 0x0}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f00000023c0)=""/4096, 0xfe19}], 0x10}}], 0x2, 0x0, 0x0) 10:38:48 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000030000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:38:48 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0xa, 0x4, 0x1, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000140), 0x1c) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000080)={0x1b7}, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 10:38:48 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x9, 0x4) bind$inet(r0, &(0x7f0000001440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x61) sendmsg$inet(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000180)="38243193266edc3324b05b8b0f17f6347c96dd4cf38df75e9e4604766b486f6fb5e64fc03c1953d431aae1f20296b291210b6b3a67047305d771d276b74eb614cc079a5e2bb67ee34ab9c63725bc3b406ef0308594e097a55a83bfeb1992e392d4aae2b1f03b74d30074fa02ec67b7ba727d7d0dfad05b7d3cdc7b3b7bba4a4eb6b8b189d3a69d4afe61d4ff00da5065b0e4ea333102ed5cfe0b5f69934abc10a03255bc05dfe1fe166d3f1da38afe2059f49902a329b5ccf5bef672f7913742cac26c9ac6", 0xc5}, {&(0x7f0000001480)="94fdd81a4d941965a5d7b6ff6eb2134a69767213ef22eb892eb64cdcab0ebb8c1ea80d7bc0706854a64628a2d3b7d57cea052f1652ba6b1a1b57b472abb8fa92580f6178311c7f0c770103baa2fe0d8340781140e00028eac05fe0f2b89ab8734c3ff907c05915e1fa5fe0d8213c8287e3604fc06cfdc783c3169f704c87fe5871bd5c946ab17ccf5bebe25de049e707566ef40517ebd8f01414b1", 0x9b}], 0x2}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x3) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) recvmsg(r0, &(0x7f0000000140)={0x0, 0x3a98, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa47475}, 0x100) 10:38:48 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffffa, 0x20000802, &(0x7f00000000c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) r2 = dup2(r0, r0) r3 = dup2(r0, r2) sendmsg$TIPC_NL_PUBL_GET(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000100)=ANY=[@ANYBLOB], 0x1}}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000080)=@ccm_128={{}, "5c7639d15ada5f6e", "bd20e179106c1498c407c931dadb38ca", "72d1b6fd", "ae1b08b01fb1512f"}, 0x28) close(r0) 10:38:48 executing program 4: syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x163882) syz_open_dev$sg(0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) rt_sigqueueinfo(r0, 0x15, &(0x7f0000000280)) 10:38:49 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000050000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:38:49 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffffa, 0x20000802, &(0x7f00000000c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) r2 = dup2(r0, r0) r3 = dup2(r0, r2) sendmsg$TIPC_NL_PUBL_GET(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000100)=ANY=[@ANYBLOB], 0x1}}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000080)=@ccm_128={{}, "5c7639d15ada5f6e", "bd20e179106c1498c407c931dadb38ca", "72d1b6fd", "ae1b08b01fb1512f"}, 0x28) close(r0) 10:38:49 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000060000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:38:49 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[], 0xfffffed5) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'rmd128\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x1ffffd, 0x0) 10:38:49 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffffa, 0x20000802, &(0x7f00000000c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) r2 = dup2(r0, r0) r3 = dup2(r0, r2) sendmsg$TIPC_NL_PUBL_GET(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000100)=ANY=[@ANYBLOB], 0x1}}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000080)=@ccm_128={{}, "5c7639d15ada5f6e", "bd20e179106c1498c407c931dadb38ca", "72d1b6fd", "ae1b08b01fb1512f"}, 0x28) close(r0) 10:38:49 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000070000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:38:49 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffffa, 0x20000802, &(0x7f00000000c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) r2 = dup2(r0, r0) r3 = dup2(r0, r2) sendmsg$TIPC_NL_PUBL_GET(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000100)=ANY=[@ANYBLOB], 0x1}}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000080)=@ccm_128={{}, "5c7639d15ada5f6e", "bd20e179106c1498c407c931dadb38ca", "72d1b6fd", "ae1b08b01fb1512f"}, 0x28) close(r0) 10:38:49 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000080000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:38:50 executing program 4: pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280)={0x1}, 0xff7f) r4 = open(&(0x7f0000000100)='./file0\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x9000)=nil, 0x9000, 0x800002, 0x11, r4, 0x0) madvise(&(0x7f0000005000/0x2000)=nil, 0x2000, 0x9) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000300)=""/250, 0xfffffdf6) 10:38:50 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffffa, 0x20000802, &(0x7f00000000c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) r2 = dup2(r0, r0) r3 = dup2(r0, r2) sendmsg$TIPC_NL_PUBL_GET(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000100)=ANY=[@ANYBLOB], 0x1}}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000080)=@ccm_128={{}, "5c7639d15ada5f6e", "bd20e179106c1498c407c931dadb38ca", "72d1b6fd", "ae1b08b01fb1512f"}, 0x28) close(r0) 10:38:50 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x9, 0x4) bind$inet(r0, &(0x7f0000001440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x61) sendmsg$inet(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000180)="38243193266edc3324b05b8b0f17f6347c96dd4cf38df75e9e4604766b486f6fb5e64fc03c1953d431aae1f20296b291210b6b3a67047305d771d276b74eb614cc079a5e2bb67ee34ab9c63725bc3b406ef0308594e097a55a83bfeb1992e392d4aae2b1f03b74d30074fa02ec67b7ba727d7d0dfad05b7d3cdc7b3b7bba4a4eb6b8b189d3a69d4afe61d4ff00da5065b0e4ea333102ed5cfe0b5f69934abc10a03255bc05dfe1fe166d3f1da38afe2059f49902a329b5ccf5bef672f7913742cac26c9ac6", 0xc5}, {&(0x7f0000001480)="94fdd81a4d941965a5d7b6ff6eb2134a69767213ef22eb892eb64cdcab0ebb8c1ea80d7bc0706854a64628a2d3b7d57cea052f1652ba6b1a1b57b472abb8fa92580f6178311c7f0c770103baa2fe0d8340781140e00028eac05fe0f2b89ab8734c3ff907c05915e1fa5fe0d8213c8287e3604fc06cfdc783c3169f704c87fe5871bd5c946ab17ccf5bebe25de049e707566ef40517ebd8f01414b1", 0x9b}], 0x2}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x3) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) recvmsg(r0, &(0x7f0000000140)={0x0, 0x3a98, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa47475}, 0x100) 10:38:50 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000006080000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:38:50 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffa4}, [@ldst={0x7, 0x5, 0x0, 0x0, 0xa}]}, &(0x7f0000000080)='GPL\x00', 0x3, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 10:38:50 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a00000000000b0000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:38:50 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffffa, 0x20000802, &(0x7f00000000c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) r2 = dup2(r0, r0) r3 = dup2(r0, r2) sendmsg$TIPC_NL_PUBL_GET(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000100)=ANY=[@ANYBLOB], 0x1}}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000080)=@ccm_128={{}, "5c7639d15ada5f6e", "bd20e179106c1498c407c931dadb38ca", "72d1b6fd", "ae1b08b01fb1512f"}, 0x28) close(r0) 10:38:50 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[], 0xfffffed5) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'rmd128\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x1ffffd, 0x0) 10:38:50 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffa4}, [@ldst={0x7, 0x5, 0x0, 0x0, 0xa}]}, &(0x7f0000000080)='GPL\x00', 0x3, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 10:38:50 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a00000000000d0000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:38:50 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffffa, 0x20000802, &(0x7f00000000c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) r2 = dup2(r0, r0) r3 = dup2(r0, r2) sendmsg$TIPC_NL_PUBL_GET(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000100)=ANY=[@ANYBLOB], 0x1}}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000080)=@ccm_128={{}, "5c7639d15ada5f6e", "bd20e179106c1498c407c931dadb38ca", "72d1b6fd", "ae1b08b01fb1512f"}, 0x28) close(r0) 10:38:50 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000280000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:38:51 executing program 4: pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280)={0x1}, 0xff7f) r4 = open(&(0x7f0000000100)='./file0\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x9000)=nil, 0x9000, 0x800002, 0x11, r4, 0x0) madvise(&(0x7f0000005000/0x2000)=nil, 0x2000, 0x9) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000300)=""/250, 0xfffffdf6) 10:38:51 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffa4}, [@ldst={0x7, 0x5, 0x0, 0x0, 0xa}]}, &(0x7f0000000080)='GPL\x00', 0x3, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 10:38:51 executing program 1: add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000140)="f8", 0x1, 0xfffffffffffffffc) 10:38:51 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x9, 0x4) bind$inet(r0, &(0x7f0000001440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x61) sendmsg$inet(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000180)="38243193266edc3324b05b8b0f17f6347c96dd4cf38df75e9e4604766b486f6fb5e64fc03c1953d431aae1f20296b291210b6b3a67047305d771d276b74eb614cc079a5e2bb67ee34ab9c63725bc3b406ef0308594e097a55a83bfeb1992e392d4aae2b1f03b74d30074fa02ec67b7ba727d7d0dfad05b7d3cdc7b3b7bba4a4eb6b8b189d3a69d4afe61d4ff00da5065b0e4ea333102ed5cfe0b5f69934abc10a03255bc05dfe1fe166d3f1da38afe2059f49902a329b5ccf5bef672f7913742cac26c9ac6", 0xc5}, {&(0x7f0000001480)="94fdd81a4d941965a5d7b6ff6eb2134a69767213ef22eb892eb64cdcab0ebb8c1ea80d7bc0706854a64628a2d3b7d57cea052f1652ba6b1a1b57b472abb8fa92580f6178311c7f0c770103baa2fe0d8340781140e00028eac05fe0f2b89ab8734c3ff907c05915e1fa5fe0d8213c8287e3604fc06cfdc783c3169f704c87fe5871bd5c946ab17ccf5bebe25de049e707566ef40517ebd8f01414b1", 0x9b}], 0x2}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x3) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) recvmsg(r0, &(0x7f0000000140)={0x0, 0x3a98, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa47475}, 0x100) 10:38:51 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a00000000003a0000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:38:51 executing program 1: pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280)={0x1}, 0xff7f) r4 = open(&(0x7f0000000100)='./file0\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x9000)=nil, 0x9000, 0x800002, 0x11, r4, 0x0) madvise(&(0x7f0000005000/0x2000)=nil, 0x2000, 0x9) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000300)=""/250, 0xfffffdf6) 10:38:51 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a00000000003f0000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:38:51 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[], 0xfffffed5) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'rmd128\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x1ffffd, 0x0) 10:38:51 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffa4}, [@ldst={0x7, 0x5, 0x0, 0x0, 0xa}]}, &(0x7f0000000080)='GPL\x00', 0x3, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 10:38:51 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000400000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:38:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x68, r2, 0x5, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0xf01, @media='ib\x00'}}}}, 0x68}}, 0x0) 10:38:51 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000005430000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:38:52 executing program 4: pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280)={0x1}, 0xff7f) r4 = open(&(0x7f0000000100)='./file0\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x9000)=nil, 0x9000, 0x800002, 0x11, r4, 0x0) madvise(&(0x7f0000005000/0x2000)=nil, 0x2000, 0x9) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000300)=""/250, 0xfffffdf6) 10:38:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x68, r2, 0x5, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0xf01, @media='ib\x00'}}}}, 0x68}}, 0x0) 10:38:52 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x9, 0x4) bind$inet(r0, &(0x7f0000001440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x61) sendmsg$inet(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000180)="38243193266edc3324b05b8b0f17f6347c96dd4cf38df75e9e4604766b486f6fb5e64fc03c1953d431aae1f20296b291210b6b3a67047305d771d276b74eb614cc079a5e2bb67ee34ab9c63725bc3b406ef0308594e097a55a83bfeb1992e392d4aae2b1f03b74d30074fa02ec67b7ba727d7d0dfad05b7d3cdc7b3b7bba4a4eb6b8b189d3a69d4afe61d4ff00da5065b0e4ea333102ed5cfe0b5f69934abc10a03255bc05dfe1fe166d3f1da38afe2059f49902a329b5ccf5bef672f7913742cac26c9ac6", 0xc5}, {&(0x7f0000001480)="94fdd81a4d941965a5d7b6ff6eb2134a69767213ef22eb892eb64cdcab0ebb8c1ea80d7bc0706854a64628a2d3b7d57cea052f1652ba6b1a1b57b472abb8fa92580f6178311c7f0c770103baa2fe0d8340781140e00028eac05fe0f2b89ab8734c3ff907c05915e1fa5fe0d8213c8287e3604fc06cfdc783c3169f704c87fe5871bd5c946ab17ccf5bebe25de049e707566ef40517ebd8f01414b1", 0x9b}], 0x2}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x3) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) recvmsg(r0, &(0x7f0000000140)={0x0, 0x3a98, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa47475}, 0x100) 10:38:52 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000600000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:38:52 executing program 1: pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280)={0x1}, 0xff7f) r4 = open(&(0x7f0000000100)='./file0\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x9000)=nil, 0x9000, 0x800002, 0x11, r4, 0x0) madvise(&(0x7f0000005000/0x2000)=nil, 0x2000, 0x9) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000300)=""/250, 0xfffffdf6) 10:38:52 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a000000000e800000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:38:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x68, r2, 0x5, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0xf01, @media='ib\x00'}}}}, 0x68}}, 0x0) 10:38:52 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="2e0000001e000502ed0080637e6394f20200d2000500fcb711407f480f0003001601000002000000f88000f01700", 0x27c}], 0x1}, 0x0) [ 2533.833129][T24837] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 2533.867885][T24837] __nla_validate_parse: 2 callbacks suppressed [ 2533.867896][T24837] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.2'. 10:38:52 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000035800000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:38:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x68, r2, 0x5, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0xf01, @media='ib\x00'}}}}, 0x68}}, 0x0) 10:38:52 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="2e0000001e000502ed0080637e6394f20200d2000500fcb711407f480f0003001601000002000000f88000f01700", 0x27c}], 0x1}, 0x0) [ 2534.126461][T24844] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 10:38:52 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000810000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) [ 2534.168811][T24844] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.2'. 10:38:53 executing program 4: pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280)={0x1}, 0xff7f) r4 = open(&(0x7f0000000100)='./file0\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x9000)=nil, 0x9000, 0x800002, 0x11, r4, 0x0) madvise(&(0x7f0000005000/0x2000)=nil, 0x2000, 0x9) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000300)=""/250, 0xfffffdf6) 10:38:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000400)="11dca5055e62cfe47bf070") sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000200)="240000001e0007041dfffd946f610500020000000100000000000000080001000400017e", 0x24}], 0x1}, 0x0) r1 = socket(0x6000000000010, 0x3, 0x0) sendmmsg$alg(r1, &(0x7f0000000140), 0x492492492492540, 0x0) 10:38:53 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="2e0000001e000502ed0080637e6394f20200d2000500fcb711407f480f0003001601000002000000f88000f01700", 0x27c}], 0x1}, 0x0) 10:38:53 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000ffffdd860000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:38:53 executing program 1: pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280)={0x1}, 0xff7f) r4 = open(&(0x7f0000000100)='./file0\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x9000)=nil, 0x9000, 0x800002, 0x11, r4, 0x0) madvise(&(0x7f0000005000/0x2000)=nil, 0x2000, 0x9) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000300)=""/250, 0xfffffdf6) 10:38:53 executing program 3: mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) socket$inet(0x10, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xefbd) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e80)={0x0, r1, 0x0, 0x14, &(0x7f0000000e40)='security.capability\x00'}, 0x30) gettid() r2 = getpgrp(0x0) setpriority(0x0, r2, 0x8001) r3 = fcntl$dupfd(0xffffffffffffffff, 0xfffffffffffffffe, r1) write$apparmor_current(r3, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x1) r4 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000080)=[r3, r3, r0], 0x3) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3={0x3000000, [{}, {0x692, 0x2}]}, 0x18, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) getuid() [ 2534.655538][T24860] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 2534.688482][T24860] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.2'. 10:38:53 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000047880000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:38:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x1, @link_local, 'hsr0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 10:38:53 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="2e0000001e000502ed0080637e6394f20200d2000500fcb711407f480f0003001601000002000000f88000f01700", 0x27c}], 0x1}, 0x0) [ 2534.988615][T24876] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 2535.016133][T24876] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.2'. 10:38:53 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000048880000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:38:54 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, 0x0, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) 10:38:54 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000064880000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:38:54 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000ffffa8880000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:38:54 executing program 3: mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) socket$inet(0x10, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xefbd) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e80)={0x0, r1, 0x0, 0x14, &(0x7f0000000e40)='security.capability\x00'}, 0x30) gettid() r2 = getpgrp(0x0) setpriority(0x0, r2, 0x8001) r3 = fcntl$dupfd(0xffffffffffffffff, 0xfffffffffffffffe, r1) write$apparmor_current(r3, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x1) r4 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000080)=[r3, r3, r0], 0x3) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3={0x3000000, [{}, {0x692, 0x2}]}, 0x18, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) getuid() 10:38:54 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, 0x0, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) 10:38:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x1, @link_local, 'hsr0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 10:38:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x1, @link_local, 'hsr0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 10:38:54 executing program 4: mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) socket$inet(0x10, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xefbd) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e80)={0x0, r1, 0x0, 0x14, &(0x7f0000000e40)='security.capability\x00'}, 0x30) gettid() r2 = getpgrp(0x0) setpriority(0x0, r2, 0x8001) r3 = fcntl$dupfd(0xffffffffffffffff, 0xfffffffffffffffe, r1) write$apparmor_current(r3, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x1) r4 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000080)=[r3, r3, r0], 0x3) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3={0x3000000, [{}, {0x692, 0x2}]}, 0x18, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) getuid() 10:38:54 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, 0x0, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) 10:38:54 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000ffffca880000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:38:55 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000006890000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:38:55 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, 0x0, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) 10:38:55 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000ffffff8d0000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:38:55 executing program 4: mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) socket$inet(0x10, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xefbd) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e80)={0x0, r1, 0x0, 0x14, &(0x7f0000000e40)='security.capability\x00'}, 0x30) gettid() r2 = getpgrp(0x0) setpriority(0x0, r2, 0x8001) r3 = fcntl$dupfd(0xffffffffffffffff, 0xfffffffffffffffe, r1) write$apparmor_current(r3, &(0x7f0000000540)=ANY=[@ANYBLOB="2d0dba64032277611d507ad3215d7e6a93416fbe1c9b4e0420cba87adcaba5efb34fbae052b1d1ac1fdd88e6ccd11af8061d7d50a2f18ba378853ac32b98b9a57508c920eb2e81ef5ee0d8029d80e46750d00dce2648e63e8fbee13d1dad9c5727308d0192844f1034e1b6e895f693d634e2d4ec8535f3553c76bceb8f68836d79e674684c91343b4e1a0843b9ee7dc29944874555feb578188dea0b1759609ded81a15a413ea2bd0fbeb0784109bae5a1dc4452ef6928b2ea242eef02fb09b8f36b0446234c1ce3897111fbd652d100e82d52bc703fc70a90229b3d4e7e31a2767288524f9003e7949570069fead55acf6ed8b5fe8a216d0dc97b424daa211a9243cd85951d2bf10ae0eb8b2a06d21f709aa55251e92d2edf36c9"], 0x1) r4 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000080)=[r3, r3, r0], 0x3) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3={0x3000000, [{}, {0x692, 0x2}]}, 0x18, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) getuid() 10:38:55 executing program 2: mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) socket$inet(0x10, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xefbd) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e80)={0x0, r1, 0x0, 0x14, &(0x7f0000000e40)='security.capability\x00'}, 0x30) gettid() r2 = getpgrp(0x0) setpriority(0x0, r2, 0x8001) r3 = fcntl$dupfd(0xffffffffffffffff, 0xfffffffffffffffe, r1) write$apparmor_current(r3, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x1) r4 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000080)=[r3, r3, r0], 0x3) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3={0x3000000, [{}, {0x692, 0x2}]}, 0x18, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) getuid() 10:38:55 executing program 3: mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) socket$inet(0x10, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xefbd) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e80)={0x0, r1, 0x0, 0x14, &(0x7f0000000e40)='security.capability\x00'}, 0x30) gettid() r2 = getpgrp(0x0) setpriority(0x0, r2, 0x8001) r3 = fcntl$dupfd(0xffffffffffffffff, 0xfffffffffffffffe, r1) write$apparmor_current(r3, &(0x7f0000000540)=ANY=[@ANYBLOB="2d0dba64032277611d507ad3215d7e6a93416fbe1c9b4e0420cba87adcaba5efb34fbae052b1d1ac1fdd88e6ccd11af8061d7d50a2f18ba378853ac32b98b9a57508c920eb2e81ef5ee0d8029d80e46750d00dce2648e63e8fbee13d1dad9c5727308d0192844f1034e1b6e895f693d634e2d4ec8535f3553c76bceb8f68836d79e674684c91343b4e1a0843b9ee7dc29944874555feb578188dea0b1759609ded81a15a413ea2bd0fbeb0784109bae5a1dc4452ef6928b2ea242eef02fb09b8f36b0446234c1ce3897111fbd652d100e82d52bc703fc70a90229b3d4e7e31a2767288524f9003e7949570069fead55acf6ed8b5fe8a216d0dc97b424daa211a9243cd85951d2bf10ae0eb8b2a06d21f709aa55251e92d2edf36c9"], 0x1) r4 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000080)=[r3, r3, r0], 0x3) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3={0x3000000, [{}, {0x692, 0x2}]}, 0x18, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) getuid() 10:38:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x1, @link_local, 'hsr0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 10:38:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x1, @link_local, 'hsr0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 10:38:55 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000008000a00000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:38:56 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000001a00000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:38:56 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000fffffff50000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:38:56 executing program 3: mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) socket$inet(0x10, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xefbd) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e80)={0x0, r1, 0x0, 0x14, &(0x7f0000000e40)='security.capability\x00'}, 0x30) gettid() r2 = getpgrp(0x0) setpriority(0x0, r2, 0x8001) r3 = fcntl$dupfd(0xffffffffffffffff, 0xfffffffffffffffe, r1) write$apparmor_current(r3, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x1) r4 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000080)=[r3, r3, r0], 0x3) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3={0x3000000, [{}, {0x692, 0x2}]}, 0x18, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) getuid() 10:38:56 executing program 4: mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) socket$inet(0x10, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xefbd) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e80)={0x0, r1, 0x0, 0x14, &(0x7f0000000e40)='security.capability\x00'}, 0x30) gettid() r2 = getpgrp(0x0) setpriority(0x0, r2, 0x8001) r3 = fcntl$dupfd(0xffffffffffffffff, 0xfffffffffffffffe, r1) write$apparmor_current(r3, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x1) r4 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000080)=[r3, r3, r0], 0x3) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3={0x3000000, [{}, {0x692, 0x2}]}, 0x18, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) getuid() 10:38:56 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000ff0000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:38:56 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a000088a8ffff0000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:38:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x1, @link_local, 'hsr0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 10:38:57 executing program 2: mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) socket$inet(0x10, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xefbd) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e80)={0x0, r1, 0x0, 0x14, &(0x7f0000000e40)='security.capability\x00'}, 0x30) gettid() r2 = getpgrp(0x0) setpriority(0x0, r2, 0x8001) r3 = fcntl$dupfd(0xffffffffffffffff, 0xfffffffffffffffe, r1) write$apparmor_current(r3, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x1) r4 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000080)=[r3, r3, r0], 0x3) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3={0x3000000, [{}, {0x692, 0x2}]}, 0x18, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) getuid() 10:38:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x1, @link_local, 'hsr0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 10:38:57 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a000088caffff0000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:38:57 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a000086ddffff0000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:38:57 executing program 4: r0 = open(&(0x7f0000ba0000)='./file0\x00', 0xfc, 0x0) fcntl$setlease(r0, 0x400, 0x0) rt_sigprocmask(0x0, &(0x7f0000000000)={0xfffffffffffffffe}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00000000c0)={0xfffffffffffffffd}, 0xfffffffffffffffe, 0x0, 0x8) open(&(0x7f0000000180)='./file0\x00', 0x802, 0x0) 10:38:57 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha384\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 10:38:57 executing program 3: r0 = socket$packet(0x11, 0x20000000000002, 0x300) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000280)=0x3, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0xb38, 0x4) sendmsg(r0, &(0x7f00000001c0)={&(0x7f0000000140)=@nfc={0x27, 0x1}, 0x80, 0x0}, 0x0) recvmmsg(r0, &(0x7f0000000100)=[{{0x0, 0xffffffffffffff53, 0x0}}], 0x400009c, 0x2040, 0x0) 10:38:57 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a000000f0ffff0000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) [ 2539.052192][ T26] audit: type=1804 audit(1563964737.799:579): pid=25011 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir522092351/syzkaller.fFoyyd/1761/file0" dev="sda1" ino=17265 res=1 10:38:58 executing program 3: r0 = socket$packet(0x11, 0x20000000000002, 0x300) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000280)=0x3, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0xb38, 0x4) sendmsg(r0, &(0x7f00000001c0)={&(0x7f0000000140)=@nfc={0x27, 0x1}, 0x80, 0x0}, 0x0) recvmmsg(r0, &(0x7f0000000100)=[{{0x0, 0xffffffffffffff53, 0x0}}], 0x400009c, 0x2040, 0x0) 10:38:58 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a00008dffffff0000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:38:58 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) r1 = dup2(r0, r0) write$tun(r1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 10:38:58 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x54, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 10:38:58 executing program 2: mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) socket$inet(0x10, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xefbd) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e80)={0x0, r1, 0x0, 0x14, &(0x7f0000000e40)='security.capability\x00'}, 0x30) gettid() r2 = getpgrp(0x0) setpriority(0x0, r2, 0x8001) r3 = fcntl$dupfd(0xffffffffffffffff, 0xfffffffffffffffe, r1) write$apparmor_current(r3, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x1) r4 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000080)=[r3, r3, r0], 0x3) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3={0x3000000, [{}, {0x692, 0x2}]}, 0x18, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) getuid() 10:38:58 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000f5ffffff0000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:38:58 executing program 3: r0 = socket$packet(0x11, 0x20000000000002, 0x300) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000280)=0x3, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0xb38, 0x4) sendmsg(r0, &(0x7f00000001c0)={&(0x7f0000000140)=@nfc={0x27, 0x1}, 0x80, 0x0}, 0x0) recvmmsg(r0, &(0x7f0000000100)=[{{0x0, 0xffffffffffffff53, 0x0}}], 0x400009c, 0x2040, 0x0) 10:38:58 executing program 4: syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000004c0)={0x64, 0x0, &(0x7f0000000300)=[@exit_looper, @acquire_done={0x40106309, 0x1}, @transaction_sg={0x40486311, {0x0, 0x0, 0x3f00, 0x0, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, &(0x7f0000000400)}) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) 10:38:58 executing program 3: r0 = socket$packet(0x11, 0x20000000000002, 0x300) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000280)=0x3, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0xb38, 0x4) sendmsg(r0, &(0x7f00000001c0)={&(0x7f0000000140)=@nfc={0x27, 0x1}, 0x80, 0x0}, 0x0) recvmmsg(r0, &(0x7f0000000100)=[{{0x0, 0xffffffffffffff53, 0x0}}], 0x400009c, 0x2040, 0x0) 10:38:58 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000ffffffffa001000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:38:58 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$nfs4(&(0x7f0000000000)='nfs4\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001240)='vmnet0system\xe9nodevbdevprocmd5sum\x00') 10:38:58 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) r1 = dup2(r0, r0) write$tun(r1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 10:38:58 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) r1 = dup2(r0, r0) write$tun(r1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 10:38:58 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000ffffffffa000800000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) [ 2540.078462][T25056] debugfs: File '25047' in directory 'proc' already present! 10:38:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x0, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200007c0], 0x2, 0x0, &(0x7f00000007c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 10:38:58 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$nfs4(&(0x7f0000000000)='nfs4\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001240)='vmnet0system\xe9nodevbdevprocmd5sum\x00') 10:38:59 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="ca85"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, 0x0}], 0xaaaaafe, 0x0, 0x0, 0xffffffffffffffdd) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000080)={0x102000, 0x2, 0x0, 0x10001, 0x36490720}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) sendmsg$NET_DM_CMD_START(r0, 0x0, 0x40000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) 10:38:59 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000fffffffffffff00000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:38:59 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) r1 = dup2(r0, r0) write$tun(r1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 10:38:59 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$nfs4(&(0x7f0000000000)='nfs4\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001240)='vmnet0system\xe9nodevbdevprocmd5sum\x00') 10:38:59 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) r1 = dup2(r0, r0) write$tun(r1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 10:38:59 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000880)="b2c109a663d55e58a50a4c7957e4", 0x0}, 0x28) 10:38:59 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000000000100ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:38:59 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$nfs4(&(0x7f0000000000)='nfs4\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001240)='vmnet0system\xe9nodevbdevprocmd5sum\x00') 10:38:59 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x8}}}}}}, 0x0) 10:38:59 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) r1 = dup2(r0, r0) write$tun(r1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 10:38:59 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000000000200ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:38:59 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) r1 = dup2(r0, r0) write$tun(r1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 10:39:00 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="ca85"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, 0x0}], 0xaaaaafe, 0x0, 0x0, 0xffffffffffffffdd) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000080)={0x102000, 0x2, 0x0, 0x10001, 0x36490720}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) sendmsg$NET_DM_CMD_START(r0, 0x0, 0x40000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) 10:39:00 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x8}}}}}}, 0x0) 10:39:00 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f00000001c0)={[{0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}]}) 10:39:00 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000000000300ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='nodots,usefree,flush']) 10:39:00 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x8}}}}}}, 0x0) [ 2541.479577][T25133] pit: kvm: requested 2514 ns i8254 timer period limited to 200000 ns 10:39:00 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000000000500ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) [ 2541.557790][T25144] FAT-fs (loop1): bogus number of reserved sectors 10:39:00 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f00000028c0)=[{{&(0x7f0000000000)=@in={0x2, 0x4e22, @remote}, 0x80, 0x0}}, {{&(0x7f0000001440)=@ethernet={0x0, @remote}, 0x80, 0x0}}], 0x2, 0x0) [ 2541.603010][T25144] FAT-fs (loop1): Can't find a valid FAT filesystem [ 2541.714087][T25152] FAT-fs (loop1): bogus number of reserved sectors [ 2541.744319][T25152] FAT-fs (loop1): Can't find a valid FAT filesystem 10:39:00 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f00000001c0)={[{0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}]}) 10:39:00 executing program 3: socketpair$unix(0x1, 0x900000000001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x4108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() tkill(r1, 0xa) 10:39:00 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x8}}}}}}, 0x0) 10:39:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='nodots,usefree,flush']) 10:39:00 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="ca85"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, 0x0}], 0xaaaaafe, 0x0, 0x0, 0xffffffffffffffdd) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000080)={0x102000, 0x2, 0x0, 0x10001, 0x36490720}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) sendmsg$NET_DM_CMD_START(r0, 0x0, 0x40000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) 10:39:00 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000000000600ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='status\x00') process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) preadv(r1, &(0x7f00000013c0), 0x1e3, 0x0) 10:39:00 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000300)={0x0, 0x1, 0x0, "0823121bee284398dd527bb0fcc31c8b16561c1d5d1384ada921def9abbc0771"}) [ 2542.116896][T25169] FAT-fs (loop1): bogus number of reserved sectors [ 2542.150278][T25169] FAT-fs (loop1): Can't find a valid FAT filesystem [ 2542.153320][T25162] pit: kvm: requested 2514 ns i8254 timer period limited to 200000 ns 10:39:01 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000000000700ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:01 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f00000001c0)={[{0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}]}) 10:39:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='nodots,usefree,flush']) 10:39:01 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000300)={0x0, 0x1, 0x0, "0823121bee284398dd527bb0fcc31c8b16561c1d5d1384ada921def9abbc0771"}) 10:39:01 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000000000800ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) [ 2542.664323][T25200] FAT-fs (loop1): bogus number of reserved sectors [ 2542.684200][T25197] pit: kvm: requested 2514 ns i8254 timer period limited to 200000 ns [ 2542.690936][T25200] FAT-fs (loop1): Can't find a valid FAT filesystem 10:39:01 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000300)={0x0, 0x1, 0x0, "0823121bee284398dd527bb0fcc31c8b16561c1d5d1384ada921def9abbc0771"}) 10:39:01 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000000060800ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='nodots,usefree,flush']) 10:39:01 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="ca85"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, 0x0}], 0xaaaaafe, 0x0, 0x0, 0xffffffffffffffdd) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000080)={0x102000, 0x2, 0x0, 0x10001, 0x36490720}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) sendmsg$NET_DM_CMD_START(r0, 0x0, 0x40000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) 10:39:01 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000540)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000140)={"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"}) ioctl$KVM_SET_IRQCHIP(r2, 0x4020aea5, &(0x7f0000000a40)={0xfffffffffffffff9, 0x0, @ioapic}) 10:39:01 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f00000001c0)={[{0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}]}) 10:39:01 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000300)={0x0, 0x1, 0x0, "0823121bee284398dd527bb0fcc31c8b16561c1d5d1384ada921def9abbc0771"}) [ 2543.121134][T25216] FAT-fs (loop1): bogus number of reserved sectors 10:39:01 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000000000b00ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) [ 2543.171732][T25216] FAT-fs (loop1): Can't find a valid FAT filesystem 10:39:02 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev}}, 0x80) 10:39:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000540)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000140)={"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"}) ioctl$KVM_SET_IRQCHIP(r2, 0x4020aea5, &(0x7f0000000a40)={0xfffffffffffffff9, 0x0, @ioapic}) 10:39:02 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000000000d00ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:02 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) syz_emit_ethernet(0x207843, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300002, 0x0, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0x3e}, {[], @icmpv6=@time_exceed={0xffffff83, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) readv(r0, &(0x7f0000000640)=[{&(0x7f0000000080)=""/194, 0xc2}], 0x1) poll(&(0x7f0000000380)=[{r0}], 0x1, 0x0) 10:39:02 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000280)='/dev/dsp#\x00', 0xb, 0x80002) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$int_in(r0, 0x80006080045017, &(0x7f00000000c0)) 10:39:02 executing program 5: futex(&(0x7f000000cffc)=0x1, 0x8b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0x8c, 0x1, 0x0, &(0x7f0000048000)=0x1, 0x0) 10:39:02 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000000002800ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000421, 0x1) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x2000000000011, r0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x891a, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) 10:39:02 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000040)={0x10200, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000480)={0x0, 0x0, 0x13001, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="8c0b000000080009"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000)=0x9, 0x8f7a99bbe5b13b0f) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:39:02 executing program 1: bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x3fa, 0x10000}) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9e6f, 0x0, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x51000, 0x4, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xc1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, 0x0, 0x0) [ 2543.898267][T25250] kvm: apic: phys broadcast and lowest prio 10:39:02 executing program 3: r0 = perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r0, 0x0) 10:39:02 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000000003a00ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000540)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000140)={"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"}) ioctl$KVM_SET_IRQCHIP(r2, 0x4020aea5, &(0x7f0000000a40)={0xfffffffffffffff9, 0x0, @ioapic}) 10:39:02 executing program 4: setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000040)="441f0800000000009727c1c6fe76cef3e26def230002", 0x16) sched_setaffinity(0x0, 0xfffffffffffffe68, &(0x7f0000000140)=0x9) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PPPIOCSMAXCID(r1, 0x40047451, &(0x7f0000000280)=0x300) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)=0x0) ptrace$getenv(0x4201, r4, 0x5, &(0x7f0000000200)) preadv(r3, &(0x7f0000000100), 0x2df, 0x0) syz_genetlink_get_family_id$team(0x0) getsockopt$packet_int(r3, 0x107, 0x0, 0x0, &(0x7f0000000180)) ioctl$VIDIOC_DQEVENT(0xffffffffffffffff, 0x80885659, 0x0) mkdir(0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x800000000105082) r6 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r6, 0x0, 0x0, 0x81005) sendfile(r5, r5, 0x0, 0x10200000e) lsetxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) 10:39:02 executing program 1: bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x3fa, 0x10000}) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9e6f, 0x0, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x51000, 0x4, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xc1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, 0x0, 0x0) 10:39:03 executing program 3: r0 = perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r0, 0x0) 10:39:03 executing program 5: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0x5, 0x0, 0x0) 10:39:03 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000000003f00ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) [ 2544.548062][T25284] kvm: apic: phys broadcast and lowest prio 10:39:03 executing program 3: r0 = perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r0, 0x0) 10:39:03 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000000004000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000540)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000140)={"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"}) ioctl$KVM_SET_IRQCHIP(r2, 0x4020aea5, &(0x7f0000000a40)={0xfffffffffffffff9, 0x0, @ioapic}) 10:39:03 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000240)=@framed={{0xffffffb4, 0x6c00000000000000, 0x0, 0x0, 0x0, 0x72, 0xa, 0xff00}}, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0xc3, &(0x7f0000000000)=""/195, 0x0, 0x0, [0x0, 0x6c000000]}, 0x48) 10:39:03 executing program 4: setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000040)="441f0800000000009727c1c6fe76cef3e26def230002", 0x16) sched_setaffinity(0x0, 0xfffffffffffffe68, &(0x7f0000000140)=0x9) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PPPIOCSMAXCID(r1, 0x40047451, &(0x7f0000000280)=0x300) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)=0x0) ptrace$getenv(0x4201, r4, 0x5, &(0x7f0000000200)) preadv(r3, &(0x7f0000000100), 0x2df, 0x0) syz_genetlink_get_family_id$team(0x0) getsockopt$packet_int(r3, 0x107, 0x0, 0x0, &(0x7f0000000180)) ioctl$VIDIOC_DQEVENT(0xffffffffffffffff, 0x80885659, 0x0) mkdir(0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x800000000105082) r6 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r6, 0x0, 0x0, 0x81005) sendfile(r5, r5, 0x0, 0x10200000e) lsetxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) 10:39:03 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000000054300ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:03 executing program 1: bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x3fa, 0x10000}) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9e6f, 0x0, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x51000, 0x4, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xc1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, 0x0, 0x0) 10:39:03 executing program 3: r0 = perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r0, 0x0) 10:39:03 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000000006000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:03 executing program 5: setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000040)="441f0800000000009727c1c6fe76cef3e26def230002", 0x16) sched_setaffinity(0x0, 0xfffffffffffffe68, &(0x7f0000000140)=0x9) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PPPIOCSMAXCID(r1, 0x40047451, &(0x7f0000000280)=0x300) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)=0x0) ptrace$getenv(0x4201, r4, 0x5, &(0x7f0000000200)) preadv(r3, &(0x7f0000000100), 0x2df, 0x0) syz_genetlink_get_family_id$team(0x0) getsockopt$packet_int(r3, 0x107, 0x0, 0x0, &(0x7f0000000180)) ioctl$VIDIOC_DQEVENT(0xffffffffffffffff, 0x80885659, 0x0) mkdir(0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x800000000105082) r6 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r6, 0x0, 0x0, 0x81005) sendfile(r5, r5, 0x0, 0x10200000e) lsetxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) [ 2545.226106][ C0] net_ratelimit: 6 callbacks suppressed [ 2545.226115][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2545.226278][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2545.231743][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2545.249039][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2545.254951][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2545.260785][ C1] protocol 88fb is buggy, dev hsr_slave_1 10:39:04 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a0009000100021d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 10:39:04 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='oom_score_adj\x00') write$cgroup_pid(r0, 0x0, 0x2fc) 10:39:04 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a00000000000000000e8000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) [ 2545.439311][T25340] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 10:39:04 executing program 4: setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000040)="441f0800000000009727c1c6fe76cef3e26def230002", 0x16) sched_setaffinity(0x0, 0xfffffffffffffe68, &(0x7f0000000140)=0x9) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PPPIOCSMAXCID(r1, 0x40047451, &(0x7f0000000280)=0x300) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)=0x0) ptrace$getenv(0x4201, r4, 0x5, &(0x7f0000000200)) preadv(r3, &(0x7f0000000100), 0x2df, 0x0) syz_genetlink_get_family_id$team(0x0) getsockopt$packet_int(r3, 0x107, 0x0, 0x0, &(0x7f0000000180)) ioctl$VIDIOC_DQEVENT(0xffffffffffffffff, 0x80885659, 0x0) mkdir(0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x800000000105082) r6 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r6, 0x0, 0x0, 0x81005) sendfile(r5, r5, 0x0, 0x10200000e) lsetxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) 10:39:04 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a0009000100021d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 10:39:04 executing program 1: bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x3fa, 0x10000}) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9e6f, 0x0, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x51000, 0x4, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xc1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, 0x0, 0x0) 10:39:04 executing program 3: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@statfs_percent={'statfs_percent', 0x3d, 0x100000001}}]}) 10:39:04 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000000358000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) [ 2545.773216][T25357] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 10:39:04 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a0009000100021d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 10:39:04 executing program 5: setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000040)="441f0800000000009727c1c6fe76cef3e26def230002", 0x16) sched_setaffinity(0x0, 0xfffffffffffffe68, &(0x7f0000000140)=0x9) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PPPIOCSMAXCID(r1, 0x40047451, &(0x7f0000000280)=0x300) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)=0x0) ptrace$getenv(0x4201, r4, 0x5, &(0x7f0000000200)) preadv(r3, &(0x7f0000000100), 0x2df, 0x0) syz_genetlink_get_family_id$team(0x0) getsockopt$packet_int(r3, 0x107, 0x0, 0x0, &(0x7f0000000180)) ioctl$VIDIOC_DQEVENT(0xffffffffffffffff, 0x80885659, 0x0) mkdir(0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x800000000105082) r6 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r6, 0x0, 0x0, 0x81005) sendfile(r5, r5, 0x0, 0x10200000e) lsetxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) 10:39:04 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="4138cb101c6e2c841ab39d5efadca8dc", 0x10) dup2(r1, r0) 10:39:04 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000000008100ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) [ 2546.102478][T25373] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 10:39:05 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a0009000100021d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 10:39:05 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a000000000000ffffdd8600ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:05 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="4138cb101c6e2c841ab39d5efadca8dc", 0x10) dup2(r1, r0) 10:39:05 executing program 4: setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000040)="441f0800000000009727c1c6fe76cef3e26def230002", 0x16) sched_setaffinity(0x0, 0xfffffffffffffe68, &(0x7f0000000140)=0x9) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PPPIOCSMAXCID(r1, 0x40047451, &(0x7f0000000280)=0x300) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)=0x0) ptrace$getenv(0x4201, r4, 0x5, &(0x7f0000000200)) preadv(r3, &(0x7f0000000100), 0x2df, 0x0) syz_genetlink_get_family_id$team(0x0) getsockopt$packet_int(r3, 0x107, 0x0, 0x0, &(0x7f0000000180)) ioctl$VIDIOC_DQEVENT(0xffffffffffffffff, 0x80885659, 0x0) mkdir(0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x800000000105082) r6 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r6, 0x0, 0x0, 0x81005) sendfile(r5, r5, 0x0, 0x10200000e) lsetxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) 10:39:05 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x2a, &(0x7f00000004c0)=0xfffffffffffffffe, &(0x7f0000000000)=0x2) syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x10000) [ 2546.493593][T25392] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 10:39:05 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000000478800ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, 0x0, 0x0) close(r2) ppoll(&(0x7f0000000540)=[{r3}, {r1}], 0x2, 0x0, 0x0, 0x0) 10:39:05 executing program 5: setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000040)="441f0800000000009727c1c6fe76cef3e26def230002", 0x16) sched_setaffinity(0x0, 0xfffffffffffffe68, &(0x7f0000000140)=0x9) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PPPIOCSMAXCID(r1, 0x40047451, &(0x7f0000000280)=0x300) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)=0x0) ptrace$getenv(0x4201, r4, 0x5, &(0x7f0000000200)) preadv(r3, &(0x7f0000000100), 0x2df, 0x0) syz_genetlink_get_family_id$team(0x0) getsockopt$packet_int(r3, 0x107, 0x0, 0x0, &(0x7f0000000180)) ioctl$VIDIOC_DQEVENT(0xffffffffffffffff, 0x80885659, 0x0) mkdir(0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x800000000105082) r6 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r6, 0x0, 0x0, 0x81005) sendfile(r5, r5, 0x0, 0x10200000e) lsetxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) 10:39:05 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="4138cb101c6e2c841ab39d5efadca8dc", 0x10) dup2(r1, r0) 10:39:05 executing program 2: syz_open_dev$cec(&(0x7f0000000300)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) pipe(&(0x7f0000000180)) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000280)) syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x8}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r0+30000000}, 0x0) 10:39:05 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000000488800ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:05 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="4138cb101c6e2c841ab39d5efadca8dc", 0x10) dup2(r1, r0) 10:39:05 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x6a, &(0x7f0000000180)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x70}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x3, {0x10, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {}]}]}}}}}}}, 0x0) 10:39:06 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000000648800ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:06 executing program 3: socketpair$unix(0x1, 0x20000000003, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'bridge0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@bridge_delneigh={0x1c, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2}}, 0x1c}}, 0x0) 10:39:06 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x2a, &(0x7f00000004c0)=0xfffffffffffffffe, &(0x7f0000000000)=0x2) syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x10000) 10:39:06 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0xd, 0x0, &(0x7f0000001140)=0x700) 10:39:06 executing program 4: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000300)="390000001300030468fe0704000000000000ff3f06000000450001070005001419001a0015000a00050008000300000800025d14a4e91ee438", 0x39}], 0x1) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000100), 0x0) 10:39:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x18}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) 10:39:06 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a000000000000ffffa88800ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) [ 2547.642105][T25450] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2547.663598][T25450] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2547.728471][T25450] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2547.769478][T25450] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.4'. 10:39:06 executing program 4: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000300)="390000001300030468fe0704000000000000ff3f06000000450001070005001419001a0015000a00050008000300000800025d14a4e91ee438", 0x39}], 0x1) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000100), 0x0) 10:39:06 executing program 2: syz_open_dev$cec(&(0x7f0000000300)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) pipe(&(0x7f0000000180)) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000280)) syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x8}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r0+30000000}, 0x0) 10:39:06 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000006c0)={{}, {}, [{}], {}, [], {}, {0x20, 0x4}}, 0x2c, 0x1) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000480)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) request_key(0x0, &(0x7f0000000380)={'syz'}, 0x0, 0xfffffffffffffff8) mount$overlay(0x400007, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 10:39:06 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a000000000000ffffca8800ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:06 executing program 3: getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000300), &(0x7f0000000400)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000380)=0x14) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000040)=0x5) openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x140202, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x400) r1 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r1, 0xffffffffffffffff) [ 2548.249346][T25468] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.4'. 10:39:07 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000000068900ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) [ 2548.322541][T25468] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2548.357950][T25472] overlayfs: conflicting lowerdir path [ 2548.452682][T25479] overlayfs: workdir and upperdir must reside under the same mount 10:39:07 executing program 4: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000300)="390000001300030468fe0704000000000000ff3f06000000450001070005001419001a0015000a00050008000300000800025d14a4e91ee438", 0x39}], 0x1) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000100), 0x0) 10:39:07 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x2a, &(0x7f00000004c0)=0xfffffffffffffffe, &(0x7f0000000000)=0x2) syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x10000) 10:39:07 executing program 2: syz_open_dev$cec(&(0x7f0000000300)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) pipe(&(0x7f0000000180)) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000280)) syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x8}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r0+30000000}, 0x0) 10:39:07 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000006c0)={{}, {}, [{}], {}, [], {}, {0x20, 0x4}}, 0x2c, 0x1) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000480)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) request_key(0x0, &(0x7f0000000380)={'syz'}, 0x0, 0xfffffffffffffff8) mount$overlay(0x400007, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 10:39:07 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a000000000000ffffff8d00ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:07 executing program 3: getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000300), &(0x7f0000000400)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000380)=0x14) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000040)=0x5) openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x140202, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x400) r1 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r1, 0xffffffffffffffff) 10:39:07 executing program 4: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000300)="390000001300030468fe0704000000000000ff3f06000000450001070005001419001a0015000a00050008000300000800025d14a4e91ee438", 0x39}], 0x1) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000100), 0x0) 10:39:07 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'ip_vti0\x00', &(0x7f0000000080)=@ethtool_sset_info={0x37, 0x0, 0xee8}}) 10:39:08 executing program 3: getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000300), &(0x7f0000000400)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000380)=0x14) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000040)=0x5) openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x140202, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x400) r1 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r1, 0xffffffffffffffff) 10:39:08 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a000000000000fffffff500ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:08 executing program 4: pipe(&(0x7f0000002d40)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[@ANYRES16], 0xffffff88) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) splice(r1, 0x0, r0, 0x0, 0x7, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") 10:39:08 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a000000000000000000ff00ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:08 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000006c0)={{}, {}, [{}], {}, [], {}, {0x20, 0x4}}, 0x2c, 0x1) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000480)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) request_key(0x0, &(0x7f0000000380)={'syz'}, 0x0, 0xfffffffffffffff8) mount$overlay(0x400007, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 10:39:08 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x2a, &(0x7f00000004c0)=0xfffffffffffffffe, &(0x7f0000000000)=0x2) syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x10000) 10:39:08 executing program 2: syz_open_dev$cec(&(0x7f0000000300)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) pipe(&(0x7f0000000180)) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000280)) syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x8}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r0+30000000}, 0x0) 10:39:08 executing program 3: getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000300), &(0x7f0000000400)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000380)=0x14) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000040)=0x5) openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x140202, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x400) r1 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r1, 0xffffffffffffffff) 10:39:08 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000008000a0ffffffff00ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:08 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000001a0ffffffff00ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) [ 2550.065440][T25529] overlayfs: workdir and upperdir must reside under the same mount 10:39:08 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000006c0)={{}, {}, [{}], {}, [], {}, {0x20, 0x4}}, 0x2c, 0x1) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000480)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) request_key(0x0, &(0x7f0000000380)={'syz'}, 0x0, 0xfffffffffffffff8) mount$overlay(0x400007, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 10:39:08 executing program 3: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000) 10:39:09 executing program 2: r0 = semget$private(0x0, 0x7, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0x15}], 0x1) semop(r0, &(0x7f00000004c0)=[{}], 0x1) semctl$IPC_RMID(r0, 0x0, 0x0) 10:39:09 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a000000f0ffffffffffff00ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) [ 2550.513309][T25550] overlayfs: conflicting lowerdir path 10:39:09 executing program 4: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = epoll_create(0xe) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)) epoll_wait(r2, &(0x7f0000000080)=[{}], 0x1, 0x1ff) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:39:09 executing program 3: syz_emit_ethernet(0x2a, &(0x7f0000000080)={@broadcast, @remote, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x73, 0x0, @initdev, @local}, @igmp}}}}, 0x0) 10:39:09 executing program 2: syz_open_procfs(0x0, 0x0) mlockall(0x400000003) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 10:39:10 executing program 5: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, 0x1c) 10:39:10 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000200000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:10 executing program 3: syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xfe\x17\x10n\xa6\x96!\xda\x8d\xce\xe8\xc1\xf6\"\xcb@P]n\x86\xfcu\xe9\x1a\xd7.\xa7\x12\xa5f\xf5wf\xdd\xbb_!\tb\x96\xcb\xae\x8e\xb0\xcf3\x89|h.\xcc\a\xda\x94\xdd\x88\x1e\xa5\x8a\x97\xec?\xd9+\xe9\xced]\x9a\xd2\xbd\xf7\r\x17\xa2\xb4{\xdd\xd7\xb1\v\xf9\x1a,\xf2f\xcd\xfd\xbba') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 10:39:10 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd2(0x0, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000000)={0x0, 0x0, 0x2, r2, 0x3}) 10:39:10 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x6, 0x4, 0x338d, 0x5}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r0, &(0x7f0000000140), &(0x7f00000001c0)=""/182}, 0x18) 10:39:10 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000300000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:10 executing program 5: mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) sendmmsg(r0, &(0x7f0000000000), 0x40000000000018e, 0x0) 10:39:10 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0x40a85321, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00'}) 10:39:10 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x6, 0x4, 0x338d, 0x5}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r0, &(0x7f0000000140), &(0x7f00000001c0)=""/182}, 0x18) 10:39:10 executing program 4: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = epoll_create(0xe) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)) epoll_wait(r2, &(0x7f0000000080)=[{}], 0x1, 0x1ff) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:39:10 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000500000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:11 executing program 2: syz_open_procfs(0x0, 0x0) mlockall(0x400000003) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 10:39:11 executing program 5: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = epoll_create(0xe) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)) epoll_wait(r2, &(0x7f0000000080)=[{}], 0x1, 0x1ff) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:39:11 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0x40a85321, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00'}) 10:39:11 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x6, 0x4, 0x338d, 0x5}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r0, &(0x7f0000000140), &(0x7f00000001c0)=""/182}, 0x18) 10:39:11 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000600000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:11 executing program 4: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = epoll_create(0xe) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)) epoll_wait(r2, &(0x7f0000000080)=[{}], 0x1, 0x1ff) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:39:11 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000700000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:11 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0x40a85321, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00'}) 10:39:11 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x6, 0x4, 0x338d, 0x5}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r0, &(0x7f0000000140), &(0x7f00000001c0)=""/182}, 0x18) 10:39:11 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000800000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:11 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0x40a85321, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00'}) 10:39:12 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000b00000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:12 executing program 2: syz_open_procfs(0x0, 0x0) mlockall(0x400000003) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 10:39:12 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000d00000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:12 executing program 5: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = epoll_create(0xe) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)) epoll_wait(r2, &(0x7f0000000080)=[{}], 0x1, 0x1ff) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:39:12 executing program 4: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = epoll_create(0xe) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)) epoll_wait(r2, &(0x7f0000000080)=[{}], 0x1, 0x1ff) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:39:12 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000002800000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:13 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000003a00000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:13 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000006000000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:13 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a000000f000000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:13 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a000000a001000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:13 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000003000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:13 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000005000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:13 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000004305000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:14 executing program 2: syz_open_procfs(0x0, 0x0) mlockall(0x400000003) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 10:39:14 executing program 5: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = epoll_create(0xe) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)) epoll_wait(r2, &(0x7f0000000080)=[{}], 0x1, 0x1ff) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:39:14 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000006000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:14 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000806000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:14 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000008906000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:14 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000007000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:14 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000608000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:14 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a000000000b000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:14 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a000000000d000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:15 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a000000800e000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:15 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000028000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:15 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000008035000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:15 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a000000003a000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:15 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a000000003f000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:15 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000040000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:15 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000543000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:15 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000008847000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:15 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000008848000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:15 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000060000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:15 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000008864000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:15 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000e80000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:15 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000003580000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:15 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000081000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:15 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000004788000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:15 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000004888000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:15 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000006488000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:15 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000689000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:15 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a00000000f0000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:15 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a00000000ff000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:15 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a000000a000800000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:15 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a000000fffff00000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:16 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000100000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:16 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000200000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:16 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000300000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:16 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000500000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:16 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000600000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:16 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000700000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:16 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000800000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:16 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000060800000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:16 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000b00000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:16 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000d00000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:16 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000002800000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:16 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000003a00000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:16 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000003f00000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:16 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000004000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:16 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000054300000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:16 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000006000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:16 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a00000000000e8000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:16 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000358000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:16 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000008100000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:16 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a000000ffffdd8600000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:16 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000478800000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:16 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000488800000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:16 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000648800000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:16 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a000000ffffa88800000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:16 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a000000ffffca8800000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:16 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000068900000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:16 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vfio/vfio\x00', 0x400040, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x4000004000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x81, 0x349, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x1, 0x0) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000000000)=""/19) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(0xffffffffffffffff, 0x810c5701, 0x0) connect$rxrpc(r0, &(0x7f00000003c0)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e22, @loopback}}, 0x24) clock_gettime(0x0, 0x0) getgroups(0x1, &(0x7f0000000040)=[0xffffffffffffffff]) fgetxattr(r0, &(0x7f0000000200)=@random={'security.', 'proc\'em1:.keyring*user\'.\x00'}, &(0x7f0000000800)=""/4096, 0x1000) syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0x80) setregid(0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x39, 0x0) r2 = socket$inet(0x10, 0x2000000000000002, 0x0) sendmsg(r2, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000780)="2f0000001c0005c5ffffff000d000c000200001f01000000fc0002c9130001000300000050000000586700a286ef1e6dd4bcd963b36241e8a75954c8078a3f9644fbabccf7574870a0745e1e5851d39e491cdb29200f29a365f5e23bfb31a092da746544ed6585a0e7f16491", 0x6c}], 0x1, 0x0, 0x0, 0xfffffffc}, 0x0) r3 = shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x4000) shmdt(r3) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) bind$vsock_stream(r1, &(0x7f0000000080)={0x28, 0x0, 0xaa55bedb70530215, @my=0x0}, 0x10) 10:39:16 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000f00fb8)={0xb, 0x5, &(0x7f0000b0afd8)=ANY=[@ANYBLOB="1800000000000000000000000080000018000000", @ANYRES32, @ANYBLOB="00000000000000009500000000000000"], &(0x7f0000fe9000)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000e18000)=""/4096}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f0000000140), 0x0}, 0x18) 10:39:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000000)={'IDLETIMER\x00'}, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) perf_event_open(0x0, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) msgget(0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$int_in(r0, 0x5452, &(0x7f0000000280)=0x5) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 10:39:16 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x0, @dev}, 0x4}}, 0x26) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x32) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r2, 0x111, 0x5, 0x20401040, 0x4) 10:39:16 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x11f9, 0x10401000001) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000180), 0x5}], 0x100000000000002f, 0x0) 10:39:16 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a000000ffffff8d00000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:17 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x0, @dev}, 0x4}}, 0x26) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x32) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r2, 0x111, 0x5, 0x20401040, 0x4) 10:39:17 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000080)="150300000600400000000200850cf7c21975e697080000026b2a2fcddad8897c6f11876d886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a0", 0xac, 0x0, 0x0, 0x0) 10:39:17 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_CLEAR_QUE(r0, 0x125f) 10:39:17 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x0, @dev}, 0x4}}, 0x26) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x32) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r2, 0x111, 0x5, 0x20401040, 0x4) 10:39:17 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a000000008000a000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:17 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) 10:39:17 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vfio/vfio\x00', 0x400040, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x4000004000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x81, 0x349, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x1, 0x0) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000000000)=""/19) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(0xffffffffffffffff, 0x810c5701, 0x0) connect$rxrpc(r0, &(0x7f00000003c0)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e22, @loopback}}, 0x24) clock_gettime(0x0, 0x0) getgroups(0x1, &(0x7f0000000040)=[0xffffffffffffffff]) fgetxattr(r0, &(0x7f0000000200)=@random={'security.', 'proc\'em1:.keyring*user\'.\x00'}, &(0x7f0000000800)=""/4096, 0x1000) syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0x80) setregid(0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x39, 0x0) r2 = socket$inet(0x10, 0x2000000000000002, 0x0) sendmsg(r2, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000780)="2f0000001c0005c5ffffff000d000c000200001f01000000fc0002c9130001000300000050000000586700a286ef1e6dd4bcd963b36241e8a75954c8078a3f9644fbabccf7574870a0745e1e5851d39e491cdb29200f29a365f5e23bfb31a092da746544ed6585a0e7f16491", 0x6c}], 0x1, 0x0, 0x0, 0xfffffffc}, 0x0) r3 = shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x4000) shmdt(r3) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) bind$vsock_stream(r1, &(0x7f0000000080)={0x28, 0x0, 0xaa55bedb70530215, @my=0x0}, 0x10) 10:39:17 executing program 3: syz_emit_ethernet(0x46, &(0x7f0000000000)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "c22df7", 0x10, 0x21, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x3800000000000000]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}, {[], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x3, 0x2, 0x0, "0087ae", 0x0, "ca8345"}}}}}}}, 0x0) 10:39:17 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000640)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\xe3\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\x00\x87\xac\xad\x80\xa3P\x8c\xea\x17f%;\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80\x1d\x95WM\x9a\xc6\x95\x98\xed\xe9\xca\x9e\xe6\xcb\x8e\xef\xf659-\xef\xb5\xc9\xf2\"\x15\xb39T\x81\x19\xcc\xcd\xb5\r\x10G\x16(~\x15\xd1\xde\x9e\xb1s\xa0\x864hb\xaa\xa3\x18V\x17xE\xbd\xc2QD\xa5P\x0f\x8e\x1f\x888\xb6\xee\xc6N\xd2\x136\xeb\xa4\x1d\xaap\xc6\x9e\xdc\x007h\f\x96g\"_\xb1\x1b\xdb\x86\xc6\xc9\xb1\xcc\xa1\x9f\xd8h\xcc\x12\xf1k\xe8\x86:D\xd2\xd1\x02I\xfe\x96t\xe5C\x86)\xf0M\xc4\xa35\xcc\x9b\x9e\xbb5\x18[\x958D\\~3\xcaO\x97M\xaf\x930\xfd\x13\xa3\xde\xce0\x1d5I\xba\xc5;T\xdc\xaf\xc8\xa6\n\x92\x0e6>\x19*') r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed\x19*') r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) dup3(r2, r3, 0x0) 10:39:19 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a00000088caffff00000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:19 executing program 4: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mlockall(0x1) madvise(&(0x7f00001d8000/0x2000)=nil, 0x2000, 0xa) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 10:39:19 executing program 1: r0 = socket$inet6(0xa, 0x4000000080002, 0x88) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x2, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40001ab, 0x9400) [ 2560.913263][T25920] device nr0 entered promiscuous mode 10:39:19 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000640)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\xe3\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\x00\x87\xac\xad\x80\xa3P\x8c\xea\x17f%;\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80\x1d\x95WM\x9a\xc6\x95\x98\xed\xe9\xca\x9e\xe6\xcb\x8e\xef\xf659-\xef\xb5\xc9\xf2\"\x15\xb39T\x81\x19\xcc\xcd\xb5\r\x10G\x16(~\x15\xd1\xde\x9e\xb1s\xa0\x864hb\xaa\xa3\x18V\x17xE\xbd\xc2QD\xa5P\x0f\x8e\x1f\x888\xb6\xee\xc6N\xd2\x136\xeb\xa4\x1d\xaap\xc6\x9e\xdc\x007h\f\x96g\"_\xb1\x1b\xdb\x86\xc6\xc9\xb1\xcc\xa1\x9f\xd8h\xcc\x12\xf1k\xe8\x86:D\xd2\xd1\x02I\xfe\x96t\xe5C\x86)\xf0M\xc4\xa35\xcc\x9b\x9e\xbb5\x18[\x958D\\~3\xcaO\x97M\xaf\x930\xfd\x13\xa3\xde\xce0\x1d5I\xba\xc5;T\xdc\xaf\xc8\xa6\n\x92\x0e6>\x19*') r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) dup3(r2, r3, 0x0) 10:39:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000200)={0x84, @dev, 0x0, 0x0, 'lblc\x00', 0xa, 0x2, 0x7b}, 0x2c) [ 2563.115322][T25965] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xe01/0xee0 10:39:22 executing program 4: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mlockall(0x1) madvise(&(0x7f00001d8000/0x2000)=nil, 0x2000, 0xa) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 10:39:22 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a000000f5ffffff00000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:22 executing program 2: lsetxattr$security_selinux(0x0, &(0x7f0000000540)='security.selinux\x00', 0x0, 0x1e4, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000005c0)=[@sack_perm, @timestamp, @timestamp, @sack_perm, @sack_perm, @sack_perm, @window={0x3, 0x80000001}, @mss={0x2, 0x1}, @mss={0x2, 0x101}], 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap$perf(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80013, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) prlimit64(0x0, 0xb, &(0x7f00000001c0)={0x20}, &(0x7f0000000240)) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) 10:39:22 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000640)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\xe3\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\x00\x87\xac\xad\x80\xa3P\x8c\xea\x17f%;\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80\x1d\x95WM\x9a\xc6\x95\x98\xed\xe9\xca\x9e\xe6\xcb\x8e\xef\xf659-\xef\xb5\xc9\xf2\"\x15\xb39T\x81\x19\xcc\xcd\xb5\r\x10G\x16(~\x15\xd1\xde\x9e\xb1s\xa0\x864hb\xaa\xa3\x18V\x17xE\xbd\xc2QD\xa5P\x0f\x8e\x1f\x888\xb6\xee\xc6N\xd2\x136\xeb\xa4\x1d\xaap\xc6\x9e\xdc\x007h\f\x96g\"_\xb1\x1b\xdb\x86\xc6\xc9\xb1\xcc\xa1\x9f\xd8h\xcc\x12\xf1k\xe8\x86:D\xd2\xd1\x02I\xfe\x96t\xe5C\x86)\xf0M\xc4\xa35\xcc\x9b\x9e\xbb5\x18[\x958D\\~3\xcaO\x97M\xaf\x930\xfd\x13\xa3\xde\xce0\x1d5I\xba\xc5;T\xdc\xaf\xc8\xa6\n\x92\x0e6>\x19*') r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) dup3(r2, r3, 0x0) 10:39:24 executing program 5: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mlockall(0x1) madvise(&(0x7f00001d8000/0x2000)=nil, 0x2000, 0xa) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 10:39:24 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000000000002ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:24 executing program 4: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mlockall(0x1) madvise(&(0x7f00001d8000/0x2000)=nil, 0x2000, 0xa) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 10:39:24 executing program 2: lsetxattr$security_selinux(0x0, &(0x7f0000000540)='security.selinux\x00', 0x0, 0x1e4, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000005c0)=[@sack_perm, @timestamp, @timestamp, @sack_perm, @sack_perm, @sack_perm, @window={0x3, 0x80000001}, @mss={0x2, 0x1}, @mss={0x2, 0x101}], 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap$perf(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80013, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) prlimit64(0x0, 0xb, &(0x7f00000001c0)={0x20}, &(0x7f0000000240)) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) 10:39:24 executing program 1: lsetxattr$security_selinux(0x0, &(0x7f0000000540)='security.selinux\x00', 0x0, 0x1e4, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000005c0)=[@sack_perm, @timestamp, @timestamp, @sack_perm, @sack_perm, @sack_perm, @window={0x3, 0x80000001}, @mss={0x2, 0x1}, @mss={0x2, 0x101}], 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap$perf(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80013, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) prlimit64(0x0, 0xb, &(0x7f00000001c0)={0x20}, &(0x7f0000000240)) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) 10:39:24 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000000000003ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:24 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000000000005ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) [ 2565.865062][T26009] device nr0 entered promiscuous mode [ 2565.902129][T26001] netlink: 'syz-executor.1': attribute type 6 has an invalid length. 10:39:24 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000000000006ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:24 executing program 1: lsetxattr$security_selinux(0x0, &(0x7f0000000540)='security.selinux\x00', 0x0, 0x1e4, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000005c0)=[@sack_perm, @timestamp, @timestamp, @sack_perm, @sack_perm, @sack_perm, @window={0x3, 0x80000001}, @mss={0x2, 0x1}, @mss={0x2, 0x101}], 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap$perf(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80013, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) prlimit64(0x0, 0xb, &(0x7f00000001c0)={0x20}, &(0x7f0000000240)) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) 10:39:25 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000000000007ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:25 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000000000008ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:26 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) dup3(r2, r3, 0x0) 10:39:26 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000000000608ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:26 executing program 5: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mlockall(0x1) madvise(&(0x7f00001d8000/0x2000)=nil, 0x2000, 0xa) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 10:39:26 executing program 4: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mlockall(0x1) madvise(&(0x7f00001d8000/0x2000)=nil, 0x2000, 0xa) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) [ 2567.655175][T26030] IPVS: ftp: loaded support on port[0] = 21 [ 2568.003664][T26040] device nr0 entered promiscuous mode [ 2568.703599][T26030] chnl_net:caif_netlink_parms(): no params data found [ 2568.930608][T26030] bridge0: port 1(bridge_slave_0) entered blocking state [ 2568.986326][T26030] bridge0: port 1(bridge_slave_0) entered disabled state [ 2568.994594][T26030] device bridge_slave_0 entered promiscuous mode [ 2569.066554][T26030] bridge0: port 2(bridge_slave_1) entered blocking state [ 2569.073733][T26030] bridge0: port 2(bridge_slave_1) entered disabled state [ 2569.107561][T26030] device bridge_slave_1 entered promiscuous mode [ 2569.201048][T26030] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2569.225748][T26030] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2569.281542][T26030] team0: Port device team_slave_0 added [ 2569.308693][T26030] team0: Port device team_slave_1 added [ 2569.344367][T26030] device hsr_slave_0 entered promiscuous mode [ 2569.357231][T26030] device hsr_slave_1 entered promiscuous mode [ 2569.368221][T26030] debugfs: Directory 'hsr0' with parent '/' already present! [ 2569.492423][T26030] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2569.535319][T21056] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2569.563376][T21056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2569.572093][T21056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2569.586636][T26030] 8021q: adding VLAN 0 to HW filter on device team0 [ 2569.619953][ T4817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2569.640061][ T4817] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2569.649382][ T4817] bridge0: port 1(bridge_slave_0) entered blocking state [ 2569.656516][ T4817] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2569.676980][T21057] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2569.685106][T21057] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2569.695568][T21057] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2569.708923][T21057] bridge0: port 2(bridge_slave_1) entered blocking state [ 2569.716049][T21057] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2569.737477][T21057] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2569.746421][T21057] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2569.754789][T21057] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2569.763496][T21057] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2569.772701][T21057] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2569.783708][T26030] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2570.110009][T26030] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2570.522160][T26057] netlink: 'syz-executor.2': attribute type 6 has an invalid length. 10:39:29 executing program 2: lsetxattr$security_selinux(0x0, &(0x7f0000000540)='security.selinux\x00', 0x0, 0x1e4, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000005c0)=[@sack_perm, @timestamp, @timestamp, @sack_perm, @sack_perm, @sack_perm, @window={0x3, 0x80000001}, @mss={0x2, 0x1}, @mss={0x2, 0x101}], 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap$perf(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80013, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) prlimit64(0x0, 0xb, &(0x7f00000001c0)={0x20}, &(0x7f0000000240)) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) 10:39:29 executing program 1: lsetxattr$security_selinux(0x0, &(0x7f0000000540)='security.selinux\x00', 0x0, 0x1e4, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000005c0)=[@sack_perm, @timestamp, @timestamp, @sack_perm, @sack_perm, @sack_perm, @window={0x3, 0x80000001}, @mss={0x2, 0x1}, @mss={0x2, 0x101}], 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap$perf(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80013, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) prlimit64(0x0, 0xb, &(0x7f00000001c0)={0x20}, &(0x7f0000000240)) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) 10:39:29 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r2, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0x8}, {&(0x7f00000023c0)=""/49, 0x200023f1}, {&(0x7f0000003580)=""/4096, 0xc89d}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x30, 0x0, &(0x7f0000008000)={0x0, 0x989680}) 10:39:29 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a000000000000000000000bffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:29 executing program 5: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mlockall(0x1) madvise(&(0x7f00001d8000/0x2000)=nil, 0x2000, 0xa) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 10:39:29 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x10, &(0x7f0000000080)=[@in={0x2, 0x0, @remote}]}, &(0x7f0000000ec0)=0x10) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x7d, &(0x7f0000000140)=@sack_info={r1}, &(0x7f0000000100)=0x208) 10:39:29 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a000000000000000000000dffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:29 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x10, &(0x7f0000000080)=[@in={0x2, 0x0, @remote}]}, &(0x7f0000000ec0)=0x10) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x7d, &(0x7f0000000140)=@sack_info={r1}, &(0x7f0000000100)=0x208) 10:39:29 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000000000028ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:29 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x10, &(0x7f0000000080)=[@in={0x2, 0x0, @remote}]}, &(0x7f0000000ec0)=0x10) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x7d, &(0x7f0000000140)=@sack_info={r1}, &(0x7f0000000100)=0x208) 10:39:29 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a000000000000000000003affffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:30 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x10, &(0x7f0000000080)=[@in={0x2, 0x0, @remote}]}, &(0x7f0000000ec0)=0x10) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x7d, &(0x7f0000000140)=@sack_info={r1}, &(0x7f0000000100)=0x208) 10:39:30 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a000000000000000000003fffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) [ 2572.469600][T26090] IPVS: ftp: loaded support on port[0] = 21 [ 2572.845381][T26090] chnl_net:caif_netlink_parms(): no params data found [ 2573.035825][T26090] bridge0: port 1(bridge_slave_0) entered blocking state [ 2573.043103][T26090] bridge0: port 1(bridge_slave_0) entered disabled state [ 2573.051503][T26090] device bridge_slave_0 entered promiscuous mode [ 2573.059925][T26090] bridge0: port 2(bridge_slave_1) entered blocking state [ 2573.067327][T26090] bridge0: port 2(bridge_slave_1) entered disabled state [ 2573.075069][T26090] device bridge_slave_1 entered promiscuous mode [ 2573.083294][T24975] IPVS: stopping backup sync thread 3530 ... [ 2573.105472][T26090] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2573.123756][T26090] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2573.148685][T26090] team0: Port device team_slave_0 added [ 2573.156242][T26090] team0: Port device team_slave_1 added [ 2573.189852][T26090] device hsr_slave_0 entered promiscuous mode [ 2573.199587][T26090] device hsr_slave_1 entered promiscuous mode [ 2573.205841][T26090] debugfs: Directory 'hsr0' with parent '/' already present! [ 2573.228032][T26090] bridge0: port 2(bridge_slave_1) entered blocking state [ 2573.235130][T26090] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2573.242577][T26090] bridge0: port 1(bridge_slave_0) entered blocking state [ 2573.249739][T26090] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2573.303869][T26090] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2573.332563][ T4817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2573.340801][ T4817] bridge0: port 1(bridge_slave_0) entered disabled state [ 2573.350878][ T4817] bridge0: port 2(bridge_slave_1) entered disabled state [ 2573.359794][ T4817] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2573.373010][T26090] 8021q: adding VLAN 0 to HW filter on device team0 [ 2573.388946][T24975] device bridge_slave_1 left promiscuous mode [ 2573.395175][T24975] bridge0: port 2(bridge_slave_1) entered disabled state [ 2573.412712][T24975] device bridge_slave_0 left promiscuous mode [ 2573.419418][T24975] bridge0: port 1(bridge_slave_0) entered disabled state [ 2573.429782][T24975] device bridge_slave_1 left promiscuous mode [ 2573.435938][T24975] bridge0: port 2(bridge_slave_1) entered disabled state [ 2573.444216][T24975] device bridge_slave_0 left promiscuous mode [ 2573.450662][T24975] bridge0: port 1(bridge_slave_0) entered disabled state [ 2577.411693][T24975] bond8 (unregistering): Released all slaves [ 2577.423274][T24975] bond7 (unregistering): Released all slaves [ 2577.439424][T24975] bond6 (unregistering): Released all slaves [ 2577.453816][T24975] bond5 (unregistering): Released all slaves [ 2577.520328][T24975] bond4 (unregistering): Released all slaves [ 2577.532628][T24975] bond3 (unregistering): Released all slaves [ 2577.560044][T24975] bond2 (unregistering): Released all slaves [ 2577.572020][T24975] bond1 (unregistering): Released all slaves [ 2577.593831][T24975] device hsr_slave_0 left promiscuous mode [ 2577.600058][T24975] device hsr_slave_1 left promiscuous mode [ 2577.622544][T24975] team0 (unregistering): Port device team_slave_1 removed [ 2577.635376][T24975] team0 (unregistering): Port device team_slave_0 removed [ 2577.649984][T24975] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2577.664880][T24975] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2577.719217][T24975] bond0 (unregistering): Released all slaves [ 2577.810819][T24975] device hsr_slave_0 left promiscuous mode [ 2577.817266][T24975] device hsr_slave_1 left promiscuous mode [ 2577.836289][T24975] team0 (unregistering): Port device team_slave_1 removed [ 2577.849490][T24975] team0 (unregistering): Port device team_slave_0 removed [ 2577.860917][T24975] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2577.880630][T24975] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2577.936261][T24975] bond0 (unregistering): Released all slaves [ 2578.003549][T21056] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2578.011961][T21056] bridge0: port 1(bridge_slave_0) entered blocking state [ 2578.019069][T21056] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2578.028739][T21056] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2578.037338][T21056] bridge0: port 2(bridge_slave_1) entered blocking state [ 2578.044474][T21056] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2578.054847][T21056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2578.085184][ T8710] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2578.097073][ T8710] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2578.105586][ T8710] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2578.127266][ T8710] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2578.142929][ T8710] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2578.151663][ T8710] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2578.160750][ T8710] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2578.169302][ T8710] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2578.182531][T26090] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2578.196824][T26090] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2578.204858][ T4817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2578.213713][ T4817] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2578.239952][T26090] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2578.371489][T26099] netlink: 'syz-executor.1': attribute type 6 has an invalid length. 10:39:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca5055e0bcfe47bf070") pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x84a5, 0x10}) close(r3) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'lo\x00', 0x0}) bind$packet(r4, &(0x7f0000000040)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r4, 0x107, 0xf, &(0x7f0000000000)=0x5, 0x4) splice(r1, 0x0, r3, 0x0, 0x10003, 0x0) 10:39:37 executing program 3: timerfd_gettime(0xffffffffffffffff, &(0x7f00000004c0)) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x800010b, 0x18) shmat(0x0, &(0x7f0000ff0000/0x10000)=nil, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) 10:39:37 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000040)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x69, 0x10, 0x30}, [@ldst={0x6, 0x2, 0x6}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 10:39:37 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001700)={0x2, 0x0, [{0x0, 0xed, &(0x7f0000000440)=""/237}, {0x0, 0x3e, &(0x7f0000000100)=""/62}]}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000280)) 10:39:37 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000000000040ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:37 executing program 1: prlimit64(0x0, 0x0, &(0x7f00000001c0)={0x20}, 0x0) 10:39:37 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000000000543ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:37 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000040)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x69, 0x10, 0x30}, [@ldst={0x6, 0x2, 0x6}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 10:39:37 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000000000060ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:37 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000040)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x69, 0x10, 0x30}, [@ldst={0x6, 0x2, 0x6}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 10:39:37 executing program 3: timerfd_gettime(0xffffffffffffffff, &(0x7f00000004c0)) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x800010b, 0x18) shmat(0x0, &(0x7f0000ff0000/0x10000)=nil, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) 10:39:37 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000000000e80ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:38 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f00000004c0)) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x800010b, 0x18) shmat(0x0, &(0x7f0000ff0000/0x10000)=nil, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) 10:39:38 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000040)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x69, 0x10, 0x30}, [@ldst={0x6, 0x2, 0x6}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 10:39:38 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000000003580ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) [ 2580.305547][T26139] IPVS: ftp: loaded support on port[0] = 21 [ 2580.502163][T26139] chnl_net:caif_netlink_parms(): no params data found [ 2580.543516][T26139] bridge0: port 1(bridge_slave_0) entered blocking state [ 2580.550843][T26139] bridge0: port 1(bridge_slave_0) entered disabled state [ 2580.559089][T26139] device bridge_slave_0 entered promiscuous mode [ 2580.567222][T26139] bridge0: port 2(bridge_slave_1) entered blocking state [ 2580.574406][T26139] bridge0: port 2(bridge_slave_1) entered disabled state [ 2580.582703][T26139] device bridge_slave_1 entered promiscuous mode [ 2580.607359][T26139] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2580.618919][T26139] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2580.643104][T26139] team0: Port device team_slave_0 added [ 2580.652369][T26139] team0: Port device team_slave_1 added [ 2580.707960][T26139] device hsr_slave_0 entered promiscuous mode [ 2580.714465][T26139] device hsr_slave_1 entered promiscuous mode [ 2580.721093][T26139] debugfs: Directory 'hsr0' with parent '/' already present! [ 2580.821265][T26139] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2580.848284][T22419] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2580.857157][T22419] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2580.869157][T26139] 8021q: adding VLAN 0 to HW filter on device team0 [ 2580.882623][T22419] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2580.892084][T22419] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2580.916795][T22419] bridge0: port 1(bridge_slave_0) entered blocking state [ 2580.923883][T22419] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2580.946288][T22419] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2580.954453][T22419] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2580.964313][T22419] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2580.973347][T22419] bridge0: port 2(bridge_slave_1) entered blocking state [ 2580.980492][T22419] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2580.990968][T22419] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2581.000489][T22419] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2581.009927][T22419] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2581.019370][T22419] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2581.044707][T26139] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2581.057041][T26139] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2581.072601][ T8710] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2581.082251][ T8710] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2581.102905][ T8710] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2581.112813][ T8710] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2581.122150][ T8710] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2581.153873][T26139] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2581.172951][T22419] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 10:39:40 executing program 3: timerfd_gettime(0xffffffffffffffff, &(0x7f00000004c0)) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x800010b, 0x18) shmat(0x0, &(0x7f0000ff0000/0x10000)=nil, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) 10:39:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x2, 0x3, 0x19) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000140), 0x4) 10:39:40 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000000000081ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:40 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f00000004c0)) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x800010b, 0x18) shmat(0x0, &(0x7f0000ff0000/0x10000)=nil, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) 10:39:40 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x40000fffffb, 0xa02) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_PIT2(r0, 0x550b, 0x0) 10:39:40 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='io.max\x00', 0x2, 0x0) write$FUSE_OPEN(r1, &(0x7f0000000000)={0x20}, 0x20) 10:39:40 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a00000000000000ffffdd86ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:40 executing program 3: timerfd_gettime(0xffffffffffffffff, &(0x7f00000004c0)) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x800010b, 0x18) shmat(0x0, &(0x7f0000ff0000/0x10000)=nil, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) 10:39:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x2, 0x3, 0x19) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000140), 0x4) 10:39:40 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x13, 0xfffffffffffffffe, 0x179) 10:39:40 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f00000004c0)) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x800010b, 0x18) shmat(0x0, &(0x7f0000ff0000/0x10000)=nil, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) 10:39:40 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000000004788ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:40 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x13, 0xfffffffffffffffe, 0x179) 10:39:40 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000000004888ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:40 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f00000000c0)=0xc61, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) [ 2583.334107][T26200] IPVS: ftp: loaded support on port[0] = 21 [ 2583.745464][T26200] chnl_net:caif_netlink_parms(): no params data found [ 2583.933026][T26200] bridge0: port 1(bridge_slave_0) entered blocking state [ 2583.940321][T26200] bridge0: port 1(bridge_slave_0) entered disabled state [ 2583.948659][T26200] device bridge_slave_0 entered promiscuous mode [ 2583.956733][T26200] bridge0: port 2(bridge_slave_1) entered blocking state [ 2583.963989][T26200] bridge0: port 2(bridge_slave_1) entered disabled state [ 2583.972244][T26200] device bridge_slave_1 entered promiscuous mode [ 2583.995662][T26200] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2584.007370][T26200] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2584.176886][T26200] team0: Port device team_slave_0 added [ 2584.184559][T26200] team0: Port device team_slave_1 added [ 2584.208370][T26200] device hsr_slave_0 entered promiscuous mode [ 2584.215100][T26200] device hsr_slave_1 entered promiscuous mode [ 2584.222242][T26200] debugfs: Directory 'hsr0' with parent '/' already present! [ 2584.387109][T26200] bridge0: port 2(bridge_slave_1) entered blocking state [ 2584.394209][T26200] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2584.401671][T26200] bridge0: port 1(bridge_slave_0) entered blocking state [ 2584.408817][T26200] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2584.602481][T26200] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2584.616882][T21056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2584.625059][T21056] bridge0: port 1(bridge_slave_0) entered disabled state [ 2584.633326][T21056] bridge0: port 2(bridge_slave_1) entered disabled state [ 2584.642613][T21056] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2584.801387][T26200] 8021q: adding VLAN 0 to HW filter on device team0 [ 2584.817869][ T4739] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2584.827481][ T4739] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2584.836105][ T4739] bridge0: port 1(bridge_slave_0) entered blocking state [ 2584.843157][ T4739] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2584.852339][ T4739] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2584.862620][ T4739] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2584.873764][ T4739] bridge0: port 2(bridge_slave_1) entered blocking state [ 2584.882468][ T4739] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2584.897166][T24975] device bridge_slave_1 left promiscuous mode [ 2584.903384][T24975] bridge0: port 2(bridge_slave_1) entered disabled state [ 2584.912879][T24975] device bridge_slave_0 left promiscuous mode [ 2584.920624][T24975] bridge0: port 1(bridge_slave_0) entered disabled state [ 2584.930109][T24975] device bridge_slave_1 left promiscuous mode [ 2584.937780][T24975] bridge0: port 2(bridge_slave_1) entered disabled state [ 2584.945683][T24975] device bridge_slave_0 left promiscuous mode [ 2584.952520][T24975] bridge0: port 1(bridge_slave_0) entered disabled state [ 2588.972525][T24975] device hsr_slave_0 left promiscuous mode [ 2588.978597][T24975] device hsr_slave_1 left promiscuous mode [ 2588.998451][T24975] team0 (unregistering): Port device team_slave_1 removed [ 2589.012547][T24975] team0 (unregistering): Port device team_slave_0 removed [ 2589.025110][T24975] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2589.042062][T24975] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2589.095946][T24975] bond0 (unregistering): Released all slaves [ 2589.133144][T24975] device hsr_slave_0 left promiscuous mode [ 2589.139356][T24975] device hsr_slave_1 left promiscuous mode [ 2589.159000][T24975] team0 (unregistering): Port device team_slave_1 removed [ 2589.170463][T24975] team0 (unregistering): Port device team_slave_0 removed [ 2589.184770][T24975] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2589.202856][T24975] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2589.255428][T24975] bond0 (unregistering): Released all slaves [ 2589.324119][T22419] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2589.343408][T21056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2589.352523][T21056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2589.361344][T21056] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2589.370237][T21056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2589.380091][T21056] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2589.389787][T21056] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2589.409669][ T4739] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2589.418260][ T4739] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2589.434083][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2589.442785][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2589.465104][T26200] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2589.489408][T26200] 8021q: adding VLAN 0 to HW filter on device batadv0 10:39:48 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000240)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x44) gettid() r2 = msgget$private(0x0, 0x40) msgctl$MSG_INFO(r2, 0xc, &(0x7f0000000340)=""/229) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, 0x0) socket$kcm(0x11, 0x3, 0x0) socket$caif_stream(0x25, 0x1, 0x4) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f00000002c0)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0xfffffffffffffcd2, &(0x7f0000000100)=[{&(0x7f0000000180)}]}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207c804a01a000000880367fb0a000200030ada1b40d805000300c50083b8", 0x2e}], 0x1}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r3, 0x0, 0x0) 10:39:48 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x13, 0xfffffffffffffffe, 0x179) 10:39:48 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000000006488ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x800008800000001) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x8, 0x6}, 0x2c) getsockopt$inet_mreqsrc(r0, 0x0, 0x53, &(0x7f0000000000)={@dev, @local, @broadcast}, &(0x7f0000000040)=0x2c) 10:39:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x2, 0x3, 0x19) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000140), 0x4) 10:39:48 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f00000000c0)=0xc61, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) 10:39:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x2, 0x3, 0x19) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000140), 0x4) 10:39:48 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a00000000000000ffffa888ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) [ 2589.870858][T26221] __nla_validate_parse: 4 callbacks suppressed [ 2589.870911][T26221] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.1'. 10:39:48 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x8, 0x7ff, 0x3}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000080), &(0x7f0000000280)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080), 0x0}, 0x18) 10:39:48 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x13, 0xfffffffffffffffe, 0x179) 10:39:48 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f00000000c0)=0xc61, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) [ 2590.144638][T26227] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2590.193215][T26227] CPU: 0 PID: 26227 Comm: syz-executor.1 Not tainted 5.3.0-rc1-next-20190724 #50 [ 2590.202452][T26227] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2590.212521][T26227] Call Trace: [ 2590.215822][T26227] dump_stack+0x172/0x1f0 [ 2590.220166][T26227] dump_header+0x10b/0x82d [ 2590.224598][T26227] oom_kill_process.cold+0x10/0x15 [ 2590.229724][T26227] out_of_memory+0x79a/0x12c0 [ 2590.234461][T26227] ? __sched_text_start+0x8/0x8 [ 2590.239325][T26227] ? oom_killer_disable+0x280/0x280 [ 2590.244541][T26227] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2590.250095][T26227] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2590.255744][T26227] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 2590.261567][T26227] ? cgroup_file_notify+0x140/0x1b0 [ 2590.266788][T26227] memory_max_write+0x262/0x3a0 [ 2590.271654][T26227] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 2590.278616][T26227] ? lock_acquire+0x190/0x410 [ 2590.283313][T26227] ? kernfs_fop_write+0x227/0x480 [ 2590.288358][T26227] cgroup_file_write+0x241/0x790 [ 2590.293307][T26227] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 2590.300077][T26227] ? cgroup_migrate_add_task+0x890/0x890 [ 2590.305725][T26227] ? cgroup_migrate_add_task+0x890/0x890 [ 2590.311364][T26227] kernfs_fop_write+0x2b8/0x480 [ 2590.316269][T26227] __vfs_write+0x8a/0x110 [ 2590.320630][T26227] ? kernfs_fop_open+0xd80/0xd80 [ 2590.325587][T26227] vfs_write+0x268/0x5d0 [ 2590.329852][T26227] ksys_write+0x14f/0x290 [ 2590.334218][T26227] ? __ia32_sys_read+0xb0/0xb0 [ 2590.338999][T26227] ? do_syscall_64+0x26/0x760 10:39:49 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a00000000000000ffffca88ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) [ 2590.343705][T26227] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2590.349790][T26227] ? do_syscall_64+0x26/0x760 [ 2590.354485][T26227] __x64_sys_write+0x73/0xb0 [ 2590.359088][T26227] do_syscall_64+0xfa/0x760 [ 2590.363616][T26227] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2590.369514][T26227] RIP: 0033:0x459829 [ 2590.373451][T26227] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2590.393083][T26227] RSP: 002b:00007f46dd811c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2590.401506][T26227] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829 [ 2590.409480][T26227] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 2590.417572][T26227] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2590.425547][T26227] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f46dd8126d4 [ 2590.433613][T26227] R13: 00000000004c9774 R14: 00000000004e0b70 R15: 00000000ffffffff [ 2590.661852][T26227] memory: usage 5676kB, limit 0kB, failcnt 6 [ 2590.677408][T26227] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2590.684443][T26227] Memory cgroup stats for /syz1: [ 2590.684979][T26227] anon 106496 [ 2590.684979][T26227] file 217088 [ 2590.684979][T26227] kernel_stack 131072 [ 2590.684979][T26227] slab 5472256 [ 2590.684979][T26227] sock 57344 [ 2590.684979][T26227] shmem 122880 [ 2590.684979][T26227] file_mapped 0 [ 2590.684979][T26227] file_dirty 135168 [ 2590.684979][T26227] file_writeback 0 [ 2590.684979][T26227] anon_thp 0 [ 2590.684979][T26227] inactive_anon 69632 [ 2590.684979][T26227] active_anon 45056 [ 2590.684979][T26227] inactive_file 135168 [ 2590.684979][T26227] active_file 45056 [ 2590.684979][T26227] unevictable 0 [ 2590.684979][T26227] slab_reclaimable 2838528 [ 2590.684979][T26227] slab_unreclaimable 2633728 [ 2590.684979][T26227] pgfault 392469 [ 2590.684979][T26227] pgmajfault 0 [ 2590.684979][T26227] workingset_refault 0 [ 2590.684979][T26227] workingset_activate 0 [ 2590.684979][T26227] workingset_nodereclaim 0 [ 2590.684979][T26227] pgrefill 126 [ 2590.684979][T26227] pgscan 153 [ 2590.684979][T26227] pgsteal 86 [ 2590.790829][T26227] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=26217,uid=0 [ 2590.816739][T26227] Memory cgroup out of memory: Killed process 26217 (syz-executor.1) total-vm:72836kB, anon-rss:100kB, file-rss:34816kB, shmem-rss:0kB, UID:0 [ 2590.846400][ T1056] oom_reaper: reaped process 26217 (syz-executor.1), now anon-rss:0kB, file-rss:34852kB, shmem-rss:0kB 10:39:49 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000240)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x44) gettid() r2 = msgget$private(0x0, 0x40) msgctl$MSG_INFO(r2, 0xc, &(0x7f0000000340)=""/229) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, 0x0) socket$kcm(0x11, 0x3, 0x0) socket$caif_stream(0x25, 0x1, 0x4) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f00000002c0)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0xfffffffffffffcd2, &(0x7f0000000100)=[{&(0x7f0000000180)}]}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207c804a01a000000880367fb0a000200030ada1b40d805000300c50083b8", 0x2e}], 0x1}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r3, 0x0, 0x0) 10:39:49 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000000c0), 0x4) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x820}], 0x1) recvmmsg(r1, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 10:39:49 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x1000000000011, &(0x7f0000003980), 0x0, 0x0, 0x0) r1 = getpgid(0x0) waitid(0x2, r1, 0x0, 0x1000006, 0x0) 10:39:49 executing program 5: r0 = fsopen(&(0x7f0000000080)='ecryptfs\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x6, 0x0, 0x0, 0x0) 10:39:49 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000000000689ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) [ 2591.127607][T26200] syz-executor.1 invoked oom-killer: gfp_mask=0x40cc0(GFP_KERNEL|__GFP_COMP), order=1, oom_score_adj=0 [ 2591.198653][T26256] Error parsing options; rc = [-22] 10:39:50 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000240)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x44) gettid() r2 = msgget$private(0x0, 0x40) msgctl$MSG_INFO(r2, 0xc, &(0x7f0000000340)=""/229) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, 0x0) socket$kcm(0x11, 0x3, 0x0) socket$caif_stream(0x25, 0x1, 0x4) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f00000002c0)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0xfffffffffffffcd2, &(0x7f0000000100)=[{&(0x7f0000000180)}]}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207c804a01a000000880367fb0a000200030ada1b40d805000300c50083b8", 0x2e}], 0x1}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r3, 0x0, 0x0) 10:39:50 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a00000000000000ffffff8dffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) [ 2591.316567][T26200] CPU: 1 PID: 26200 Comm: syz-executor.1 Not tainted 5.3.0-rc1-next-20190724 #50 [ 2591.325711][T26200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2591.335775][T26200] Call Trace: [ 2591.339077][T26200] dump_stack+0x172/0x1f0 [ 2591.343422][T26200] dump_header+0x10b/0x82d [ 2591.347853][T26200] ? oom_kill_process+0x94/0x3f0 [ 2591.352891][T26200] oom_kill_process.cold+0x10/0x15 [ 2591.358029][T26200] out_of_memory+0x79a/0x12c0 [ 2591.362723][T26200] ? lock_downgrade+0x920/0x920 [ 2591.367593][T26200] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2591.373404][T26200] ? oom_killer_disable+0x280/0x280 [ 2591.378632][T26200] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2591.384193][T26200] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2591.389845][T26200] ? do_raw_spin_unlock+0x57/0x270 [ 2591.394970][T26200] ? _raw_spin_unlock+0x2d/0x50 [ 2591.399835][T26200] try_charge+0x1080/0x1480 [ 2591.404355][T26200] ? __lock_acquire+0x7c0/0x4c30 [ 2591.409399][T26200] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2591.414955][T26200] ? cache_grow_begin+0x122/0xd20 [ 2591.419999][T26200] ? find_held_lock+0x35/0x130 [ 2591.424777][T26200] ? cache_grow_begin+0x122/0xd20 [ 2591.429830][T26200] __memcg_kmem_charge_memcg+0x71/0xf0 [ 2591.435297][T26200] ? memcg_kmem_put_cache+0x50/0x50 [ 2591.440508][T26200] ? __kasan_check_read+0x11/0x20 [ 2591.445546][T26200] cache_grow_begin+0x627/0xd20 [ 2591.450405][T26200] ? __sanitizer_cov_trace_cmp2+0x1/0x20 [ 2591.456055][T26200] ? mempolicy_slab_node+0x139/0x390 [ 2591.461359][T26200] fallback_alloc+0x1fd/0x2d0 [ 2591.466048][T26200] ____cache_alloc_node+0x1bc/0x1d0 [ 2591.471256][T26200] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2591.477520][T26200] kmem_cache_alloc+0x1ef/0x710 [ 2591.478189][T26267] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2591.482391][T26200] sk_prot_alloc+0x67/0x310 [ 2591.496185][T26200] sk_alloc+0x39/0xf70 [ 2591.500325][T26200] inet_create+0x368/0xdf0 [ 2591.504767][T26200] __sock_create+0x3d8/0x730 [ 2591.509359][T26200] ? _raw_spin_unlock_irq+0x28/0x90 [ 2591.514580][T26200] __sys_socket+0x103/0x220 [ 2591.519092][T26200] ? move_addr_to_kernel+0x80/0x80 [ 2591.524220][T26200] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 2591.529696][T26200] ? do_syscall_64+0x26/0x760 [ 2591.534373][T26200] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2591.540436][T26200] ? do_syscall_64+0x26/0x760 [ 2591.545122][T26200] __x64_sys_socket+0x73/0xb0 [ 2591.549808][T26200] do_syscall_64+0xfa/0x760 [ 2591.554324][T26200] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2591.560218][T26200] RIP: 0033:0x45c377 10:39:50 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f00000000c0)=0xc61, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) [ 2591.564121][T26200] Code: 00 00 00 49 89 ca b8 36 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 b8 29 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2591.583749][T26200] RSP: 002b:00007ffff0e551c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 2591.583764][T26200] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045c377 [ 2591.583772][T26200] RDX: 0000000000000006 RSI: 0000000000000001 RDI: 0000000000000002 10:39:50 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000240)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x44) gettid() r2 = msgget$private(0x0, 0x40) msgctl$MSG_INFO(r2, 0xc, &(0x7f0000000340)=""/229) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, 0x0) socket$kcm(0x11, 0x3, 0x0) socket$caif_stream(0x25, 0x1, 0x4) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f00000002c0)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0xfffffffffffffcd2, &(0x7f0000000100)=[{&(0x7f0000000180)}]}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207c804a01a000000880367fb0a000200030ada1b40d805000300c50083b8", 0x2e}], 0x1}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r3, 0x0, 0x0) [ 2591.583778][T26200] RBP: 0000000000000005 R08: 0000000000000000 R09: 000000000000000a [ 2591.583786][T26200] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000000 [ 2591.583794][T26200] R13: 00007ffff0e558e0 R14: 0000000000278418 R15: 00007ffff0e558f0 10:39:50 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x1000000000011, &(0x7f0000003980), 0x0, 0x0, 0x0) r1 = getpgid(0x0) waitid(0x2, r1, 0x0, 0x1000006, 0x0) 10:39:50 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a00000000000000fffffff5ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) [ 2591.786106][T26200] memory: usage 5032kB, limit 0kB, failcnt 23 [ 2591.792213][T26200] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2591.826128][T26200] Memory cgroup stats for /syz1: [ 2591.826618][T26200] anon 106496 [ 2591.826618][T26200] file 217088 [ 2591.826618][T26200] kernel_stack 0 [ 2591.826618][T26200] slab 5148672 [ 2591.826618][T26200] sock 57344 [ 2591.826618][T26200] shmem 122880 [ 2591.826618][T26200] file_mapped 0 [ 2591.826618][T26200] file_dirty 135168 [ 2591.826618][T26200] file_writeback 0 [ 2591.826618][T26200] anon_thp 0 [ 2591.826618][T26200] inactive_anon 69632 [ 2591.826618][T26200] active_anon 45056 [ 2591.826618][T26200] inactive_file 135168 [ 2591.826618][T26200] active_file 45056 [ 2591.826618][T26200] unevictable 0 [ 2591.826618][T26200] slab_reclaimable 2838528 [ 2591.826618][T26200] slab_unreclaimable 2310144 [ 2591.826618][T26200] pgfault 392469 [ 2591.826618][T26200] pgmajfault 0 [ 2591.826618][T26200] workingset_refault 0 [ 2591.826618][T26200] workingset_activate 0 [ 2591.826618][T26200] workingset_nodereclaim 0 [ 2591.826618][T26200] pgrefill 126 [ 2591.826618][T26200] pgscan 153 [ 2591.826618][T26200] pgsteal 86 [ 2591.826618][T26200] pgactivate 33 10:39:50 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a00000000000000000000ffffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) [ 2592.008208][T26273] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2592.125790][T26200] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=26200,uid=0 [ 2592.195105][T26200] Memory cgroup out of memory: Killed process 26200 (syz-executor.1) total-vm:72440kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB, UID:0 [ 2592.322908][T26273] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2592.381513][T26273] CPU: 1 PID: 26273 Comm: syz-executor.5 Not tainted 5.3.0-rc1-next-20190724 #50 [ 2592.390683][T26273] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2592.400751][T26273] Call Trace: [ 2592.404060][T26273] dump_stack+0x172/0x1f0 [ 2592.408408][T26273] dump_header+0x10b/0x82d [ 2592.412837][T26273] oom_kill_process.cold+0x10/0x15 [ 2592.417961][T26273] out_of_memory+0x79a/0x12c0 [ 2592.422655][T26273] ? oom_killer_disable+0x280/0x280 [ 2592.427873][T26273] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2592.433448][T26273] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2592.439095][T26273] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 2592.445083][T26273] ? cgroup_file_notify+0x140/0x1b0 [ 2592.450295][T26273] memory_max_write+0x262/0x3a0 [ 2592.455160][T26273] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 2592.461943][T26273] ? lock_acquire+0x190/0x410 [ 2592.466631][T26273] ? kernfs_fop_write+0x227/0x480 [ 2592.471687][T26273] cgroup_file_write+0x241/0x790 [ 2592.476744][T26273] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 2592.483516][T26273] ? cgroup_migrate_add_task+0x890/0x890 [ 2592.489167][T26273] ? cgroup_migrate_add_task+0x890/0x890 [ 2592.494805][T26273] kernfs_fop_write+0x2b8/0x480 [ 2592.499673][T26273] __vfs_write+0x8a/0x110 [ 2592.504004][T26273] ? kernfs_fop_open+0xd80/0xd80 [ 2592.509057][T26273] vfs_write+0x268/0x5d0 [ 2592.513316][T26273] ksys_write+0x14f/0x290 [ 2592.517658][T26273] ? __ia32_sys_read+0xb0/0xb0 [ 2592.522432][T26273] ? do_syscall_64+0x26/0x760 [ 2592.527119][T26273] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2592.533191][T26273] ? do_syscall_64+0x26/0x760 [ 2592.537884][T26273] __x64_sys_write+0x73/0xb0 [ 2592.542489][T26273] do_syscall_64+0xfa/0x760 [ 2592.547009][T26273] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2592.552912][T26273] RIP: 0033:0x459829 [ 2592.556811][T26273] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2592.576425][T26273] RSP: 002b:00007f8f9351fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2592.584950][T26273] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829 [ 2592.592933][T26273] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 2592.600918][T26273] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2592.608902][T26273] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8f935206d4 [ 2592.616912][T26273] R13: 00000000004c9774 R14: 00000000004e0b70 R15: 00000000ffffffff [ 2592.636274][T26273] memory: usage 155256kB, limit 0kB, failcnt 0 [ 2592.649911][T26273] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2592.660399][T26273] Memory cgroup stats for /syz5: [ 2592.660521][T26273] anon 145203200 [ 2592.660521][T26273] file 0 [ 2592.660521][T26273] kernel_stack 1114112 [ 2592.660521][T26273] slab 7618560 [ 2592.660521][T26273] sock 24576 [ 2592.660521][T26273] shmem 0 [ 2592.660521][T26273] file_mapped 0 [ 2592.660521][T26273] file_dirty 0 [ 2592.660521][T26273] file_writeback 0 [ 2592.660521][T26273] anon_thp 18874368 [ 2592.660521][T26273] inactive_anon 126984192 [ 2592.660521][T26273] active_anon 13844480 [ 2592.660521][T26273] inactive_file 61440 [ 2592.660521][T26273] active_file 0 [ 2592.660521][T26273] unevictable 4452352 [ 2592.660521][T26273] slab_reclaimable 3244032 [ 2592.660521][T26273] slab_unreclaimable 4374528 [ 2592.660521][T26273] pgfault 453948 [ 2592.660521][T26273] pgmajfault 0 [ 2592.660521][T26273] workingset_refault 132 [ 2592.660521][T26273] workingset_activate 33 [ 2592.660521][T26273] workingset_nodereclaim 0 [ 2592.660521][T26273] pgrefill 6121 [ 2592.660521][T26273] pgscan 7687 [ 2592.660521][T26273] pgsteal 832 [ 2592.765184][T26273] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=23953,uid=0 [ 2592.788921][T26273] Memory cgroup out of memory: Killed process 23953 (syz-executor.5) total-vm:72836kB, anon-rss:18484kB, file-rss:34816kB, shmem-rss:0kB, UID:0 [ 2592.843146][ T1056] oom_reaper: reaped process 23953 (syz-executor.5), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB 10:39:51 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000240)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x44) gettid() r2 = msgget$private(0x0, 0x40) msgctl$MSG_INFO(r2, 0xc, &(0x7f0000000340)=""/229) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, 0x0) socket$kcm(0x11, 0x3, 0x0) socket$caif_stream(0x25, 0x1, 0x4) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f00000002c0)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0xfffffffffffffcd2, &(0x7f0000000100)=[{&(0x7f0000000180)}]}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207c804a01a000000880367fb0a000200030ada1b40d805000300c50083b8", 0x2e}], 0x1}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r3, 0x0, 0x0) 10:39:51 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x1000000000011, &(0x7f0000003980), 0x0, 0x0, 0x0) r1 = getpgid(0x0) waitid(0x2, r1, 0x0, 0x1000006, 0x0) 10:39:51 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x1000000000011, &(0x7f0000003980), 0x0, 0x0, 0x0) r1 = getpgid(0x0) waitid(0x2, r1, 0x0, 0x1000006, 0x0) 10:39:51 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a000000008000a0ffffffffffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:51 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000240)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x44) gettid() r2 = msgget$private(0x0, 0x40) msgctl$MSG_INFO(r2, 0xc, &(0x7f0000000340)=""/229) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, 0x0) socket$kcm(0x11, 0x3, 0x0) socket$caif_stream(0x25, 0x1, 0x4) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f00000002c0)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0xfffffffffffffcd2, &(0x7f0000000100)=[{&(0x7f0000000180)}]}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207c804a01a000000880367fb0a000200030ada1b40d805000300c50083b8", 0x2e}], 0x1}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r3, 0x0, 0x0) 10:39:51 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000240)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x44) gettid() r2 = msgget$private(0x0, 0x40) msgctl$MSG_INFO(r2, 0xc, &(0x7f0000000340)=""/229) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, 0x0) socket$kcm(0x11, 0x3, 0x0) socket$caif_stream(0x25, 0x1, 0x4) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f00000002c0)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0xfffffffffffffcd2, &(0x7f0000000100)=[{&(0x7f0000000180)}]}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207c804a01a000000880367fb0a000200030ada1b40d805000300c50083b8", 0x2e}], 0x1}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r3, 0x0, 0x0) [ 2592.995121][T26139] syz-executor.2 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2593.023989][T26139] CPU: 1 PID: 26139 Comm: syz-executor.2 Not tainted 5.3.0-rc1-next-20190724 #50 [ 2593.033126][T26139] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2593.043194][T26139] Call Trace: [ 2593.046499][T26139] dump_stack+0x172/0x1f0 [ 2593.050835][T26139] dump_header+0x10b/0x82d [ 2593.055248][T26139] ? oom_kill_process+0x94/0x3f0 [ 2593.060195][T26139] oom_kill_process.cold+0x10/0x15 [ 2593.065322][T26139] out_of_memory+0x79a/0x12c0 [ 2593.070007][T26139] ? lock_downgrade+0x920/0x920 [ 2593.074866][T26139] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2593.080692][T26139] ? oom_killer_disable+0x280/0x280 [ 2593.085923][T26139] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2593.091481][T26139] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2593.097124][T26139] ? do_raw_spin_unlock+0x57/0x270 [ 2593.102242][T26139] ? _raw_spin_unlock+0x2d/0x50 [ 2593.107102][T26139] try_charge+0x1080/0x1480 [ 2593.111624][T26139] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2593.117187][T26139] ? find_held_lock+0x35/0x130 [ 2593.121958][T26139] ? get_mem_cgroup_from_mm+0x139/0x320 [ 2593.127524][T26139] ? lock_downgrade+0x920/0x920 [ 2593.132384][T26139] ? percpu_ref_tryget_live+0x111/0x290 [ 2593.137957][T26139] __memcg_kmem_charge_memcg+0x71/0xf0 [ 2593.143440][T26139] ? memcg_kmem_put_cache+0x50/0x50 [ 2593.148663][T26139] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2593.154262][T26139] __memcg_kmem_charge+0x13a/0x3a0 [ 2593.159388][T26139] __alloc_pages_nodemask+0x4f2/0x8f0 [ 2593.164786][T26139] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2593.171226][T26139] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2593.176963][T26139] ? copy_process+0x46d1/0x6b00 [ 2593.181833][T26139] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2593.187140][T26139] ? trace_hardirqs_on+0x67/0x240 [ 2593.192261][T26139] ? __kasan_check_read+0x11/0x20 [ 2593.197304][T26139] copy_process+0x3f8/0x6b00 [ 2593.201929][T26139] ? __kasan_check_read+0x11/0x20 [ 2593.206967][T26139] ? __lock_acquire+0x1702/0x4c30 [ 2593.212001][T26139] ? __kasan_check_read+0x11/0x20 [ 2593.217039][T26139] ? mark_lock+0xc0/0x11e0 [ 2593.221488][T26139] ? __cleanup_sighand+0x60/0x60 [ 2593.226435][T26139] ? find_held_lock+0x35/0x130 [ 2593.231227][T26139] _do_fork+0x146/0xfa0 [ 2593.235395][T26139] ? copy_init_mm+0x20/0x20 [ 2593.239918][T26139] ? __kasan_check_read+0x11/0x20 [ 2593.244941][T26139] ? _copy_to_user+0x118/0x160 [ 2593.249714][T26139] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2593.255958][T26139] ? put_timespec64+0xda/0x140 [ 2593.260735][T26139] __x64_sys_clone+0x18d/0x250 [ 2593.265503][T26139] ? __ia32_sys_vfork+0xc0/0xc0 [ 2593.270364][T26139] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2593.275669][T26139] ? trace_hardirqs_on+0x67/0x240 [ 2593.280710][T26139] do_syscall_64+0xfa/0x760 [ 2593.285222][T26139] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2593.291114][T26139] RIP: 0033:0x457dfa [ 2593.295009][T26139] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2593.314618][T26139] RSP: 002b:00007ffc86c59d00 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2593.323038][T26139] RAX: ffffffffffffffda RBX: 00007ffc86c59d00 RCX: 0000000000457dfa [ 2593.331019][T26139] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 10:39:52 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a000000000001a0ffffffffffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) [ 2593.338999][T26139] RBP: 00007ffc86c59d40 R08: 0000000000000001 R09: 0000555556f28940 [ 2593.346974][T26139] R10: 0000555556f28c10 R11: 0000000000000246 R12: 0000000000000001 [ 2593.354964][T26139] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffc86c59d90 10:39:52 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000240)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x44) gettid() r2 = msgget$private(0x0, 0x40) msgctl$MSG_INFO(r2, 0xc, &(0x7f0000000340)=""/229) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, 0x0) socket$kcm(0x11, 0x3, 0x0) socket$caif_stream(0x25, 0x1, 0x4) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f00000002c0)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0xfffffffffffffcd2, &(0x7f0000000100)=[{&(0x7f0000000180)}]}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207c804a01a000000880367fb0a000200030ada1b40d805000300c50083b8", 0x2e}], 0x1}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r3, 0x0, 0x0) 10:39:52 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x1000000000011, &(0x7f0000003980), 0x0, 0x0, 0x0) r1 = getpgid(0x0) waitid(0x2, r1, 0x0, 0x1000006, 0x0) [ 2593.462589][T26139] memory: usage 6464kB, limit 0kB, failcnt 8 [ 2593.468836][T26139] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2593.475801][T26139] Memory cgroup stats for /syz2: [ 2593.475934][T26139] anon 274432 [ 2593.475934][T26139] file 0 [ 2593.475934][T26139] kernel_stack 65536 [ 2593.475934][T26139] slab 6848512 [ 2593.475934][T26139] sock 65536 [ 2593.475934][T26139] shmem 20480 [ 2593.475934][T26139] file_mapped 135168 [ 2593.475934][T26139] file_dirty 0 [ 2593.475934][T26139] file_writeback 0 10:39:52 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x1000000000011, &(0x7f0000003980), 0x0, 0x0, 0x0) r1 = getpgid(0x0) waitid(0x2, r1, 0x0, 0x1000006, 0x0) [ 2593.475934][T26139] anon_thp 0 [ 2593.475934][T26139] inactive_anon 114688 [ 2593.475934][T26139] active_anon 122880 [ 2593.475934][T26139] inactive_file 40960 [ 2593.475934][T26139] active_file 94208 [ 2593.475934][T26139] unevictable 0 [ 2593.475934][T26139] slab_reclaimable 3379200 [ 2593.475934][T26139] slab_unreclaimable 3469312 [ 2593.475934][T26139] pgfault 371679 [ 2593.475934][T26139] pgmajfault 0 [ 2593.475934][T26139] workingset_refault 330 [ 2593.475934][T26139] workingset_activate 132 [ 2593.475934][T26139] workingset_nodereclaim 0 [ 2593.475934][T26139] pgrefill 5100 [ 2593.475934][T26139] pgscan 9148 [ 2593.475934][T26139] pgsteal 3869 10:39:52 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a00000000f0ffffffffffffffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) [ 2593.866367][T26139] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=26139,uid=0 [ 2593.906092][T26139] Memory cgroup out of memory: Killed process 26139 (syz-executor.2) total-vm:72440kB, anon-rss:100kB, file-rss:35776kB, shmem-rss:0kB, UID:0 10:39:52 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x1000000000011, &(0x7f0000003980), 0x0, 0x0, 0x0) r1 = getpgid(0x0) waitid(0x2, r1, 0x0, 0x1000006, 0x0) 10:39:52 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000002000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) [ 2593.936856][ T1056] oom_reaper: reaped process 26139 (syz-executor.2), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 2593.952942][T15469] syz-executor.5 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2593.976635][T15469] CPU: 0 PID: 15469 Comm: syz-executor.5 Not tainted 5.3.0-rc1-next-20190724 #50 [ 2593.985795][T15469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2593.995854][T15469] Call Trace: [ 2593.999258][T15469] dump_stack+0x172/0x1f0 [ 2594.003595][T15469] dump_header+0x10b/0x82d [ 2594.008020][T15469] ? oom_kill_process+0x94/0x3f0 [ 2594.012970][T15469] oom_kill_process.cold+0x10/0x15 [ 2594.018183][T15469] out_of_memory+0x79a/0x12c0 [ 2594.022868][T15469] ? lock_downgrade+0x920/0x920 [ 2594.027735][T15469] ? oom_killer_disable+0x280/0x280 [ 2594.032955][T15469] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2594.038520][T15469] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2594.044165][T15469] ? do_raw_spin_unlock+0x57/0x270 [ 2594.049287][T15469] ? _raw_spin_unlock+0x2d/0x50 [ 2594.054152][T15469] try_charge+0x1080/0x1480 [ 2594.058684][T15469] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2594.064244][T15469] ? find_held_lock+0x35/0x130 [ 2594.069026][T15469] ? get_mem_cgroup_from_mm+0x139/0x320 [ 2594.074597][T15469] ? lock_downgrade+0x920/0x920 [ 2594.079456][T15469] ? percpu_ref_tryget_live+0x111/0x290 [ 2594.085012][T15469] __memcg_kmem_charge_memcg+0x71/0xf0 [ 2594.090480][T15469] ? memcg_kmem_put_cache+0x50/0x50 [ 2594.095685][T15469] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2594.101239][T15469] __memcg_kmem_charge+0x13a/0x3a0 [ 2594.106358][T15469] __alloc_pages_nodemask+0x4f2/0x8f0 [ 2594.106375][T15469] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2594.106394][T15469] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2594.106418][T15469] ? copy_process+0x46d1/0x6b00 [ 2594.106439][T15469] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2594.106456][T15469] ? trace_hardirqs_on+0x67/0x240 [ 2594.106469][T15469] ? __kasan_check_read+0x11/0x20 [ 2594.106490][T15469] copy_process+0x3f8/0x6b00 [ 2594.106509][T15469] ? __kasan_check_read+0x11/0x20 [ 2594.106524][T15469] ? __lock_acquire+0x1702/0x4c30 [ 2594.106535][T15469] ? __kasan_check_read+0x11/0x20 [ 2594.106547][T15469] ? mark_lock+0xc0/0x11e0 [ 2594.106567][T15469] ? __cleanup_sighand+0x60/0x60 [ 2594.106580][T15469] ? find_held_lock+0x35/0x130 [ 2594.106609][T15469] _do_fork+0x146/0xfa0 [ 2594.106626][T15469] ? copy_init_mm+0x20/0x20 [ 2594.106645][T15469] ? __kasan_check_read+0x11/0x20 [ 2594.106659][T15469] ? _copy_to_user+0x118/0x160 [ 2594.106679][T15469] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2594.106698][T15469] ? put_timespec64+0xda/0x140 [ 2594.118313][T15469] __x64_sys_clone+0x18d/0x250 [ 2594.118331][T15469] ? __ia32_sys_vfork+0xc0/0xc0 [ 2594.118356][T15469] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2594.118374][T15469] ? trace_hardirqs_on+0x67/0x240 [ 2594.118394][T15469] do_syscall_64+0xfa/0x760 [ 2594.118422][T15469] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2594.118434][T15469] RIP: 0033:0x457dfa [ 2594.118449][T15469] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2594.118458][T15469] RSP: 002b:00007ffcb60b4d70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2594.118471][T15469] RAX: ffffffffffffffda RBX: 00007ffcb60b4d70 RCX: 0000000000457dfa [ 2594.118486][T15469] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 10:39:53 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000003000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:39:53 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000240)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x44) gettid() r2 = msgget$private(0x0, 0x40) msgctl$MSG_INFO(r2, 0xc, &(0x7f0000000340)=""/229) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, 0x0) socket$kcm(0x11, 0x3, 0x0) socket$caif_stream(0x25, 0x1, 0x4) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f00000002c0)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0xfffffffffffffcd2, &(0x7f0000000100)=[{&(0x7f0000000180)}]}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207c804a01a000000880367fb0a000200030ada1b40d805000300c50083b8", 0x2e}], 0x1}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r3, 0x0, 0x0) [ 2594.285559][T15469] RBP: 00007ffcb60b4db0 R08: 0000000000000001 R09: 0000555556556940 [ 2594.293535][T15469] R10: 0000555556556c10 R11: 0000000000000246 R12: 0000000000000001 [ 2594.301515][T15469] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffcb60b4e00 [ 2594.350425][T15469] memory: usage 134204kB, limit 0kB, failcnt 8 10:39:53 executing program 3: ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000100)={0x3b, @broadcast, 0x0, 0x2, 'sh\x00', 0x0, 0x32, 0x3b}, 0x2c) creat(&(0x7f0000000340)='./file0\x00', 0x0) [ 2594.396032][T15469] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2594.402911][T15469] Memory cgroup stats for /syz5: [ 2594.403030][T15469] anon 124182528 [ 2594.403030][T15469] file 0 [ 2594.403030][T15469] kernel_stack 1048576 [ 2594.403030][T15469] slab 7618560 [ 2594.403030][T15469] sock 24576 [ 2594.403030][T15469] shmem 0 [ 2594.403030][T15469] file_mapped 0 [ 2594.403030][T15469] file_dirty 0 [ 2594.403030][T15469] file_writeback 0 [ 2594.403030][T15469] anon_thp 16777216 [ 2594.403030][T15469] inactive_anon 108195840 [ 2594.403030][T15469] active_anon 11747328 [ 2594.403030][T15469] inactive_file 61440 [ 2594.403030][T15469] active_file 0 [ 2594.403030][T15469] unevictable 4452352 [ 2594.403030][T15469] slab_reclaimable 3244032 [ 2594.403030][T15469] slab_unreclaimable 4374528 [ 2594.403030][T15469] pgfault 453948 [ 2594.403030][T15469] pgmajfault 0 [ 2594.403030][T15469] workingset_refault 132 [ 2594.403030][T15469] workingset_activate 33 [ 2594.403030][T15469] workingset_nodereclaim 0 [ 2594.403030][T15469] pgrefill 6121 [ 2594.403030][T15469] pgscan 7687 [ 2594.403030][T15469] pgsteal 832 [ 2594.668137][T15469] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=24100,uid=0 [ 2594.714334][T15469] Memory cgroup out of memory: Killed process 24100 (syz-executor.5) total-vm:72704kB, anon-rss:18356kB, file-rss:34944kB, shmem-rss:0kB, UID:0 [ 2594.747600][T26327] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2594.776095][T26327] CPU: 0 PID: 26327 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190724 #50 [ 2594.785332][T26327] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2594.799824][T26327] Call Trace: [ 2594.803218][T26327] dump_stack+0x172/0x1f0 [ 2594.807513][ T1056] oom_reaper: reaped process 24100 (syz-executor.5), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB [ 2594.818569][T26327] dump_header+0x10b/0x82d [ 2594.818684][T26327] oom_kill_process.cold+0x10/0x15 [ 2594.818702][T26327] out_of_memory+0x79a/0x12c0 [ 2594.818723][T26327] ? oom_killer_disable+0x280/0x280 [ 2594.818751][T26327] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2594.843757][T26327] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2594.849427][T26327] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 2594.855254][T26327] ? cgroup_file_notify+0x140/0x1b0 [ 2594.860475][T26327] memory_max_write+0x262/0x3a0 [ 2594.865527][T26327] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 2594.872312][T26327] ? lock_acquire+0x190/0x410 [ 2594.876999][T26327] ? kernfs_fop_write+0x227/0x480 [ 2594.882863][T26327] cgroup_file_write+0x241/0x790 [ 2594.887821][T26327] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 2594.894596][T26327] ? cgroup_migrate_add_task+0x890/0x890 [ 2594.900252][T26327] ? cgroup_migrate_add_task+0x890/0x890 [ 2594.905900][T26327] kernfs_fop_write+0x2b8/0x480 [ 2594.911031][T26327] __vfs_write+0x8a/0x110 [ 2594.915382][T26327] ? kernfs_fop_open+0xd80/0xd80 [ 2594.920340][T26327] vfs_write+0x268/0x5d0 [ 2594.924605][T26327] ksys_write+0x14f/0x290 [ 2594.928953][T26327] ? __ia32_sys_read+0xb0/0xb0 [ 2594.933728][T26327] ? do_syscall_64+0x26/0x760 [ 2594.938420][T26327] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2594.944589][T26327] ? do_syscall_64+0x26/0x760 [ 2594.949286][T26327] __x64_sys_write+0x73/0xb0 [ 2594.953911][T26327] do_syscall_64+0xfa/0x760 [ 2594.958479][T26327] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2594.964386][T26327] RIP: 0033:0x459829 [ 2594.968305][T26327] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2594.988099][T26327] RSP: 002b:00007fdc52608c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2594.996525][T26327] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829 [ 2595.004510][T26327] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 2595.012489][T26327] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2595.020477][T26327] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdc526096d4 [ 2595.028461][T26327] R13: 00000000004c9774 R14: 00000000004e0b70 R15: 00000000ffffffff [ 2595.156747][T26327] memory: usage 146260kB, limit 0kB, failcnt 0 [ 2595.165695][T26327] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2595.187262][T26324] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2595.192008][T26327] Memory cgroup stats for /syz4: [ 2595.192141][T26327] anon 129961984 [ 2595.192141][T26327] file 49152 [ 2595.192141][T26327] kernel_stack 2097152 [ 2595.192141][T26327] slab 8806400 [ 2595.192141][T26327] sock 8192 [ 2595.192141][T26327] shmem 20480 [ 2595.192141][T26327] file_mapped 0 [ 2595.192141][T26327] file_dirty 0 [ 2595.192141][T26327] file_writeback 0 [ 2595.192141][T26327] anon_thp 46137344 [ 2595.192141][T26327] inactive_anon 93417472 [ 2595.192141][T26327] active_anon 36499456 [ 2595.192141][T26327] inactive_file 0 [ 2595.192141][T26327] active_file 45056 [ 2595.192141][T26327] unevictable 12288 [ 2595.192141][T26327] slab_reclaimable 3919872 [ 2595.192141][T26327] slab_unreclaimable 4886528 [ 2595.192141][T26327] pgfault 400488 [ 2595.192141][T26327] pgmajfault 0 [ 2595.192141][T26327] workingset_refault 825 [ 2595.192141][T26327] workingset_activate 330 [ 2595.192141][T26327] workingset_nodereclaim 0 [ 2595.192141][T26327] pgrefill 12552 [ 2595.192141][T26327] pgscan 17027 [ 2595.192141][T26327] pgsteal 4298 10:39:54 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000240)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x44) gettid() r2 = msgget$private(0x0, 0x40) msgctl$MSG_INFO(r2, 0xc, &(0x7f0000000340)=""/229) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, 0x0) socket$kcm(0x11, 0x3, 0x0) socket$caif_stream(0x25, 0x1, 0x4) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f00000002c0)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0xfffffffffffffcd2, &(0x7f0000000100)=[{&(0x7f0000000180)}]}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207c804a01a000000880367fb0a000200030ada1b40d805000300c50083b8", 0x2e}], 0x1}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r3, 0x0, 0x0) [ 2595.296797][T26327] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=25963,uid=0 [ 2595.318424][T26332] IPVS: ftp: loaded support on port[0] = 21 [ 2595.342544][T26327] Memory cgroup out of memory: Killed process 25963 (syz-executor.4) total-vm:72824kB, anon-rss:18348kB, file-rss:34816kB, shmem-rss:0kB, UID:0 [ 2595.428901][T15469] syz-executor.5 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2595.473590][T15469] CPU: 0 PID: 15469 Comm: syz-executor.5 Not tainted 5.3.0-rc1-next-20190724 #50 [ 2595.482818][T15469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2595.492877][T15469] Call Trace: [ 2595.496174][T15469] dump_stack+0x172/0x1f0 [ 2595.496195][T15469] dump_header+0x10b/0x82d [ 2595.496207][T15469] ? oom_kill_process+0x94/0x3f0 [ 2595.496234][T15469] oom_kill_process.cold+0x10/0x15 [ 2595.505000][T15469] out_of_memory+0x79a/0x12c0 [ 2595.519710][T15469] ? lock_downgrade+0x920/0x920 [ 2595.524605][T15469] ? oom_killer_disable+0x280/0x280 [ 2595.529827][T15469] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2595.535392][T15469] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2595.541070][T15469] ? do_raw_spin_unlock+0x57/0x270 [ 2595.546203][T15469] ? _raw_spin_unlock+0x2d/0x50 [ 2595.546223][T15469] try_charge+0x1080/0x1480 [ 2595.546248][T15469] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2595.546262][T15469] ? find_held_lock+0x35/0x130 [ 2595.546278][T15469] ? get_mem_cgroup_from_mm+0x139/0x320 [ 2595.546302][T15469] ? lock_downgrade+0x920/0x920 [ 2595.546315][T15469] ? percpu_ref_tryget_live+0x111/0x290 [ 2595.546336][T15469] __memcg_kmem_charge_memcg+0x71/0xf0 [ 2595.546349][T15469] ? memcg_kmem_put_cache+0x50/0x50 [ 2595.546369][T15469] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2595.546387][T15469] __memcg_kmem_charge+0x13a/0x3a0 [ 2595.546416][T15469] __alloc_pages_nodemask+0x4f2/0x8f0 [ 2595.546431][T15469] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2595.546449][T15469] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2595.546464][T15469] ? copy_process+0x46d1/0x6b00 [ 2595.546483][T15469] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2595.546508][T15469] ? trace_hardirqs_on+0x67/0x240 [ 2595.576543][T15469] ? __kasan_check_read+0x11/0x20 [ 2595.576572][T15469] copy_process+0x3f8/0x6b00 [ 2595.587568][T15469] ? __kasan_check_read+0x11/0x20 [ 2595.587584][T15469] ? __lock_acquire+0x1702/0x4c30 [ 2595.587596][T15469] ? __kasan_check_read+0x11/0x20 [ 2595.587610][T15469] ? mark_lock+0xc0/0x11e0 [ 2595.587633][T15469] ? __cleanup_sighand+0x60/0x60 [ 2595.587647][T15469] ? find_held_lock+0x35/0x130 [ 2595.587676][T15469] _do_fork+0x146/0xfa0 [ 2595.587695][T15469] ? copy_init_mm+0x20/0x20 [ 2595.587714][T15469] ? __kasan_check_read+0x11/0x20 [ 2595.587728][T15469] ? _copy_to_user+0x118/0x160 [ 2595.587746][T15469] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2595.587766][T15469] ? put_timespec64+0xda/0x140 [ 2595.641037][T15469] __x64_sys_clone+0x18d/0x250 [ 2595.650641][T15469] ? __ia32_sys_vfork+0xc0/0xc0 [ 2595.650665][T15469] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2595.650681][T15469] ? trace_hardirqs_on+0x67/0x240 [ 2595.650700][T15469] do_syscall_64+0xfa/0x760 [ 2595.650718][T15469] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2595.650729][T15469] RIP: 0033:0x457dfa [ 2595.650745][T15469] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2595.650752][T15469] RSP: 002b:00007ffcb60b4d70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2595.650767][T15469] RAX: ffffffffffffffda RBX: 00007ffcb60b4d70 RCX: 0000000000457dfa [ 2595.650775][T15469] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2595.650784][T15469] RBP: 00007ffcb60b4db0 R08: 0000000000000001 R09: 0000555556556940 [ 2595.650792][T15469] R10: 0000555556556c10 R11: 0000000000000246 R12: 0000000000000001 [ 2595.650800][T15469] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffcb60b4e00 [ 2595.696048][T15469] memory: usage 115648kB, limit 0kB, failcnt 14 [ 2595.758963][T15469] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2595.758969][T15469] Memory cgroup stats for /syz5: [ 2595.759084][T15469] anon 105283584 [ 2595.759084][T15469] file 0 [ 2595.759084][T15469] kernel_stack 1048576 [ 2595.759084][T15469] slab 7618560 [ 2595.759084][T15469] sock 24576 [ 2595.759084][T15469] shmem 0 [ 2595.759084][T15469] file_mapped 0 [ 2595.759084][T15469] file_dirty 0 [ 2595.759084][T15469] file_writeback 0 [ 2595.759084][T15469] anon_thp 16777216 [ 2595.759084][T15469] inactive_anon 89407488 [ 2595.759084][T15469] active_anon 11747328 [ 2595.759084][T15469] inactive_file 61440 [ 2595.759084][T15469] active_file 0 [ 2595.759084][T15469] unevictable 4452352 [ 2595.759084][T15469] slab_reclaimable 3244032 [ 2595.759084][T15469] slab_unreclaimable 4374528 [ 2595.759084][T15469] pgfault 453948 [ 2595.759084][T15469] pgmajfault 0 [ 2595.759084][T15469] workingset_refault 132 [ 2595.759084][T15469] workingset_activate 33 [ 2595.759084][T15469] workingset_nodereclaim 0 [ 2595.759084][T15469] pgrefill 6121 [ 2595.759084][T15469] pgscan 7687 [ 2595.759084][T15469] pgsteal 832 [ 2595.759104][T15469] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=24047,uid=0 [ 2595.775722][T15469] Memory cgroup out of memory: Killed process 24047 (syz-executor.5) total-vm:72704kB, anon-rss:18356kB, file-rss:34816kB, shmem-rss:0kB, UID:0 [ 2595.830363][T15469] syz-executor.5 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2595.937743][T15469] CPU: 0 PID: 15469 Comm: syz-executor.5 Not tainted 5.3.0-rc1-next-20190724 #50 [ 2595.960970][T15469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2595.960985][T15469] Call Trace: [ 2595.980195][T15469] dump_stack+0x172/0x1f0 [ 2595.987836][T15469] dump_header+0x10b/0x82d [ 2595.987849][T15469] ? oom_kill_process+0x94/0x3f0 [ 2595.987865][T15469] oom_kill_process.cold+0x10/0x15 [ 2595.987881][T15469] out_of_memory+0x79a/0x12c0 [ 2595.987898][T15469] ? lock_downgrade+0x920/0x920 [ 2595.987916][T15469] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2595.987932][T15469] ? oom_killer_disable+0x280/0x280 [ 2595.987958][T15469] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2595.987975][T15469] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2595.987994][T15469] ? do_raw_spin_unlock+0x57/0x270 [ 2595.988010][T15469] ? _raw_spin_unlock+0x2d/0x50 [ 2595.988027][T15469] try_charge+0x1080/0x1480 [ 2595.988051][T15469] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2596.007148][T15469] ? find_held_lock+0x35/0x130 [ 2596.007167][T15469] ? get_mem_cgroup_from_mm+0x139/0x320 [ 2596.007190][T15469] ? lock_downgrade+0x920/0x920 [ 2596.007203][T15469] ? percpu_ref_tryget_live+0x111/0x290 [ 2596.007221][T15469] __memcg_kmem_charge_memcg+0x71/0xf0 [ 2596.007234][T15469] ? memcg_kmem_put_cache+0x50/0x50 [ 2596.007253][T15469] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2596.007271][T15469] __memcg_kmem_charge+0x13a/0x3a0 [ 2596.017922][T15469] __alloc_pages_nodemask+0x4f2/0x8f0 [ 2596.017937][T15469] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2596.017956][T15469] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2596.017972][T15469] ? copy_process+0x46d1/0x6b00 [ 2596.017989][T15469] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2596.018006][T15469] ? trace_hardirqs_on+0x67/0x240 [ 2596.018019][T15469] ? __kasan_check_read+0x11/0x20 [ 2596.018040][T15469] copy_process+0x3f8/0x6b00 [ 2596.018059][T15469] ? __kasan_check_read+0x11/0x20 [ 2596.018074][T15469] ? __lock_acquire+0x1702/0x4c30 [ 2596.018086][T15469] ? __kasan_check_read+0x11/0x20 [ 2596.018109][T15469] ? mark_lock+0xc0/0x11e0 [ 2596.028854][T15469] ? __cleanup_sighand+0x60/0x60 [ 2596.039744][T15469] ? find_held_lock+0x35/0x130 [ 2596.039774][T15469] _do_fork+0x146/0xfa0 [ 2596.039791][T15469] ? copy_init_mm+0x20/0x20 [ 2596.039810][T15469] ? __kasan_check_read+0x11/0x20 [ 2596.039824][T15469] ? _copy_to_user+0x118/0x160 [ 2596.039843][T15469] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2596.039855][T15469] ? put_timespec64+0xda/0x140 [ 2596.039877][T15469] __x64_sys_clone+0x18d/0x250 [ 2596.039897][T15469] ? __ia32_sys_vfork+0xc0/0xc0 [ 2596.054877][T15469] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2596.065178][T15469] ? trace_hardirqs_on+0x67/0x240 [ 2596.081093][T15469] do_syscall_64+0xfa/0x760 [ 2596.096936][T15469] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2596.096948][T15469] RIP: 0033:0x457dfa [ 2596.096964][T15469] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2596.096971][T15469] RSP: 002b:00007ffcb60b4d70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2596.096984][T15469] RAX: ffffffffffffffda RBX: 00007ffcb60b4d70 RCX: 0000000000457dfa [ 2596.096991][T15469] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2596.096999][T15469] RBP: 00007ffcb60b4db0 R08: 0000000000000001 R09: 0000555556556940 [ 2596.097007][T15469] R10: 0000555556556c10 R11: 0000000000000246 R12: 0000000000000001 [ 2596.097015][T15469] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffcb60b4e00 [ 2596.226058][T15469] memory: usage 97104kB, limit 0kB, failcnt 20 [ 2596.288092][T15469] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2596.314912][T15469] Memory cgroup stats for /syz5: [ 2596.315038][T15469] anon 86589440 [ 2596.315038][T15469] file 0 [ 2596.315038][T15469] kernel_stack 983040 [ 2596.315038][T15469] slab 7618560 [ 2596.315038][T15469] sock 24576 [ 2596.315038][T15469] shmem 0 [ 2596.315038][T15469] file_mapped 0 [ 2596.315038][T15469] file_dirty 0 [ 2596.315038][T15469] file_writeback 0 [ 2596.315038][T15469] anon_thp 16777216 [ 2596.315038][T15469] inactive_anon 70619136 [ 2596.315038][T15469] active_anon 11747328 [ 2596.315038][T15469] inactive_file 61440 [ 2596.315038][T15469] active_file 0 [ 2596.315038][T15469] unevictable 4452352 [ 2596.315038][T15469] slab_reclaimable 3244032 [ 2596.315038][T15469] slab_unreclaimable 4374528 [ 2596.315038][T15469] pgfault 453948 [ 2596.315038][T15469] pgmajfault 0 [ 2596.315038][T15469] workingset_refault 132 [ 2596.315038][T15469] workingset_activate 33 [ 2596.315038][T15469] workingset_nodereclaim 0 [ 2596.315038][T15469] pgrefill 6121 [ 2596.315038][T15469] pgscan 7687 [ 2596.315038][T15469] pgsteal 832 [ 2596.415864][T15469] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=23942,uid=0 [ 2596.432554][T15469] Memory cgroup out of memory: Killed process 23942 (syz-executor.5) total-vm:72704kB, anon-rss:18356kB, file-rss:34816kB, shmem-rss:0kB, UID:0 [ 2596.455744][ T1056] oom_reaper: reaped process 23942 (syz-executor.5), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB [ 2596.495459][T15469] syz-executor.5 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2596.518731][T15469] CPU: 0 PID: 15469 Comm: syz-executor.5 Not tainted 5.3.0-rc1-next-20190724 #50 [ 2596.527880][T15469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2596.527886][T15469] Call Trace: [ 2596.527912][T15469] dump_stack+0x172/0x1f0 [ 2596.527931][T15469] dump_header+0x10b/0x82d [ 2596.527943][T15469] ? oom_kill_process+0x94/0x3f0 [ 2596.527959][T15469] oom_kill_process.cold+0x10/0x15 [ 2596.527975][T15469] out_of_memory+0x79a/0x12c0 [ 2596.527990][T15469] ? lock_downgrade+0x920/0x920 [ 2596.528009][T15469] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2596.528031][T15469] ? oom_killer_disable+0x280/0x280 [ 2596.541396][T15469] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2596.550095][T15469] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2596.550116][T15469] ? do_raw_spin_unlock+0x57/0x270 [ 2596.550132][T15469] ? _raw_spin_unlock+0x2d/0x50 [ 2596.550150][T15469] try_charge+0x1080/0x1480 [ 2596.550172][T15469] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2596.550187][T15469] ? find_held_lock+0x35/0x130 [ 2596.550202][T15469] ? get_mem_cgroup_from_mm+0x139/0x320 [ 2596.550224][T15469] ? lock_downgrade+0x920/0x920 [ 2596.550244][T15469] ? percpu_ref_tryget_live+0x111/0x290 [ 2596.564958][T15469] __memcg_kmem_charge_memcg+0x71/0xf0 [ 2596.575614][T15469] ? memcg_kmem_put_cache+0x50/0x50 [ 2596.586338][T15469] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2596.586364][T15469] __memcg_kmem_charge+0x13a/0x3a0 [ 2596.586384][T15469] __alloc_pages_nodemask+0x4f2/0x8f0 [ 2596.586399][T15469] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2596.586424][T15469] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2596.586441][T15469] ? copy_process+0x46d1/0x6b00 [ 2596.586459][T15469] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2596.586480][T15469] ? trace_hardirqs_on+0x67/0x240 [ 2596.586504][T15469] ? __kasan_check_read+0x11/0x20 [ 2596.597240][T15469] copy_process+0x3f8/0x6b00 [ 2596.597261][T15469] ? __kasan_check_read+0x11/0x20 [ 2596.597277][T15469] ? __lock_acquire+0x1702/0x4c30 [ 2596.597289][T15469] ? __kasan_check_read+0x11/0x20 [ 2596.597303][T15469] ? mark_lock+0xc0/0x11e0 [ 2596.597328][T15469] ? __cleanup_sighand+0x60/0x60 [ 2596.606663][T15469] ? find_held_lock+0x35/0x130 [ 2596.606695][T15469] _do_fork+0x146/0xfa0 [ 2596.606713][T15469] ? copy_init_mm+0x20/0x20 [ 2596.606732][T15469] ? __kasan_check_read+0x11/0x20 [ 2596.606753][T15469] ? _copy_to_user+0x118/0x160 [ 2596.606790][T15469] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2596.617064][T15469] ? put_timespec64+0xda/0x140 [ 2596.617086][T15469] __x64_sys_clone+0x18d/0x250 [ 2596.617126][T15469] ? __ia32_sys_vfork+0xc0/0xc0 [ 2596.617172][T15469] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2596.627552][T15469] ? trace_hardirqs_on+0x67/0x240 [ 2596.638537][T15469] do_syscall_64+0xfa/0x760 [ 2596.638558][T15469] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2596.638569][T15469] RIP: 0033:0x457dfa [ 2596.638584][T15469] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2596.638592][T15469] RSP: 002b:00007ffcb60b4d70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2596.638604][T15469] RAX: ffffffffffffffda RBX: 00007ffcb60b4d70 RCX: 0000000000457dfa [ 2596.638611][T15469] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2596.638619][T15469] RBP: 00007ffcb60b4db0 R08: 0000000000000001 R09: 0000555556556940 [ 2596.638628][T15469] R10: 0000555556556c10 R11: 0000000000000246 R12: 0000000000000001 [ 2596.638635][T15469] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffcb60b4e00 [ 2596.653555][T15469] memory: usage 78488kB, limit 0kB, failcnt 26 [ 2596.662361][T15469] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2596.676030][T15469] Memory cgroup stats for /syz5: [ 2596.676158][T15469] anon 67715072 [ 2596.676158][T15469] file 0 [ 2596.676158][T15469] kernel_stack 983040 [ 2596.676158][T15469] slab 7618560 [ 2596.676158][T15469] sock 24576 [ 2596.676158][T15469] shmem 0 [ 2596.676158][T15469] file_mapped 0 [ 2596.676158][T15469] file_dirty 0 [ 2596.676158][T15469] file_writeback 0 [ 2596.676158][T15469] anon_thp 12582912 [ 2596.676158][T15469] inactive_anon 56000512 [ 2596.676158][T15469] active_anon 11747328 [ 2596.676158][T15469] inactive_file 61440 [ 2596.676158][T15469] active_file 0 [ 2596.676158][T15469] unevictable 126976 [ 2596.676158][T15469] slab_reclaimable 3244032 [ 2596.676158][T15469] slab_unreclaimable 4374528 [ 2596.676158][T15469] pgfault 453948 [ 2596.676158][T15469] pgmajfault 0 [ 2596.676158][T15469] workingset_refault 132 [ 2596.676158][T15469] workingset_activate 33 [ 2596.676158][T15469] workingset_nodereclaim 0 [ 2596.676158][T15469] pgrefill 6121 [ 2596.676158][T15469] pgscan 7687 [ 2596.676158][T15469] pgsteal 832 [ 2596.682189][T15469] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=26084,uid=0 [ 2596.692448][T15469] Memory cgroup out of memory: Killed process 26084 (syz-executor.5) total-vm:72696kB, anon-rss:18224kB, file-rss:34816kB, shmem-rss:0kB, UID:0 [ 2596.737063][T15469] syz-executor.5 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2596.757535][T15469] CPU: 0 PID: 15469 Comm: syz-executor.5 Not tainted 5.3.0-rc1-next-20190724 #50 [ 2596.768386][T15469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2596.768392][T15469] Call Trace: [ 2596.768424][T15469] dump_stack+0x172/0x1f0 [ 2596.768445][T15469] dump_header+0x10b/0x82d [ 2596.768456][T15469] ? oom_kill_process+0x94/0x3f0 [ 2596.768472][T15469] oom_kill_process.cold+0x10/0x15 [ 2596.768489][T15469] out_of_memory+0x79a/0x12c0 [ 2596.768504][T15469] ? lock_downgrade+0x920/0x920 [ 2596.768523][T15469] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2596.768539][T15469] ? oom_killer_disable+0x280/0x280 [ 2596.768564][T15469] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2596.784294][T15469] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2596.794247][T15469] ? do_raw_spin_unlock+0x57/0x270 [ 2596.822447][T15469] ? _raw_spin_unlock+0x2d/0x50 [ 2596.838439][T15469] try_charge+0x1080/0x1480 [ 2596.838464][T15469] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2596.838479][T15469] ? find_held_lock+0x35/0x130 [ 2596.838495][T15469] ? get_mem_cgroup_from_mm+0x139/0x320 [ 2596.838517][T15469] ? lock_downgrade+0x920/0x920 [ 2596.838531][T15469] ? percpu_ref_tryget_live+0x111/0x290 [ 2596.838551][T15469] __memcg_kmem_charge_memcg+0x71/0xf0 [ 2596.838565][T15469] ? memcg_kmem_put_cache+0x50/0x50 [ 2596.838593][T15469] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2596.854557][T15469] __memcg_kmem_charge+0x13a/0x3a0 [ 2596.868688][T15469] __alloc_pages_nodemask+0x4f2/0x8f0 [ 2596.868705][T15469] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2596.868723][T15469] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2596.868739][T15469] ? copy_process+0x46d1/0x6b00 [ 2596.868758][T15469] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2596.868774][T15469] ? trace_hardirqs_on+0x67/0x240 [ 2596.868788][T15469] ? __kasan_check_read+0x11/0x20 [ 2596.868809][T15469] copy_process+0x3f8/0x6b00 [ 2596.868829][T15469] ? __kasan_check_read+0x11/0x20 [ 2596.868843][T15469] ? __lock_acquire+0x1702/0x4c30 [ 2596.868854][T15469] ? __kasan_check_read+0x11/0x20 [ 2596.868869][T15469] ? mark_lock+0xc0/0x11e0 [ 2596.868891][T15469] ? __cleanup_sighand+0x60/0x60 [ 2596.970440][T15469] ? find_held_lock+0x35/0x130 [ 2596.970470][T15469] _do_fork+0x146/0xfa0 [ 2596.970489][T15469] ? copy_init_mm+0x20/0x20 [ 2596.970508][T15469] ? __kasan_check_read+0x11/0x20 [ 2596.970522][T15469] ? _copy_to_user+0x118/0x160 [ 2596.970540][T15469] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2596.970554][T15469] ? put_timespec64+0xda/0x140 [ 2596.970576][T15469] __x64_sys_clone+0x18d/0x250 [ 2596.970592][T15469] ? __ia32_sys_vfork+0xc0/0xc0 [ 2596.970615][T15469] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2596.970632][T15469] ? trace_hardirqs_on+0x67/0x240 [ 2596.970653][T15469] do_syscall_64+0xfa/0x760 [ 2596.970671][T15469] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2596.970683][T15469] RIP: 0033:0x457dfa [ 2596.970699][T15469] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2596.970717][T15469] RSP: 002b:00007ffcb60b4d70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2597.000668][T15469] RAX: ffffffffffffffda RBX: 00007ffcb60b4d70 RCX: 0000000000457dfa [ 2597.000685][T15469] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2597.021580][T15469] RBP: 00007ffcb60b4db0 R08: 0000000000000001 R09: 0000555556556940 [ 2597.021595][T15469] R10: 0000555556556c10 R11: 0000000000000246 R12: 0000000000000001 [ 2597.039259][T15469] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffcb60b4e00 [ 2597.043738][T15469] memory: usage 60076kB, limit 0kB, failcnt 32 [ 2597.048812][T15469] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2597.048818][T15469] Memory cgroup stats for /syz5: [ 2597.051984][T15469] anon 49053696 [ 2597.051984][T15469] file 0 [ 2597.051984][T15469] kernel_stack 983040 [ 2597.051984][T15469] slab 7618560 [ 2597.051984][T15469] sock 24576 [ 2597.051984][T15469] shmem 0 [ 2597.051984][T15469] file_mapped 0 [ 2597.051984][T15469] file_dirty 0 [ 2597.051984][T15469] file_writeback 0 [ 2597.051984][T15469] anon_thp 12582912 [ 2597.051984][T15469] inactive_anon 37347328 [ 2597.051984][T15469] active_anon 11747328 [ 2597.051984][T15469] inactive_file 61440 [ 2597.051984][T15469] active_file 0 [ 2597.051984][T15469] unevictable 126976 [ 2597.051984][T15469] slab_reclaimable 3244032 [ 2597.051984][T15469] slab_unreclaimable 4374528 [ 2597.051984][T15469] pgfault 453948 [ 2597.051984][T15469] pgmajfault 0 [ 2597.051984][T15469] workingset_refault 132 [ 2597.051984][T15469] workingset_activate 33 [ 2597.051984][T15469] workingset_nodereclaim 0 [ 2597.051984][T15469] pgrefill 6121 [ 2597.051984][T15469] pgscan 7687 [ 2597.051984][T15469] pgsteal 832 [ 2597.061869][T15469] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=26045,uid=0 [ 2597.074984][T15469] Memory cgroup out of memory: Killed process 26045 (syz-executor.5) total-vm:72696kB, anon-rss:18224kB, file-rss:34816kB, shmem-rss:0kB, UID:0 [ 2597.502302][ T1056] oom_reaper: reaped process 26045 (syz-executor.5), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB [ 2597.510127][T15469] syz-executor.5 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2597.528381][T15469] CPU: 0 PID: 15469 Comm: syz-executor.5 Not tainted 5.3.0-rc1-next-20190724 #50 [ 2597.537502][T15469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2597.537508][T15469] Call Trace: [ 2597.537531][T15469] dump_stack+0x172/0x1f0 [ 2597.537552][T15469] dump_header+0x10b/0x82d [ 2597.537564][T15469] ? oom_kill_process+0x94/0x3f0 [ 2597.537581][T15469] oom_kill_process.cold+0x10/0x15 [ 2597.537597][T15469] out_of_memory+0x79a/0x12c0 [ 2597.537613][T15469] ? lock_downgrade+0x920/0x920 [ 2597.537632][T15469] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2597.537650][T15469] ? oom_killer_disable+0x280/0x280 [ 2597.537677][T15469] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2597.537694][T15469] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2597.537716][T15469] ? do_raw_spin_unlock+0x57/0x270 [ 2597.537733][T15469] ? _raw_spin_unlock+0x2d/0x50 [ 2597.537753][T15469] try_charge+0x1080/0x1480 [ 2597.537778][T15469] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2597.537793][T15469] ? find_held_lock+0x35/0x130 [ 2597.537811][T15469] ? get_mem_cgroup_from_mm+0x139/0x320 [ 2597.537835][T15469] ? lock_downgrade+0x920/0x920 [ 2597.537850][T15469] ? percpu_ref_tryget_live+0x111/0x290 [ 2597.537870][T15469] __memcg_kmem_charge_memcg+0x71/0xf0 [ 2597.537884][T15469] ? memcg_kmem_put_cache+0x50/0x50 [ 2597.537904][T15469] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2597.537923][T15469] __memcg_kmem_charge+0x13a/0x3a0 [ 2597.537943][T15469] __alloc_pages_nodemask+0x4f2/0x8f0 [ 2597.537959][T15469] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2597.537978][T15469] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2597.537995][T15469] ? copy_process+0x46d1/0x6b00 [ 2597.538014][T15469] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2597.538031][T15469] ? trace_hardirqs_on+0x67/0x240 [ 2597.538043][T15469] ? __kasan_check_read+0x11/0x20 [ 2597.538064][T15469] copy_process+0x3f8/0x6b00 [ 2597.560118][T15469] ? __kasan_check_read+0x11/0x20 [ 2597.570132][T15469] ? __lock_acquire+0x1702/0x4c30 [ 2597.570145][T15469] ? __kasan_check_read+0x11/0x20 [ 2597.570158][T15469] ? mark_lock+0xc0/0x11e0 [ 2597.570181][T15469] ? __cleanup_sighand+0x60/0x60 [ 2597.570195][T15469] ? find_held_lock+0x35/0x130 [ 2597.570223][T15469] _do_fork+0x146/0xfa0 [ 2597.570242][T15469] ? copy_init_mm+0x20/0x20 [ 2597.570261][T15469] ? __kasan_check_read+0x11/0x20 [ 2597.570276][T15469] ? _copy_to_user+0x118/0x160 [ 2597.570295][T15469] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2597.570308][T15469] ? put_timespec64+0xda/0x140 [ 2597.570329][T15469] __x64_sys_clone+0x18d/0x250 [ 2597.585635][T15469] ? __ia32_sys_vfork+0xc0/0xc0 [ 2597.596355][T15469] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2597.596373][T15469] ? trace_hardirqs_on+0x67/0x240 [ 2597.596394][T15469] do_syscall_64+0xfa/0x760 [ 2597.596422][T15469] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2597.596435][T15469] RIP: 0033:0x457dfa [ 2597.596451][T15469] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2597.596459][T15469] RSP: 002b:00007ffcb60b4d70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2597.607182][T15469] RAX: ffffffffffffffda RBX: 00007ffcb60b4d70 RCX: 0000000000457dfa [ 2597.607196][T15469] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2597.616539][T15469] RBP: 00007ffcb60b4db0 R08: 0000000000000001 R09: 0000555556556940 [ 2597.616547][T15469] R10: 0000555556556c10 R11: 0000000000000246 R12: 0000000000000001 [ 2597.616555][T15469] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffcb60b4e00 [ 2597.634114][T15469] memory: usage 41648kB, limit 0kB, failcnt 38 [ 2597.676396][T15469] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2597.687041][T15469] Memory cgroup stats for /syz5: [ 2597.687162][T15469] anon 30359552 [ 2597.687162][T15469] file 0 [ 2597.687162][T15469] kernel_stack 917504 [ 2597.687162][T15469] slab 7618560 [ 2597.687162][T15469] sock 24576 [ 2597.687162][T15469] shmem 0 [ 2597.687162][T15469] file_mapped 0 [ 2597.687162][T15469] file_dirty 0 [ 2597.687162][T15469] file_writeback 0 [ 2597.687162][T15469] anon_thp 8388608 [ 2597.687162][T15469] inactive_anon 18698240 [ 2597.687162][T15469] active_anon 11747328 [ 2597.687162][T15469] inactive_file 61440 [ 2597.687162][T15469] active_file 0 [ 2597.687162][T15469] unevictable 126976 [ 2597.687162][T15469] slab_reclaimable 3244032 [ 2597.687162][T15469] slab_unreclaimable 4374528 [ 2597.687162][T15469] pgfault 453948 [ 2597.687162][T15469] pgmajfault 0 [ 2597.687162][T15469] workingset_refault 132 [ 2597.687162][T15469] workingset_activate 33 [ 2597.687162][T15469] workingset_nodereclaim 0 [ 2597.687162][T15469] pgrefill 6121 [ 2597.687162][T15469] pgscan 7687 [ 2597.687162][T15469] pgsteal 832 [ 2597.697576][T15469] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=26026,uid=0 [ 2597.707274][T15469] Memory cgroup out of memory: Killed process 26026 (syz-executor.5) total-vm:72696kB, anon-rss:18224kB, file-rss:34816kB, shmem-rss:0kB, UID:0 [ 2597.773139][T15469] syz-executor.5 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2597.781533][T15469] CPU: 0 PID: 15469 Comm: syz-executor.5 Not tainted 5.3.0-rc1-next-20190724 #50 [ 2598.026621][T15469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2598.036724][T15469] Call Trace: [ 2598.040032][T15469] dump_stack+0x172/0x1f0 [ 2598.044372][T15469] dump_header+0x10b/0x82d [ 2598.048795][T15469] ? oom_kill_process+0x94/0x3f0 [ 2598.053912][T15469] oom_kill_process.cold+0x10/0x15 [ 2598.059034][T15469] out_of_memory+0x79a/0x12c0 [ 2598.063716][T15469] ? lock_downgrade+0x920/0x920 [ 2598.068596][T15469] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2598.074420][T15469] ? oom_killer_disable+0x280/0x280 [ 2598.079632][T15469] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2598.085174][T15469] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2598.090812][T15469] ? do_raw_spin_unlock+0x57/0x270 [ 2598.095922][T15469] ? _raw_spin_unlock+0x2d/0x50 [ 2598.100778][T15469] try_charge+0x1080/0x1480 [ 2598.105293][T15469] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2598.110860][T15469] ? find_held_lock+0x35/0x130 [ 2598.115637][T15469] ? get_mem_cgroup_from_mm+0x139/0x320 [ 2598.121201][T15469] ? lock_downgrade+0x920/0x920 [ 2598.126057][T15469] ? percpu_ref_tryget_live+0x111/0x290 [ 2598.131624][T15469] __memcg_kmem_charge_memcg+0x71/0xf0 [ 2598.137096][T15469] ? memcg_kmem_put_cache+0x50/0x50 [ 2598.142307][T15469] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2598.147861][T15469] __memcg_kmem_charge+0x13a/0x3a0 [ 2598.152980][T15469] __alloc_pages_nodemask+0x4f2/0x8f0 [ 2598.158362][T15469] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2598.164629][T15469] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2598.170360][T15469] ? copy_process+0x46d1/0x6b00 [ 2598.175221][T15469] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2598.180512][T15469] ? trace_hardirqs_on+0x67/0x240 [ 2598.185532][T15469] ? __kasan_check_read+0x11/0x20 [ 2598.190569][T15469] copy_process+0x3f8/0x6b00 [ 2598.195172][T15469] ? __kasan_check_read+0x11/0x20 [ 2598.200199][T15469] ? __lock_acquire+0x1702/0x4c30 [ 2598.205223][T15469] ? __kasan_check_read+0x11/0x20 [ 2598.210253][T15469] ? mark_lock+0xc0/0x11e0 [ 2598.214680][T15469] ? __cleanup_sighand+0x60/0x60 [ 2598.219619][T15469] ? find_held_lock+0x35/0x130 [ 2598.224412][T15469] _do_fork+0x146/0xfa0 [ 2598.228574][T15469] ? copy_init_mm+0x20/0x20 [ 2598.233080][T15469] ? __kasan_check_read+0x11/0x20 [ 2598.238104][T15469] ? _copy_to_user+0x118/0x160 [ 2598.242880][T15469] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2598.249119][T15469] ? put_timespec64+0xda/0x140 [ 2598.253893][T15469] __x64_sys_clone+0x18d/0x250 [ 2598.258660][T15469] ? __ia32_sys_vfork+0xc0/0xc0 [ 2598.263520][T15469] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2598.268803][T15469] ? trace_hardirqs_on+0x67/0x240 [ 2598.273842][T15469] do_syscall_64+0xfa/0x760 [ 2598.278348][T15469] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2598.284233][T15469] RIP: 0033:0x457dfa [ 2598.288127][T15469] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2598.307731][T15469] RSP: 002b:00007ffcb60b4d70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2598.316155][T15469] RAX: ffffffffffffffda RBX: 00007ffcb60b4d70 RCX: 0000000000457dfa [ 2598.324127][T15469] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2598.332190][T15469] RBP: 00007ffcb60b4db0 R08: 0000000000000001 R09: 0000555556556940 [ 2598.340162][T15469] R10: 0000555556556c10 R11: 0000000000000246 R12: 0000000000000001 [ 2598.348134][T15469] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffcb60b4e00 [ 2598.359799][T26332] chnl_net:caif_netlink_parms(): no params data found [ 2598.372628][T15469] memory: usage 23236kB, limit 0kB, failcnt 44 [ 2598.383475][T15469] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2598.401051][T15469] Memory cgroup stats for /syz5: [ 2598.401166][T15469] anon 11698176 [ 2598.401166][T15469] file 0 [ 2598.401166][T15469] kernel_stack 917504 [ 2598.401166][T15469] slab 7618560 [ 2598.401166][T15469] sock 24576 [ 2598.401166][T15469] shmem 0 [ 2598.401166][T15469] file_mapped 0 [ 2598.401166][T15469] file_dirty 0 [ 2598.401166][T15469] file_writeback 0 [ 2598.401166][T15469] anon_thp 8388608 [ 2598.401166][T15469] inactive_anon 45056 [ 2598.401166][T15469] active_anon 11747328 [ 2598.401166][T15469] inactive_file 61440 [ 2598.401166][T15469] active_file 0 [ 2598.401166][T15469] unevictable 126976 [ 2598.401166][T15469] slab_reclaimable 3244032 [ 2598.401166][T15469] slab_unreclaimable 4374528 [ 2598.401166][T15469] pgfault 453948 [ 2598.401166][T15469] pgmajfault 0 [ 2598.401166][T15469] workingset_refault 132 [ 2598.401166][T15469] workingset_activate 33 [ 2598.401166][T15469] workingset_nodereclaim 0 [ 2598.401166][T15469] pgrefill 6121 [ 2598.401166][T15469] pgscan 7687 [ 2598.401166][T15469] pgsteal 832 [ 2598.498261][T15469] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=18403,uid=0 [ 2598.514359][T15469] Memory cgroup out of memory: Killed process 18403 (syz-executor.5) total-vm:72572kB, anon-rss:2204kB, file-rss:35852kB, shmem-rss:0kB, UID:0 [ 2598.545818][T26332] bridge0: port 1(bridge_slave_0) entered blocking state [ 2598.550390][T15469] syz-executor.5 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2598.560430][T26332] bridge0: port 1(bridge_slave_0) entered disabled state [ 2598.567232][T15469] CPU: 0 PID: 15469 Comm: syz-executor.5 Not tainted 5.3.0-rc1-next-20190724 #50 [ 2598.580795][T15469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2598.580802][T15469] Call Trace: [ 2598.580826][T15469] dump_stack+0x172/0x1f0 [ 2598.580847][T15469] dump_header+0x10b/0x82d [ 2598.580860][T15469] ? oom_kill_process+0x94/0x3f0 [ 2598.580877][T15469] oom_kill_process.cold+0x10/0x15 [ 2598.580895][T15469] out_of_memory+0x79a/0x12c0 [ 2598.580911][T15469] ? lock_downgrade+0x920/0x920 [ 2598.580931][T15469] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2598.580947][T15469] ? oom_killer_disable+0x280/0x280 [ 2598.580982][T15469] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2598.581003][T15469] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2598.600301][T26332] device bridge_slave_0 entered promiscuous mode [ 2598.603047][T15469] ? do_raw_spin_unlock+0x57/0x270 [ 2598.617734][T15469] ? _raw_spin_unlock+0x2d/0x50 [ 2598.617756][T15469] try_charge+0x1080/0x1480 [ 2598.617780][T15469] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2598.617796][T15469] ? find_held_lock+0x35/0x130 [ 2598.617814][T15469] ? get_mem_cgroup_from_mm+0x139/0x320 [ 2598.617838][T15469] ? lock_downgrade+0x920/0x920 [ 2598.617858][T15469] ? percpu_ref_tryget_live+0x111/0x290 [ 2598.628497][T15469] __memcg_kmem_charge_memcg+0x71/0xf0 [ 2598.628511][T15469] ? memcg_kmem_put_cache+0x50/0x50 [ 2598.628531][T15469] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2598.628548][T15469] __memcg_kmem_charge+0x13a/0x3a0 [ 2598.628568][T15469] __alloc_pages_nodemask+0x4f2/0x8f0 [ 2598.628584][T15469] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2598.628602][T15469] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2598.628616][T15469] ? copy_process+0x46d1/0x6b00 [ 2598.628634][T15469] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2598.628654][T15469] ? trace_hardirqs_on+0x67/0x240 [ 2598.641766][T26332] bridge0: port 2(bridge_slave_1) entered blocking state [ 2598.644984][T15469] ? __kasan_check_read+0x11/0x20 [ 2598.645009][T15469] copy_process+0x3f8/0x6b00 [ 2598.652602][T26332] bridge0: port 2(bridge_slave_1) entered disabled state [ 2598.656440][T15469] ? __kasan_check_read+0x11/0x20 [ 2598.656458][T15469] ? __lock_acquire+0x1702/0x4c30 [ 2598.656470][T15469] ? __kasan_check_read+0x11/0x20 [ 2598.656484][T15469] ? mark_lock+0xc0/0x11e0 [ 2598.656508][T15469] ? __cleanup_sighand+0x60/0x60 [ 2598.656524][T15469] ? find_held_lock+0x35/0x130 [ 2598.656555][T15469] _do_fork+0x146/0xfa0 [ 2598.656577][T15469] ? copy_init_mm+0x20/0x20 [ 2598.671458][T15469] ? __kasan_check_read+0x11/0x20 [ 2598.683985][T26332] device bridge_slave_1 entered promiscuous mode [ 2598.686576][T15469] ? _copy_to_user+0x118/0x160 [ 2598.686597][T15469] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2598.686610][T15469] ? put_timespec64+0xda/0x140 [ 2598.686634][T15469] __x64_sys_clone+0x18d/0x250 [ 2598.686650][T15469] ? __ia32_sys_vfork+0xc0/0xc0 [ 2598.686682][T15469] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2598.697670][T15469] ? trace_hardirqs_on+0x67/0x240 [ 2598.697691][T15469] do_syscall_64+0xfa/0x760 [ 2598.697712][T15469] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2598.697724][T15469] RIP: 0033:0x457dfa [ 2598.697739][T15469] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2598.697747][T15469] RSP: 002b:00007ffcb60b4d70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2598.697761][T15469] RAX: ffffffffffffffda RBX: 00007ffcb60b4d70 RCX: 0000000000457dfa [ 2598.697769][T15469] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2598.697778][T15469] RBP: 00007ffcb60b4db0 R08: 0000000000000001 R09: 0000555556556940 [ 2598.697787][T15469] R10: 0000555556556c10 R11: 0000000000000246 R12: 0000000000000001 [ 2598.697795][T15469] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffcb60b4e00 [ 2598.703135][T15469] memory: usage 20892kB, limit 0kB, failcnt 50 [ 2598.719677][T15469] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2598.736679][T15469] Memory cgroup stats for /syz5: [ 2598.736795][T15469] anon 9515008 [ 2598.736795][T15469] file 0 [ 2598.736795][T15469] kernel_stack 851968 [ 2598.736795][T15469] slab 7618560 [ 2598.736795][T15469] sock 24576 [ 2598.736795][T15469] shmem 0 [ 2598.736795][T15469] file_mapped 0 [ 2598.736795][T15469] file_dirty 0 [ 2598.736795][T15469] file_writeback 0 [ 2598.736795][T15469] anon_thp 6291456 [ 2598.736795][T15469] inactive_anon 45056 [ 2598.736795][T15469] active_anon 9547776 [ 2598.736795][T15469] inactive_file 61440 [ 2598.736795][T15469] active_file 0 [ 2598.736795][T15469] unevictable 126976 [ 2598.736795][T15469] slab_reclaimable 3244032 [ 2598.736795][T15469] slab_unreclaimable 4374528 [ 2598.736795][T15469] pgfault 453948 [ 2598.736795][T15469] pgmajfault 0 [ 2598.736795][T15469] workingset_refault 132 [ 2598.736795][T15469] workingset_activate 33 [ 2598.736795][T15469] workingset_nodereclaim 0 [ 2598.736795][T15469] pgrefill 6121 [ 2598.736795][T15469] pgscan 7687 [ 2598.736795][T15469] pgsteal 832 [ 2598.747574][T15469] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=18138,uid=0 [ 2598.771883][T15469] Memory cgroup out of memory: Killed process 18138 (syz-executor.5) total-vm:72572kB, anon-rss:2196kB, file-rss:35848kB, shmem-rss:0kB, UID:0 [ 2598.807390][T15469] syz-executor.5 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2598.821049][T15469] CPU: 0 PID: 15469 Comm: syz-executor.5 Not tainted 5.3.0-rc1-next-20190724 #50 [ 2598.831892][T15469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2598.831898][T15469] Call Trace: [ 2598.831924][T15469] dump_stack+0x172/0x1f0 [ 2598.831944][T15469] dump_header+0x10b/0x82d [ 2598.831956][T15469] ? oom_kill_process+0x94/0x3f0 [ 2598.831973][T15469] oom_kill_process.cold+0x10/0x15 [ 2598.831989][T15469] out_of_memory+0x79a/0x12c0 [ 2598.832005][T15469] ? lock_downgrade+0x920/0x920 [ 2598.832025][T15469] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2598.832041][T15469] ? oom_killer_disable+0x280/0x280 [ 2598.832069][T15469] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2598.832085][T15469] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2598.832106][T15469] ? do_raw_spin_unlock+0x57/0x270 [ 2598.832121][T15469] ? _raw_spin_unlock+0x2d/0x50 [ 2598.832142][T15469] try_charge+0x1080/0x1480 [ 2598.846508][T15469] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2598.846525][T15469] ? find_held_lock+0x35/0x130 [ 2598.846541][T15469] ? get_mem_cgroup_from_mm+0x139/0x320 [ 2598.846566][T15469] ? lock_downgrade+0x920/0x920 [ 2598.846585][T15469] ? percpu_ref_tryget_live+0x111/0x290 [ 2598.856897][T15469] __memcg_kmem_charge_memcg+0x71/0xf0 [ 2598.856911][T15469] ? memcg_kmem_put_cache+0x50/0x50 [ 2598.856929][T15469] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2598.856945][T15469] __memcg_kmem_charge+0x13a/0x3a0 [ 2598.856962][T15469] __alloc_pages_nodemask+0x4f2/0x8f0 [ 2598.856976][T15469] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2598.856993][T15469] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2598.857008][T15469] ? copy_process+0x46d1/0x6b00 [ 2598.857029][T15469] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2598.857047][T15469] ? trace_hardirqs_on+0x67/0x240 [ 2598.857061][T15469] ? __kasan_check_read+0x11/0x20 [ 2598.857081][T15469] copy_process+0x3f8/0x6b00 [ 2598.857099][T15469] ? __kasan_check_read+0x11/0x20 [ 2598.871395][T15469] ? __lock_acquire+0x1702/0x4c30 [ 2598.900991][T15469] ? __kasan_check_read+0x11/0x20 [ 2598.901012][T15469] ? mark_lock+0xc0/0x11e0 [ 2598.916958][T15469] ? __cleanup_sighand+0x60/0x60 [ 2598.916975][T15469] ? find_held_lock+0x35/0x130 [ 2598.917005][T15469] _do_fork+0x146/0xfa0 [ 2598.917025][T15469] ? copy_init_mm+0x20/0x20 [ 2598.917047][T15469] ? __kasan_check_read+0x11/0x20 [ 2598.917062][T15469] ? _copy_to_user+0x118/0x160 [ 2598.917083][T15469] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2598.941442][T15469] ? put_timespec64+0xda/0x140 [ 2598.941464][T15469] __x64_sys_clone+0x18d/0x250 [ 2598.941482][T15469] ? __ia32_sys_vfork+0xc0/0xc0 [ 2598.941504][T15469] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2598.941520][T15469] ? trace_hardirqs_on+0x67/0x240 [ 2598.941543][T15469] do_syscall_64+0xfa/0x760 [ 2598.959463][T15469] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2599.063190][T15469] RIP: 0033:0x457dfa [ 2599.063213][T15469] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2599.089485][T15469] RSP: 002b:00007ffcb60b4d70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2599.108668][T15469] RAX: ffffffffffffffda RBX: 00007ffcb60b4d70 RCX: 0000000000457dfa [ 2599.108684][T15469] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2599.116272][T15469] RBP: 00007ffcb60b4db0 R08: 0000000000000001 R09: 0000555556556940 [ 2599.116280][T15469] R10: 0000555556556c10 R11: 0000000000000246 R12: 0000000000000001 [ 2599.116287][T15469] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffcb60b4e00 [ 2599.120696][T15469] memory: usage 18576kB, limit 0kB, failcnt 56 [ 2599.130996][T15469] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2599.141016][T15469] Memory cgroup stats for /syz5: [ 2599.141127][T15469] anon 7307264 [ 2599.141127][T15469] file 0 [ 2599.141127][T15469] kernel_stack 851968 [ 2599.141127][T15469] slab 7618560 [ 2599.141127][T15469] sock 24576 [ 2599.141127][T15469] shmem 0 [ 2599.141127][T15469] file_mapped 0 [ 2599.141127][T15469] file_dirty 0 [ 2599.141127][T15469] file_writeback 0 [ 2599.141127][T15469] anon_thp 4194304 [ 2599.141127][T15469] inactive_anon 45056 [ 2599.141127][T15469] active_anon 7348224 [ 2599.141127][T15469] inactive_file 61440 [ 2599.141127][T15469] active_file 0 [ 2599.141127][T15469] unevictable 126976 [ 2599.141127][T15469] slab_reclaimable 3244032 [ 2599.141127][T15469] slab_unreclaimable 4374528 [ 2599.141127][T15469] pgfault 453948 [ 2599.141127][T15469] pgmajfault 0 [ 2599.141127][T15469] workingset_refault 132 [ 2599.141127][T15469] workingset_activate 33 [ 2599.141127][T15469] workingset_nodereclaim 0 [ 2599.141127][T15469] pgrefill 6121 [ 2599.141127][T15469] pgscan 7687 [ 2599.141127][T15469] pgsteal 832 [ 2599.158577][T15469] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=18049,uid=0 [ 2599.168989][T15469] Memory cgroup out of memory: Killed process 18049 (syz-executor.5) total-vm:72704kB, anon-rss:2204kB, file-rss:35828kB, shmem-rss:0kB, UID:0 [ 2599.215227][T15469] syz-executor.5 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2599.233651][T15469] CPU: 0 PID: 15469 Comm: syz-executor.5 Not tainted 5.3.0-rc1-next-20190724 #50 [ 2599.243324][T15469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2599.243335][T15469] Call Trace: [ 2599.253487][T15469] dump_stack+0x172/0x1f0 [ 2599.263508][T15469] dump_header+0x10b/0x82d [ 2599.608471][T15469] ? oom_kill_process+0x94/0x3f0 [ 2599.613397][T15469] oom_kill_process.cold+0x10/0x15 [ 2599.618497][T15469] out_of_memory+0x79a/0x12c0 [ 2599.623266][T15469] ? lock_downgrade+0x920/0x920 [ 2599.628102][T15469] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2599.633891][T15469] ? oom_killer_disable+0x280/0x280 [ 2599.639079][T15469] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2599.644603][T15469] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2599.650225][T15469] ? do_raw_spin_unlock+0x57/0x270 [ 2599.655333][T15469] ? _raw_spin_unlock+0x2d/0x50 [ 2599.660174][T15469] try_charge+0x1080/0x1480 [ 2599.664663][T15469] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2599.670197][T15469] ? find_held_lock+0x35/0x130 [ 2599.674945][T15469] ? get_mem_cgroup_from_mm+0x139/0x320 [ 2599.680477][T15469] ? lock_downgrade+0x920/0x920 [ 2599.685306][T15469] ? percpu_ref_tryget_live+0x111/0x290 [ 2599.690841][T15469] __memcg_kmem_charge_memcg+0x71/0xf0 [ 2599.696289][T15469] ? memcg_kmem_put_cache+0x50/0x50 [ 2599.701473][T15469] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2599.707001][T15469] __memcg_kmem_charge+0x13a/0x3a0 [ 2599.712095][T15469] __alloc_pages_nodemask+0x4f2/0x8f0 [ 2599.717454][T15469] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2599.723689][T15469] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2599.729392][T15469] ? copy_process+0x46d1/0x6b00 [ 2599.734228][T15469] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2599.739499][T15469] ? trace_hardirqs_on+0x67/0x240 [ 2599.744504][T15469] ? __kasan_check_read+0x11/0x20 [ 2599.749520][T15469] copy_process+0x3f8/0x6b00 [ 2599.754138][T15469] ? __kasan_check_read+0x11/0x20 [ 2599.759168][T15469] ? __lock_acquire+0x1702/0x4c30 [ 2599.764285][T15469] ? __kasan_check_read+0x11/0x20 [ 2599.769294][T15469] ? mark_lock+0xc0/0x11e0 [ 2599.773702][T15469] ? __cleanup_sighand+0x60/0x60 [ 2599.778634][T15469] ? find_held_lock+0x35/0x130 [ 2599.783418][T15469] _do_fork+0x146/0xfa0 [ 2599.790035][T15469] ? copy_init_mm+0x20/0x20 [ 2599.798095][T15469] ? __kasan_check_read+0x11/0x20 [ 2599.803099][T15469] ? _copy_to_user+0x118/0x160 [ 2599.807864][T15469] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2599.814080][T15469] ? put_timespec64+0xda/0x140 [ 2599.819014][T15469] __x64_sys_clone+0x18d/0x250 [ 2599.823763][T15469] ? __ia32_sys_vfork+0xc0/0xc0 [ 2599.828617][T15469] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2599.833884][T15469] ? trace_hardirqs_on+0x67/0x240 [ 2599.838895][T15469] do_syscall_64+0xfa/0x760 [ 2599.843432][T15469] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2599.849492][T15469] RIP: 0033:0x457dfa [ 2599.853371][T15469] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2599.873057][T15469] RSP: 002b:00007ffcb60b4d70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2599.881472][T15469] RAX: ffffffffffffffda RBX: 00007ffcb60b4d70 RCX: 0000000000457dfa [ 2599.889440][T15469] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2599.897434][T15469] RBP: 00007ffcb60b4db0 R08: 0000000000000001 R09: 0000555556556940 [ 2599.905400][T15469] R10: 0000555556556c10 R11: 0000000000000246 R12: 0000000000000001 [ 2599.913370][T15469] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffcb60b4e00 [ 2599.922982][T15469] memory: usage 16232kB, limit 0kB, failcnt 80 [ 2599.929236][T15469] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2599.936161][T15469] Memory cgroup stats for /syz5: [ 2599.936260][T15469] anon 5091328 [ 2599.936260][T15469] file 0 [ 2599.936260][T15469] kernel_stack 786432 [ 2599.936260][T15469] slab 7618560 [ 2599.936260][T15469] sock 24576 [ 2599.936260][T15469] shmem 0 [ 2599.936260][T15469] file_mapped 0 [ 2599.936260][T15469] file_dirty 0 [ 2599.936260][T15469] file_writeback 0 [ 2599.936260][T15469] anon_thp 2097152 [ 2599.936260][T15469] inactive_anon 45056 [ 2599.936260][T15469] active_anon 5132288 [ 2599.936260][T15469] inactive_file 61440 [ 2599.936260][T15469] active_file 0 [ 2599.936260][T15469] unevictable 126976 [ 2599.936260][T15469] slab_reclaimable 3244032 [ 2599.936260][T15469] slab_unreclaimable 4374528 [ 2599.936260][T15469] pgfault 453948 [ 2599.936260][T15469] pgmajfault 0 [ 2599.936260][T15469] workingset_refault 132 [ 2599.936260][T15469] workingset_activate 33 [ 2599.936260][T15469] workingset_nodereclaim 0 [ 2599.936260][T15469] pgrefill 6121 [ 2599.936260][T15469] pgscan 7687 [ 2599.936260][T15469] pgsteal 832 [ 2600.029564][T15469] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=19014,uid=0 [ 2600.045421][T15469] Memory cgroup out of memory: Killed process 19014 (syz-executor.5) total-vm:72704kB, anon-rss:2204kB, file-rss:35784kB, shmem-rss:0kB, UID:0 [ 2600.071406][ T1056] oom_reaper: reaped process 19014 (syz-executor.5), now anon-rss:0kB, file-rss:34824kB, shmem-rss:0kB [ 2600.074017][T15469] syz-executor.5 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2600.102121][T15469] CPU: 0 PID: 15469 Comm: syz-executor.5 Not tainted 5.3.0-rc1-next-20190724 #50 [ 2600.111239][T15469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2600.121290][T15469] Call Trace: [ 2600.124584][T15469] dump_stack+0x172/0x1f0 [ 2600.128929][T15469] dump_header+0x10b/0x82d [ 2600.133351][T15469] ? oom_kill_process+0x94/0x3f0 [ 2600.138299][T15469] oom_kill_process.cold+0x10/0x15 [ 2600.143422][T15469] out_of_memory+0x79a/0x12c0 [ 2600.148102][T15469] ? lock_downgrade+0x920/0x920 [ 2600.152963][T15469] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2600.158867][T15469] ? oom_killer_disable+0x280/0x280 [ 2600.164083][T15469] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2600.169635][T15469] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2600.175280][T15469] ? do_raw_spin_unlock+0x57/0x270 [ 2600.180396][T15469] ? _raw_spin_unlock+0x2d/0x50 [ 2600.185261][T15469] try_charge+0x1080/0x1480 [ 2600.189776][T15469] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2600.195323][T15469] ? find_held_lock+0x35/0x130 [ 2600.200094][T15469] ? get_mem_cgroup_from_mm+0x139/0x320 [ 2600.205651][T15469] ? lock_downgrade+0x920/0x920 [ 2600.210511][T15469] ? percpu_ref_tryget_live+0x111/0x290 [ 2600.216070][T15469] __memcg_kmem_charge_memcg+0x71/0xf0 [ 2600.221537][T15469] ? memcg_kmem_put_cache+0x50/0x50 [ 2600.226744][T15469] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2600.232292][T15469] __memcg_kmem_charge+0x13a/0x3a0 [ 2600.237413][T15469] __alloc_pages_nodemask+0x4f2/0x8f0 [ 2600.242788][T15469] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2600.249034][T15469] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2600.254764][T15469] ? copy_process+0x46d1/0x6b00 [ 2600.259624][T15469] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2600.264918][T15469] ? trace_hardirqs_on+0x67/0x240 [ 2600.269949][T15469] ? __kasan_check_read+0x11/0x20 [ 2600.274988][T15469] copy_process+0x3f8/0x6b00 [ 2600.279598][T15469] ? __kasan_check_read+0x11/0x20 [ 2600.284813][T15469] ? __lock_acquire+0x1702/0x4c30 [ 2600.289873][T15469] ? __kasan_check_read+0x11/0x20 [ 2600.294900][T15469] ? mark_lock+0xc0/0x11e0 [ 2600.299337][T15469] ? __cleanup_sighand+0x60/0x60 [ 2600.304286][T15469] ? find_held_lock+0x35/0x130 [ 2600.309071][T15469] _do_fork+0x146/0xfa0 [ 2600.313237][T15469] ? copy_init_mm+0x20/0x20 [ 2600.317748][T15469] ? __kasan_check_read+0x11/0x20 [ 2600.322774][T15469] ? _copy_to_user+0x118/0x160 [ 2600.327546][T15469] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2600.333782][T15469] ? put_timespec64+0xda/0x140 [ 2600.338553][T15469] __x64_sys_clone+0x18d/0x250 [ 2600.343323][T15469] ? __ia32_sys_vfork+0xc0/0xc0 [ 2600.348189][T15469] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2600.353481][T15469] ? trace_hardirqs_on+0x67/0x240 [ 2600.358516][T15469] do_syscall_64+0xfa/0x760 [ 2600.363027][T15469] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2600.368916][T15469] RIP: 0033:0x457dfa [ 2600.372810][T15469] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2600.392424][T15469] RSP: 002b:00007ffcb60b4d70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2600.400840][T15469] RAX: ffffffffffffffda RBX: 00007ffcb60b4d70 RCX: 0000000000457dfa [ 2600.408814][T15469] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2600.416781][T15469] RBP: 00007ffcb60b4db0 R08: 0000000000000001 R09: 0000555556556940 [ 2600.424734][T15469] R10: 0000555556556c10 R11: 0000000000000246 R12: 0000000000000001 [ 2600.432686][T15469] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffcb60b4e00 [ 2600.441546][T15469] memory: usage 13880kB, limit 0kB, failcnt 86 [ 2600.449912][T15469] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2600.458993][T15469] Memory cgroup stats for /syz5: [ 2600.459106][T15469] anon 2899968 [ 2600.459106][T15469] file 0 [ 2600.459106][T15469] kernel_stack 786432 [ 2600.459106][T15469] slab 7618560 [ 2600.459106][T15469] sock 24576 [ 2600.459106][T15469] shmem 0 [ 2600.459106][T15469] file_mapped 0 [ 2600.459106][T15469] file_dirty 0 [ 2600.459106][T15469] file_writeback 0 [ 2600.459106][T15469] anon_thp 0 [ 2600.459106][T15469] inactive_anon 45056 [ 2600.459106][T15469] active_anon 2904064 [ 2600.459106][T15469] inactive_file 61440 [ 2600.459106][T15469] active_file 0 [ 2600.459106][T15469] unevictable 126976 [ 2600.459106][T15469] slab_reclaimable 3244032 [ 2600.459106][T15469] slab_unreclaimable 4374528 [ 2600.459106][T15469] pgfault 453948 [ 2600.459106][T15469] pgmajfault 0 [ 2600.459106][T15469] workingset_refault 132 [ 2600.459106][T15469] workingset_activate 33 [ 2600.459106][T15469] workingset_nodereclaim 0 [ 2600.459106][T15469] pgrefill 6121 [ 2600.459106][T15469] pgscan 7687 [ 2600.459106][T15469] pgsteal 832 [ 2600.459106][T15469] pgactivate 5544 [ 2600.464063][T15469] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=31488,uid=0 [ 2600.572154][T15469] Memory cgroup out of memory: Killed process 31488 (syz-executor.5) total-vm:72704kB, anon-rss:172kB, file-rss:35804kB, shmem-rss:0kB, UID:0 [ 2600.608249][T15469] syz-executor.5 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2600.620328][T15469] CPU: 0 PID: 15469 Comm: syz-executor.5 Not tainted 5.3.0-rc1-next-20190724 #50 [ 2600.629439][T15469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2600.629445][T15469] Call Trace: [ 2600.629468][T15469] dump_stack+0x172/0x1f0 [ 2600.629488][T15469] dump_header+0x10b/0x82d [ 2600.629501][T15469] ? oom_kill_process+0x94/0x3f0 [ 2600.629517][T15469] oom_kill_process.cold+0x10/0x15 [ 2600.629535][T15469] out_of_memory+0x79a/0x12c0 [ 2600.629551][T15469] ? lock_downgrade+0x920/0x920 [ 2600.629571][T15469] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2600.629587][T15469] ? oom_killer_disable+0x280/0x280 [ 2600.629614][T15469] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2600.629630][T15469] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2600.629650][T15469] ? do_raw_spin_unlock+0x57/0x270 [ 2600.698420][T15469] ? _raw_spin_unlock+0x2d/0x50 [ 2600.703284][T15469] try_charge+0x1080/0x1480 [ 2600.707809][T15469] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2600.713349][T15469] ? find_held_lock+0x35/0x130 [ 2600.718114][T15469] ? get_mem_cgroup_from_mm+0x139/0x320 [ 2600.723666][T15469] ? lock_downgrade+0x920/0x920 [ 2600.728515][T15469] ? percpu_ref_tryget_live+0x111/0x290 [ 2600.734066][T15469] __memcg_kmem_charge_memcg+0x71/0xf0 [ 2600.739524][T15469] ? memcg_kmem_put_cache+0x50/0x50 [ 2600.744752][T15469] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2600.750304][T15469] __memcg_kmem_charge+0x13a/0x3a0 [ 2600.755947][T15469] __alloc_pages_nodemask+0x4f2/0x8f0 [ 2600.761349][T15469] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2600.767605][T15469] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2600.774846][T15469] ? copy_process+0x46d1/0x6b00 [ 2600.779703][T15469] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2600.784991][T15469] ? trace_hardirqs_on+0x67/0x240 [ 2600.790014][T15469] ? __kasan_check_read+0x11/0x20 [ 2600.795046][T15469] copy_process+0x3f8/0x6b00 [ 2600.799646][T15469] ? __kasan_check_read+0x11/0x20 [ 2600.804680][T15469] ? __lock_acquire+0x1702/0x4c30 [ 2600.809702][T15469] ? __kasan_check_read+0x11/0x20 [ 2600.814732][T15469] ? mark_lock+0xc0/0x11e0 [ 2600.819189][T15469] ? __cleanup_sighand+0x60/0x60 [ 2600.824171][T15469] ? find_held_lock+0x35/0x130 [ 2600.828966][T15469] _do_fork+0x146/0xfa0 [ 2600.833124][T15469] ? copy_init_mm+0x20/0x20 [ 2600.837650][T15469] ? __kasan_check_read+0x11/0x20 [ 2600.842682][T15469] ? _copy_to_user+0x118/0x160 [ 2600.847451][T15469] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2600.853725][T15469] ? put_timespec64+0xda/0x140 [ 2600.858508][T15469] __x64_sys_clone+0x18d/0x250 [ 2600.863280][T15469] ? __ia32_sys_vfork+0xc0/0xc0 [ 2600.868146][T15469] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2600.873460][T15469] ? trace_hardirqs_on+0x67/0x240 [ 2600.879105][T15469] do_syscall_64+0xfa/0x760 [ 2600.883608][T15469] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2600.889498][T15469] RIP: 0033:0x457dfa [ 2600.893390][T15469] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2600.913001][T15469] RSP: 002b:00007ffcb60b4d70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2600.921424][T15469] RAX: ffffffffffffffda RBX: 00007ffcb60b4d70 RCX: 0000000000457dfa [ 2600.929413][T15469] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2600.937390][T15469] RBP: 00007ffcb60b4db0 R08: 0000000000000001 R09: 0000555556556940 [ 2600.945363][T15469] R10: 0000555556556c10 R11: 0000000000000246 R12: 0000000000000001 [ 2600.953335][T15469] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffcb60b4e00 [ 2600.963249][T15469] memory: usage 13572kB, limit 0kB, failcnt 92 [ 2600.969648][T15469] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2600.977713][T15469] Memory cgroup stats for /syz5: [ 2600.977828][T15469] anon 2756608 [ 2600.977828][T15469] file 0 [ 2600.977828][T15469] kernel_stack 720896 [ 2600.977828][T15469] slab 7618560 [ 2600.977828][T15469] sock 24576 [ 2600.977828][T15469] shmem 0 [ 2600.977828][T15469] file_mapped 0 [ 2600.977828][T15469] file_dirty 0 [ 2600.977828][T15469] file_writeback 0 [ 2600.977828][T15469] anon_thp 0 [ 2600.977828][T15469] inactive_anon 45056 [ 2600.977828][T15469] active_anon 2768896 [ 2600.977828][T15469] inactive_file 61440 [ 2600.977828][T15469] active_file 0 [ 2600.977828][T15469] unevictable 126976 [ 2600.977828][T15469] slab_reclaimable 3244032 [ 2600.977828][T15469] slab_unreclaimable 4374528 [ 2600.977828][T15469] pgfault 453948 [ 2600.977828][T15469] pgmajfault 0 [ 2600.977828][T15469] workingset_refault 132 [ 2600.977828][T15469] workingset_activate 33 [ 2600.977828][T15469] workingset_nodereclaim 0 [ 2600.977828][T15469] pgrefill 6121 [ 2600.977828][T15469] pgscan 7687 [ 2600.977828][T15469] pgsteal 832 [ 2600.977828][T15469] pgactivate 5544 [ 2601.086204][T15469] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=31474,uid=0 [ 2601.111886][T15469] Memory cgroup out of memory: Killed process 31474 (syz-executor.5) total-vm:72704kB, anon-rss:172kB, file-rss:35804kB, shmem-rss:0kB, UID:0 [ 2601.135777][ T1056] oom_reaper: reaped process 31474 (syz-executor.5), now anon-rss:0kB, file-rss:34844kB, shmem-rss:0kB [ 2601.139191][T15469] syz-executor.5 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2601.168132][T15469] CPU: 0 PID: 15469 Comm: syz-executor.5 Not tainted 5.3.0-rc1-next-20190724 #50 [ 2601.177271][T15469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2601.187340][T15469] Call Trace: [ 2601.190656][T15469] dump_stack+0x172/0x1f0 [ 2601.195000][T15469] dump_header+0x10b/0x82d [ 2601.199427][T15469] ? oom_kill_process+0x94/0x3f0 [ 2601.204384][T15469] oom_kill_process.cold+0x10/0x15 [ 2601.209521][T15469] out_of_memory+0x79a/0x12c0 [ 2601.214211][T15469] ? lock_downgrade+0x920/0x920 [ 2601.219071][T15469] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2601.224905][T15469] ? oom_killer_disable+0x280/0x280 [ 2601.230139][T15469] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2601.235713][T15469] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2601.241361][T15469] ? do_raw_spin_unlock+0x57/0x270 [ 2601.246481][T15469] ? _raw_spin_unlock+0x2d/0x50 [ 2601.251338][T15469] try_charge+0x1080/0x1480 [ 2601.255861][T15469] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2601.261412][T15469] ? find_held_lock+0x35/0x130 [ 2601.266182][T15469] ? get_mem_cgroup_from_mm+0x139/0x320 [ 2601.271827][T15469] ? lock_downgrade+0x920/0x920 [ 2601.276677][T15469] ? percpu_ref_tryget_live+0x111/0x290 [ 2601.282226][T15469] __memcg_kmem_charge_memcg+0x71/0xf0 [ 2601.287688][T15469] ? memcg_kmem_put_cache+0x50/0x50 [ 2601.292890][T15469] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2601.298448][T15469] __memcg_kmem_charge+0x13a/0x3a0 [ 2601.303564][T15469] __alloc_pages_nodemask+0x4f2/0x8f0 [ 2601.308940][T15469] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2601.315192][T15469] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2601.320917][T15469] ? copy_process+0x46d1/0x6b00 [ 2601.325779][T15469] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2601.331066][T15469] ? trace_hardirqs_on+0x67/0x240 [ 2601.336076][T15469] ? __kasan_check_read+0x11/0x20 [ 2601.341088][T15469] copy_process+0x3f8/0x6b00 [ 2601.345661][T15469] ? __kasan_check_read+0x11/0x20 [ 2601.350669][T15469] ? __lock_acquire+0x1702/0x4c30 [ 2601.355689][T15469] ? __kasan_check_read+0x11/0x20 [ 2601.360695][T15469] ? mark_lock+0xc0/0x11e0 [ 2601.365094][T15469] ? __cleanup_sighand+0x60/0x60 [ 2601.370027][T15469] ? find_held_lock+0x35/0x130 [ 2601.374788][T15469] _do_fork+0x146/0xfa0 [ 2601.378934][T15469] ? copy_init_mm+0x20/0x20 [ 2601.383456][T15469] ? __kasan_check_read+0x11/0x20 [ 2601.388490][T15469] ? _copy_to_user+0x118/0x160 [ 2601.393240][T15469] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2601.399463][T15469] ? put_timespec64+0xda/0x140 [ 2601.404582][T15469] __x64_sys_clone+0x18d/0x250 [ 2601.409335][T15469] ? __ia32_sys_vfork+0xc0/0xc0 [ 2601.414191][T15469] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2601.419476][T15469] ? trace_hardirqs_on+0x67/0x240 [ 2601.424488][T15469] do_syscall_64+0xfa/0x760 [ 2601.428980][T15469] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2601.434850][T15469] RIP: 0033:0x457dfa [ 2601.438775][T15469] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2601.458388][T15469] RSP: 002b:00007ffcb60b4d70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2601.466806][T15469] RAX: ffffffffffffffda RBX: 00007ffcb60b4d70 RCX: 0000000000457dfa [ 2601.474789][T15469] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2601.482746][T15469] RBP: 00007ffcb60b4db0 R08: 0000000000000001 R09: 0000555556556940 [ 2601.490709][T15469] R10: 0000555556556c10 R11: 0000000000000246 R12: 0000000000000001 [ 2601.498677][T15469] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffcb60b4e00 [ 2601.507524][T15469] memory: usage 13272kB, limit 0kB, failcnt 98 [ 2601.513699][T15469] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2601.520764][T15469] Memory cgroup stats for /syz5: [ 2601.520870][T15469] anon 2617344 [ 2601.520870][T15469] file 0 [ 2601.520870][T15469] kernel_stack 655360 [ 2601.520870][T15469] slab 7618560 [ 2601.520870][T15469] sock 24576 [ 2601.520870][T15469] shmem 0 [ 2601.520870][T15469] file_mapped 0 [ 2601.520870][T15469] file_dirty 0 [ 2601.520870][T15469] file_writeback 0 [ 2601.520870][T15469] anon_thp 0 [ 2601.520870][T15469] inactive_anon 45056 [ 2601.520870][T15469] active_anon 2633728 [ 2601.520870][T15469] inactive_file 61440 [ 2601.520870][T15469] active_file 0 [ 2601.520870][T15469] unevictable 126976 [ 2601.520870][T15469] slab_reclaimable 3244032 [ 2601.520870][T15469] slab_unreclaimable 4374528 [ 2601.520870][T15469] pgfault 453948 [ 2601.520870][T15469] pgmajfault 0 [ 2601.520870][T15469] workingset_refault 132 [ 2601.520870][T15469] workingset_activate 33 [ 2601.520870][T15469] workingset_nodereclaim 0 [ 2601.520870][T15469] pgrefill 6121 [ 2601.520870][T15469] pgscan 7687 [ 2601.520870][T15469] pgsteal 832 [ 2601.520870][T15469] pgactivate 5544 [ 2601.525836][T15469] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=31433,uid=0 [ 2601.637363][T15469] Memory cgroup out of memory: Killed process 31433 (syz-executor.5) total-vm:72704kB, anon-rss:172kB, file-rss:35792kB, shmem-rss:0kB, UID:0 [ 2601.663198][ T1056] oom_reaper: reaped process 31433 (syz-executor.5), now anon-rss:0kB, file-rss:34832kB, shmem-rss:0kB [ 2601.677053][T26332] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2601.684454][T15469] syz-executor.5 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2601.704943][T26332] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2601.738807][T15469] CPU: 1 PID: 15469 Comm: syz-executor.5 Not tainted 5.3.0-rc1-next-20190724 #50 [ 2601.747938][T15469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2601.747945][T15469] Call Trace: [ 2601.747969][T15469] dump_stack+0x172/0x1f0 [ 2601.747989][T15469] dump_header+0x10b/0x82d [ 2601.748001][T15469] ? oom_kill_process+0x94/0x3f0 [ 2601.748019][T15469] oom_kill_process.cold+0x10/0x15 [ 2601.748037][T15469] out_of_memory+0x79a/0x12c0 [ 2601.784809][T15469] ? lock_downgrade+0x920/0x920 [ 2601.789677][T15469] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2601.795494][T15469] ? oom_killer_disable+0x280/0x280 [ 2601.800713][T15469] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2601.800730][T15469] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2601.800749][T15469] ? do_raw_spin_unlock+0x57/0x270 [ 2601.800764][T15469] ? _raw_spin_unlock+0x2d/0x50 [ 2601.800782][T15469] try_charge+0x1080/0x1480 [ 2601.800806][T15469] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2601.831956][T15469] ? find_held_lock+0x35/0x130 [ 2601.836738][T15469] ? get_mem_cgroup_from_mm+0x139/0x320 [ 2601.842298][T15469] ? lock_downgrade+0x920/0x920 [ 2601.847155][T15469] ? percpu_ref_tryget_live+0x111/0x290 [ 2601.852711][T15469] __memcg_kmem_charge_memcg+0x71/0xf0 [ 2601.858189][T15469] ? memcg_kmem_put_cache+0x50/0x50 [ 2601.863406][T15469] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2601.868970][T15469] __memcg_kmem_charge+0x13a/0x3a0 [ 2601.874218][T15469] __alloc_pages_nodemask+0x4f2/0x8f0 [ 2601.879788][T15469] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2601.886073][T15469] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2601.891806][T15469] ? copy_process+0x46d1/0x6b00 [ 2601.896801][T15469] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2601.902095][T15469] ? trace_hardirqs_on+0x67/0x240 [ 2601.907123][T15469] ? __kasan_check_read+0x11/0x20 [ 2601.912161][T15469] copy_process+0x3f8/0x6b00 [ 2601.916766][T15469] ? __kasan_check_read+0x11/0x20 [ 2601.921800][T15469] ? __lock_acquire+0x1702/0x4c30 [ 2601.926830][T15469] ? __kasan_check_read+0x11/0x20 [ 2601.931867][T15469] ? mark_lock+0xc0/0x11e0 [ 2601.936293][T15469] ? __cleanup_sighand+0x60/0x60 [ 2601.941215][T15469] ? find_held_lock+0x35/0x130 [ 2601.945983][T15469] _do_fork+0x146/0xfa0 [ 2601.950134][T15469] ? copy_init_mm+0x20/0x20 [ 2601.954619][T15469] ? __kasan_check_read+0x11/0x20 [ 2601.959625][T15469] ? _copy_to_user+0x118/0x160 [ 2601.964377][T15469] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2601.970599][T15469] ? put_timespec64+0xda/0x140 [ 2601.975388][T15469] __x64_sys_clone+0x18d/0x250 [ 2601.980145][T15469] ? __ia32_sys_vfork+0xc0/0xc0 [ 2601.984996][T15469] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2601.990279][T15469] ? trace_hardirqs_on+0x67/0x240 [ 2601.995285][T15469] do_syscall_64+0xfa/0x760 [ 2601.999789][T15469] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2602.005665][T15469] RIP: 0033:0x457dfa [ 2602.009540][T15469] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2602.029136][T15469] RSP: 002b:00007ffcb60b4d70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2602.038228][T15469] RAX: ffffffffffffffda RBX: 00007ffcb60b4d70 RCX: 0000000000457dfa [ 2602.046184][T15469] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2602.054134][T15469] RBP: 00007ffcb60b4db0 R08: 0000000000000001 R09: 0000555556556940 [ 2602.062086][T15469] R10: 0000555556556c10 R11: 0000000000000246 R12: 0000000000000001 [ 2602.070053][T15469] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffcb60b4e00 [ 2602.078627][T15469] memory: usage 12848kB, limit 0kB, failcnt 104 [ 2602.084881][T15469] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2602.091885][T15469] Memory cgroup stats for /syz5: [ 2602.092045][T15469] anon 2469888 [ 2602.092045][T15469] file 0 [ 2602.092045][T15469] kernel_stack 655360 [ 2602.092045][T15469] slab 7618560 [ 2602.092045][T15469] sock 24576 [ 2602.092045][T15469] shmem 0 [ 2602.092045][T15469] file_mapped 0 [ 2602.092045][T15469] file_dirty 0 [ 2602.092045][T15469] file_writeback 0 [ 2602.092045][T15469] anon_thp 0 [ 2602.092045][T15469] inactive_anon 45056 [ 2602.092045][T15469] active_anon 2498560 [ 2602.092045][T15469] inactive_file 61440 [ 2602.092045][T15469] active_file 0 [ 2602.092045][T15469] unevictable 126976 [ 2602.092045][T15469] slab_reclaimable 3244032 [ 2602.092045][T15469] slab_unreclaimable 4374528 [ 2602.092045][T15469] pgfault 453948 [ 2602.092045][T15469] pgmajfault 0 [ 2602.092045][T15469] workingset_refault 132 [ 2602.092045][T15469] workingset_activate 33 [ 2602.092045][T15469] workingset_nodereclaim 0 [ 2602.092045][T15469] pgrefill 6121 [ 2602.092045][T15469] pgscan 7687 [ 2602.092045][T15469] pgsteal 832 [ 2602.092045][T15469] pgactivate 5544 [ 2602.188442][T15469] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=12871,uid=0 [ 2602.204367][T15469] Memory cgroup out of memory: Killed process 12871 (syz-executor.5) total-vm:72836kB, anon-rss:176kB, file-rss:35784kB, shmem-rss:0kB, UID:0 [ 2602.240381][T15469] syz-executor.5 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2602.252295][T15469] CPU: 1 PID: 15469 Comm: syz-executor.5 Not tainted 5.3.0-rc1-next-20190724 #50 [ 2602.261404][T15469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2602.271469][T15469] Call Trace: [ 2602.274779][T15469] dump_stack+0x172/0x1f0 [ 2602.279149][T15469] dump_header+0x10b/0x82d [ 2602.283571][T15469] ? oom_kill_process+0x94/0x3f0 [ 2602.288520][T15469] oom_kill_process.cold+0x10/0x15 [ 2602.293636][T15469] out_of_memory+0x79a/0x12c0 [ 2602.298320][T15469] ? lock_downgrade+0x920/0x920 [ 2602.303178][T15469] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2602.308997][T15469] ? oom_killer_disable+0x280/0x280 [ 2602.314223][T15469] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2602.319786][T15469] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2602.325431][T15469] ? do_raw_spin_unlock+0x57/0x270 [ 2602.330539][T15469] ? _raw_spin_unlock+0x2d/0x50 [ 2602.335375][T15469] try_charge+0x1080/0x1480 [ 2602.339869][T15469] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2602.345486][T15469] ? find_held_lock+0x35/0x130 [ 2602.350253][T15469] ? get_mem_cgroup_from_mm+0x139/0x320 [ 2602.355793][T15469] ? lock_downgrade+0x920/0x920 [ 2602.360626][T15469] ? percpu_ref_tryget_live+0x111/0x290 [ 2602.366173][T15469] __memcg_kmem_charge_memcg+0x71/0xf0 [ 2602.371618][T15469] ? memcg_kmem_put_cache+0x50/0x50 [ 2602.376805][T15469] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2602.382435][T15469] __memcg_kmem_charge+0x13a/0x3a0 [ 2602.387536][T15469] __alloc_pages_nodemask+0x4f2/0x8f0 [ 2602.392891][T15469] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2602.399122][T15469] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2602.404825][T15469] ? copy_process+0x46d1/0x6b00 [ 2602.409659][T15469] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2602.414947][T15469] ? trace_hardirqs_on+0x67/0x240 [ 2602.419958][T15469] ? __kasan_check_read+0x11/0x20 [ 2602.424967][T15469] copy_process+0x3f8/0x6b00 [ 2602.429548][T15469] ? __kasan_check_read+0x11/0x20 [ 2602.434559][T15469] ? __lock_acquire+0x1702/0x4c30 [ 2602.439564][T15469] ? __kasan_check_read+0x11/0x20 [ 2602.444585][T15469] ? mark_lock+0xc0/0x11e0 [ 2602.449004][T15469] ? __cleanup_sighand+0x60/0x60 [ 2602.453952][T15469] ? find_held_lock+0x35/0x130 [ 2602.458716][T15469] _do_fork+0x146/0xfa0 [ 2602.462862][T15469] ? copy_init_mm+0x20/0x20 [ 2602.467352][T15469] ? __kasan_check_read+0x11/0x20 [ 2602.472392][T15469] ? _copy_to_user+0x118/0x160 [ 2602.477146][T15469] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2602.483369][T15469] ? put_timespec64+0xda/0x140 [ 2602.488137][T15469] __x64_sys_clone+0x18d/0x250 [ 2602.492889][T15469] ? __ia32_sys_vfork+0xc0/0xc0 [ 2602.497754][T15469] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2602.503030][T15469] ? trace_hardirqs_on+0x67/0x240 [ 2602.508041][T15469] do_syscall_64+0xfa/0x760 [ 2602.512530][T15469] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2602.518403][T15469] RIP: 0033:0x457dfa [ 2602.522277][T15469] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2602.541880][T15469] RSP: 002b:00007ffcb60b4d70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2602.550306][T15469] RAX: ffffffffffffffda RBX: 00007ffcb60b4d70 RCX: 0000000000457dfa [ 2602.558262][T15469] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2602.566218][T15469] RBP: 00007ffcb60b4db0 R08: 0000000000000001 R09: 0000555556556940 [ 2602.574190][T15469] R10: 0000555556556c10 R11: 0000000000000246 R12: 0000000000000001 [ 2602.582153][T15469] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffcb60b4e00 [ 2602.591599][T15469] memory: usage 12532kB, limit 0kB, failcnt 110 [ 2602.598015][T15469] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2602.604862][T15469] Memory cgroup stats for /syz5: [ 2602.605002][T15469] anon 2334720 [ 2602.605002][T15469] file 0 [ 2602.605002][T15469] kernel_stack 655360 [ 2602.605002][T15469] slab 7618560 [ 2602.605002][T15469] sock 24576 [ 2602.605002][T15469] shmem 0 [ 2602.605002][T15469] file_mapped 0 [ 2602.605002][T15469] file_dirty 0 [ 2602.605002][T15469] file_writeback 0 [ 2602.605002][T15469] anon_thp 0 [ 2602.605002][T15469] inactive_anon 45056 [ 2602.605002][T15469] active_anon 2363392 [ 2602.605002][T15469] inactive_file 61440 [ 2602.605002][T15469] active_file 0 [ 2602.605002][T15469] unevictable 126976 [ 2602.605002][T15469] slab_reclaimable 3244032 [ 2602.605002][T15469] slab_unreclaimable 4374528 [ 2602.605002][T15469] pgfault 453948 [ 2602.605002][T15469] pgmajfault 0 [ 2602.605002][T15469] workingset_refault 132 [ 2602.605002][T15469] workingset_activate 33 [ 2602.605002][T15469] workingset_nodereclaim 0 [ 2602.605002][T15469] pgrefill 6121 [ 2602.605002][T15469] pgscan 7687 [ 2602.605002][T15469] pgsteal 832 [ 2602.605002][T15469] pgactivate 5544 [ 2602.610125][T15469] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=15469,uid=0 [ 2602.717317][T15469] Memory cgroup out of memory: Killed process 15469 (syz-executor.5) total-vm:72440kB, anon-rss:112kB, file-rss:35776kB, shmem-rss:0kB, UID:0 [ 2602.887063][T26332] team0: Port device team_slave_0 added [ 2602.977122][T26332] team0: Port device team_slave_1 added [ 2603.031227][T26332] device hsr_slave_0 entered promiscuous mode [ 2603.051257][T26332] device hsr_slave_1 entered promiscuous mode [ 2603.065337][T26332] debugfs: Directory 'hsr0' with parent '/' already present! 10:40:03 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000240)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x44) gettid() r2 = msgget$private(0x0, 0x40) msgctl$MSG_INFO(r2, 0xc, &(0x7f0000000340)=""/229) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, 0x0) socket$kcm(0x11, 0x3, 0x0) socket$caif_stream(0x25, 0x1, 0x4) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f00000002c0)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0xfffffffffffffcd2, &(0x7f0000000100)=[{&(0x7f0000000180)}]}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207c804a01a000000880367fb0a000200030ada1b40d805000300c50083b8", 0x2e}], 0x1}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r3, 0x0, 0x0) 10:40:03 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000005000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) [ 2605.244106][T26332] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2605.256177][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2605.264459][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2605.420708][T26332] 8021q: adding VLAN 0 to HW filter on device team0 [ 2605.433951][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2605.443252][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2605.451932][ T3018] bridge0: port 1(bridge_slave_0) entered blocking state [ 2605.459357][ T3018] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2605.469056][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2605.636177][ T4817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2605.644890][ T4817] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2605.653592][ T4817] bridge0: port 2(bridge_slave_1) entered blocking state [ 2605.660718][ T4817] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2605.826661][T22420] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2605.835191][T22420] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2605.845020][T22420] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2605.854065][T22420] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2605.863009][T22420] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2605.872729][T22420] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2605.882418][T22420] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2605.893627][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2605.902320][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2605.914441][T24975] device bridge_slave_1 left promiscuous mode [ 2605.921544][T24975] bridge0: port 2(bridge_slave_1) entered disabled state [ 2605.930453][T24975] device bridge_slave_0 left promiscuous mode [ 2605.937200][T24975] bridge0: port 1(bridge_slave_0) entered disabled state [ 2605.945693][T24975] device bridge_slave_1 left promiscuous mode [ 2605.952139][T24975] bridge0: port 2(bridge_slave_1) entered disabled state [ 2605.962133][T24975] device bridge_slave_0 left promiscuous mode [ 2605.968834][T24975] bridge0: port 1(bridge_slave_0) entered disabled state [ 2609.829364][T24975] device hsr_slave_0 left promiscuous mode [ 2609.835277][T24975] device hsr_slave_1 left promiscuous mode [ 2609.852747][T24975] team0 (unregistering): Port device team_slave_1 removed [ 2609.865037][T24975] team0 (unregistering): Port device team_slave_0 removed [ 2609.879226][T24975] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2609.892576][T24975] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2609.947130][T24975] bond0 (unregistering): Released all slaves [ 2609.981259][T24975] device hsr_slave_0 left promiscuous mode [ 2609.989394][T24975] device hsr_slave_1 left promiscuous mode [ 2610.004634][T24975] team0 (unregistering): Port device team_slave_1 removed [ 2610.019525][T24975] team0 (unregistering): Port device team_slave_0 removed [ 2610.031139][T24975] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2610.045016][T24975] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2610.100152][T24975] bond0 (unregistering): Released all slaves [ 2610.132466][ T4817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2610.141816][ T4817] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2610.153145][T26332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2610.181397][T26332] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2610.323788][T26343] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2610.382183][T26343] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2610.392846][T26343] CPU: 0 PID: 26343 Comm: syz-executor.1 Not tainted 5.3.0-rc1-next-20190724 #50 [ 2610.401960][T26343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2610.412020][T26343] Call Trace: [ 2610.415333][T26343] dump_stack+0x172/0x1f0 [ 2610.419680][T26343] dump_header+0x10b/0x82d [ 2610.424108][T26343] oom_kill_process.cold+0x10/0x15 [ 2610.429231][T26343] out_of_memory+0x79a/0x12c0 [ 2610.433916][T26343] ? __sched_text_start+0x8/0x8 [ 2610.438778][T26343] ? oom_killer_disable+0x280/0x280 [ 2610.443998][T26343] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2610.449556][T26343] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2610.455202][T26343] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 2610.461011][T26343] ? cgroup_file_notify+0x140/0x1b0 [ 2610.466224][T26343] memory_max_write+0x262/0x3a0 [ 2610.471176][T26343] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 2610.477949][T26343] ? lock_acquire+0x190/0x410 [ 2610.482628][T26343] ? kernfs_fop_write+0x227/0x480 [ 2610.487667][T26343] cgroup_file_write+0x241/0x790 [ 2610.492616][T26343] ? mem_cgroup_count_precharge_pte_range+0x5a0/0x5a0 [ 2610.499386][T26343] ? cgroup_migrate_add_task+0x890/0x890 [ 2610.505036][T26343] ? cgroup_migrate_add_task+0x890/0x890 [ 2610.510671][T26343] kernfs_fop_write+0x2b8/0x480 [ 2610.515535][T26343] __vfs_write+0x8a/0x110 [ 2610.519870][T26343] ? kernfs_fop_open+0xd80/0xd80 [ 2610.524816][T26343] vfs_write+0x268/0x5d0 [ 2610.529072][T26343] ksys_write+0x14f/0x290 [ 2610.533416][T26343] ? __ia32_sys_read+0xb0/0xb0 [ 2610.538286][T26343] __x64_sys_write+0x73/0xb0 [ 2610.542967][T26343] do_syscall_64+0xfa/0x760 [ 2610.547482][T26343] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2610.553462][T26343] RIP: 0033:0x459829 [ 2610.557367][T26343] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2610.577061][T26343] RSP: 002b:00007fd88aa23c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2610.585497][T26343] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829 [ 2610.593470][T26343] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 2610.601455][T26343] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2610.609612][T26343] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd88aa246d4 [ 2610.617590][T26343] R13: 00000000004c9774 R14: 00000000004e0b70 R15: 00000000ffffffff [ 2610.648870][T26343] memory: usage 6660kB, limit 0kB, failcnt 24 [ 2610.657087][T26343] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2610.664335][T26343] Memory cgroup stats for /syz1: [ 2610.665686][T26343] anon 2240512 [ 2610.665686][T26343] file 217088 [ 2610.665686][T26343] kernel_stack 65536 [ 2610.665686][T26343] slab 4468736 [ 2610.665686][T26343] sock 57344 [ 2610.665686][T26343] shmem 122880 [ 2610.665686][T26343] file_mapped 0 [ 2610.665686][T26343] file_dirty 0 [ 2610.665686][T26343] file_writeback 0 [ 2610.665686][T26343] anon_thp 2097152 [ 2610.665686][T26343] inactive_anon 69632 [ 2610.665686][T26343] active_anon 2170880 [ 2610.665686][T26343] inactive_file 135168 [ 2610.665686][T26343] active_file 45056 [ 2610.665686][T26343] unevictable 0 [ 2610.665686][T26343] slab_reclaimable 2433024 [ 2610.665686][T26343] slab_unreclaimable 2035712 [ 2610.665686][T26343] pgfault 392535 [ 2610.665686][T26343] pgmajfault 0 [ 2610.665686][T26343] workingset_refault 0 [ 2610.665686][T26343] workingset_activate 0 [ 2610.665686][T26343] workingset_nodereclaim 0 [ 2610.665686][T26343] pgrefill 126 [ 2610.665686][T26343] pgscan 153 [ 2610.665686][T26343] pgsteal 86 [ 2610.762635][T26343] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=26342,uid=0 [ 2610.781594][T26343] Memory cgroup out of memory: Killed process 26342 (syz-executor.1) total-vm:72576kB, anon-rss:2140kB, file-rss:34816kB, shmem-rss:0kB, UID:0 [ 2610.801211][ T1056] oom_reaper: reaped process 26342 (syz-executor.1), now anon-rss:0kB, file-rss:34872kB, shmem-rss:0kB 10:40:09 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {&(0x7f0000000000)="bcec64749e2cf89751dac0e7ebe2021981d2bc9997060217f4ac5f866f4bc8", 0x1f}], 0x2) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:40:09 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000006000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:40:09 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000240)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x44) gettid() r2 = msgget$private(0x0, 0x40) msgctl$MSG_INFO(r2, 0xc, &(0x7f0000000340)=""/229) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, 0x0) socket$kcm(0x11, 0x3, 0x0) socket$caif_stream(0x25, 0x1, 0x4) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f00000002c0)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0xfffffffffffffcd2, &(0x7f0000000100)=[{&(0x7f0000000180)}]}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207c804a01a000000880367fb0a000200030ada1b40d805000300c50083b8", 0x2e}], 0x1}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r3, 0x0, 0x0) 10:40:09 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='numa_maps\x00') io_setup(0x4, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x320f) [ 2611.072639][T15473] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2611.116262][T15473] CPU: 0 PID: 15473 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190724 #50 [ 2611.125422][T15473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2611.136266][T15473] Call Trace: [ 2611.139569][T15473] dump_stack+0x172/0x1f0 [ 2611.143905][T15473] dump_header+0x10b/0x82d [ 2611.148325][T15473] ? oom_kill_process+0x94/0x3f0 [ 2611.153274][T15473] oom_kill_process.cold+0x10/0x15 [ 2611.158393][T15473] out_of_memory+0x79a/0x12c0 [ 2611.163075][T15473] ? lock_downgrade+0x920/0x920 [ 2611.168466][T15473] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2611.174285][T15473] ? oom_killer_disable+0x280/0x280 [ 2611.179554][T15473] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2611.185133][T15473] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2611.190786][T15473] ? do_raw_spin_unlock+0x57/0x270 [ 2611.195918][T15473] ? _raw_spin_unlock+0x2d/0x50 [ 2611.200787][T15473] try_charge+0x1080/0x1480 [ 2611.205324][T15473] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2611.210885][T15473] ? find_held_lock+0x35/0x130 10:40:09 executing program 3: ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000100)={0x3b, @broadcast, 0x0, 0x2, 'sh\x00', 0x0, 0x32, 0x3b}, 0x2c) creat(&(0x7f0000000340)='./file0\x00', 0x0) [ 2611.215662][T15473] ? get_mem_cgroup_from_mm+0x139/0x320 [ 2611.221230][T15473] ? lock_downgrade+0x920/0x920 [ 2611.226087][T15473] ? percpu_ref_tryget_live+0x111/0x290 [ 2611.231656][T15473] __memcg_kmem_charge_memcg+0x71/0xf0 [ 2611.237135][T15473] ? memcg_kmem_put_cache+0x50/0x50 [ 2611.242361][T15473] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2611.247932][T15473] __memcg_kmem_charge+0x13a/0x3a0 [ 2611.253070][T15473] __alloc_pages_nodemask+0x4f2/0x8f0 [ 2611.258460][T15473] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 10:40:10 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000007000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:40:10 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffd92, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="4400000010000100"/20, @ANYRES32=r1, @ANYBLOB="0000000000000000240012001400010005000000000000006c617665000000000c0005000800050003000000b19a9807a73b26ee1d9b00d3134cb78d55ffc8044d1e1ab50e5b4f327d1d4534749886ef4617beb12344787a92c705307910822ca0658c609007cd"], 0x44}}, 0x0) [ 2611.264708][T15473] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2611.270443][T15473] ? copy_process+0x46d1/0x6b00 [ 2611.275314][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2611.280633][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2611.285666][T15473] ? __kasan_check_read+0x11/0x20 [ 2611.290726][T15473] copy_process+0x3f8/0x6b00 [ 2611.295330][T15473] ? __kasan_check_read+0x11/0x20 [ 2611.300359][T15473] ? __lock_acquire+0x1702/0x4c30 [ 2611.305388][T15473] ? __kasan_check_read+0x11/0x20 [ 2611.310439][T15473] ? mark_lock+0xc0/0x11e0 [ 2611.314880][T15473] ? __cleanup_sighand+0x60/0x60 [ 2611.319833][T15473] ? find_held_lock+0x35/0x130 [ 2611.324658][T15473] _do_fork+0x146/0xfa0 [ 2611.328831][T15473] ? copy_init_mm+0x20/0x20 [ 2611.333350][T15473] ? __kasan_check_read+0x11/0x20 [ 2611.338386][T15473] ? _copy_to_user+0x118/0x160 [ 2611.343167][T15473] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2611.349419][T15473] ? put_timespec64+0xda/0x140 [ 2611.354243][T15473] __x64_sys_clone+0x18d/0x250 [ 2611.359057][T15473] ? __ia32_sys_vfork+0xc0/0xc0 [ 2611.363930][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2611.369228][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2611.374272][T15473] do_syscall_64+0xfa/0x760 [ 2611.378791][T15473] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2611.384687][T15473] RIP: 0033:0x457dfa [ 2611.388591][T15473] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2611.408214][T15473] RSP: 002b:00007ffe9d25c010 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2611.416642][T15473] RAX: ffffffffffffffda RBX: 00007ffe9d25c010 RCX: 0000000000457dfa [ 2611.424634][T15473] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2611.432659][T15473] RBP: 00007ffe9d25c050 R08: 0000000000000001 R09: 0000555556205940 [ 2611.440651][T15473] R10: 0000555556205c10 R11: 0000000000000246 R12: 0000000000000001 [ 2611.448642][T15473] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe9d25c0a0 10:40:10 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000008000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) [ 2611.493294][T15473] memory: usage 125032kB, limit 0kB, failcnt 15 [ 2611.502000][T15473] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2611.512714][T15473] Memory cgroup stats for /syz4: [ 2611.512828][T15473] anon 109142016 [ 2611.512828][T15473] file 49152 [ 2611.512828][T15473] kernel_stack 2031616 [ 2611.512828][T15473] slab 8806400 [ 2611.512828][T15473] sock 8192 [ 2611.512828][T15473] shmem 20480 [ 2611.512828][T15473] file_mapped 0 10:40:10 executing program 3: ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000100)={0x3b, @broadcast, 0x0, 0x2, 'sh\x00', 0x0, 0x32, 0x3b}, 0x2c) creat(&(0x7f0000000340)='./file0\x00', 0x0) [ 2611.512828][T15473] file_dirty 0 [ 2611.512828][T15473] file_writeback 0 [ 2611.512828][T15473] anon_thp 44040192 [ 2611.512828][T15473] inactive_anon 74629120 [ 2611.512828][T15473] active_anon 34295808 [ 2611.512828][T15473] inactive_file 0 [ 2611.512828][T15473] active_file 45056 [ 2611.512828][T15473] unevictable 12288 [ 2611.512828][T15473] slab_reclaimable 3919872 [ 2611.512828][T15473] slab_unreclaimable 4886528 [ 2611.512828][T15473] pgfault 400521 [ 2611.512828][T15473] pgmajfault 0 [ 2611.512828][T15473] workingset_refault 825 [ 2611.512828][T15473] workingset_activate 330 [ 2611.512828][T15473] workingset_nodereclaim 0 [ 2611.512828][T15473] pgrefill 12552 [ 2611.512828][T15473] pgscan 17027 [ 2611.512828][T15473] pgsteal 4298 10:40:10 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a000000000b000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:40:10 executing program 3: ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000100)={0x3b, @broadcast, 0x0, 0x2, 'sh\x00', 0x0, 0x32, 0x3b}, 0x2c) creat(&(0x7f0000000340)='./file0\x00', 0x0) [ 2611.876223][T15473] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=26047,uid=0 10:40:10 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a000000000d000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) [ 2611.930570][T15473] Memory cgroup out of memory: Killed process 26047 (syz-executor.4) total-vm:72696kB, anon-rss:18224kB, file-rss:34816kB, shmem-rss:0kB, UID:0 [ 2612.001820][T26332] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 2612.026834][T26332] CPU: 1 PID: 26332 Comm: syz-executor.1 Not tainted 5.3.0-rc1-next-20190724 #50 [ 2612.035975][T26332] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2612.046043][T26332] Call Trace: [ 2612.049347][T26332] dump_stack+0x172/0x1f0 [ 2612.053693][T26332] dump_header+0x10b/0x82d [ 2612.058111][T26332] ? oom_kill_process+0x94/0x3f0 [ 2612.063072][T26332] oom_kill_process.cold+0x10/0x15 [ 2612.068197][T26332] out_of_memory+0x79a/0x12c0 [ 2612.072882][T26332] ? lock_downgrade+0x920/0x920 [ 2612.077753][T26332] ? oom_killer_disable+0x280/0x280 [ 2612.082990][T26332] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2612.086040][ T1056] oom_reaper: reaped process 26047 (syz-executor.4), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB [ 2612.088538][T26332] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2612.105174][T26332] ? do_raw_spin_unlock+0x57/0x270 [ 2612.110296][T26332] ? _raw_spin_unlock+0x2d/0x50 [ 2612.115250][T26332] try_charge+0x1080/0x1480 [ 2612.119772][T26332] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2612.125321][T26332] ? percpu_ref_tryget_live+0x111/0x290 [ 2612.130883][T26332] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2612.137141][T26332] ? __kasan_check_read+0x11/0x20 [ 2612.142174][T26332] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2612.147728][T26332] mem_cgroup_try_charge+0x136/0x590 [ 2612.153025][T26332] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2612.158670][T26332] wp_page_copy+0x421/0x1690 [ 2612.163262][T26332] ? find_held_lock+0x35/0x130 [ 2612.168039][T26332] ? follow_pfn+0x2a0/0x2a0 [ 2612.172553][T26332] ? lock_downgrade+0x920/0x920 [ 2612.177414][T26332] ? swp_swapcount+0x540/0x540 [ 2612.182185][T26332] ? __kasan_check_read+0x11/0x20 [ 2612.187224][T26332] ? do_raw_spin_unlock+0x57/0x270 [ 2612.192438][T26332] do_wp_page+0x499/0x14d0 [ 2612.196888][T26332] ? finish_mkwrite_fault+0x570/0x570 [ 2612.202293][T26332] __handle_mm_fault+0x22f7/0x3f20 [ 2612.207419][T26332] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 2612.212982][T26332] ? __kasan_check_read+0x11/0x20 [ 2612.218018][T26332] handle_mm_fault+0x1b5/0x6b0 [ 2612.222794][T26332] __do_page_fault+0x536/0xdd0 [ 2612.227577][T26332] do_page_fault+0x38/0x590 [ 2612.232105][T26332] page_fault+0x39/0x40 [ 2612.236259][T26332] RIP: 0033:0x4034f2 [ 2612.240156][T26332] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 59 8d 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 79 42 05 00 48 [ 2612.259766][T26332] RSP: 002b:00007ffffb448ba0 EFLAGS: 00010246 [ 2612.265838][T26332] RAX: 0000000000000000 RBX: 000000000027d490 RCX: 0000000000413430 [ 2612.273823][T26332] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007ffffb449cd0 [ 2612.281800][T26332] RBP: 0000000000000002 R08: 0000000000000001 R09: 00005555574bb940 [ 2612.289779][T26332] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffffb449cd0 [ 2612.297750][T26332] R13: 00007ffffb449cc0 R14: 0000000000000000 R15: 00007ffffb449cd0 10:40:11 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000028000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) [ 2612.375501][T26332] memory: usage 4160kB, limit 0kB, failcnt 32 [ 2612.405441][T26332] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2612.417809][T26332] Memory cgroup stats for /syz1: [ 2612.418251][T26332] anon 139264 [ 2612.418251][T26332] file 53248 [ 2612.418251][T26332] kernel_stack 0 [ 2612.418251][T26332] slab 4333568 [ 2612.418251][T26332] sock 57344 [ 2612.418251][T26332] shmem 122880 [ 2612.418251][T26332] file_mapped 0 [ 2612.418251][T26332] file_dirty 0 [ 2612.418251][T26332] file_writeback 0 [ 2612.418251][T26332] anon_thp 0 [ 2612.418251][T26332] inactive_anon 69632 [ 2612.418251][T26332] active_anon 69632 [ 2612.418251][T26332] inactive_file 135168 [ 2612.418251][T26332] active_file 45056 [ 2612.418251][T26332] unevictable 0 [ 2612.418251][T26332] slab_reclaimable 2433024 [ 2612.418251][T26332] slab_unreclaimable 1900544 [ 2612.418251][T26332] pgfault 392535 [ 2612.418251][T26332] pgmajfault 0 [ 2612.418251][T26332] workingset_refault 0 [ 2612.418251][T26332] workingset_activate 0 [ 2612.418251][T26332] workingset_nodereclaim 0 [ 2612.418251][T26332] pgrefill 126 [ 2612.418251][T26332] pgscan 193 [ 2612.418251][T26332] pgsteal 126 [ 2612.418251][T26332] pgactivate 33 [ 2612.544108][T26332] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=26332,uid=0 [ 2612.562623][T26332] Memory cgroup out of memory: Killed process 26332 (syz-executor.1) total-vm:72444kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB, UID:0 [ 2612.579907][ T1056] oom_reaper: reaped process 26332 (syz-executor.1), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB [ 2612.579996][T15473] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2612.603755][T15473] CPU: 1 PID: 15473 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190724 #50 [ 2612.612872][T15473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2612.622935][T15473] Call Trace: [ 2612.626232][T15473] dump_stack+0x172/0x1f0 [ 2612.630575][T15473] dump_header+0x10b/0x82d [ 2612.635027][T15473] ? oom_kill_process+0x94/0x3f0 [ 2612.640159][T15473] oom_kill_process.cold+0x10/0x15 [ 2612.645273][T15473] out_of_memory+0x79a/0x12c0 [ 2612.649954][T15473] ? lock_downgrade+0x920/0x920 [ 2612.654810][T15473] ? oom_killer_disable+0x280/0x280 [ 2612.660025][T15473] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2612.665577][T15473] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2612.671224][T15473] ? do_raw_spin_unlock+0x57/0x270 [ 2612.676342][T15473] ? _raw_spin_unlock+0x2d/0x50 [ 2612.681199][T15473] try_charge+0x1080/0x1480 [ 2612.685712][T15473] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2612.691270][T15473] ? find_held_lock+0x35/0x130 [ 2612.696046][T15473] ? get_mem_cgroup_from_mm+0x139/0x320 [ 2612.701641][T15473] ? lock_downgrade+0x920/0x920 [ 2612.706497][T15473] ? percpu_ref_tryget_live+0x111/0x290 [ 2612.712049][T15473] __memcg_kmem_charge_memcg+0x71/0xf0 [ 2612.718079][T15473] ? memcg_kmem_put_cache+0x50/0x50 [ 2612.728760][T15473] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2612.734315][T15473] __memcg_kmem_charge+0x13a/0x3a0 [ 2612.739527][T15473] __alloc_pages_nodemask+0x4f2/0x8f0 [ 2612.744901][T15473] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2612.751158][T15473] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2612.756881][T15473] ? copy_process+0x46d1/0x6b00 [ 2612.761744][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2612.767035][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2612.772538][T15473] ? __kasan_check_read+0x11/0x20 [ 2612.777574][T15473] copy_process+0x3f8/0x6b00 [ 2612.782171][T15473] ? __kasan_check_read+0x11/0x20 [ 2612.787201][T15473] ? __lock_acquire+0x1702/0x4c30 [ 2612.792241][T15473] ? __kasan_check_read+0x11/0x20 [ 2612.797276][T15473] ? mark_lock+0xc0/0x11e0 [ 2612.801706][T15473] ? __cleanup_sighand+0x60/0x60 [ 2612.806646][T15473] ? find_held_lock+0x35/0x130 [ 2612.811433][T15473] _do_fork+0x146/0xfa0 [ 2612.815604][T15473] ? copy_init_mm+0x20/0x20 [ 2612.820126][T15473] ? __kasan_check_read+0x11/0x20 [ 2612.825159][T15473] ? _copy_to_user+0x118/0x160 [ 2612.829940][T15473] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2612.836194][T15473] ? put_timespec64+0xda/0x140 [ 2612.840946][T15473] __x64_sys_clone+0x18d/0x250 [ 2612.845699][T15473] ? __ia32_sys_vfork+0xc0/0xc0 [ 2612.850557][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2612.864630][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2612.869654][T15473] do_syscall_64+0xfa/0x760 [ 2612.874147][T15473] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2612.880020][T15473] RIP: 0033:0x457dfa [ 2612.883926][T15473] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2612.903519][T15473] RSP: 002b:00007ffe9d25c010 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2612.911921][T15473] RAX: ffffffffffffffda RBX: 00007ffe9d25c010 RCX: 0000000000457dfa [ 2612.919879][T15473] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2612.927834][T15473] RBP: 00007ffe9d25c050 R08: 0000000000000001 R09: 0000555556205940 [ 2612.935790][T15473] R10: 0000555556205c10 R11: 0000000000000246 R12: 0000000000000001 [ 2612.944043][T15473] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe9d25c0a0 [ 2612.952584][T15473] memory: usage 106600kB, limit 0kB, failcnt 21 [ 2612.958922][T15473] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2612.965778][T15473] Memory cgroup stats for /syz4: [ 2612.965921][T15473] anon 90378240 [ 2612.965921][T15473] file 49152 [ 2612.965921][T15473] kernel_stack 2031616 [ 2612.965921][T15473] slab 8806400 [ 2612.965921][T15473] sock 8192 [ 2612.965921][T15473] shmem 20480 [ 2612.965921][T15473] file_mapped 0 [ 2612.965921][T15473] file_dirty 0 [ 2612.965921][T15473] file_writeback 0 [ 2612.965921][T15473] anon_thp 44040192 [ 2612.965921][T15473] inactive_anon 55975936 [ 2612.965921][T15473] active_anon 34295808 [ 2612.965921][T15473] inactive_file 0 [ 2612.965921][T15473] active_file 45056 [ 2612.965921][T15473] unevictable 12288 [ 2612.965921][T15473] slab_reclaimable 3919872 [ 2612.965921][T15473] slab_unreclaimable 4886528 [ 2612.965921][T15473] pgfault 400521 [ 2612.965921][T15473] pgmajfault 0 [ 2612.965921][T15473] workingset_refault 825 [ 2612.965921][T15473] workingset_activate 330 [ 2612.965921][T15473] workingset_nodereclaim 0 [ 2612.965921][T15473] pgrefill 12552 [ 2612.965921][T15473] pgscan 17027 [ 2612.965921][T15473] pgsteal 4298 [ 2613.060951][T15473] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=26022,uid=0 [ 2613.076623][T15473] Memory cgroup out of memory: Killed process 26022 (syz-executor.4) total-vm:72696kB, anon-rss:18224kB, file-rss:34816kB, shmem-rss:0kB, UID:0 [ 2613.120950][T15473] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2613.143031][T15473] CPU: 1 PID: 15473 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190724 #50 [ 2613.152165][T15473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2613.162219][T15473] Call Trace: [ 2613.165607][T15473] dump_stack+0x172/0x1f0 [ 2613.169949][T15473] dump_header+0x10b/0x82d [ 2613.174369][T15473] ? oom_kill_process+0x94/0x3f0 [ 2613.179323][T15473] oom_kill_process.cold+0x10/0x15 [ 2613.184441][T15473] out_of_memory+0x79a/0x12c0 [ 2613.189215][T15473] ? lock_downgrade+0x920/0x920 [ 2613.194073][T15473] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2613.199893][T15473] ? oom_killer_disable+0x280/0x280 [ 2613.205119][T15473] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2613.210670][T15473] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2613.216317][T15473] ? do_raw_spin_unlock+0x57/0x270 [ 2613.221440][T15473] ? _raw_spin_unlock+0x2d/0x50 [ 2613.226305][T15473] try_charge+0x1080/0x1480 [ 2613.230826][T15473] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2613.236392][T15473] ? find_held_lock+0x35/0x130 [ 2613.241165][T15473] ? get_mem_cgroup_from_mm+0x139/0x320 [ 2613.246727][T15473] ? lock_downgrade+0x920/0x920 [ 2613.251585][T15473] ? percpu_ref_tryget_live+0x111/0x290 [ 2613.257139][T15473] __memcg_kmem_charge_memcg+0x71/0xf0 [ 2613.262603][T15473] ? memcg_kmem_put_cache+0x50/0x50 [ 2613.267814][T15473] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2613.273370][T15473] __memcg_kmem_charge+0x13a/0x3a0 [ 2613.278490][T15473] __alloc_pages_nodemask+0x4f2/0x8f0 [ 2613.283899][T15473] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2613.290154][T15473] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2613.295907][T15473] ? copy_process+0x46d1/0x6b00 [ 2613.300774][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2613.306068][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2613.311187][T15473] ? __kasan_check_read+0x11/0x20 [ 2613.316309][T15473] copy_process+0x3f8/0x6b00 [ 2613.320908][T15473] ? __kasan_check_read+0x11/0x20 [ 2613.325958][T15473] ? __lock_acquire+0x1702/0x4c30 [ 2613.330984][T15473] ? __kasan_check_read+0x11/0x20 [ 2613.336015][T15473] ? mark_lock+0xc0/0x11e0 [ 2613.340444][T15473] ? __cleanup_sighand+0x60/0x60 [ 2613.345384][T15473] ? find_held_lock+0x35/0x130 [ 2613.350165][T15473] _do_fork+0x146/0xfa0 [ 2613.354352][T15473] ? copy_init_mm+0x20/0x20 [ 2613.358861][T15473] ? __kasan_check_read+0x11/0x20 [ 2613.363979][T15473] ? _copy_to_user+0x118/0x160 [ 2613.368751][T15473] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2613.375181][T15473] ? put_timespec64+0xda/0x140 [ 2613.379967][T15473] __x64_sys_clone+0x18d/0x250 [ 2613.384759][T15473] ? __ia32_sys_vfork+0xc0/0xc0 [ 2613.389803][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2613.395104][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2613.400144][T15473] do_syscall_64+0xfa/0x760 [ 2613.404681][T15473] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2613.410584][T15473] RIP: 0033:0x457dfa [ 2613.414487][T15473] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2613.434094][T15473] RSP: 002b:00007ffe9d25c010 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2613.442605][T15473] RAX: ffffffffffffffda RBX: 00007ffe9d25c010 RCX: 0000000000457dfa [ 2613.450584][T15473] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2613.458562][T15473] RBP: 00007ffe9d25c050 R08: 0000000000000001 R09: 0000555556205940 [ 2613.466538][T15473] R10: 0000555556205c10 R11: 0000000000000246 R12: 0000000000000001 [ 2613.474511][T15473] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe9d25c0a0 [ 2613.482897][T15473] memory: usage 88188kB, limit 0kB, failcnt 27 [ 2613.489155][T15473] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2613.496115][T15473] Memory cgroup stats for /syz4: [ 2613.496243][T15473] anon 71610368 [ 2613.496243][T15473] file 49152 [ 2613.496243][T15473] kernel_stack 2031616 [ 2613.496243][T15473] slab 8806400 [ 2613.496243][T15473] sock 8192 [ 2613.496243][T15473] shmem 20480 [ 2613.496243][T15473] file_mapped 0 [ 2613.496243][T15473] file_dirty 0 [ 2613.496243][T15473] file_writeback 0 [ 2613.496243][T15473] anon_thp 41943040 [ 2613.496243][T15473] inactive_anon 37314560 [ 2613.496243][T15473] active_anon 34295808 [ 2613.496243][T15473] inactive_file 0 [ 2613.496243][T15473] active_file 45056 [ 2613.496243][T15473] unevictable 12288 [ 2613.496243][T15473] slab_reclaimable 3919872 [ 2613.496243][T15473] slab_unreclaimable 4886528 [ 2613.496243][T15473] pgfault 400521 [ 2613.496243][T15473] pgmajfault 0 [ 2613.496243][T15473] workingset_refault 825 [ 2613.496243][T15473] workingset_activate 330 [ 2613.496243][T15473] workingset_nodereclaim 0 [ 2613.496243][T15473] pgrefill 12552 [ 2613.496243][T15473] pgscan 17027 [ 2613.496243][T15473] pgsteal 4298 [ 2613.592625][T15473] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=25991,uid=0 [ 2613.616342][T15473] Memory cgroup out of memory: Killed process 25991 (syz-executor.4) total-vm:72696kB, anon-rss:18224kB, file-rss:34816kB, shmem-rss:0kB, UID:0 10:40:12 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000180)=0x32, 0x4) socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 2613.681644][ T1056] oom_reaper: reaped process 25991 (syz-executor.4), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB [ 2613.702543][T15473] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2613.735737][T15473] CPU: 1 PID: 15473 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190724 #50 [ 2613.745052][T15473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2613.755110][T15473] Call Trace: [ 2613.758407][T15473] dump_stack+0x172/0x1f0 [ 2613.758428][T15473] dump_header+0x10b/0x82d [ 2613.758439][T15473] ? oom_kill_process+0x94/0x3f0 [ 2613.758457][T15473] oom_kill_process.cold+0x10/0x15 [ 2613.758473][T15473] out_of_memory+0x79a/0x12c0 [ 2613.758495][T15473] ? lock_downgrade+0x920/0x920 [ 2613.786754][T15473] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2613.792564][T15473] ? oom_killer_disable+0x280/0x280 [ 2613.795159][T26373] IPVS: ftp: loaded support on port[0] = 21 [ 2613.797776][T15473] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2613.797795][T15473] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2613.797817][T15473] ? do_raw_spin_unlock+0x57/0x270 [ 2613.819945][T15473] ? _raw_spin_unlock+0x2d/0x50 [ 2613.824807][T15473] try_charge+0x1080/0x1480 [ 2613.829414][T15473] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2613.829431][T15473] ? find_held_lock+0x35/0x130 [ 2613.829447][T15473] ? get_mem_cgroup_from_mm+0x139/0x320 [ 2613.829468][T15473] ? lock_downgrade+0x920/0x920 [ 2613.829481][T15473] ? percpu_ref_tryget_live+0x111/0x290 [ 2613.829499][T15473] __memcg_kmem_charge_memcg+0x71/0xf0 [ 2613.829522][T15473] ? memcg_kmem_put_cache+0x50/0x50 [ 2613.850211][T15473] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2613.861215][T15473] __memcg_kmem_charge+0x13a/0x3a0 [ 2613.861235][T15473] __alloc_pages_nodemask+0x4f2/0x8f0 [ 2613.861250][T15473] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2613.861268][T15473] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2613.861289][T15473] ? copy_process+0x46d1/0x6b00 [ 2613.872119][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2613.882588][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2613.894508][T15473] ? __kasan_check_read+0x11/0x20 [ 2613.894533][T15473] copy_process+0x3f8/0x6b00 [ 2613.904637][T15473] ? __kasan_check_read+0x11/0x20 [ 2613.914655][T15473] ? __lock_acquire+0x1702/0x4c30 [ 2613.924244][T15473] ? __kasan_check_read+0x11/0x20 [ 2613.924264][T15473] ? mark_lock+0xc0/0x11e0 [ 2613.934324][T15473] ? __cleanup_sighand+0x60/0x60 [ 2613.943643][T15473] ? find_held_lock+0x35/0x130 [ 2613.948426][T15473] _do_fork+0x146/0xfa0 [ 2613.948445][T15473] ? copy_init_mm+0x20/0x20 [ 2613.948471][T15473] ? __kasan_check_read+0x11/0x20 [ 2613.957125][T15473] ? _copy_to_user+0x118/0x160 [ 2613.957146][T15473] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2613.957158][T15473] ? put_timespec64+0xda/0x140 [ 2613.957181][T15473] __x64_sys_clone+0x18d/0x250 [ 2613.957203][T15473] ? __ia32_sys_vfork+0xc0/0xc0 [ 2613.967003][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2613.967021][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2613.967045][T15473] do_syscall_64+0xfa/0x760 [ 2613.978386][T15473] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2613.978398][T15473] RIP: 0033:0x457dfa [ 2613.978413][T15473] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2613.978421][T15473] RSP: 002b:00007ffe9d25c010 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2613.978441][T15473] RAX: ffffffffffffffda RBX: 00007ffe9d25c010 RCX: 0000000000457dfa [ 2613.988061][T15473] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2613.988070][T15473] RBP: 00007ffe9d25c050 R08: 0000000000000001 R09: 0000555556205940 [ 2613.988077][T15473] R10: 0000555556205c10 R11: 0000000000000246 R12: 0000000000000001 [ 2613.988084][T15473] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe9d25c0a0 [ 2614.011192][T15473] memory: usage 69764kB, limit 0kB, failcnt 33 [ 2614.060053][T15473] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2614.094062][T15473] Memory cgroup stats for /syz4: [ 2614.094187][T15473] anon 52940800 [ 2614.094187][T15473] file 49152 [ 2614.094187][T15473] kernel_stack 1966080 [ 2614.094187][T15473] slab 8806400 [ 2614.094187][T15473] sock 8192 [ 2614.094187][T15473] shmem 20480 [ 2614.094187][T15473] file_mapped 0 [ 2614.094187][T15473] file_dirty 0 [ 2614.094187][T15473] file_writeback 0 [ 2614.094187][T15473] anon_thp 27262976 [ 2614.094187][T15473] inactive_anon 18722816 [ 2614.094187][T15473] active_anon 34295808 [ 2614.094187][T15473] inactive_file 0 [ 2614.094187][T15473] active_file 45056 [ 2614.094187][T15473] unevictable 12288 [ 2614.094187][T15473] slab_reclaimable 3919872 [ 2614.094187][T15473] slab_unreclaimable 4886528 [ 2614.094187][T15473] pgfault 400521 [ 2614.094187][T15473] pgmajfault 0 [ 2614.094187][T15473] workingset_refault 825 [ 2614.094187][T15473] workingset_activate 330 [ 2614.094187][T15473] workingset_nodereclaim 0 [ 2614.094187][T15473] pgrefill 12552 [ 2614.094187][T15473] pgscan 17027 [ 2614.094187][T15473] pgsteal 4298 [ 2614.101189][T15473] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=25957,uid=0 [ 2614.215594][T26374] IPVS: ftp: loaded support on port[0] = 21 [ 2614.236207][T15473] Memory cgroup out of memory: Killed process 25957 (syz-executor.4) total-vm:72696kB, anon-rss:18224kB, file-rss:34816kB, shmem-rss:0kB, UID:0 [ 2614.302102][T15473] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2614.336041][T15473] CPU: 1 PID: 15473 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190724 #50 [ 2614.345176][T15473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2614.346163][ T1056] oom_reaper: reaped process 25957 (syz-executor.4), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB [ 2614.355250][T15473] Call Trace: [ 2614.369580][T15473] dump_stack+0x172/0x1f0 [ 2614.373927][T15473] dump_header+0x10b/0x82d [ 2614.378344][T15473] ? oom_kill_process+0x94/0x3f0 [ 2614.378362][T15473] oom_kill_process.cold+0x10/0x15 [ 2614.378378][T15473] out_of_memory+0x79a/0x12c0 [ 2614.378392][T15473] ? lock_downgrade+0x920/0x920 [ 2614.378410][T15473] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2614.378427][T15473] ? oom_killer_disable+0x280/0x280 [ 2614.378452][T15473] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2614.388485][T15473] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2614.397985][T15473] ? do_raw_spin_unlock+0x57/0x270 [ 2614.398002][T15473] ? _raw_spin_unlock+0x2d/0x50 [ 2614.398022][T15473] try_charge+0x1080/0x1480 [ 2614.398051][T15473] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2614.420180][T15473] ? find_held_lock+0x35/0x130 [ 2614.430131][T15473] ? get_mem_cgroup_from_mm+0x139/0x320 [ 2614.430154][T15473] ? lock_downgrade+0x920/0x920 [ 2614.430167][T15473] ? percpu_ref_tryget_live+0x111/0x290 [ 2614.430187][T15473] __memcg_kmem_charge_memcg+0x71/0xf0 [ 2614.445169][T15473] ? memcg_kmem_put_cache+0x50/0x50 [ 2614.455547][T15473] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2614.466886][T15473] __memcg_kmem_charge+0x13a/0x3a0 [ 2614.466907][T15473] __alloc_pages_nodemask+0x4f2/0x8f0 [ 2614.466930][T15473] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2614.466950][T15473] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2614.477681][T15473] ? copy_process+0x46d1/0x6b00 [ 2614.477702][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2614.477720][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2614.477734][T15473] ? __kasan_check_read+0x11/0x20 [ 2614.477754][T15473] copy_process+0x3f8/0x6b00 [ 2614.488245][T15473] ? __kasan_check_read+0x11/0x20 [ 2614.488261][T15473] ? __lock_acquire+0x1702/0x4c30 [ 2614.488272][T15473] ? __kasan_check_read+0x11/0x20 [ 2614.488292][T15473] ? mark_lock+0xc0/0x11e0 [ 2614.500245][T15473] ? __cleanup_sighand+0x60/0x60 [ 2614.500261][T15473] ? find_held_lock+0x35/0x130 [ 2614.500293][T15473] _do_fork+0x146/0xfa0 [ 2614.510409][T15473] ? copy_init_mm+0x20/0x20 [ 2614.520443][T15473] ? __kasan_check_read+0x11/0x20 [ 2614.530042][T15473] ? _copy_to_user+0x118/0x160 [ 2614.530062][T15473] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2614.530076][T15473] ? put_timespec64+0xda/0x140 [ 2614.530099][T15473] __x64_sys_clone+0x18d/0x250 [ 2614.530118][T15473] ? __ia32_sys_vfork+0xc0/0xc0 [ 2614.540152][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2614.549480][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2614.549500][T15473] do_syscall_64+0xfa/0x760 [ 2614.549519][T15473] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2614.549531][T15473] RIP: 0033:0x457dfa [ 2614.549546][T15473] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2614.549560][T15473] RSP: 002b:00007ffe9d25c010 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2614.558462][T15473] RAX: ffffffffffffffda RBX: 00007ffe9d25c010 RCX: 0000000000457dfa [ 2614.567953][T15473] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2614.567961][T15473] RBP: 00007ffe9d25c050 R08: 0000000000000001 R09: 0000555556205940 [ 2614.567969][T15473] R10: 0000555556205c10 R11: 0000000000000246 R12: 0000000000000001 [ 2614.567976][T15473] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe9d25c0a0 [ 2614.685682][T15473] memory: usage 51352kB, limit 0kB, failcnt 39 [ 2614.693982][T15473] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2614.702892][T15473] Memory cgroup stats for /syz4: [ 2614.703005][T15473] anon 34279424 [ 2614.703005][T15473] file 49152 [ 2614.703005][T15473] kernel_stack 1966080 [ 2614.703005][T15473] slab 8671232 [ 2614.703005][T15473] sock 8192 [ 2614.703005][T15473] shmem 20480 [ 2614.703005][T15473] file_mapped 0 [ 2614.703005][T15473] file_dirty 0 [ 2614.703005][T15473] file_writeback 0 [ 2614.703005][T15473] anon_thp 27262976 [ 2614.703005][T15473] inactive_anon 69632 [ 2614.703005][T15473] active_anon 34295808 [ 2614.703005][T15473] inactive_file 0 [ 2614.703005][T15473] active_file 45056 [ 2614.703005][T15473] unevictable 12288 [ 2614.703005][T15473] slab_reclaimable 3784704 [ 2614.703005][T15473] slab_unreclaimable 4886528 [ 2614.703005][T15473] pgfault 400521 [ 2614.703005][T15473] pgmajfault 0 [ 2614.703005][T15473] workingset_refault 825 [ 2614.703005][T15473] workingset_activate 330 [ 2614.703005][T15473] workingset_nodereclaim 0 [ 2614.703005][T15473] pgrefill 12552 [ 2614.703005][T15473] pgscan 17027 [ 2614.703005][T15473] pgsteal 4298 [ 2614.810315][T15473] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=13252,uid=0 [ 2614.827230][T15473] Memory cgroup out of memory: Killed process 13252 (syz-executor.4) total-vm:72572kB, anon-rss:2200kB, file-rss:35860kB, shmem-rss:0kB, UID:0 [ 2614.844330][ T1056] oom_reaper: reaped process 13252 (syz-executor.4), now anon-rss:0kB, file-rss:34900kB, shmem-rss:0kB [ 2614.859783][T15473] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2614.872718][T15473] CPU: 0 PID: 15473 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190724 #50 [ 2614.882815][T15473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2614.882821][T15473] Call Trace: [ 2614.882846][T15473] dump_stack+0x172/0x1f0 [ 2614.882867][T15473] dump_header+0x10b/0x82d [ 2614.882878][T15473] ? oom_kill_process+0x94/0x3f0 [ 2614.882894][T15473] oom_kill_process.cold+0x10/0x15 [ 2614.882910][T15473] out_of_memory+0x79a/0x12c0 [ 2614.882925][T15473] ? lock_downgrade+0x920/0x920 [ 2614.882943][T15473] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2614.882960][T15473] ? oom_killer_disable+0x280/0x280 [ 2614.882988][T15473] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2614.883004][T15473] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2614.883032][T15473] ? do_raw_spin_unlock+0x57/0x270 [ 2614.924630][T15473] ? _raw_spin_unlock+0x2d/0x50 [ 2614.935653][T15473] try_charge+0x1080/0x1480 [ 2614.946850][T15473] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2614.946867][T15473] ? find_held_lock+0x35/0x130 [ 2614.946883][T15473] ? get_mem_cgroup_from_mm+0x139/0x320 [ 2614.946907][T15473] ? lock_downgrade+0x920/0x920 [ 2614.946921][T15473] ? percpu_ref_tryget_live+0x111/0x290 [ 2614.946940][T15473] __memcg_kmem_charge_memcg+0x71/0xf0 [ 2614.946954][T15473] ? memcg_kmem_put_cache+0x50/0x50 [ 2614.946973][T15473] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2614.946991][T15473] __memcg_kmem_charge+0x13a/0x3a0 [ 2614.961532][T15473] __alloc_pages_nodemask+0x4f2/0x8f0 [ 2614.971828][T15473] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2614.971851][T15473] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2614.982247][T15473] ? copy_process+0x46d1/0x6b00 [ 2614.993274][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2615.004004][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2615.014498][T15473] ? __kasan_check_read+0x11/0x20 [ 2615.026447][T15473] copy_process+0x3f8/0x6b00 [ 2615.026468][T15473] ? __kasan_check_read+0x11/0x20 [ 2615.026483][T15473] ? __lock_acquire+0x1702/0x4c30 [ 2615.026495][T15473] ? __kasan_check_read+0x11/0x20 [ 2615.026509][T15473] ? mark_lock+0xc0/0x11e0 [ 2615.026532][T15473] ? __cleanup_sighand+0x60/0x60 [ 2615.026547][T15473] ? find_held_lock+0x35/0x130 [ 2615.026577][T15473] _do_fork+0x146/0xfa0 [ 2615.041708][T15473] ? copy_init_mm+0x20/0x20 [ 2615.051305][T15473] ? __kasan_check_read+0x11/0x20 [ 2615.061341][T15473] ? _copy_to_user+0x118/0x160 [ 2615.075674][T15473] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2615.084568][T15473] ? put_timespec64+0xda/0x140 [ 2615.094083][T15473] __x64_sys_clone+0x18d/0x250 [ 2615.105090][T15473] ? __ia32_sys_vfork+0xc0/0xc0 [ 2615.114616][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2615.124724][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2615.129862][T15473] do_syscall_64+0xfa/0x760 [ 2615.129884][T15473] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2615.129895][T15473] RIP: 0033:0x457dfa [ 2615.129910][T15473] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2615.129917][T15473] RSP: 002b:00007ffe9d25c010 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2615.129930][T15473] RAX: ffffffffffffffda RBX: 00007ffe9d25c010 RCX: 0000000000457dfa [ 2615.129938][T15473] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2615.129946][T15473] RBP: 00007ffe9d25c050 R08: 0000000000000001 R09: 0000555556205940 [ 2615.129954][T15473] R10: 0000555556205c10 R11: 0000000000000246 R12: 0000000000000001 [ 2615.129962][T15473] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe9d25c0a0 [ 2615.139930][T15473] memory: usage 48936kB, limit 0kB, failcnt 45 [ 2615.164375][T15473] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2615.189084][T15473] Memory cgroup stats for /syz4: [ 2615.189200][T15473] anon 32108544 [ 2615.189200][T15473] file 49152 [ 2615.189200][T15473] kernel_stack 1900544 [ 2615.189200][T15473] slab 8671232 [ 2615.189200][T15473] sock 8192 [ 2615.189200][T15473] shmem 20480 [ 2615.189200][T15473] file_mapped 0 [ 2615.189200][T15473] file_dirty 0 [ 2615.189200][T15473] file_writeback 0 [ 2615.189200][T15473] anon_thp 25165824 [ 2615.189200][T15473] inactive_anon 69632 [ 2615.189200][T15473] active_anon 32161792 [ 2615.189200][T15473] inactive_file 0 [ 2615.189200][T15473] active_file 45056 [ 2615.189200][T15473] unevictable 12288 [ 2615.189200][T15473] slab_reclaimable 3784704 [ 2615.189200][T15473] slab_unreclaimable 4886528 [ 2615.189200][T15473] pgfault 400521 [ 2615.189200][T15473] pgmajfault 0 [ 2615.189200][T15473] workingset_refault 825 [ 2615.189200][T15473] workingset_activate 330 [ 2615.189200][T15473] workingset_nodereclaim 0 [ 2615.189200][T15473] pgrefill 12552 [ 2615.189200][T15473] pgscan 17027 [ 2615.189200][T15473] pgsteal 4298 [ 2615.205190][T15473] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=22028,uid=0 [ 2615.219601][T15473] Memory cgroup out of memory: Killed process 22028 (syz-executor.4) total-vm:72572kB, anon-rss:2200kB, file-rss:35844kB, shmem-rss:0kB, UID:0 [ 2615.221297][ T1056] oom_reaper: reaped process 22028 (syz-executor.4), now anon-rss:0kB, file-rss:34884kB, shmem-rss:0kB [ 2615.326814][T15473] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2615.351925][T15473] CPU: 0 PID: 15473 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190724 #50 [ 2615.374739][T15473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2615.393907][T15473] Call Trace: [ 2615.393939][T15473] dump_stack+0x172/0x1f0 [ 2615.401537][T15473] dump_header+0x10b/0x82d [ 2615.405951][T15473] ? oom_kill_process+0x94/0x3f0 [ 2615.411065][T15473] oom_kill_process.cold+0x10/0x15 [ 2615.416186][T15473] out_of_memory+0x79a/0x12c0 [ 2615.416203][T15473] ? lock_downgrade+0x920/0x920 [ 2615.416221][T15473] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2615.416237][T15473] ? oom_killer_disable+0x280/0x280 [ 2615.416262][T15473] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2615.416278][T15473] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2615.416298][T15473] ? do_raw_spin_unlock+0x57/0x270 [ 2615.416315][T15473] ? _raw_spin_unlock+0x2d/0x50 [ 2615.416335][T15473] try_charge+0x1080/0x1480 [ 2615.425857][T15473] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2615.442382][T15473] ? find_held_lock+0x35/0x130 [ 2615.472720][T15473] ? get_mem_cgroup_from_mm+0x139/0x320 [ 2615.478280][T15473] ? lock_downgrade+0x920/0x920 [ 2615.478295][T15473] ? percpu_ref_tryget_live+0x111/0x290 [ 2615.478313][T15473] __memcg_kmem_charge_memcg+0x71/0xf0 [ 2615.478327][T15473] ? memcg_kmem_put_cache+0x50/0x50 [ 2615.478345][T15473] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2615.478361][T15473] __memcg_kmem_charge+0x13a/0x3a0 [ 2615.478380][T15473] __alloc_pages_nodemask+0x4f2/0x8f0 [ 2615.478396][T15473] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2615.478421][T15473] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2615.478437][T15473] ? copy_process+0x46d1/0x6b00 [ 2615.478458][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2615.494287][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2615.510264][T15473] ? __kasan_check_read+0x11/0x20 [ 2615.510288][T15473] copy_process+0x3f8/0x6b00 [ 2615.510307][T15473] ? __kasan_check_read+0x11/0x20 [ 2615.510322][T15473] ? __lock_acquire+0x1702/0x4c30 [ 2615.510333][T15473] ? __kasan_check_read+0x11/0x20 [ 2615.510347][T15473] ? mark_lock+0xc0/0x11e0 [ 2615.510370][T15473] ? __cleanup_sighand+0x60/0x60 [ 2615.510385][T15473] ? find_held_lock+0x35/0x130 [ 2615.510424][T15473] _do_fork+0x146/0xfa0 [ 2615.527719][T15473] ? copy_init_mm+0x20/0x20 [ 2615.527741][T15473] ? __kasan_check_read+0x11/0x20 [ 2615.527756][T15473] ? _copy_to_user+0x118/0x160 [ 2615.527775][T15473] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2615.527789][T15473] ? put_timespec64+0xda/0x140 [ 2615.527810][T15473] __x64_sys_clone+0x18d/0x250 [ 2615.537931][T15473] ? __ia32_sys_vfork+0xc0/0xc0 [ 2615.537956][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2615.537973][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2615.537993][T15473] do_syscall_64+0xfa/0x760 [ 2615.538012][T15473] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2615.538024][T15473] RIP: 0033:0x457dfa [ 2615.538039][T15473] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2615.538048][T15473] RSP: 002b:00007ffe9d25c010 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2615.538061][T15473] RAX: ffffffffffffffda RBX: 00007ffe9d25c010 RCX: 0000000000457dfa [ 2615.538069][T15473] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2615.538077][T15473] RBP: 00007ffe9d25c050 R08: 0000000000000001 R09: 0000555556205940 [ 2615.538084][T15473] R10: 0000555556205c10 R11: 0000000000000246 R12: 0000000000000001 [ 2615.538092][T15473] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe9d25c0a0 [ 2615.539771][T15473] memory: usage 46592kB, limit 0kB, failcnt 51 [ 2615.552999][T15473] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2615.563261][T15473] Memory cgroup stats for /syz4: [ 2615.563382][T15473] anon 29880320 [ 2615.563382][T15473] file 49152 [ 2615.563382][T15473] kernel_stack 1900544 [ 2615.563382][T15473] slab 8671232 [ 2615.563382][T15473] sock 8192 [ 2615.563382][T15473] shmem 20480 [ 2615.563382][T15473] file_mapped 0 [ 2615.563382][T15473] file_dirty 0 [ 2615.563382][T15473] file_writeback 0 [ 2615.563382][T15473] anon_thp 23068672 [ 2615.563382][T15473] inactive_anon 69632 [ 2615.563382][T15473] active_anon 29933568 [ 2615.563382][T15473] inactive_file 0 [ 2615.563382][T15473] active_file 45056 [ 2615.563382][T15473] unevictable 12288 [ 2615.563382][T15473] slab_reclaimable 3784704 [ 2615.563382][T15473] slab_unreclaimable 4886528 [ 2615.563382][T15473] pgfault 400521 [ 2615.563382][T15473] pgmajfault 0 [ 2615.563382][T15473] workingset_refault 825 [ 2615.563382][T15473] workingset_activate 330 [ 2615.563382][T15473] workingset_nodereclaim 0 [ 2615.563382][T15473] pgrefill 12552 [ 2615.563382][T15473] pgscan 17027 [ 2615.563382][T15473] pgsteal 4298 [ 2615.572849][T15473] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=6722,uid=0 [ 2615.583622][T15473] Memory cgroup out of memory: Killed process 6722 (syz-executor.4) total-vm:72572kB, anon-rss:2200kB, file-rss:35808kB, shmem-rss:0kB, UID:0 [ 2615.610959][T15473] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2615.622052][T15473] CPU: 0 PID: 15473 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190724 #50 [ 2615.632295][T15473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2615.632308][T15473] Call Trace: [ 2615.642710][T15473] dump_stack+0x172/0x1f0 [ 2615.666295][T15473] dump_header+0x10b/0x82d [ 2615.666309][T15473] ? oom_kill_process+0x94/0x3f0 [ 2615.666324][T15473] oom_kill_process.cold+0x10/0x15 [ 2615.666340][T15473] out_of_memory+0x79a/0x12c0 [ 2615.666355][T15473] ? lock_downgrade+0x920/0x920 [ 2615.666372][T15473] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2615.666388][T15473] ? oom_killer_disable+0x280/0x280 [ 2615.666420][T15473] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2615.666437][T15473] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2615.666458][T15473] ? do_raw_spin_unlock+0x57/0x270 [ 2615.666474][T15473] ? _raw_spin_unlock+0x2d/0x50 [ 2615.666495][T15473] try_charge+0x1080/0x1480 [ 2615.682904][T15473] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2615.698861][T15473] ? find_held_lock+0x35/0x130 [ 2615.698880][T15473] ? get_mem_cgroup_from_mm+0x139/0x320 [ 2615.698902][T15473] ? lock_downgrade+0x920/0x920 [ 2615.698914][T15473] ? percpu_ref_tryget_live+0x111/0x290 [ 2615.698932][T15473] __memcg_kmem_charge_memcg+0x71/0xf0 [ 2615.698945][T15473] ? memcg_kmem_put_cache+0x50/0x50 [ 2615.698968][T15473] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2615.714938][T15473] __memcg_kmem_charge+0x13a/0x3a0 [ 2615.727983][T15473] __alloc_pages_nodemask+0x4f2/0x8f0 [ 2615.728001][T15473] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2615.728030][T15473] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2615.728049][T15473] ? copy_process+0x46d1/0x6b00 [ 2615.728070][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2615.728087][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2615.728103][T15473] ? __kasan_check_read+0x11/0x20 [ 2615.728125][T15473] copy_process+0x3f8/0x6b00 [ 2615.728146][T15473] ? __kasan_check_read+0x11/0x20 [ 2615.822958][T15473] ? __lock_acquire+0x1702/0x4c30 [ 2615.822972][T15473] ? __kasan_check_read+0x11/0x20 [ 2615.822984][T15473] ? mark_lock+0xc0/0x11e0 [ 2615.823005][T15473] ? __cleanup_sighand+0x60/0x60 [ 2615.823018][T15473] ? find_held_lock+0x35/0x130 [ 2615.823046][T15473] _do_fork+0x146/0xfa0 [ 2615.823064][T15473] ? copy_init_mm+0x20/0x20 [ 2615.823082][T15473] ? __kasan_check_read+0x11/0x20 [ 2615.823096][T15473] ? _copy_to_user+0x118/0x160 [ 2615.823116][T15473] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2615.823128][T15473] ? put_timespec64+0xda/0x140 [ 2615.823147][T15473] __x64_sys_clone+0x18d/0x250 [ 2615.823165][T15473] ? __ia32_sys_vfork+0xc0/0xc0 [ 2615.823187][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2615.823205][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2615.823225][T15473] do_syscall_64+0xfa/0x760 [ 2615.823243][T15473] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2615.823254][T15473] RIP: 0033:0x457dfa [ 2615.823269][T15473] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2615.823276][T15473] RSP: 002b:00007ffe9d25c010 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2615.823289][T15473] RAX: ffffffffffffffda RBX: 00007ffe9d25c010 RCX: 0000000000457dfa [ 2615.823296][T15473] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2615.823304][T15473] RBP: 00007ffe9d25c050 R08: 0000000000000001 R09: 0000555556205940 [ 2615.823312][T15473] R10: 0000555556205c10 R11: 0000000000000246 R12: 0000000000000001 [ 2615.823321][T15473] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe9d25c0a0 [ 2615.827614][T15473] memory: usage 44264kB, limit 0kB, failcnt 57 [ 2615.853333][T15473] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2615.875309][T15473] Memory cgroup stats for /syz4: [ 2615.875466][T15473] anon 27668480 [ 2615.875466][T15473] file 49152 [ 2615.875466][T15473] kernel_stack 1835008 [ 2615.875466][T15473] slab 8671232 [ 2615.875466][T15473] sock 8192 [ 2615.875466][T15473] shmem 20480 [ 2615.875466][T15473] file_mapped 0 [ 2615.875466][T15473] file_dirty 0 [ 2615.875466][T15473] file_writeback 0 [ 2615.875466][T15473] anon_thp 20971520 [ 2615.875466][T15473] inactive_anon 69632 [ 2615.875466][T15473] active_anon 27721728 [ 2615.875466][T15473] inactive_file 0 [ 2615.875466][T15473] active_file 45056 [ 2615.875466][T15473] unevictable 12288 [ 2615.875466][T15473] slab_reclaimable 3784704 [ 2615.875466][T15473] slab_unreclaimable 4886528 [ 2615.875466][T15473] pgfault 400521 [ 2615.875466][T15473] pgmajfault 0 [ 2615.875466][T15473] workingset_refault 825 [ 2615.875466][T15473] workingset_activate 330 [ 2615.875466][T15473] workingset_nodereclaim 0 [ 2615.875466][T15473] pgrefill 12552 [ 2615.875466][T15473] pgscan 17027 [ 2615.875466][T15473] pgsteal 4298 [ 2615.888677][T15473] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=16497,uid=0 [ 2615.897688][T15473] Memory cgroup out of memory: Killed process 16497 (syz-executor.4) total-vm:72572kB, anon-rss:2200kB, file-rss:35808kB, shmem-rss:0kB, UID:0 [ 2616.364191][ T1056] oom_reaper: reaped process 16497 (syz-executor.4), now anon-rss:0kB, file-rss:34848kB, shmem-rss:0kB [ 2616.366848][T15473] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2616.392685][T15473] CPU: 0 PID: 15473 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190724 #50 [ 2616.401817][T15473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2616.401823][T15473] Call Trace: [ 2616.401847][T15473] dump_stack+0x172/0x1f0 [ 2616.401866][T15473] dump_header+0x10b/0x82d [ 2616.401877][T15473] ? oom_kill_process+0x94/0x3f0 [ 2616.401894][T15473] oom_kill_process.cold+0x10/0x15 [ 2616.401910][T15473] out_of_memory+0x79a/0x12c0 [ 2616.401925][T15473] ? lock_downgrade+0x920/0x920 [ 2616.401944][T15473] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2616.401960][T15473] ? oom_killer_disable+0x280/0x280 [ 2616.401986][T15473] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2616.419643][T15473] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2616.419666][T15473] ? do_raw_spin_unlock+0x57/0x270 [ 2616.419683][T15473] ? _raw_spin_unlock+0x2d/0x50 [ 2616.419702][T15473] try_charge+0x1080/0x1480 [ 2616.419726][T15473] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2616.429057][T15473] ? find_held_lock+0x35/0x130 [ 2616.429075][T15473] ? get_mem_cgroup_from_mm+0x139/0x320 [ 2616.429099][T15473] ? lock_downgrade+0x920/0x920 [ 2616.429112][T15473] ? percpu_ref_tryget_live+0x111/0x290 [ 2616.429133][T15473] __memcg_kmem_charge_memcg+0x71/0xf0 [ 2616.429146][T15473] ? memcg_kmem_put_cache+0x50/0x50 [ 2616.429166][T15473] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2616.429184][T15473] __memcg_kmem_charge+0x13a/0x3a0 [ 2616.438961][T15473] __alloc_pages_nodemask+0x4f2/0x8f0 [ 2616.438977][T15473] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2616.438995][T15473] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2616.439018][T15473] ? copy_process+0x46d1/0x6b00 [ 2616.449829][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2616.460555][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2616.460569][T15473] ? __kasan_check_read+0x11/0x20 [ 2616.460589][T15473] copy_process+0x3f8/0x6b00 [ 2616.460608][T15473] ? __kasan_check_read+0x11/0x20 [ 2616.460623][T15473] ? __lock_acquire+0x1702/0x4c30 [ 2616.460634][T15473] ? __kasan_check_read+0x11/0x20 [ 2616.460646][T15473] ? mark_lock+0xc0/0x11e0 [ 2616.460669][T15473] ? __cleanup_sighand+0x60/0x60 [ 2616.460689][T15473] ? find_held_lock+0x35/0x130 [ 2616.471435][T15473] _do_fork+0x146/0xfa0 [ 2616.480759][T15473] ? copy_init_mm+0x20/0x20 [ 2616.491041][T15473] ? __kasan_check_read+0x11/0x20 [ 2616.501432][T15473] ? _copy_to_user+0x118/0x160 [ 2616.512408][T15473] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2616.523215][T15473] ? put_timespec64+0xda/0x140 [ 2616.533674][T15473] __x64_sys_clone+0x18d/0x250 [ 2616.545608][T15473] ? __ia32_sys_vfork+0xc0/0xc0 [ 2616.555720][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2616.565741][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2616.575346][T15473] do_syscall_64+0xfa/0x760 [ 2616.585382][T15473] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2616.594716][T15473] RIP: 0033:0x457dfa [ 2616.603616][T15473] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2616.613109][T15473] RSP: 002b:00007ffe9d25c010 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2616.624168][T15473] RAX: ffffffffffffffda RBX: 00007ffe9d25c010 RCX: 0000000000457dfa [ 2616.624183][T15473] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2616.633686][T15473] RBP: 00007ffe9d25c050 R08: 0000000000000001 R09: 0000555556205940 [ 2616.633700][T15473] R10: 0000555556205c10 R11: 0000000000000246 R12: 0000000000000001 [ 2616.643800][T15473] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe9d25c0a0 [ 2616.731486][T15473] memory: usage 42088kB, limit 0kB, failcnt 63 [ 2616.737770][T15473] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2616.744789][T15473] Memory cgroup stats for /syz4: [ 2616.744905][T15473] anon 25481216 [ 2616.744905][T15473] file 49152 [ 2616.744905][T15473] kernel_stack 1835008 [ 2616.744905][T15473] slab 8671232 [ 2616.744905][T15473] sock 8192 [ 2616.744905][T15473] shmem 20480 [ 2616.744905][T15473] file_mapped 0 [ 2616.744905][T15473] file_dirty 0 [ 2616.744905][T15473] file_writeback 0 [ 2616.744905][T15473] anon_thp 18874368 [ 2616.744905][T15473] inactive_anon 69632 [ 2616.744905][T15473] active_anon 25477120 [ 2616.744905][T15473] inactive_file 0 [ 2616.744905][T15473] active_file 45056 [ 2616.744905][T15473] unevictable 12288 [ 2616.744905][T15473] slab_reclaimable 3784704 [ 2616.744905][T15473] slab_unreclaimable 4886528 [ 2616.744905][T15473] pgfault 400521 [ 2616.744905][T15473] pgmajfault 0 [ 2616.744905][T15473] workingset_refault 825 [ 2616.744905][T15473] workingset_activate 330 [ 2616.744905][T15473] workingset_nodereclaim 0 [ 2616.744905][T15473] pgrefill 12552 [ 2616.744905][T15473] pgscan 17027 [ 2616.744905][T15473] pgsteal 4298 [ 2616.750102][T15473] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=7561,uid=0 [ 2616.857871][T15473] Memory cgroup out of memory: Killed process 7561 (syz-executor.4) total-vm:72704kB, anon-rss:2208kB, file-rss:35784kB, shmem-rss:0kB, UID:0 [ 2616.875400][ T1056] oom_reaper: reaped process 7561 (syz-executor.4), now anon-rss:0kB, file-rss:34824kB, shmem-rss:0kB [ 2616.897066][T15473] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2616.909079][T15473] CPU: 1 PID: 15473 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190724 #50 [ 2616.918186][T15473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2616.918193][T15473] Call Trace: [ 2616.918216][T15473] dump_stack+0x172/0x1f0 [ 2616.918238][T15473] dump_header+0x10b/0x82d [ 2616.918250][T15473] ? oom_kill_process+0x94/0x3f0 [ 2616.918267][T15473] oom_kill_process.cold+0x10/0x15 [ 2616.918284][T15473] out_of_memory+0x79a/0x12c0 [ 2616.918300][T15473] ? lock_downgrade+0x920/0x920 [ 2616.918320][T15473] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2616.918337][T15473] ? oom_killer_disable+0x280/0x280 [ 2616.918361][T15473] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2616.918377][T15473] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2616.918399][T15473] ? do_raw_spin_unlock+0x57/0x270 [ 2616.918414][T15473] ? _raw_spin_unlock+0x2d/0x50 [ 2616.918434][T15473] try_charge+0x1080/0x1480 [ 2616.918460][T15473] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2616.918475][T15473] ? find_held_lock+0x35/0x130 [ 2616.918493][T15473] ? get_mem_cgroup_from_mm+0x139/0x320 [ 2616.918521][T15473] ? lock_downgrade+0x920/0x920 [ 2616.950616][T15473] ? percpu_ref_tryget_live+0x111/0x290 [ 2616.950638][T15473] __memcg_kmem_charge_memcg+0x71/0xf0 [ 2616.960153][T15473] ? memcg_kmem_put_cache+0x50/0x50 [ 2616.960172][T15473] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2616.960189][T15473] __memcg_kmem_charge+0x13a/0x3a0 [ 2616.960209][T15473] __alloc_pages_nodemask+0x4f2/0x8f0 [ 2616.971195][T15473] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2616.982380][T15473] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2616.992319][T15473] ? copy_process+0x46d1/0x6b00 [ 2617.002343][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2617.012628][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2617.022992][T15473] ? __kasan_check_read+0x11/0x20 [ 2617.023018][T15473] copy_process+0x3f8/0x6b00 [ 2617.033660][T15473] ? __kasan_check_read+0x11/0x20 [ 2617.040750][T26373] chnl_net:caif_netlink_parms(): no params data found [ 2617.044329][T15473] ? __lock_acquire+0x1702/0x4c30 [ 2617.055950][T15473] ? __kasan_check_read+0x11/0x20 [ 2617.055972][T15473] ? mark_lock+0xc0/0x11e0 [ 2617.066530][T15473] ? __cleanup_sighand+0x60/0x60 [ 2617.066546][T15473] ? find_held_lock+0x35/0x130 [ 2617.066582][T15473] _do_fork+0x146/0xfa0 [ 2617.076872][T15473] ? copy_init_mm+0x20/0x20 [ 2617.076893][T15473] ? __kasan_check_read+0x11/0x20 [ 2617.076908][T15473] ? _copy_to_user+0x118/0x160 [ 2617.076937][T15473] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2617.086527][T15473] ? put_timespec64+0xda/0x140 [ 2617.086549][T15473] __x64_sys_clone+0x18d/0x250 [ 2617.086566][T15473] ? __ia32_sys_vfork+0xc0/0xc0 [ 2617.086597][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2617.098365][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2617.098386][T15473] do_syscall_64+0xfa/0x760 [ 2617.098405][T15473] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2617.098416][T15473] RIP: 0033:0x457dfa [ 2617.098438][T15473] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2617.108458][T15473] RSP: 002b:00007ffe9d25c010 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2617.108473][T15473] RAX: ffffffffffffffda RBX: 00007ffe9d25c010 RCX: 0000000000457dfa [ 2617.108480][T15473] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2617.108488][T15473] RBP: 00007ffe9d25c050 R08: 0000000000000001 R09: 0000555556205940 [ 2617.108496][T15473] R10: 0000555556205c10 R11: 0000000000000246 R12: 0000000000000001 [ 2617.108504][T15473] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe9d25c0a0 [ 2617.267690][T15473] memory: usage 39580kB, limit 0kB, failcnt 75 [ 2617.273866][T15473] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2617.273880][T15473] Memory cgroup stats for /syz4: [ 2617.273996][T15473] anon 23261184 [ 2617.273996][T15473] file 49152 [ 2617.273996][T15473] kernel_stack 1769472 [ 2617.273996][T15473] slab 8671232 [ 2617.273996][T15473] sock 8192 [ 2617.273996][T15473] shmem 20480 [ 2617.273996][T15473] file_mapped 0 [ 2617.273996][T15473] file_dirty 0 [ 2617.273996][T15473] file_writeback 0 [ 2617.273996][T15473] anon_thp 16777216 [ 2617.273996][T15473] inactive_anon 69632 [ 2617.273996][T15473] active_anon 23257088 [ 2617.273996][T15473] inactive_file 0 [ 2617.273996][T15473] active_file 45056 [ 2617.273996][T15473] unevictable 12288 [ 2617.273996][T15473] slab_reclaimable 3784704 [ 2617.273996][T15473] slab_unreclaimable 4886528 [ 2617.273996][T15473] pgfault 400521 [ 2617.273996][T15473] pgmajfault 0 [ 2617.273996][T15473] workingset_refault 825 [ 2617.273996][T15473] workingset_activate 330 [ 2617.273996][T15473] workingset_nodereclaim 0 [ 2617.273996][T15473] pgrefill 12552 [ 2617.273996][T15473] pgscan 17027 [ 2617.273996][T15473] pgsteal 4298 [ 2617.291628][T15473] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=18405,uid=0 [ 2617.405808][T15473] Memory cgroup out of memory: Killed process 18405 (syz-executor.4) total-vm:72704kB, anon-rss:2208kB, file-rss:34816kB, shmem-rss:0kB, UID:0 [ 2617.442176][T15473] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2617.454175][T15473] CPU: 1 PID: 15473 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190724 #50 [ 2617.464156][T15473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2617.464169][T15473] Call Trace: [ 2617.477516][T15473] dump_stack+0x172/0x1f0 [ 2617.481852][T15473] dump_header+0x10b/0x82d [ 2617.486276][T15473] ? oom_kill_process+0x94/0x3f0 [ 2617.491220][T15473] oom_kill_process.cold+0x10/0x15 [ 2617.496344][T15473] out_of_memory+0x79a/0x12c0 [ 2617.501027][T15473] ? lock_downgrade+0x920/0x920 [ 2617.505889][T15473] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2617.511714][T15473] ? oom_killer_disable+0x280/0x280 [ 2617.516933][T15473] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2617.522485][T15473] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2617.528124][T15473] ? do_raw_spin_unlock+0x57/0x270 [ 2617.528139][T15473] ? _raw_spin_unlock+0x2d/0x50 [ 2617.528157][T15473] try_charge+0x1080/0x1480 [ 2617.528180][T15473] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2617.528196][T15473] ? find_held_lock+0x35/0x130 [ 2617.528217][T15473] ? get_mem_cgroup_from_mm+0x139/0x320 [ 2617.548225][T15473] ? lock_downgrade+0x920/0x920 [ 2617.548241][T15473] ? percpu_ref_tryget_live+0x111/0x290 [ 2617.548260][T15473] __memcg_kmem_charge_memcg+0x71/0xf0 [ 2617.548273][T15473] ? memcg_kmem_put_cache+0x50/0x50 [ 2617.548294][T15473] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2617.558588][T15473] __memcg_kmem_charge+0x13a/0x3a0 [ 2617.558607][T15473] __alloc_pages_nodemask+0x4f2/0x8f0 [ 2617.558622][T15473] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2617.558640][T15473] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2617.558661][T15473] ? copy_process+0x46d1/0x6b00 [ 2617.569038][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2617.569055][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2617.569069][T15473] ? __kasan_check_read+0x11/0x20 [ 2617.569090][T15473] copy_process+0x3f8/0x6b00 [ 2617.569109][T15473] ? __kasan_check_read+0x11/0x20 [ 2617.580003][T15473] ? __lock_acquire+0x1702/0x4c30 [ 2617.580016][T15473] ? __kasan_check_read+0x11/0x20 [ 2617.580030][T15473] ? mark_lock+0xc0/0x11e0 [ 2617.580052][T15473] ? __cleanup_sighand+0x60/0x60 [ 2617.580077][T15473] ? find_held_lock+0x35/0x130 [ 2617.590740][T15473] _do_fork+0x146/0xfa0 [ 2617.590758][T15473] ? copy_init_mm+0x20/0x20 [ 2617.590778][T15473] ? __kasan_check_read+0x11/0x20 [ 2617.590797][T15473] ? _copy_to_user+0x118/0x160 [ 2617.602391][T15473] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2617.613140][T15473] ? put_timespec64+0xda/0x140 [ 2617.623438][T15473] __x64_sys_clone+0x18d/0x250 [ 2617.633031][T15473] ? __ia32_sys_vfork+0xc0/0xc0 [ 2617.643063][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2617.652484][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2617.662336][T15473] do_syscall_64+0xfa/0x760 [ 2617.670968][T15473] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2617.680722][T15473] RIP: 0033:0x457dfa [ 2617.680742][T15473] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2617.691756][T15473] RSP: 002b:00007ffe9d25c010 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2617.701353][T15473] RAX: ffffffffffffffda RBX: 00007ffe9d25c010 RCX: 0000000000457dfa [ 2617.711622][T15473] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2617.711636][T15473] RBP: 00007ffe9d25c050 R08: 0000000000000001 R09: 0000555556205940 [ 2617.722003][T15473] R10: 0000555556205c10 R11: 0000000000000246 R12: 0000000000000001 [ 2617.722017][T15473] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe9d25c0a0 [ 2617.795880][T15473] memory: usage 37404kB, limit 0kB, failcnt 81 [ 2617.811715][T15473] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2617.818709][T15473] Memory cgroup stats for /syz4: [ 2617.818840][T15473] anon 21045248 [ 2617.818840][T15473] file 49152 [ 2617.818840][T15473] kernel_stack 1769472 [ 2617.818840][T15473] slab 8671232 [ 2617.818840][T15473] sock 8192 [ 2617.818840][T15473] shmem 20480 [ 2617.818840][T15473] file_mapped 0 [ 2617.818840][T15473] file_dirty 0 [ 2617.818840][T15473] file_writeback 0 [ 2617.818840][T15473] anon_thp 14680064 [ 2617.818840][T15473] inactive_anon 69632 [ 2617.818840][T15473] active_anon 21041152 [ 2617.818840][T15473] inactive_file 0 [ 2617.818840][T15473] active_file 45056 [ 2617.818840][T15473] unevictable 12288 [ 2617.818840][T15473] slab_reclaimable 3784704 [ 2617.818840][T15473] slab_unreclaimable 4886528 [ 2617.818840][T15473] pgfault 400521 [ 2617.818840][T15473] pgmajfault 0 [ 2617.818840][T15473] workingset_refault 825 [ 2617.818840][T15473] workingset_activate 330 [ 2617.818840][T15473] workingset_nodereclaim 0 [ 2617.818840][T15473] pgrefill 12552 [ 2617.818840][T15473] pgscan 17027 [ 2617.818840][T15473] pgsteal 4298 [ 2617.824420][T15473] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=23719,uid=0 [ 2617.933036][T15473] Memory cgroup out of memory: Killed process 23719 (syz-executor.4) total-vm:72572kB, anon-rss:2204kB, file-rss:34816kB, shmem-rss:0kB, UID:0 [ 2617.958490][T15473] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2617.970516][T15473] CPU: 0 PID: 15473 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190724 #50 [ 2617.979656][T15473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2617.989799][T15473] Call Trace: [ 2617.989827][T15473] dump_stack+0x172/0x1f0 [ 2617.989846][T15473] dump_header+0x10b/0x82d [ 2617.989857][T15473] ? oom_kill_process+0x94/0x3f0 [ 2617.989873][T15473] oom_kill_process.cold+0x10/0x15 [ 2617.989889][T15473] out_of_memory+0x79a/0x12c0 [ 2617.989904][T15473] ? lock_downgrade+0x920/0x920 [ 2617.989922][T15473] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2617.989939][T15473] ? oom_killer_disable+0x280/0x280 [ 2617.989964][T15473] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2617.989979][T15473] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2617.990000][T15473] ? do_raw_spin_unlock+0x57/0x270 [ 2618.012024][T15473] ? _raw_spin_unlock+0x2d/0x50 [ 2618.032511][T15473] try_charge+0x1080/0x1480 [ 2618.048758][T15473] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2618.048774][T15473] ? find_held_lock+0x35/0x130 [ 2618.048791][T15473] ? get_mem_cgroup_from_mm+0x139/0x320 [ 2618.048814][T15473] ? lock_downgrade+0x920/0x920 [ 2618.048829][T15473] ? percpu_ref_tryget_live+0x111/0x290 [ 2618.048849][T15473] __memcg_kmem_charge_memcg+0x71/0xf0 [ 2618.048862][T15473] ? memcg_kmem_put_cache+0x50/0x50 [ 2618.048886][T15473] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2618.063754][T15473] __memcg_kmem_charge+0x13a/0x3a0 [ 2618.074039][T15473] __alloc_pages_nodemask+0x4f2/0x8f0 [ 2618.089864][T15473] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2618.089887][T15473] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2618.089903][T15473] ? copy_process+0x46d1/0x6b00 [ 2618.089922][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2618.089939][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2618.089953][T15473] ? __kasan_check_read+0x11/0x20 [ 2618.089973][T15473] copy_process+0x3f8/0x6b00 [ 2618.089995][T15473] ? __kasan_check_read+0x11/0x20 [ 2618.105834][T15473] ? __lock_acquire+0x1702/0x4c30 [ 2618.117422][T15473] ? __kasan_check_read+0x11/0x20 [ 2618.117440][T15473] ? mark_lock+0xc0/0x11e0 [ 2618.117463][T15473] ? __cleanup_sighand+0x60/0x60 [ 2618.117477][T15473] ? find_held_lock+0x35/0x130 [ 2618.117508][T15473] _do_fork+0x146/0xfa0 [ 2618.117526][T15473] ? copy_init_mm+0x20/0x20 [ 2618.117546][T15473] ? __kasan_check_read+0x11/0x20 [ 2618.117561][T15473] ? _copy_to_user+0x118/0x160 [ 2618.117583][T15473] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2618.133395][T15473] ? put_timespec64+0xda/0x140 [ 2618.143543][T15473] __x64_sys_clone+0x18d/0x250 [ 2618.153133][T15473] ? __ia32_sys_vfork+0xc0/0xc0 [ 2618.163170][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2618.172581][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2618.181478][T15473] do_syscall_64+0xfa/0x760 [ 2618.191014][T15473] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2618.201989][T15473] RIP: 0033:0x457dfa [ 2618.202005][T15473] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2618.202012][T15473] RSP: 002b:00007ffe9d25c010 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2618.202025][T15473] RAX: ffffffffffffffda RBX: 00007ffe9d25c010 RCX: 0000000000457dfa [ 2618.202032][T15473] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2618.202041][T15473] RBP: 00007ffe9d25c050 R08: 0000000000000001 R09: 0000555556205940 [ 2618.202048][T15473] R10: 0000555556205c10 R11: 0000000000000246 R12: 0000000000000001 [ 2618.202056][T15473] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe9d25c0a0 [ 2618.205701][T15473] memory: usage 34928kB, limit 0kB, failcnt 87 [ 2618.219233][T15473] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2618.227303][T15473] Memory cgroup stats for /syz4: [ 2618.227461][T15473] anon 18833408 [ 2618.227461][T15473] file 49152 [ 2618.227461][T15473] kernel_stack 1703936 [ 2618.227461][T15473] slab 8671232 [ 2618.227461][T15473] sock 8192 [ 2618.227461][T15473] shmem 20480 [ 2618.227461][T15473] file_mapped 0 [ 2618.227461][T15473] file_dirty 0 [ 2618.227461][T15473] file_writeback 0 [ 2618.227461][T15473] anon_thp 12582912 [ 2618.227461][T15473] inactive_anon 69632 [ 2618.227461][T15473] active_anon 18829312 [ 2618.227461][T15473] inactive_file 0 [ 2618.227461][T15473] active_file 45056 [ 2618.227461][T15473] unevictable 12288 [ 2618.227461][T15473] slab_reclaimable 3784704 [ 2618.227461][T15473] slab_unreclaimable 4886528 [ 2618.227461][T15473] pgfault 400521 [ 2618.227461][T15473] pgmajfault 0 [ 2618.227461][T15473] workingset_refault 825 [ 2618.227461][T15473] workingset_activate 330 [ 2618.227461][T15473] workingset_nodereclaim 0 [ 2618.227461][T15473] pgrefill 12552 [ 2618.227461][T15473] pgscan 17027 [ 2618.227461][T15473] pgsteal 4298 [ 2618.227486][T15473] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=18371,uid=0 [ 2618.227617][T15473] Memory cgroup out of memory: Killed process 18371 (syz-executor.4) total-vm:72704kB, anon-rss:2208kB, file-rss:34816kB, shmem-rss:0kB, UID:0 [ 2618.281614][T15473] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2618.303437][T15473] CPU: 0 PID: 15473 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190724 #50 [ 2618.324214][T15473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2618.324226][T15473] Call Trace: [ 2618.418685][T15473] dump_stack+0x172/0x1f0 [ 2618.418705][T15473] dump_header+0x10b/0x82d [ 2618.418716][T15473] ? oom_kill_process+0x94/0x3f0 [ 2618.418731][T15473] oom_kill_process.cold+0x10/0x15 [ 2618.418747][T15473] out_of_memory+0x79a/0x12c0 [ 2618.418762][T15473] ? lock_downgrade+0x920/0x920 [ 2618.418779][T15473] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2618.418794][T15473] ? oom_killer_disable+0x280/0x280 [ 2618.418820][T15473] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2618.418835][T15473] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2618.418855][T15473] ? do_raw_spin_unlock+0x57/0x270 [ 2618.418871][T15473] ? _raw_spin_unlock+0x2d/0x50 [ 2618.418888][T15473] try_charge+0x1080/0x1480 [ 2618.418911][T15473] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2618.418925][T15473] ? find_held_lock+0x35/0x130 [ 2618.418941][T15473] ? get_mem_cgroup_from_mm+0x139/0x320 [ 2618.418963][T15473] ? lock_downgrade+0x920/0x920 [ 2618.418975][T15473] ? percpu_ref_tryget_live+0x111/0x290 [ 2618.418995][T15473] __memcg_kmem_charge_memcg+0x71/0xf0 [ 2618.419009][T15473] ? memcg_kmem_put_cache+0x50/0x50 [ 2618.419028][T15473] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2618.419045][T15473] __memcg_kmem_charge+0x13a/0x3a0 [ 2618.419066][T15473] __alloc_pages_nodemask+0x4f2/0x8f0 [ 2618.419081][T15473] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2618.419097][T15473] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2618.419112][T15473] ? copy_process+0x46d1/0x6b00 [ 2618.419130][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2618.419154][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2618.449103][T15473] ? __kasan_check_read+0x11/0x20 [ 2618.449127][T15473] copy_process+0x3f8/0x6b00 [ 2618.449145][T15473] ? __kasan_check_read+0x11/0x20 [ 2618.449160][T15473] ? __lock_acquire+0x1702/0x4c30 [ 2618.449172][T15473] ? __kasan_check_read+0x11/0x20 [ 2618.449185][T15473] ? mark_lock+0xc0/0x11e0 [ 2618.449207][T15473] ? __cleanup_sighand+0x60/0x60 [ 2618.449222][T15473] ? find_held_lock+0x35/0x130 [ 2618.449255][T15473] _do_fork+0x146/0xfa0 [ 2618.449275][T15473] ? copy_init_mm+0x20/0x20 [ 2618.470328][T15473] ? __kasan_check_read+0x11/0x20 [ 2618.487975][T15473] ? _copy_to_user+0x118/0x160 [ 2618.487997][T15473] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2618.488011][T15473] ? put_timespec64+0xda/0x140 [ 2618.488034][T15473] __x64_sys_clone+0x18d/0x250 [ 2618.488051][T15473] ? __ia32_sys_vfork+0xc0/0xc0 [ 2618.488076][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2618.488093][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2618.488114][T15473] do_syscall_64+0xfa/0x760 [ 2618.502558][T15473] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2618.512083][T15473] RIP: 0033:0x457dfa [ 2618.523063][T15473] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2618.534207][T15473] RSP: 002b:00007ffe9d25c010 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2618.544185][T15473] RAX: ffffffffffffffda RBX: 00007ffe9d25c010 RCX: 0000000000457dfa [ 2618.544200][T15473] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2618.554305][T15473] RBP: 00007ffe9d25c050 R08: 0000000000000001 R09: 0000555556205940 [ 2618.554320][T15473] R10: 0000555556205c10 R11: 0000000000000246 R12: 0000000000000001 [ 2618.564597][T15473] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe9d25c0a0 [ 2618.576052][T15473] memory: usage 32604kB, limit 0kB, failcnt 93 [ 2618.587023][T15473] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2618.604484][T15473] Memory cgroup stats for /syz4: [ 2618.604611][T15473] anon 16617472 [ 2618.604611][T15473] file 49152 [ 2618.604611][T15473] kernel_stack 1638400 [ 2618.604611][T15473] slab 8671232 [ 2618.604611][T15473] sock 8192 [ 2618.604611][T15473] shmem 20480 [ 2618.604611][T15473] file_mapped 0 [ 2618.604611][T15473] file_dirty 0 [ 2618.604611][T15473] file_writeback 0 [ 2618.604611][T15473] anon_thp 10485760 [ 2618.604611][T15473] inactive_anon 69632 [ 2618.604611][T15473] active_anon 16613376 [ 2618.604611][T15473] inactive_file 0 [ 2618.604611][T15473] active_file 45056 [ 2618.604611][T15473] unevictable 12288 [ 2618.604611][T15473] slab_reclaimable 3784704 [ 2618.604611][T15473] slab_unreclaimable 4886528 [ 2618.604611][T15473] pgfault 400521 [ 2618.604611][T15473] pgmajfault 0 [ 2618.604611][T15473] workingset_refault 825 [ 2618.604611][T15473] workingset_activate 330 [ 2618.604611][T15473] workingset_nodereclaim 0 [ 2618.604611][T15473] pgrefill 12552 [ 2618.604611][T15473] pgscan 17027 [ 2618.604611][T15473] pgsteal 4298 [ 2618.614828][T15473] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=18325,uid=0 [ 2618.626131][T15473] Memory cgroup out of memory: Killed process 18325 (syz-executor.4) total-vm:72704kB, anon-rss:2208kB, file-rss:34816kB, shmem-rss:0kB, UID:0 [ 2618.660926][T15473] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2618.676080][T15473] CPU: 0 PID: 15473 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190724 #50 [ 2618.682221][T15473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2618.693198][T15473] Call Trace: [ 2618.702723][T15473] dump_stack+0x172/0x1f0 [ 2618.712842][T15473] dump_header+0x10b/0x82d [ 2618.722355][T15473] ? oom_kill_process+0x94/0x3f0 [ 2618.732139][T15473] oom_kill_process.cold+0x10/0x15 [ 2618.760346][T15473] out_of_memory+0x79a/0x12c0 [ 2618.760364][T15473] ? lock_downgrade+0x920/0x920 [ 2618.760382][T15473] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2618.760398][T15473] ? oom_killer_disable+0x280/0x280 [ 2618.760431][T15473] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2618.777895][T15473] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2618.777917][T15473] ? do_raw_spin_unlock+0x57/0x270 [ 2618.777933][T15473] ? _raw_spin_unlock+0x2d/0x50 [ 2618.777952][T15473] try_charge+0x1080/0x1480 [ 2618.777976][T15473] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2618.777997][T15473] ? find_held_lock+0x35/0x130 [ 2618.793959][T15473] ? get_mem_cgroup_from_mm+0x139/0x320 [ 2618.808274][T15473] ? lock_downgrade+0x920/0x920 [ 2618.808289][T15473] ? percpu_ref_tryget_live+0x111/0x290 [ 2618.808308][T15473] __memcg_kmem_charge_memcg+0x71/0xf0 [ 2618.808322][T15473] ? memcg_kmem_put_cache+0x50/0x50 [ 2618.808341][T15473] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2618.808357][T15473] __memcg_kmem_charge+0x13a/0x3a0 [ 2618.808374][T15473] __alloc_pages_nodemask+0x4f2/0x8f0 [ 2618.808388][T15473] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2618.808409][T15473] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2618.820193][T15473] ? copy_process+0x46d1/0x6b00 [ 2618.928047][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2618.928066][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2618.928080][T15473] ? __kasan_check_read+0x11/0x20 [ 2618.928101][T15473] copy_process+0x3f8/0x6b00 [ 2618.928120][T15473] ? __kasan_check_read+0x11/0x20 [ 2618.928134][T15473] ? __lock_acquire+0x1702/0x4c30 [ 2618.928153][T15473] ? __kasan_check_read+0x11/0x20 [ 2618.954831][T15473] ? mark_lock+0xc0/0x11e0 [ 2618.954855][T15473] ? __cleanup_sighand+0x60/0x60 [ 2618.954870][T15473] ? find_held_lock+0x35/0x130 [ 2618.954899][T15473] _do_fork+0x146/0xfa0 [ 2618.954917][T15473] ? copy_init_mm+0x20/0x20 [ 2618.954938][T15473] ? __kasan_check_read+0x11/0x20 [ 2618.954959][T15473] ? _copy_to_user+0x118/0x160 [ 2618.974220][T15473] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2618.981814][T15473] ? put_timespec64+0xda/0x140 [ 2618.991189][T15473] __x64_sys_clone+0x18d/0x250 [ 2619.000952][T15473] ? __ia32_sys_vfork+0xc0/0xc0 [ 2619.011801][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2619.011819][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2619.011838][T15473] do_syscall_64+0xfa/0x760 [ 2619.011857][T15473] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2619.011868][T15473] RIP: 0033:0x457dfa [ 2619.011883][T15473] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2619.011891][T15473] RSP: 002b:00007ffe9d25c010 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2619.011911][T15473] RAX: ffffffffffffffda RBX: 00007ffe9d25c010 RCX: 0000000000457dfa [ 2619.023367][T15473] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2619.023382][T15473] RBP: 00007ffe9d25c050 R08: 0000000000000001 R09: 0000555556205940 [ 2619.034198][T15473] R10: 0000555556205c10 R11: 0000000000000246 R12: 0000000000000001 [ 2619.034212][T15473] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe9d25c0a0 [ 2619.055147][T15473] memory: usage 30280kB, limit 0kB, failcnt 99 [ 2619.071429][T15473] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2619.087761][T15473] Memory cgroup stats for /syz4: [ 2619.087879][T15473] anon 14401536 [ 2619.087879][T15473] file 49152 [ 2619.087879][T15473] kernel_stack 1638400 [ 2619.087879][T15473] slab 8671232 [ 2619.087879][T15473] sock 8192 [ 2619.087879][T15473] shmem 20480 [ 2619.087879][T15473] file_mapped 0 [ 2619.087879][T15473] file_dirty 0 [ 2619.087879][T15473] file_writeback 0 [ 2619.087879][T15473] anon_thp 8388608 [ 2619.087879][T15473] inactive_anon 69632 [ 2619.087879][T15473] active_anon 14397440 [ 2619.087879][T15473] inactive_file 0 [ 2619.087879][T15473] active_file 45056 [ 2619.087879][T15473] unevictable 12288 [ 2619.087879][T15473] slab_reclaimable 3784704 [ 2619.087879][T15473] slab_unreclaimable 4886528 [ 2619.087879][T15473] pgfault 400521 [ 2619.087879][T15473] pgmajfault 0 [ 2619.087879][T15473] workingset_refault 825 [ 2619.087879][T15473] workingset_activate 330 [ 2619.087879][T15473] workingset_nodereclaim 0 [ 2619.087879][T15473] pgrefill 12552 [ 2619.087879][T15473] pgscan 17027 [ 2619.087879][T15473] pgsteal 4298 [ 2619.097269][T15473] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=17456,uid=0 [ 2619.097395][T15473] Memory cgroup out of memory: Killed process 17456 (syz-executor.4) total-vm:72704kB, anon-rss:2208kB, file-rss:34816kB, shmem-rss:0kB, UID:0 [ 2619.470389][T26373] bridge0: port 1(bridge_slave_0) entered blocking state [ 2619.491844][T15473] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2619.503832][T26373] bridge0: port 1(bridge_slave_0) entered disabled state [ 2619.511582][T15473] CPU: 1 PID: 15473 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190724 #50 [ 2619.519138][T26373] device bridge_slave_0 entered promiscuous mode [ 2619.520716][T15473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2619.520728][T15473] Call Trace: [ 2619.537118][T15473] dump_stack+0x172/0x1f0 [ 2619.537139][T15473] dump_header+0x10b/0x82d [ 2619.537159][T15473] ? oom_kill_process+0x94/0x3f0 [ 2619.544964][T15473] oom_kill_process.cold+0x10/0x15 [ 2619.554289][T15473] out_of_memory+0x79a/0x12c0 [ 2619.564055][T15473] ? lock_downgrade+0x920/0x920 [ 2619.568925][T15473] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2619.568944][T15473] ? oom_killer_disable+0x280/0x280 [ 2619.568972][T15473] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2619.579962][T15473] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2619.579983][T15473] ? do_raw_spin_unlock+0x57/0x270 [ 2619.579998][T15473] ? _raw_spin_unlock+0x2d/0x50 [ 2619.580016][T15473] try_charge+0x1080/0x1480 [ 2619.580058][T15473] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2619.591240][T15473] ? find_held_lock+0x35/0x130 [ 2619.591257][T15473] ? get_mem_cgroup_from_mm+0x139/0x320 [ 2619.591280][T15473] ? lock_downgrade+0x920/0x920 [ 2619.591300][T15473] ? percpu_ref_tryget_live+0x111/0x290 [ 2619.601523][T15473] __memcg_kmem_charge_memcg+0x71/0xf0 [ 2619.611656][T15473] ? memcg_kmem_put_cache+0x50/0x50 [ 2619.621969][T15473] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2619.632349][T15473] __memcg_kmem_charge+0x13a/0x3a0 [ 2619.643327][T15473] __alloc_pages_nodemask+0x4f2/0x8f0 [ 2619.653983][T15473] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2619.654006][T15473] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2619.665594][T15473] ? copy_process+0x46d1/0x6b00 [ 2619.676141][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2619.676161][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2619.676182][T15473] ? __kasan_check_read+0x11/0x20 [ 2619.682027][T26373] bridge0: port 2(bridge_slave_1) entered blocking state [ 2619.686500][T15473] copy_process+0x3f8/0x6b00 [ 2619.686522][T15473] ? __kasan_check_read+0x11/0x20 [ 2619.686543][T15473] ? __lock_acquire+0x1702/0x4c30 [ 2619.691851][T26373] bridge0: port 2(bridge_slave_1) entered disabled state [ 2619.698590][T15473] ? __kasan_check_read+0x11/0x20 [ 2619.698608][T15473] ? mark_lock+0xc0/0x11e0 [ 2619.698636][T15473] ? __cleanup_sighand+0x60/0x60 [ 2619.708233][T15473] ? find_held_lock+0x35/0x130 [ 2619.708265][T15473] _do_fork+0x146/0xfa0 [ 2619.708284][T15473] ? copy_init_mm+0x20/0x20 [ 2619.714524][T26373] device bridge_slave_1 entered promiscuous mode [ 2619.720326][T15473] ? __kasan_check_read+0x11/0x20 [ 2619.720341][T15473] ? _copy_to_user+0x118/0x160 [ 2619.720369][T15473] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2619.729904][T15473] ? put_timespec64+0xda/0x140 [ 2619.739587][T15473] __x64_sys_clone+0x18d/0x250 [ 2619.739604][T15473] ? __ia32_sys_vfork+0xc0/0xc0 [ 2619.739628][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2619.739650][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2619.748290][T15473] do_syscall_64+0xfa/0x760 [ 2619.748310][T15473] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2619.748322][T15473] RIP: 0033:0x457dfa [ 2619.748341][T15473] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2619.759667][T15473] RSP: 002b:00007ffe9d25c010 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2619.759682][T15473] RAX: ffffffffffffffda RBX: 00007ffe9d25c010 RCX: 0000000000457dfa [ 2619.759689][T15473] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2619.759696][T15473] RBP: 00007ffe9d25c050 R08: 0000000000000001 R09: 0000555556205940 [ 2619.759703][T15473] R10: 0000555556205c10 R11: 0000000000000246 R12: 0000000000000001 [ 2619.759710][T15473] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe9d25c0a0 [ 2619.763706][T15473] memory: usage 27956kB, limit 0kB, failcnt 105 [ 2619.771419][T15473] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2619.798802][T15473] Memory cgroup stats for /syz4: [ 2619.798961][T15473] anon 12189696 [ 2619.798961][T15473] file 49152 [ 2619.798961][T15473] kernel_stack 1638400 [ 2619.798961][T15473] slab 8671232 [ 2619.798961][T15473] sock 8192 [ 2619.798961][T15473] shmem 20480 [ 2619.798961][T15473] file_mapped 0 [ 2619.798961][T15473] file_dirty 0 [ 2619.798961][T15473] file_writeback 0 [ 2619.798961][T15473] anon_thp 6291456 [ 2619.798961][T15473] inactive_anon 69632 [ 2619.798961][T15473] active_anon 12185600 [ 2619.798961][T15473] inactive_file 0 [ 2619.798961][T15473] active_file 45056 [ 2619.798961][T15473] unevictable 12288 [ 2619.798961][T15473] slab_reclaimable 3784704 [ 2619.798961][T15473] slab_unreclaimable 4886528 [ 2619.798961][T15473] pgfault 400521 [ 2619.798961][T15473] pgmajfault 0 [ 2619.798961][T15473] workingset_refault 825 [ 2619.798961][T15473] workingset_activate 330 [ 2619.798961][T15473] workingset_nodereclaim 0 [ 2619.798961][T15473] pgrefill 12552 [ 2619.798961][T15473] pgscan 17027 [ 2619.798961][T15473] pgsteal 4298 [ 2619.814815][T15473] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=18292,uid=0 [ 2619.850453][T15473] Memory cgroup out of memory: Killed process 18292 (syz-executor.4) total-vm:72572kB, anon-rss:2200kB, file-rss:34816kB, shmem-rss:0kB, UID:0 [ 2619.865479][ T1056] oom_reaper: reaped process 18292 (syz-executor.4), now anon-rss:0kB, file-rss:34688kB, shmem-rss:0kB [ 2619.903429][T15473] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2620.022243][T15473] CPU: 1 PID: 15473 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190724 #50 [ 2620.036357][T15473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2620.036364][T15473] Call Trace: [ 2620.036387][T15473] dump_stack+0x172/0x1f0 [ 2620.036408][T15473] dump_header+0x10b/0x82d [ 2620.036420][T15473] ? oom_kill_process+0x94/0x3f0 [ 2620.036445][T15473] oom_kill_process.cold+0x10/0x15 [ 2620.057495][T15473] out_of_memory+0x79a/0x12c0 [ 2620.057513][T15473] ? lock_downgrade+0x920/0x920 [ 2620.057538][T15473] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2620.070882][T15473] ? oom_killer_disable+0x280/0x280 [ 2620.079619][T15473] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2620.090084][T15473] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2620.090105][T15473] ? do_raw_spin_unlock+0x57/0x270 [ 2620.090121][T15473] ? _raw_spin_unlock+0x2d/0x50 [ 2620.090142][T15473] try_charge+0x1080/0x1480 [ 2620.099665][T15473] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2620.099681][T15473] ? find_held_lock+0x35/0x130 [ 2620.099702][T15473] ? get_mem_cgroup_from_mm+0x139/0x320 [ 2620.110688][T15473] ? lock_downgrade+0x920/0x920 [ 2620.110702][T15473] ? percpu_ref_tryget_live+0x111/0x290 [ 2620.110727][T15473] __memcg_kmem_charge_memcg+0x71/0xf0 [ 2620.121917][T15473] ? memcg_kmem_put_cache+0x50/0x50 [ 2620.131865][T15473] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2620.142063][T15473] __memcg_kmem_charge+0x13a/0x3a0 [ 2620.152542][T15473] __alloc_pages_nodemask+0x4f2/0x8f0 [ 2620.162926][T15473] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2620.173549][T15473] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2620.184185][T15473] ? copy_process+0x46d1/0x6b00 [ 2620.195775][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2620.206338][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2620.206353][T15473] ? __kasan_check_read+0x11/0x20 [ 2620.206375][T15473] copy_process+0x3f8/0x6b00 [ 2620.216686][T15473] ? __kasan_check_read+0x11/0x20 [ 2620.216702][T15473] ? __lock_acquire+0x1702/0x4c30 [ 2620.216714][T15473] ? __kasan_check_read+0x11/0x20 [ 2620.216728][T15473] ? mark_lock+0xc0/0x11e0 [ 2620.216753][T15473] ? __cleanup_sighand+0x60/0x60 [ 2620.226384][T15473] ? find_held_lock+0x35/0x130 [ 2620.226415][T15473] _do_fork+0x146/0xfa0 [ 2620.226438][T15473] ? copy_init_mm+0x20/0x20 [ 2620.236467][T15473] ? __kasan_check_read+0x11/0x20 [ 2620.236483][T15473] ? _copy_to_user+0x118/0x160 [ 2620.236505][T15473] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2620.245931][T15473] ? put_timespec64+0xda/0x140 [ 2620.255870][T15473] __x64_sys_clone+0x18d/0x250 [ 2620.264506][T15473] ? __ia32_sys_vfork+0xc0/0xc0 [ 2620.274269][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2620.285242][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2620.294826][T15473] do_syscall_64+0xfa/0x760 [ 2620.305142][T15473] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2620.315517][T15473] RIP: 0033:0x457dfa [ 2620.315536][T15473] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2620.339027][T15473] RSP: 002b:00007ffe9d25c010 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2620.339042][T15473] RAX: ffffffffffffffda RBX: 00007ffe9d25c010 RCX: 0000000000457dfa [ 2620.339049][T15473] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2620.339057][T15473] RBP: 00007ffe9d25c050 R08: 0000000000000001 R09: 0000555556205940 [ 2620.339063][T15473] R10: 0000555556205c10 R11: 0000000000000246 R12: 0000000000000001 [ 2620.339071][T15473] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe9d25c0a0 [ 2620.352186][T15473] memory: usage 25664kB, limit 0kB, failcnt 123 [ 2620.364930][T15473] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2620.403466][T15473] Memory cgroup stats for /syz4: [ 2620.403591][T15473] anon 9965568 [ 2620.403591][T15473] file 49152 [ 2620.403591][T15473] kernel_stack 1638400 [ 2620.403591][T15473] slab 8671232 [ 2620.403591][T15473] sock 8192 [ 2620.403591][T15473] shmem 20480 [ 2620.403591][T15473] file_mapped 0 [ 2620.403591][T15473] file_dirty 0 [ 2620.403591][T15473] file_writeback 0 [ 2620.403591][T15473] anon_thp 4194304 [ 2620.403591][T15473] inactive_anon 69632 [ 2620.403591][T15473] active_anon 9961472 [ 2620.403591][T15473] inactive_file 0 [ 2620.403591][T15473] active_file 45056 [ 2620.403591][T15473] unevictable 12288 [ 2620.403591][T15473] slab_reclaimable 3784704 [ 2620.403591][T15473] slab_unreclaimable 4886528 [ 2620.403591][T15473] pgfault 400521 [ 2620.403591][T15473] pgmajfault 0 [ 2620.403591][T15473] workingset_refault 825 [ 2620.403591][T15473] workingset_activate 330 [ 2620.403591][T15473] workingset_nodereclaim 0 [ 2620.403591][T15473] pgrefill 12552 [ 2620.403591][T15473] pgscan 17027 [ 2620.403591][T15473] pgsteal 4298 [ 2620.498312][T15473] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=17421,uid=0 [ 2620.516512][T15473] Memory cgroup out of memory: Killed process 17421 (syz-executor.4) total-vm:72572kB, anon-rss:2200kB, file-rss:34816kB, shmem-rss:0kB, UID:0 [ 2620.532954][ T1056] oom_reaper: reaped process 17421 (syz-executor.4), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB [ 2620.549138][T15473] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2620.561181][T15473] CPU: 1 PID: 15473 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190724 #50 [ 2620.570299][T15473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2620.580448][T15473] Call Trace: [ 2620.583754][T15473] dump_stack+0x172/0x1f0 [ 2620.588103][T15473] dump_header+0x10b/0x82d [ 2620.592518][T15473] ? oom_kill_process+0x94/0x3f0 [ 2620.597464][T15473] oom_kill_process.cold+0x10/0x15 [ 2620.602589][T15473] out_of_memory+0x79a/0x12c0 [ 2620.607274][T15473] ? lock_downgrade+0x920/0x920 [ 2620.612130][T15473] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2620.617974][T15473] ? oom_killer_disable+0x280/0x280 [ 2620.623192][T15473] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2620.628743][T15473] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2620.634389][T15473] ? do_raw_spin_unlock+0x57/0x270 [ 2620.639536][T15473] ? _raw_spin_unlock+0x2d/0x50 [ 2620.644399][T15473] try_charge+0x1080/0x1480 [ 2620.648925][T15473] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2620.654474][T15473] ? find_held_lock+0x35/0x130 [ 2620.659252][T15473] ? get_mem_cgroup_from_mm+0x139/0x320 [ 2620.664805][T15473] ? lock_downgrade+0x920/0x920 [ 2620.669659][T15473] ? percpu_ref_tryget_live+0x111/0x290 [ 2620.675294][T15473] __memcg_kmem_charge_memcg+0x71/0xf0 [ 2620.680739][T15473] ? memcg_kmem_put_cache+0x50/0x50 [ 2620.685929][T15473] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2620.691480][T15473] __memcg_kmem_charge+0x13a/0x3a0 [ 2620.696577][T15473] __alloc_pages_nodemask+0x4f2/0x8f0 [ 2620.701946][T15473] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2620.708177][T15473] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2620.713878][T15473] ? copy_process+0x46d1/0x6b00 [ 2620.718717][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2620.724000][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2620.729008][T15473] ? __kasan_check_read+0x11/0x20 [ 2620.734047][T15473] copy_process+0x3f8/0x6b00 [ 2620.738626][T15473] ? __kasan_check_read+0x11/0x20 [ 2620.743642][T15473] ? __lock_acquire+0x1702/0x4c30 [ 2620.748645][T15473] ? __kasan_check_read+0x11/0x20 [ 2620.753654][T15473] ? mark_lock+0xc0/0x11e0 [ 2620.758060][T15473] ? __cleanup_sighand+0x60/0x60 [ 2620.762982][T15473] ? find_held_lock+0x35/0x130 [ 2620.767752][T15473] _do_fork+0x146/0xfa0 [ 2620.772719][T15473] ? copy_init_mm+0x20/0x20 [ 2620.777229][T15473] ? __kasan_check_read+0x11/0x20 [ 2620.782242][T15473] ? _copy_to_user+0x118/0x160 [ 2620.786990][T15473] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2620.793228][T15473] ? put_timespec64+0xda/0x140 [ 2620.797980][T15473] __x64_sys_clone+0x18d/0x250 [ 2620.802727][T15473] ? __ia32_sys_vfork+0xc0/0xc0 [ 2620.807567][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2620.812864][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2620.817895][T15473] do_syscall_64+0xfa/0x760 [ 2620.822417][T15473] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2620.828295][T15473] RIP: 0033:0x457dfa [ 2620.832171][T15473] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2620.851986][T15473] RSP: 002b:00007ffe9d25c010 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2620.860407][T15473] RAX: ffffffffffffffda RBX: 00007ffe9d25c010 RCX: 0000000000457dfa [ 2620.868383][T15473] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2620.876343][T15473] RBP: 00007ffe9d25c050 R08: 0000000000000001 R09: 0000555556205940 [ 2620.884326][T15473] R10: 0000555556205c10 R11: 0000000000000246 R12: 0000000000000001 [ 2620.892292][T15473] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe9d25c0a0 [ 2620.900947][T15473] memory: usage 23276kB, limit 0kB, failcnt 130 [ 2620.910075][T15473] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2620.917093][T15473] Memory cgroup stats for /syz4: [ 2620.917205][T15473] anon 7761920 [ 2620.917205][T15473] file 49152 [ 2620.917205][T15473] kernel_stack 1572864 [ 2620.917205][T15473] slab 8536064 [ 2620.917205][T15473] sock 8192 [ 2620.917205][T15473] shmem 20480 [ 2620.917205][T15473] file_mapped 0 [ 2620.917205][T15473] file_dirty 0 [ 2620.917205][T15473] file_writeback 0 [ 2620.917205][T15473] anon_thp 2097152 [ 2620.917205][T15473] inactive_anon 69632 [ 2620.917205][T15473] active_anon 7757824 [ 2620.917205][T15473] inactive_file 0 [ 2620.917205][T15473] active_file 45056 [ 2620.917205][T15473] unevictable 12288 [ 2620.917205][T15473] slab_reclaimable 3649536 [ 2620.917205][T15473] slab_unreclaimable 4886528 [ 2620.917205][T15473] pgfault 400521 [ 2620.917205][T15473] pgmajfault 0 [ 2620.917205][T15473] workingset_refault 825 [ 2620.917205][T15473] workingset_activate 330 [ 2620.917205][T15473] workingset_nodereclaim 0 [ 2620.917205][T15473] pgrefill 12552 [ 2620.917205][T15473] pgscan 17027 [ 2620.917205][T15473] pgsteal 4298 [ 2621.012962][T15473] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=17395,uid=0 [ 2621.028587][T15473] Memory cgroup out of memory: Killed process 17395 (syz-executor.4) total-vm:72572kB, anon-rss:2200kB, file-rss:34816kB, shmem-rss:0kB, UID:0 [ 2621.029964][ T1056] oom_reaper: reaped process 17395 (syz-executor.4), now anon-rss:0kB, file-rss:34688kB, shmem-rss:0kB [ 2621.058622][T15473] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2621.070694][T15473] CPU: 1 PID: 15473 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190724 #50 [ 2621.079809][T15473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2621.089861][T15473] Call Trace: [ 2621.089888][T15473] dump_stack+0x172/0x1f0 [ 2621.089908][T15473] dump_header+0x10b/0x82d [ 2621.089927][T15473] ? oom_kill_process+0x94/0x3f0 [ 2621.089949][T15473] oom_kill_process.cold+0x10/0x15 [ 2621.106888][T15473] out_of_memory+0x79a/0x12c0 [ 2621.106906][T15473] ? lock_downgrade+0x920/0x920 [ 2621.106934][T15473] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2621.106952][T15473] ? oom_killer_disable+0x280/0x280 [ 2621.116754][T15473] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2621.116771][T15473] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2621.116793][T15473] ? do_raw_spin_unlock+0x57/0x270 [ 2621.116812][T15473] ? _raw_spin_unlock+0x2d/0x50 [ 2621.127467][T15473] try_charge+0x1080/0x1480 [ 2621.127492][T15473] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2621.127514][T15473] ? find_held_lock+0x35/0x130 [ 2621.138245][T15473] ? get_mem_cgroup_from_mm+0x139/0x320 [ 2621.138271][T15473] ? lock_downgrade+0x920/0x920 [ 2621.138284][T15473] ? percpu_ref_tryget_live+0x111/0x290 [ 2621.138312][T15473] __memcg_kmem_charge_memcg+0x71/0xf0 [ 2621.149072][T15473] ? memcg_kmem_put_cache+0x50/0x50 [ 2621.149093][T15473] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2621.149111][T15473] __memcg_kmem_charge+0x13a/0x3a0 [ 2621.149130][T15473] __alloc_pages_nodemask+0x4f2/0x8f0 [ 2621.149152][T15473] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2621.158504][T15473] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2621.158521][T15473] ? copy_process+0x46d1/0x6b00 [ 2621.158540][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2621.158561][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2621.168873][T15473] ? __kasan_check_read+0x11/0x20 [ 2621.168896][T15473] copy_process+0x3f8/0x6b00 [ 2621.168924][T15473] ? __kasan_check_read+0x11/0x20 [ 2621.168945][T15473] ? __lock_acquire+0x1702/0x4c30 [ 2621.179326][T15473] ? __kasan_check_read+0x11/0x20 [ 2621.190312][T15473] ? mark_lock+0xc0/0x11e0 [ 2621.190335][T15473] ? __cleanup_sighand+0x60/0x60 [ 2621.190349][T15473] ? find_held_lock+0x35/0x130 [ 2621.190379][T15473] _do_fork+0x146/0xfa0 [ 2621.190399][T15473] ? copy_init_mm+0x20/0x20 [ 2621.201162][T15473] ? __kasan_check_read+0x11/0x20 [ 2621.211627][T15473] ? _copy_to_user+0x118/0x160 [ 2621.223941][T15473] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2621.234075][T15473] ? put_timespec64+0xda/0x140 [ 2621.248709][T15473] __x64_sys_clone+0x18d/0x250 [ 2621.248727][T15473] ? __ia32_sys_vfork+0xc0/0xc0 [ 2621.248752][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2621.248773][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2621.258809][T15473] do_syscall_64+0xfa/0x760 [ 2621.258831][T15473] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2621.258842][T15473] RIP: 0033:0x457dfa [ 2621.258857][T15473] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2621.258872][T15473] RSP: 002b:00007ffe9d25c010 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2621.268391][T15473] RAX: ffffffffffffffda RBX: 00007ffe9d25c010 RCX: 0000000000457dfa [ 2621.268399][T15473] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2621.268407][T15473] RBP: 00007ffe9d25c050 R08: 0000000000000001 R09: 0000555556205940 [ 2621.268415][T15473] R10: 0000555556205c10 R11: 0000000000000246 R12: 0000000000000001 [ 2621.268423][T15473] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe9d25c0a0 [ 2621.268813][T15473] memory: usage 20940kB, limit 0kB, failcnt 136 [ 2621.278459][T15473] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2621.292549][T15473] Memory cgroup stats for /syz4: [ 2621.292669][T15473] anon 5541888 [ 2621.292669][T15473] file 49152 [ 2621.292669][T15473] kernel_stack 1572864 [ 2621.292669][T15473] slab 8536064 [ 2621.292669][T15473] sock 8192 [ 2621.292669][T15473] shmem 20480 [ 2621.292669][T15473] file_mapped 0 [ 2621.292669][T15473] file_dirty 0 [ 2621.292669][T15473] file_writeback 0 [ 2621.292669][T15473] anon_thp 0 [ 2621.292669][T15473] inactive_anon 69632 [ 2621.292669][T15473] active_anon 5537792 [ 2621.292669][T15473] inactive_file 0 [ 2621.292669][T15473] active_file 45056 [ 2621.292669][T15473] unevictable 12288 [ 2621.292669][T15473] slab_reclaimable 3649536 [ 2621.292669][T15473] slab_unreclaimable 4886528 [ 2621.292669][T15473] pgfault 400521 [ 2621.292669][T15473] pgmajfault 0 [ 2621.292669][T15473] workingset_refault 825 [ 2621.292669][T15473] workingset_activate 330 [ 2621.292669][T15473] workingset_nodereclaim 0 [ 2621.292669][T15473] pgrefill 12552 [ 2621.292669][T15473] pgscan 17027 [ 2621.292669][T15473] pgsteal 4298 [ 2621.308725][T15473] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=13284,uid=0 [ 2621.324760][T15473] Memory cgroup out of memory: Killed process 13284 (syz-executor.4) total-vm:72572kB, anon-rss:176kB, file-rss:35864kB, shmem-rss:0kB, UID:0 [ 2621.366409][T15473] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2621.385794][T15473] CPU: 1 PID: 15473 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190724 #50 [ 2621.395472][T15473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2621.395486][T15473] Call Trace: [ 2621.582539][T15473] dump_stack+0x172/0x1f0 [ 2621.586856][T15473] dump_header+0x10b/0x82d [ 2621.591284][T15473] ? oom_kill_process+0x94/0x3f0 [ 2621.596213][T15473] oom_kill_process.cold+0x10/0x15 [ 2621.601333][T15473] out_of_memory+0x79a/0x12c0 [ 2621.606017][T15473] ? lock_downgrade+0x920/0x920 [ 2621.610953][T15473] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2621.616749][T15473] ? oom_killer_disable+0x280/0x280 [ 2621.621944][T15473] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2621.627482][T15473] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2621.633210][T15473] ? do_raw_spin_unlock+0x57/0x270 [ 2621.638325][T15473] ? _raw_spin_unlock+0x2d/0x50 [ 2621.643161][T15473] try_charge+0x1080/0x1480 [ 2621.647656][T15473] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2621.653184][T15473] ? find_held_lock+0x35/0x130 [ 2621.657938][T15473] ? get_mem_cgroup_from_mm+0x139/0x320 [ 2621.663473][T15473] ? lock_downgrade+0x920/0x920 [ 2621.668304][T15473] ? percpu_ref_tryget_live+0x111/0x290 [ 2621.673836][T15473] __memcg_kmem_charge_memcg+0x71/0xf0 [ 2621.680403][T15473] ? memcg_kmem_put_cache+0x50/0x50 [ 2621.685602][T15473] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2621.691135][T15473] __memcg_kmem_charge+0x13a/0x3a0 [ 2621.697034][T15473] __alloc_pages_nodemask+0x4f2/0x8f0 [ 2621.702393][T15473] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2621.708630][T15473] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2621.714352][T15473] ? copy_process+0x46d1/0x6b00 [ 2621.719190][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2621.724578][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2621.729586][T15473] ? __kasan_check_read+0x11/0x20 [ 2621.734611][T15473] copy_process+0x3f8/0x6b00 [ 2621.739191][T15473] ? __kasan_check_read+0x11/0x20 [ 2621.744216][T15473] ? __lock_acquire+0x1702/0x4c30 [ 2621.749257][T15473] ? __kasan_check_read+0x11/0x20 [ 2621.754267][T15473] ? mark_lock+0xc0/0x11e0 [ 2621.758687][T15473] ? __cleanup_sighand+0x60/0x60 [ 2621.763626][T15473] ? find_held_lock+0x35/0x130 [ 2621.768406][T15473] _do_fork+0x146/0xfa0 [ 2621.772553][T15473] ? copy_init_mm+0x20/0x20 [ 2621.777043][T15473] ? __kasan_check_read+0x11/0x20 [ 2621.782050][T15473] ? _copy_to_user+0x118/0x160 [ 2621.786834][T15473] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2621.793078][T15473] ? put_timespec64+0xda/0x140 [ 2621.797836][T15473] __x64_sys_clone+0x18d/0x250 [ 2621.802594][T15473] ? __ia32_sys_vfork+0xc0/0xc0 [ 2621.807451][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2621.812722][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2621.817730][T15473] do_syscall_64+0xfa/0x760 [ 2621.822219][T15473] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2621.828115][T15473] RIP: 0033:0x457dfa [ 2621.832009][T15473] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2621.851601][T15473] RSP: 002b:00007ffe9d25c010 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2621.860003][T15473] RAX: ffffffffffffffda RBX: 00007ffe9d25c010 RCX: 0000000000457dfa [ 2621.867966][T15473] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2621.875968][T15473] RBP: 00007ffe9d25c050 R08: 0000000000000001 R09: 0000555556205940 [ 2621.883951][T15473] R10: 0000555556205c10 R11: 0000000000000246 R12: 0000000000000001 [ 2621.891957][T15473] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe9d25c0a0 [ 2621.902776][T26374] chnl_net:caif_netlink_parms(): no params data found [ 2621.907308][T15473] memory: usage 20636kB, limit 0kB, failcnt 142 [ 2621.915831][T15473] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2621.922880][T15473] Memory cgroup stats for /syz4: [ 2621.923007][T15473] anon 5402624 [ 2621.923007][T15473] file 49152 [ 2621.923007][T15473] kernel_stack 1507328 [ 2621.923007][T15473] slab 8536064 [ 2621.923007][T15473] sock 8192 [ 2621.923007][T15473] shmem 20480 [ 2621.923007][T15473] file_mapped 0 [ 2621.923007][T15473] file_dirty 0 [ 2621.923007][T15473] file_writeback 0 [ 2621.923007][T15473] anon_thp 0 [ 2621.923007][T15473] inactive_anon 69632 [ 2621.923007][T15473] active_anon 5402624 [ 2621.923007][T15473] inactive_file 0 [ 2621.923007][T15473] active_file 45056 [ 2621.923007][T15473] unevictable 12288 [ 2621.923007][T15473] slab_reclaimable 3649536 [ 2621.923007][T15473] slab_unreclaimable 4886528 [ 2621.923007][T15473] pgfault 400521 [ 2621.923007][T15473] pgmajfault 0 [ 2621.923007][T15473] workingset_refault 825 [ 2621.923007][T15473] workingset_activate 330 [ 2621.923007][T15473] workingset_nodereclaim 0 [ 2621.923007][T15473] pgrefill 12552 [ 2621.923007][T15473] pgscan 17027 [ 2621.923007][T15473] pgsteal 4298 [ 2622.025833][T15473] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=13232,uid=0 [ 2622.026109][T15473] Memory cgroup out of memory: Killed process 13232 (syz-executor.4) total-vm:72572kB, anon-rss:176kB, file-rss:35844kB, shmem-rss:0kB, UID:0 [ 2622.093768][T15473] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2622.107366][T15473] CPU: 0 PID: 15473 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190724 #50 [ 2622.116505][T15473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2622.126652][T15473] Call Trace: [ 2622.129961][T15473] dump_stack+0x172/0x1f0 [ 2622.134305][T15473] dump_header+0x10b/0x82d [ 2622.138985][T15473] ? oom_kill_process+0x94/0x3f0 [ 2622.143932][T15473] oom_kill_process.cold+0x10/0x15 [ 2622.149061][T15473] out_of_memory+0x79a/0x12c0 [ 2622.153747][T15473] ? lock_downgrade+0x920/0x920 [ 2622.158607][T15473] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2622.164423][T15473] ? oom_killer_disable+0x280/0x280 [ 2622.169643][T15473] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2622.175203][T15473] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2622.180851][T15473] ? do_raw_spin_unlock+0x57/0x270 [ 2622.185971][T15473] ? _raw_spin_unlock+0x2d/0x50 [ 2622.190838][T15473] try_charge+0x1080/0x1480 [ 2622.195467][T15473] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2622.201022][T15473] ? find_held_lock+0x35/0x130 [ 2622.205821][T15473] ? get_mem_cgroup_from_mm+0x139/0x320 [ 2622.211395][T15473] ? lock_downgrade+0x920/0x920 [ 2622.216253][T15473] ? percpu_ref_tryget_live+0x111/0x290 [ 2622.221808][T15473] __memcg_kmem_charge_memcg+0x71/0xf0 [ 2622.227275][T15473] ? memcg_kmem_put_cache+0x50/0x50 [ 2622.232486][T15473] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2622.238045][T15473] __memcg_kmem_charge+0x13a/0x3a0 [ 2622.243157][T15473] __alloc_pages_nodemask+0x4f2/0x8f0 [ 2622.248525][T15473] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2622.254769][T15473] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2622.260474][T15473] ? copy_process+0x46d1/0x6b00 [ 2622.265310][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2622.270596][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2622.275639][T15473] ? __kasan_check_read+0x11/0x20 [ 2622.280659][T15473] copy_process+0x3f8/0x6b00 [ 2622.285263][T15473] ? __kasan_check_read+0x11/0x20 [ 2622.290285][T15473] ? __lock_acquire+0x1702/0x4c30 [ 2622.295315][T15473] ? __kasan_check_read+0x11/0x20 [ 2622.300322][T15473] ? mark_lock+0xc0/0x11e0 [ 2622.304741][T15473] ? __cleanup_sighand+0x60/0x60 [ 2622.309674][T15473] ? find_held_lock+0x35/0x130 [ 2622.314442][T15473] _do_fork+0x146/0xfa0 [ 2622.318596][T15473] ? copy_init_mm+0x20/0x20 [ 2622.323099][T15473] ? __kasan_check_read+0x11/0x20 [ 2622.328118][T15473] ? _copy_to_user+0x118/0x160 [ 2622.332976][T15473] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2622.339214][T15473] ? put_timespec64+0xda/0x140 [ 2622.343966][T15473] __x64_sys_clone+0x18d/0x250 [ 2622.348730][T15473] ? __ia32_sys_vfork+0xc0/0xc0 [ 2622.353582][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2622.358853][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2622.363861][T15473] do_syscall_64+0xfa/0x760 [ 2622.368366][T15473] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2622.374283][T15473] RIP: 0033:0x457dfa [ 2622.378165][T15473] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2622.397865][T15473] RSP: 002b:00007ffe9d25c010 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2622.406271][T15473] RAX: ffffffffffffffda RBX: 00007ffe9d25c010 RCX: 0000000000457dfa [ 2622.414410][T15473] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2622.422371][T15473] RBP: 00007ffe9d25c050 R08: 0000000000000001 R09: 0000555556205940 [ 2622.430427][T15473] R10: 0000555556205c10 R11: 0000000000000246 R12: 0000000000000001 [ 2622.438429][T15473] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe9d25c0a0 [ 2622.446563][T15473] memory: usage 20332kB, limit 0kB, failcnt 148 [ 2622.452904][T15473] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2622.459869][T15473] Memory cgroup stats for /syz4: [ 2622.459996][T15473] anon 5263360 [ 2622.459996][T15473] file 49152 [ 2622.459996][T15473] kernel_stack 1507328 [ 2622.459996][T15473] slab 8536064 [ 2622.459996][T15473] sock 8192 [ 2622.459996][T15473] shmem 20480 [ 2622.459996][T15473] file_mapped 0 [ 2622.459996][T15473] file_dirty 0 [ 2622.459996][T15473] file_writeback 0 [ 2622.459996][T15473] anon_thp 0 [ 2622.459996][T15473] inactive_anon 69632 [ 2622.459996][T15473] active_anon 5267456 [ 2622.459996][T15473] inactive_file 0 [ 2622.459996][T15473] active_file 45056 [ 2622.459996][T15473] unevictable 12288 [ 2622.459996][T15473] slab_reclaimable 3649536 [ 2622.459996][T15473] slab_unreclaimable 4886528 [ 2622.459996][T15473] pgfault 400521 [ 2622.459996][T15473] pgmajfault 0 [ 2622.459996][T15473] workingset_refault 825 [ 2622.459996][T15473] workingset_activate 330 [ 2622.459996][T15473] workingset_nodereclaim 0 [ 2622.459996][T15473] pgrefill 12552 [ 2622.459996][T15473] pgscan 17027 [ 2622.459996][T15473] pgsteal 4298 [ 2622.555433][T15473] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=24999,uid=0 [ 2622.571439][T15473] Memory cgroup out of memory: Killed process 24999 (syz-executor.4) total-vm:72704kB, anon-rss:184kB, file-rss:35812kB, shmem-rss:0kB, UID:0 [ 2622.587325][ T1056] oom_reaper: reaped process 24999 (syz-executor.4), now anon-rss:8kB, file-rss:34852kB, shmem-rss:0kB [ 2622.603001][T26373] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2622.606811][T15473] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2622.624111][T15473] CPU: 1 PID: 15473 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190724 #50 [ 2622.633245][T15473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2622.633252][T15473] Call Trace: [ 2622.633278][T15473] dump_stack+0x172/0x1f0 [ 2622.633298][T15473] dump_header+0x10b/0x82d [ 2622.633310][T15473] ? oom_kill_process+0x94/0x3f0 [ 2622.633326][T15473] oom_kill_process.cold+0x10/0x15 [ 2622.633352][T15473] out_of_memory+0x79a/0x12c0 [ 2622.646702][T15473] ? lock_downgrade+0x920/0x920 [ 2622.646723][T15473] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2622.646740][T15473] ? oom_killer_disable+0x280/0x280 [ 2622.646770][T15473] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2622.655506][T15473] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2622.665555][T15473] ? do_raw_spin_unlock+0x57/0x270 [ 2622.675058][T15473] ? _raw_spin_unlock+0x2d/0x50 [ 2622.686067][T15473] try_charge+0x1080/0x1480 [ 2622.686093][T15473] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2622.686109][T15473] ? find_held_lock+0x35/0x130 [ 2622.686129][T15473] ? get_mem_cgroup_from_mm+0x139/0x320 [ 2622.697296][T15473] ? lock_downgrade+0x920/0x920 [ 2622.697312][T15473] ? percpu_ref_tryget_live+0x111/0x290 [ 2622.697332][T15473] __memcg_kmem_charge_memcg+0x71/0xf0 [ 2622.697350][T15473] ? memcg_kmem_put_cache+0x50/0x50 [ 2622.707330][T15473] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2622.707348][T15473] __memcg_kmem_charge+0x13a/0x3a0 [ 2622.707369][T15473] __alloc_pages_nodemask+0x4f2/0x8f0 [ 2622.717436][T15473] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2622.717458][T15473] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2622.717474][T15473] ? copy_process+0x46d1/0x6b00 [ 2622.717497][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2622.727793][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2622.738165][T15473] ? __kasan_check_read+0x11/0x20 [ 2622.738188][T15473] copy_process+0x3f8/0x6b00 [ 2622.738207][T15473] ? __kasan_check_read+0x11/0x20 [ 2622.738222][T15473] ? __lock_acquire+0x1702/0x4c30 [ 2622.738234][T15473] ? __kasan_check_read+0x11/0x20 [ 2622.738254][T15473] ? mark_lock+0xc0/0x11e0 [ 2622.748898][T15473] ? __cleanup_sighand+0x60/0x60 [ 2622.759525][T15473] ? find_held_lock+0x35/0x130 [ 2622.759558][T15473] _do_fork+0x146/0xfa0 [ 2622.759577][T15473] ? copy_init_mm+0x20/0x20 [ 2622.759600][T15473] ? __kasan_check_read+0x11/0x20 [ 2622.771926][T15473] ? _copy_to_user+0x118/0x160 [ 2622.771941][T15473] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2622.771949][T15473] ? put_timespec64+0xda/0x140 [ 2622.771963][T15473] __x64_sys_clone+0x18d/0x250 [ 2622.771973][T15473] ? __ia32_sys_vfork+0xc0/0xc0 [ 2622.771987][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2622.771998][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2622.772010][T15473] do_syscall_64+0xfa/0x760 [ 2622.772022][T15473] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2622.772029][T15473] RIP: 0033:0x457dfa [ 2622.772039][T15473] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2622.772043][T15473] RSP: 002b:00007ffe9d25c010 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2622.772051][T15473] RAX: ffffffffffffffda RBX: 00007ffe9d25c010 RCX: 0000000000457dfa [ 2622.772056][T15473] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2622.772060][T15473] RBP: 00007ffe9d25c050 R08: 0000000000000001 R09: 0000555556205940 [ 2622.772065][T15473] R10: 0000555556205c10 R11: 0000000000000246 R12: 0000000000000001 [ 2622.772070][T15473] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe9d25c0a0 [ 2622.795456][T15473] memory: usage 20012kB, limit 0kB, failcnt 160 [ 2622.812136][T15473] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2622.821054][T15473] Memory cgroup stats for /syz4: [ 2622.821174][T15473] anon 5128192 [ 2622.821174][T15473] file 49152 [ 2622.821174][T15473] kernel_stack 1441792 [ 2622.821174][T15473] slab 8536064 [ 2622.821174][T15473] sock 8192 [ 2622.821174][T15473] shmem 20480 [ 2622.821174][T15473] file_mapped 0 [ 2622.821174][T15473] file_dirty 0 [ 2622.821174][T15473] file_writeback 0 [ 2622.821174][T15473] anon_thp 0 [ 2622.821174][T15473] inactive_anon 69632 [ 2622.821174][T15473] active_anon 5132288 [ 2622.821174][T15473] inactive_file 0 [ 2622.821174][T15473] active_file 45056 [ 2622.821174][T15473] unevictable 12288 [ 2622.821174][T15473] slab_reclaimable 3649536 [ 2622.821174][T15473] slab_unreclaimable 4886528 [ 2622.821174][T15473] pgfault 400521 [ 2622.821174][T15473] pgmajfault 0 [ 2622.821174][T15473] workingset_refault 825 [ 2622.821174][T15473] workingset_activate 330 [ 2622.821174][T15473] workingset_nodereclaim 0 [ 2622.821174][T15473] pgrefill 12552 [ 2622.821174][T15473] pgscan 17027 [ 2622.821174][T15473] pgsteal 4298 [ 2622.839442][T15473] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=17393,uid=0 [ 2622.856137][T15473] Memory cgroup out of memory: Killed process 17393 (syz-executor.4) total-vm:72704kB, anon-rss:172kB, file-rss:35828kB, shmem-rss:0kB, UID:0 [ 2622.876427][T15473] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2622.885688][T15473] CPU: 1 PID: 15473 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190724 #50 [ 2622.896158][T15473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2622.896164][T15473] Call Trace: [ 2622.896189][T15473] dump_stack+0x172/0x1f0 [ 2622.896210][T15473] dump_header+0x10b/0x82d [ 2622.896221][T15473] ? oom_kill_process+0x94/0x3f0 [ 2622.896243][T15473] oom_kill_process.cold+0x10/0x15 [ 2622.919761][T15473] out_of_memory+0x79a/0x12c0 [ 2622.919778][T15473] ? lock_downgrade+0x920/0x920 [ 2622.919795][T15473] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2622.919810][T15473] ? oom_killer_disable+0x280/0x280 [ 2622.919844][T15473] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2622.936249][T15473] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2622.936272][T15473] ? do_raw_spin_unlock+0x57/0x270 [ 2622.936288][T15473] ? _raw_spin_unlock+0x2d/0x50 [ 2622.936307][T15473] try_charge+0x1080/0x1480 [ 2622.936330][T15473] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2622.952370][T15473] ? find_held_lock+0x35/0x130 [ 2622.952388][T15473] ? get_mem_cgroup_from_mm+0x139/0x320 [ 2622.952410][T15473] ? lock_downgrade+0x920/0x920 [ 2622.952438][T15473] ? percpu_ref_tryget_live+0x111/0x290 [ 2622.968491][T15473] __memcg_kmem_charge_memcg+0x71/0xf0 [ 2622.968507][T15473] ? memcg_kmem_put_cache+0x50/0x50 [ 2622.968527][T15473] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2622.968544][T15473] __memcg_kmem_charge+0x13a/0x3a0 [ 2622.968564][T15473] __alloc_pages_nodemask+0x4f2/0x8f0 [ 2623.075578][T15473] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2623.075603][T15473] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2623.075618][T15473] ? copy_process+0x46d1/0x6b00 [ 2623.075646][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2623.105523][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2623.105537][T15473] ? __kasan_check_read+0x11/0x20 [ 2623.105557][T15473] copy_process+0x3f8/0x6b00 [ 2623.105578][T15473] ? __kasan_check_read+0x11/0x20 [ 2623.126482][T15473] ? __lock_acquire+0x1702/0x4c30 [ 2623.126497][T15473] ? __kasan_check_read+0x11/0x20 [ 2623.126509][T15473] ? mark_lock+0xc0/0x11e0 [ 2623.126531][T15473] ? __cleanup_sighand+0x60/0x60 [ 2623.126546][T15473] ? find_held_lock+0x35/0x130 [ 2623.126575][T15473] _do_fork+0x146/0xfa0 [ 2623.139932][T15473] ? copy_init_mm+0x20/0x20 [ 2623.144912][T26373] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2623.148653][T15473] ? __kasan_check_read+0x11/0x20 [ 2623.148669][T15473] ? _copy_to_user+0x118/0x160 [ 2623.148688][T15473] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2623.148701][T15473] ? put_timespec64+0xda/0x140 [ 2623.148729][T15473] __x64_sys_clone+0x18d/0x250 [ 2623.158766][T15473] ? __ia32_sys_vfork+0xc0/0xc0 [ 2623.168272][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2623.168289][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2623.168309][T15473] do_syscall_64+0xfa/0x760 [ 2623.168331][T15473] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2623.179312][T15473] RIP: 0033:0x457dfa [ 2623.179328][T15473] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2623.179335][T15473] RSP: 002b:00007ffe9d25c010 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2623.179348][T15473] RAX: ffffffffffffffda RBX: 00007ffe9d25c010 RCX: 0000000000457dfa [ 2623.179356][T15473] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2623.179371][T15473] RBP: 00007ffe9d25c050 R08: 0000000000000001 R09: 0000555556205940 [ 2623.190553][T15473] R10: 0000555556205c10 R11: 0000000000000246 R12: 0000000000000001 [ 2623.190568][T15473] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe9d25c0a0 [ 2623.253256][T15473] memory: usage 19680kB, limit 0kB, failcnt 166 [ 2623.258817][T15473] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2623.258822][T15473] Memory cgroup stats for /syz4: [ 2623.258952][T15473] anon 4988928 [ 2623.258952][T15473] file 49152 [ 2623.258952][T15473] kernel_stack 1376256 [ 2623.258952][T15473] slab 8536064 [ 2623.258952][T15473] sock 8192 [ 2623.258952][T15473] shmem 20480 [ 2623.258952][T15473] file_mapped 0 [ 2623.258952][T15473] file_dirty 0 [ 2623.258952][T15473] file_writeback 0 [ 2623.258952][T15473] anon_thp 0 [ 2623.258952][T15473] inactive_anon 69632 [ 2623.258952][T15473] active_anon 4997120 [ 2623.258952][T15473] inactive_file 0 [ 2623.258952][T15473] active_file 45056 [ 2623.258952][T15473] unevictable 12288 [ 2623.258952][T15473] slab_reclaimable 3649536 [ 2623.258952][T15473] slab_unreclaimable 4886528 [ 2623.258952][T15473] pgfault 400521 [ 2623.258952][T15473] pgmajfault 0 [ 2623.258952][T15473] workingset_refault 825 [ 2623.258952][T15473] workingset_activate 330 [ 2623.258952][T15473] workingset_nodereclaim 0 [ 2623.258952][T15473] pgrefill 12552 [ 2623.258952][T15473] pgscan 17027 [ 2623.258952][T15473] pgsteal 4298 [ 2623.258972][T15473] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=11375,uid=0 [ 2623.271185][T15473] Memory cgroup out of memory: Killed process 11375 (syz-executor.4) total-vm:72572kB, anon-rss:164kB, file-rss:35820kB, shmem-rss:0kB, UID:0 [ 2623.332432][T15473] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2623.343735][T15473] CPU: 1 PID: 15473 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190724 #50 [ 2623.352903][T15473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2623.352919][T15473] Call Trace: [ 2623.363905][T15473] dump_stack+0x172/0x1f0 [ 2623.373492][T15473] dump_header+0x10b/0x82d [ 2623.383772][T15473] ? oom_kill_process+0x94/0x3f0 [ 2623.394140][T15473] oom_kill_process.cold+0x10/0x15 [ 2623.417672][T15473] out_of_memory+0x79a/0x12c0 [ 2623.417689][T15473] ? lock_downgrade+0x920/0x920 [ 2623.417707][T15473] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2623.417729][T15473] ? oom_killer_disable+0x280/0x280 [ 2623.434388][T15473] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2623.450326][T15473] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2623.450347][T15473] ? do_raw_spin_unlock+0x57/0x270 [ 2623.450373][T15473] ? _raw_spin_unlock+0x2d/0x50 [ 2623.466318][T15473] try_charge+0x1080/0x1480 [ 2623.466343][T15473] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2623.466365][T15473] ? find_held_lock+0x35/0x130 [ 2623.479529][T15473] ? get_mem_cgroup_from_mm+0x139/0x320 [ 2623.479553][T15473] ? lock_downgrade+0x920/0x920 [ 2623.479569][T15473] ? percpu_ref_tryget_live+0x111/0x290 [ 2623.479588][T15473] __memcg_kmem_charge_memcg+0x71/0xf0 [ 2623.573584][T15473] ? memcg_kmem_put_cache+0x50/0x50 [ 2623.573604][T15473] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2623.573620][T15473] __memcg_kmem_charge+0x13a/0x3a0 [ 2623.573645][T15473] __alloc_pages_nodemask+0x4f2/0x8f0 [ 2623.603502][T15473] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2623.603525][T15473] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2623.603541][T15473] ? copy_process+0x46d1/0x6b00 [ 2623.603565][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2623.624463][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2623.624477][T15473] ? __kasan_check_read+0x11/0x20 [ 2623.624498][T15473] copy_process+0x3f8/0x6b00 [ 2623.624518][T15473] ? __kasan_check_read+0x11/0x20 [ 2623.637884][T15473] ? __lock_acquire+0x1702/0x4c30 [ 2623.637899][T15473] ? __kasan_check_read+0x11/0x20 [ 2623.637925][T15473] ? mark_lock+0xc0/0x11e0 [ 2623.646745][T15473] ? __cleanup_sighand+0x60/0x60 [ 2623.646760][T15473] ? find_held_lock+0x35/0x130 [ 2623.646791][T15473] _do_fork+0x146/0xfa0 [ 2623.656815][T15473] ? copy_init_mm+0x20/0x20 [ 2623.656836][T15473] ? __kasan_check_read+0x11/0x20 [ 2623.656857][T15473] ? _copy_to_user+0x118/0x160 [ 2623.666389][T15473] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2623.666403][T15473] ? put_timespec64+0xda/0x140 [ 2623.666426][T15473] __x64_sys_clone+0x18d/0x250 [ 2623.666446][T15473] ? __ia32_sys_vfork+0xc0/0xc0 [ 2623.677791][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2623.677810][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2623.677832][T15473] do_syscall_64+0xfa/0x760 [ 2623.689002][T15473] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2623.689014][T15473] RIP: 0033:0x457dfa [ 2623.689030][T15473] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2623.689044][T15473] RSP: 002b:00007ffe9d25c010 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2623.699073][T15473] RAX: ffffffffffffffda RBX: 00007ffe9d25c010 RCX: 0000000000457dfa [ 2623.699081][T15473] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2623.699089][T15473] RBP: 00007ffe9d25c050 R08: 0000000000000001 R09: 0000555556205940 [ 2623.699096][T15473] R10: 0000555556205c10 R11: 0000000000000246 R12: 0000000000000001 [ 2623.699104][T15473] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe9d25c0a0 [ 2623.706056][T15473] memory: usage 19396kB, limit 0kB, failcnt 172 [ 2623.730149][T15473] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2623.748592][T15473] Memory cgroup stats for /syz4: [ 2623.748717][T15473] anon 4849664 [ 2623.748717][T15473] file 49152 [ 2623.748717][T15473] kernel_stack 1376256 [ 2623.748717][T15473] slab 8536064 [ 2623.748717][T15473] sock 8192 [ 2623.748717][T15473] shmem 20480 [ 2623.748717][T15473] file_mapped 0 [ 2623.748717][T15473] file_dirty 0 [ 2623.748717][T15473] file_writeback 0 [ 2623.748717][T15473] anon_thp 0 [ 2623.748717][T15473] inactive_anon 69632 [ 2623.748717][T15473] active_anon 4861952 [ 2623.748717][T15473] inactive_file 0 [ 2623.748717][T15473] active_file 45056 [ 2623.748717][T15473] unevictable 12288 [ 2623.748717][T15473] slab_reclaimable 3649536 [ 2623.748717][T15473] slab_unreclaimable 4886528 [ 2623.748717][T15473] pgfault 400521 [ 2623.748717][T15473] pgmajfault 0 [ 2623.748717][T15473] workingset_refault 825 [ 2623.748717][T15473] workingset_activate 330 [ 2623.748717][T15473] workingset_nodereclaim 0 [ 2623.748717][T15473] pgrefill 12552 [ 2623.748717][T15473] pgscan 17027 [ 2623.748717][T15473] pgsteal 4298 [ 2623.758351][T15473] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=19268,uid=0 [ 2623.773167][T15473] Memory cgroup out of memory: Killed process 19268 (syz-executor.4) total-vm:72704kB, anon-rss:172kB, file-rss:35808kB, shmem-rss:0kB, UID:0 [ 2624.121213][ T1056] oom_reaper: reaped process 19268 (syz-executor.4), now anon-rss:0kB, file-rss:34848kB, shmem-rss:0kB [ 2624.124376][T15473] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2624.152194][T15473] CPU: 0 PID: 15473 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190724 #50 [ 2624.161421][T15473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2624.171481][T15473] Call Trace: [ 2624.174786][T15473] dump_stack+0x172/0x1f0 [ 2624.179131][T15473] dump_header+0x10b/0x82d [ 2624.183640][T15473] ? oom_kill_process+0x94/0x3f0 [ 2624.188587][T15473] oom_kill_process.cold+0x10/0x15 [ 2624.193708][T15473] out_of_memory+0x79a/0x12c0 [ 2624.198390][T15473] ? lock_downgrade+0x920/0x920 [ 2624.203267][T15473] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2624.209112][T15473] ? oom_killer_disable+0x280/0x280 [ 2624.214433][T15473] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2624.219997][T15473] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2624.225644][T15473] ? do_raw_spin_unlock+0x57/0x270 [ 2624.230766][T15473] ? _raw_spin_unlock+0x2d/0x50 [ 2624.235628][T15473] try_charge+0x1080/0x1480 [ 2624.240136][T15473] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2624.245687][T15473] ? find_held_lock+0x35/0x130 [ 2624.250446][T15473] ? get_mem_cgroup_from_mm+0x139/0x320 [ 2624.255994][T15473] ? lock_downgrade+0x920/0x920 [ 2624.260839][T15473] ? percpu_ref_tryget_live+0x111/0x290 [ 2624.266387][T15473] __memcg_kmem_charge_memcg+0x71/0xf0 [ 2624.271864][T15473] ? memcg_kmem_put_cache+0x50/0x50 [ 2624.277086][T15473] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2624.282800][T15473] __memcg_kmem_charge+0x13a/0x3a0 [ 2624.287902][T15473] __alloc_pages_nodemask+0x4f2/0x8f0 [ 2624.293286][T15473] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2624.299546][T15473] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2624.305255][T15473] ? copy_process+0x46d1/0x6b00 [ 2624.310795][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2624.316100][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2624.321388][T15473] ? __kasan_check_read+0x11/0x20 [ 2624.326500][T15473] copy_process+0x3f8/0x6b00 [ 2624.331095][T15473] ? __kasan_check_read+0x11/0x20 [ 2624.336105][T15473] ? __lock_acquire+0x1702/0x4c30 [ 2624.341107][T15473] ? __kasan_check_read+0x11/0x20 [ 2624.346126][T15473] ? mark_lock+0xc0/0x11e0 [ 2624.350568][T15473] ? __cleanup_sighand+0x60/0x60 [ 2624.355497][T15473] ? find_held_lock+0x35/0x130 [ 2624.360272][T15473] _do_fork+0x146/0xfa0 [ 2624.364427][T15473] ? copy_init_mm+0x20/0x20 [ 2624.368925][T15473] ? __kasan_check_read+0x11/0x20 [ 2624.373944][T15473] ? _copy_to_user+0x118/0x160 [ 2624.378697][T15473] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2624.384923][T15473] ? put_timespec64+0xda/0x140 [ 2624.389681][T15473] __x64_sys_clone+0x18d/0x250 [ 2624.394437][T15473] ? __ia32_sys_vfork+0xc0/0xc0 [ 2624.399279][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2624.405590][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2624.410604][T15473] do_syscall_64+0xfa/0x760 [ 2624.415101][T15473] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2624.420974][T15473] RIP: 0033:0x457dfa [ 2624.424857][T15473] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2624.444649][T15473] RSP: 002b:00007ffe9d25c010 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2624.453072][T15473] RAX: ffffffffffffffda RBX: 00007ffe9d25c010 RCX: 0000000000457dfa [ 2624.461049][T15473] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2624.469114][T15473] RBP: 00007ffe9d25c050 R08: 0000000000000001 R09: 0000555556205940 [ 2624.477084][T15473] R10: 0000555556205c10 R11: 0000000000000246 R12: 0000000000000001 [ 2624.485165][T15473] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe9d25c0a0 [ 2624.499260][T15473] memory: usage 19100kB, limit 0kB, failcnt 178 [ 2624.505524][T15473] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2624.505535][T15473] Memory cgroup stats for /syz4: [ 2624.505654][T15473] anon 4714496 [ 2624.505654][T15473] file 49152 [ 2624.505654][T15473] kernel_stack 1310720 [ 2624.505654][T15473] slab 8536064 [ 2624.505654][T15473] sock 8192 [ 2624.505654][T15473] shmem 20480 [ 2624.505654][T15473] file_mapped 0 [ 2624.505654][T15473] file_dirty 0 [ 2624.505654][T15473] file_writeback 0 [ 2624.505654][T15473] anon_thp 0 [ 2624.505654][T15473] inactive_anon 69632 [ 2624.505654][T15473] active_anon 4726784 [ 2624.505654][T15473] inactive_file 0 [ 2624.505654][T15473] active_file 45056 [ 2624.505654][T15473] unevictable 12288 [ 2624.505654][T15473] slab_reclaimable 3649536 [ 2624.505654][T15473] slab_unreclaimable 4886528 [ 2624.505654][T15473] pgfault 400521 [ 2624.505654][T15473] pgmajfault 0 [ 2624.505654][T15473] workingset_refault 825 [ 2624.505654][T15473] workingset_activate 330 [ 2624.505654][T15473] workingset_nodereclaim 0 [ 2624.505654][T15473] pgrefill 12552 [ 2624.505654][T15473] pgscan 17027 [ 2624.505654][T15473] pgsteal 4298 [ 2624.610710][T15473] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=19254,uid=0 [ 2624.626766][T15473] Memory cgroup out of memory: Killed process 19254 (syz-executor.4) total-vm:72704kB, anon-rss:172kB, file-rss:35808kB, shmem-rss:0kB, UID:0 [ 2624.660585][T15473] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2624.683548][T26374] bridge0: port 1(bridge_slave_0) entered blocking state [ 2624.690737][T15473] CPU: 1 PID: 15473 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190724 #50 [ 2624.694336][T26374] bridge0: port 1(bridge_slave_0) entered disabled state [ 2624.699943][T15473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2624.699950][T15473] Call Trace: [ 2624.699972][T15473] dump_stack+0x172/0x1f0 [ 2624.699994][T15473] dump_header+0x10b/0x82d [ 2624.700007][T15473] ? oom_kill_process+0x94/0x3f0 [ 2624.700026][T15473] oom_kill_process.cold+0x10/0x15 [ 2624.717459][T15473] out_of_memory+0x79a/0x12c0 [ 2624.717477][T15473] ? lock_downgrade+0x920/0x920 [ 2624.717496][T15473] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2624.717515][T15473] ? oom_killer_disable+0x280/0x280 [ 2624.721976][T26374] device bridge_slave_0 entered promiscuous mode [ 2624.725326][T15473] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2624.734686][T15473] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2624.744477][T15473] ? do_raw_spin_unlock+0x57/0x270 [ 2624.749951][T26374] bridge0: port 2(bridge_slave_1) entered blocking state [ 2624.755202][T15473] ? _raw_spin_unlock+0x2d/0x50 [ 2624.760472][T26374] bridge0: port 2(bridge_slave_1) entered disabled state [ 2624.766705][T15473] try_charge+0x1080/0x1480 [ 2624.766731][T15473] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2624.766752][T15473] ? find_held_lock+0x35/0x130 [ 2624.779441][T15473] ? get_mem_cgroup_from_mm+0x139/0x320 [ 2624.779464][T15473] ? lock_downgrade+0x920/0x920 [ 2624.779477][T15473] ? percpu_ref_tryget_live+0x111/0x290 [ 2624.779504][T15473] __memcg_kmem_charge_memcg+0x71/0xf0 [ 2624.785702][T26374] device bridge_slave_1 entered promiscuous mode [ 2624.801197][T15473] ? memcg_kmem_put_cache+0x50/0x50 [ 2624.801217][T15473] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2624.801234][T15473] __memcg_kmem_charge+0x13a/0x3a0 [ 2624.801255][T15473] __alloc_pages_nodemask+0x4f2/0x8f0 [ 2624.813209][T15473] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2624.813232][T15473] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2624.823355][T15473] ? copy_process+0x46d1/0x6b00 [ 2624.833667][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2624.844139][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2624.855912][T15473] ? __kasan_check_read+0x11/0x20 [ 2624.855946][T15473] copy_process+0x3f8/0x6b00 [ 2624.866864][T15473] ? __kasan_check_read+0x11/0x20 [ 2624.866881][T15473] ? __lock_acquire+0x1702/0x4c30 [ 2624.866893][T15473] ? __kasan_check_read+0x11/0x20 [ 2624.866912][T15473] ? mark_lock+0xc0/0x11e0 [ 2624.877475][T15473] ? __cleanup_sighand+0x60/0x60 [ 2624.877490][T15473] ? find_held_lock+0x35/0x130 [ 2624.877521][T15473] _do_fork+0x146/0xfa0 [ 2624.890118][T15473] ? copy_init_mm+0x20/0x20 [ 2624.890138][T15473] ? __kasan_check_read+0x11/0x20 [ 2624.890153][T15473] ? _copy_to_user+0x118/0x160 [ 2624.890175][T15473] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2624.900294][T15473] ? put_timespec64+0xda/0x140 [ 2624.900316][T15473] __x64_sys_clone+0x18d/0x250 [ 2624.900333][T15473] ? __ia32_sys_vfork+0xc0/0xc0 [ 2624.900358][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2624.910386][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2624.910407][T15473] do_syscall_64+0xfa/0x760 [ 2624.910438][T15473] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2624.920029][T15473] RIP: 0033:0x457dfa [ 2624.920045][T15473] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2624.920052][T15473] RSP: 002b:00007ffe9d25c010 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2624.920065][T15473] RAX: ffffffffffffffda RBX: 00007ffe9d25c010 RCX: 0000000000457dfa [ 2624.920080][T15473] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2624.931012][T15473] RBP: 00007ffe9d25c050 R08: 0000000000000001 R09: 0000555556205940 [ 2624.931021][T15473] R10: 0000555556205c10 R11: 0000000000000246 R12: 0000000000000001 [ 2624.931029][T15473] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe9d25c0a0 [ 2625.085217][T15473] memory: usage 18748kB, limit 0kB, failcnt 184 [ 2625.092109][T15473] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2625.099132][T15473] Memory cgroup stats for /syz4: [ 2625.099246][T15473] anon 4575232 [ 2625.099246][T15473] file 49152 [ 2625.099246][T15473] kernel_stack 1310720 [ 2625.099246][T15473] slab 8536064 [ 2625.099246][T15473] sock 8192 [ 2625.099246][T15473] shmem 20480 [ 2625.099246][T15473] file_mapped 0 [ 2625.099246][T15473] file_dirty 0 [ 2625.099246][T15473] file_writeback 0 [ 2625.099246][T15473] anon_thp 0 [ 2625.099246][T15473] inactive_anon 69632 [ 2625.099246][T15473] active_anon 4591616 [ 2625.099246][T15473] inactive_file 0 [ 2625.099246][T15473] active_file 45056 [ 2625.099246][T15473] unevictable 12288 [ 2625.099246][T15473] slab_reclaimable 3649536 [ 2625.099246][T15473] slab_unreclaimable 4886528 [ 2625.099246][T15473] pgfault 400521 [ 2625.099246][T15473] pgmajfault 0 [ 2625.099246][T15473] workingset_refault 825 [ 2625.099246][T15473] workingset_activate 330 [ 2625.099246][T15473] workingset_nodereclaim 0 [ 2625.099246][T15473] pgrefill 12552 [ 2625.099246][T15473] pgscan 17027 [ 2625.099246][T15473] pgsteal 4298 [ 2625.214956][T15473] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=19234,uid=0 [ 2625.231106][T15473] Memory cgroup out of memory: Killed process 19234 (syz-executor.4) total-vm:72704kB, anon-rss:172kB, file-rss:35808kB, shmem-rss:0kB, UID:0 [ 2625.250320][T15473] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2625.262239][T15473] CPU: 0 PID: 15473 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190724 #50 [ 2625.262249][T15473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2625.262254][T15473] Call Trace: [ 2625.262276][T15473] dump_stack+0x172/0x1f0 [ 2625.262297][T15473] dump_header+0x10b/0x82d [ 2625.262310][T15473] ? oom_kill_process+0x94/0x3f0 [ 2625.262329][T15473] oom_kill_process.cold+0x10/0x15 [ 2625.262347][T15473] out_of_memory+0x79a/0x12c0 [ 2625.262365][T15473] ? lock_downgrade+0x920/0x920 [ 2625.262385][T15473] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2625.262403][T15473] ? oom_killer_disable+0x280/0x280 [ 2625.262447][T15473] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2625.272534][ T1056] oom_reaper: reaped process 19234 (syz-executor.4), now anon-rss:0kB, file-rss:34848kB, shmem-rss:0kB [ 2625.281814][T15473] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2625.281836][T15473] ? do_raw_spin_unlock+0x57/0x270 [ 2625.281852][T15473] ? _raw_spin_unlock+0x2d/0x50 [ 2625.281873][T15473] try_charge+0x1080/0x1480 [ 2625.325107][T15473] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2625.341668][T15473] ? find_held_lock+0x35/0x130 [ 2625.341688][T15473] ? get_mem_cgroup_from_mm+0x139/0x320 [ 2625.341709][T15473] ? lock_downgrade+0x920/0x920 [ 2625.341724][T15473] ? percpu_ref_tryget_live+0x111/0x290 [ 2625.341742][T15473] __memcg_kmem_charge_memcg+0x71/0xf0 [ 2625.341756][T15473] ? memcg_kmem_put_cache+0x50/0x50 [ 2625.341774][T15473] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2625.341791][T15473] __memcg_kmem_charge+0x13a/0x3a0 [ 2625.341810][T15473] __alloc_pages_nodemask+0x4f2/0x8f0 [ 2625.341826][T15473] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2625.341845][T15473] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2625.341870][T15473] ? copy_process+0x46d1/0x6b00 [ 2625.357470][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2625.357488][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2625.357501][T15473] ? __kasan_check_read+0x11/0x20 [ 2625.357522][T15473] copy_process+0x3f8/0x6b00 [ 2625.357541][T15473] ? __kasan_check_read+0x11/0x20 [ 2625.357561][T15473] ? __lock_acquire+0x1702/0x4c30 [ 2625.367801][T15473] ? __kasan_check_read+0x11/0x20 [ 2625.367817][T15473] ? mark_lock+0xc0/0x11e0 [ 2625.367841][T15473] ? __cleanup_sighand+0x60/0x60 [ 2625.367855][T15473] ? find_held_lock+0x35/0x130 [ 2625.367884][T15473] _do_fork+0x146/0xfa0 [ 2625.367902][T15473] ? copy_init_mm+0x20/0x20 [ 2625.367922][T15473] ? __kasan_check_read+0x11/0x20 [ 2625.367937][T15473] ? _copy_to_user+0x118/0x160 [ 2625.367957][T15473] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2625.367971][T15473] ? put_timespec64+0xda/0x140 [ 2625.367992][T15473] __x64_sys_clone+0x18d/0x250 [ 2625.368008][T15473] ? __ia32_sys_vfork+0xc0/0xc0 [ 2625.368037][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2625.383320][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2625.405037][T15473] do_syscall_64+0xfa/0x760 [ 2625.415502][T15473] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2625.432298][T15473] RIP: 0033:0x457dfa [ 2625.442859][T15473] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2625.457474][T15473] RSP: 002b:00007ffe9d25c010 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2625.457489][T15473] RAX: ffffffffffffffda RBX: 00007ffe9d25c010 RCX: 0000000000457dfa [ 2625.457496][T15473] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2625.457504][T15473] RBP: 00007ffe9d25c050 R08: 0000000000000001 R09: 0000555556205940 [ 2625.457512][T15473] R10: 0000555556205c10 R11: 0000000000000246 R12: 0000000000000001 [ 2625.457519][T15473] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe9d25c0a0 [ 2625.461081][T15473] memory: usage 18452kB, limit 0kB, failcnt 190 [ 2625.472220][T15473] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2625.482149][T15473] Memory cgroup stats for /syz4: [ 2625.482274][T15473] anon 4435968 [ 2625.482274][T15473] file 49152 [ 2625.482274][T15473] kernel_stack 1245184 [ 2625.482274][T15473] slab 8536064 [ 2625.482274][T15473] sock 8192 [ 2625.482274][T15473] shmem 20480 [ 2625.482274][T15473] file_mapped 0 [ 2625.482274][T15473] file_dirty 0 [ 2625.482274][T15473] file_writeback 0 [ 2625.482274][T15473] anon_thp 0 [ 2625.482274][T15473] inactive_anon 69632 [ 2625.482274][T15473] active_anon 4456448 [ 2625.482274][T15473] inactive_file 0 [ 2625.482274][T15473] active_file 45056 [ 2625.482274][T15473] unevictable 12288 [ 2625.482274][T15473] slab_reclaimable 3649536 [ 2625.482274][T15473] slab_unreclaimable 4886528 [ 2625.482274][T15473] pgfault 400521 [ 2625.482274][T15473] pgmajfault 0 [ 2625.482274][T15473] workingset_refault 825 [ 2625.482274][T15473] workingset_activate 330 [ 2625.482274][T15473] workingset_nodereclaim 0 [ 2625.482274][T15473] pgrefill 12552 [ 2625.482274][T15473] pgscan 17027 [ 2625.482274][T15473] pgsteal 4298 [ 2625.496132][T15473] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=19219,uid=0 [ 2625.507257][T15473] Memory cgroup out of memory: Killed process 19219 (syz-executor.4) total-vm:72836kB, anon-rss:180kB, file-rss:35796kB, shmem-rss:0kB, UID:0 [ 2625.528537][T15473] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2625.542903][T15473] CPU: 0 PID: 15473 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190724 #50 [ 2625.566705][T15473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2625.566712][T15473] Call Trace: [ 2625.566739][T15473] dump_stack+0x172/0x1f0 [ 2625.566759][T15473] dump_header+0x10b/0x82d [ 2625.566769][T15473] ? oom_kill_process+0x94/0x3f0 [ 2625.566786][T15473] oom_kill_process.cold+0x10/0x15 [ 2625.566801][T15473] out_of_memory+0x79a/0x12c0 [ 2625.566816][T15473] ? lock_downgrade+0x920/0x920 [ 2625.566835][T15473] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2625.566852][T15473] ? oom_killer_disable+0x280/0x280 [ 2625.566879][T15473] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2625.566895][T15473] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2625.566916][T15473] ? do_raw_spin_unlock+0x57/0x270 [ 2625.566931][T15473] ? _raw_spin_unlock+0x2d/0x50 [ 2625.566950][T15473] try_charge+0x1080/0x1480 [ 2625.566975][T15473] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2625.566990][T15473] ? find_held_lock+0x35/0x130 [ 2625.567009][T15473] ? get_mem_cgroup_from_mm+0x139/0x320 [ 2625.567029][T15473] ? lock_downgrade+0x920/0x920 [ 2625.567041][T15473] ? percpu_ref_tryget_live+0x111/0x290 [ 2625.567063][T15473] __memcg_kmem_charge_memcg+0x71/0xf0 [ 2625.583481][T15473] ? memcg_kmem_put_cache+0x50/0x50 [ 2625.607397][T15473] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2625.607423][T15473] __memcg_kmem_charge+0x13a/0x3a0 [ 2625.607444][T15473] __alloc_pages_nodemask+0x4f2/0x8f0 [ 2625.607459][T15473] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2625.607475][T15473] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2625.607490][T15473] ? copy_process+0x46d1/0x6b00 [ 2625.607512][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2625.621737][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2625.621750][T15473] ? __kasan_check_read+0x11/0x20 [ 2625.621770][T15473] copy_process+0x3f8/0x6b00 [ 2625.621788][T15473] ? __kasan_check_read+0x11/0x20 [ 2625.621803][T15473] ? __lock_acquire+0x1702/0x4c30 [ 2625.621815][T15473] ? __kasan_check_read+0x11/0x20 [ 2625.621828][T15473] ? mark_lock+0xc0/0x11e0 [ 2625.621851][T15473] ? __cleanup_sighand+0x60/0x60 [ 2625.621865][T15473] ? find_held_lock+0x35/0x130 [ 2625.621897][T15473] _do_fork+0x146/0xfa0 [ 2625.621915][T15473] ? copy_init_mm+0x20/0x20 [ 2625.621940][T15473] ? __kasan_check_read+0x11/0x20 [ 2625.983812][T15473] ? _copy_to_user+0x118/0x160 [ 2625.988578][T15473] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2625.994843][T15473] ? put_timespec64+0xda/0x140 [ 2625.999602][T15473] __x64_sys_clone+0x18d/0x250 [ 2626.004348][T15473] ? __ia32_sys_vfork+0xc0/0xc0 [ 2626.009207][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2626.014522][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2626.019539][T15473] do_syscall_64+0xfa/0x760 [ 2626.024031][T15473] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2626.029912][T15473] RIP: 0033:0x457dfa [ 2626.033818][T15473] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2626.053601][T15473] RSP: 002b:00007ffe9d25c010 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2626.062014][T15473] RAX: ffffffffffffffda RBX: 00007ffe9d25c010 RCX: 0000000000457dfa [ 2626.069976][T15473] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2626.077964][T15473] RBP: 00007ffe9d25c050 R08: 0000000000000001 R09: 0000555556205940 [ 2626.085927][T15473] R10: 0000555556205c10 R11: 0000000000000246 R12: 0000000000000001 [ 2626.093884][T15473] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe9d25c0a0 [ 2626.104200][T26373] team0: Port device team_slave_0 added [ 2626.106177][T15473] memory: usage 18096kB, limit 0kB, failcnt 196 [ 2626.118458][T26373] team0: Port device team_slave_1 added [ 2626.134668][T26374] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2626.136568][T15473] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2626.151238][T26374] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2626.163636][T15473] Memory cgroup stats for /syz4: [ 2626.163747][T15473] anon 4300800 [ 2626.163747][T15473] file 49152 [ 2626.163747][T15473] kernel_stack 1179648 [ 2626.163747][T15473] slab 8536064 [ 2626.163747][T15473] sock 8192 [ 2626.163747][T15473] shmem 20480 [ 2626.163747][T15473] file_mapped 0 [ 2626.163747][T15473] file_dirty 0 [ 2626.163747][T15473] file_writeback 0 [ 2626.163747][T15473] anon_thp 0 [ 2626.163747][T15473] inactive_anon 69632 [ 2626.163747][T15473] active_anon 4321280 [ 2626.163747][T15473] inactive_file 0 [ 2626.163747][T15473] active_file 45056 [ 2626.163747][T15473] unevictable 12288 [ 2626.163747][T15473] slab_reclaimable 3649536 [ 2626.163747][T15473] slab_unreclaimable 4886528 [ 2626.163747][T15473] pgfault 400521 [ 2626.163747][T15473] pgmajfault 0 [ 2626.163747][T15473] workingset_refault 825 [ 2626.163747][T15473] workingset_activate 330 [ 2626.163747][T15473] workingset_nodereclaim 0 [ 2626.163747][T15473] pgrefill 12552 [ 2626.163747][T15473] pgscan 17027 [ 2626.163747][T15473] pgsteal 4298 [ 2626.258527][T15473] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=12836,uid=0 [ 2626.274331][T15473] Memory cgroup out of memory: Killed process 12836 (syz-executor.4) total-vm:72704kB, anon-rss:172kB, file-rss:35808kB, shmem-rss:0kB, UID:0 [ 2626.290586][T15473] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2626.306931][T15473] CPU: 1 PID: 15473 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190724 #50 [ 2626.316058][T15473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2626.316065][T15473] Call Trace: [ 2626.316087][T15473] dump_stack+0x172/0x1f0 [ 2626.316107][T15473] dump_header+0x10b/0x82d [ 2626.316119][T15473] ? oom_kill_process+0x94/0x3f0 [ 2626.316136][T15473] oom_kill_process.cold+0x10/0x15 [ 2626.316155][T15473] out_of_memory+0x79a/0x12c0 [ 2626.329543][T15473] ? lock_downgrade+0x920/0x920 [ 2626.338269][T15473] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2626.338286][T15473] ? oom_killer_disable+0x280/0x280 [ 2626.338311][T15473] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2626.338328][T15473] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2626.338350][T15473] ? do_raw_spin_unlock+0x57/0x270 [ 2626.348383][T15473] ? _raw_spin_unlock+0x2d/0x50 [ 2626.357892][T15473] try_charge+0x1080/0x1480 [ 2626.357925][T15473] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2626.357943][T15473] ? find_held_lock+0x35/0x130 [ 2626.357963][T15473] ? get_mem_cgroup_from_mm+0x139/0x320 [ 2626.368965][T15473] ? lock_downgrade+0x920/0x920 [ 2626.368980][T15473] ? percpu_ref_tryget_live+0x111/0x290 [ 2626.369001][T15473] __memcg_kmem_charge_memcg+0x71/0xf0 [ 2626.380185][T15473] ? memcg_kmem_put_cache+0x50/0x50 [ 2626.380205][T15473] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2626.380223][T15473] __memcg_kmem_charge+0x13a/0x3a0 [ 2626.380243][T15473] __alloc_pages_nodemask+0x4f2/0x8f0 [ 2626.390196][T15473] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2626.400219][T15473] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2626.400236][T15473] ? copy_process+0x46d1/0x6b00 [ 2626.400254][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2626.400272][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2626.400291][T15473] ? __kasan_check_read+0x11/0x20 [ 2626.410593][T15473] copy_process+0x3f8/0x6b00 [ 2626.420964][T15473] ? __kasan_check_read+0x11/0x20 [ 2626.420981][T15473] ? __lock_acquire+0x1702/0x4c30 [ 2626.420992][T15473] ? __kasan_check_read+0x11/0x20 [ 2626.421006][T15473] ? mark_lock+0xc0/0x11e0 [ 2626.421035][T15473] ? __cleanup_sighand+0x60/0x60 [ 2626.431689][T15473] ? find_held_lock+0x35/0x130 [ 2626.442338][T15473] _do_fork+0x146/0xfa0 [ 2626.453934][T15473] ? copy_init_mm+0x20/0x20 [ 2626.464495][T15473] ? __kasan_check_read+0x11/0x20 [ 2626.474969][T15473] ? _copy_to_user+0x118/0x160 [ 2626.484565][T15473] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2626.494591][T15473] ? put_timespec64+0xda/0x140 [ 2626.504013][T15473] __x64_sys_clone+0x18d/0x250 [ 2626.513709][T15473] ? __ia32_sys_vfork+0xc0/0xc0 [ 2626.522360][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2626.532133][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2626.543128][T15473] do_syscall_64+0xfa/0x760 [ 2626.552716][T15473] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2626.562990][T15473] RIP: 0033:0x457dfa [ 2626.573365][T15473] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2626.596848][T15473] RSP: 002b:00007ffe9d25c010 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2626.596863][T15473] RAX: ffffffffffffffda RBX: 00007ffe9d25c010 RCX: 0000000000457dfa [ 2626.596870][T15473] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2626.596878][T15473] RBP: 00007ffe9d25c050 R08: 0000000000000001 R09: 0000555556205940 [ 2626.596885][T15473] R10: 0000555556205c10 R11: 0000000000000246 R12: 0000000000000001 [ 2626.596892][T15473] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe9d25c0a0 [ 2626.646624][T15473] memory: usage 17800kB, limit 0kB, failcnt 202 [ 2626.652943][T15473] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2626.659957][T15473] Memory cgroup stats for /syz4: [ 2626.660080][T15473] anon 4157440 [ 2626.660080][T15473] file 49152 [ 2626.660080][T15473] kernel_stack 1179648 [ 2626.660080][T15473] slab 8536064 [ 2626.660080][T15473] sock 8192 [ 2626.660080][T15473] shmem 20480 [ 2626.660080][T15473] file_mapped 0 [ 2626.660080][T15473] file_dirty 0 [ 2626.660080][T15473] file_writeback 0 [ 2626.660080][T15473] anon_thp 0 [ 2626.660080][T15473] inactive_anon 69632 [ 2626.660080][T15473] active_anon 4186112 [ 2626.660080][T15473] inactive_file 0 [ 2626.660080][T15473] active_file 45056 [ 2626.660080][T15473] unevictable 12288 [ 2626.660080][T15473] slab_reclaimable 3649536 [ 2626.660080][T15473] slab_unreclaimable 4886528 [ 2626.660080][T15473] pgfault 400521 [ 2626.660080][T15473] pgmajfault 0 [ 2626.660080][T15473] workingset_refault 825 [ 2626.660080][T15473] workingset_activate 330 [ 2626.660080][T15473] workingset_nodereclaim 0 [ 2626.660080][T15473] pgrefill 12552 [ 2626.660080][T15473] pgscan 17027 [ 2626.660080][T15473] pgsteal 4298 [ 2626.766886][T15473] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=17348,uid=0 [ 2626.785395][T15473] Memory cgroup out of memory: Killed process 17348 (syz-executor.4) total-vm:72704kB, anon-rss:172kB, file-rss:35804kB, shmem-rss:0kB, UID:0 [ 2626.810698][T15473] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2626.823629][T15473] CPU: 0 PID: 15473 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190724 #50 [ 2626.832738][T15473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2626.843059][T15473] Call Trace: [ 2626.846374][T15473] dump_stack+0x172/0x1f0 [ 2626.850811][T15473] dump_header+0x10b/0x82d [ 2626.855244][T15473] ? oom_kill_process+0x94/0x3f0 [ 2626.860210][T15473] oom_kill_process.cold+0x10/0x15 [ 2626.865334][T15473] out_of_memory+0x79a/0x12c0 [ 2626.870022][T15473] ? lock_downgrade+0x920/0x920 [ 2626.874882][T15473] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2626.881219][T15473] ? oom_killer_disable+0x280/0x280 [ 2626.886442][T15473] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2626.891992][T15473] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2626.897633][T15473] ? do_raw_spin_unlock+0x57/0x270 [ 2626.902748][T15473] ? _raw_spin_unlock+0x2d/0x50 [ 2626.907610][T15473] try_charge+0x1080/0x1480 [ 2626.912125][T15473] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2626.917698][T15473] ? find_held_lock+0x35/0x130 [ 2626.922471][T15473] ? get_mem_cgroup_from_mm+0x139/0x320 [ 2626.928123][T15473] ? lock_downgrade+0x920/0x920 [ 2626.932987][T15473] ? percpu_ref_tryget_live+0x111/0x290 [ 2626.938545][T15473] __memcg_kmem_charge_memcg+0x71/0xf0 [ 2626.944009][T15473] ? memcg_kmem_put_cache+0x50/0x50 [ 2626.949221][T15473] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2626.954762][T15473] __memcg_kmem_charge+0x13a/0x3a0 [ 2626.959859][T15473] __alloc_pages_nodemask+0x4f2/0x8f0 [ 2626.965227][T15473] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2626.971458][T15473] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2626.977345][T15473] ? copy_process+0x46d1/0x6b00 [ 2626.982192][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2626.987474][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2626.992489][T15473] ? __kasan_check_read+0x11/0x20 [ 2626.997513][T15473] copy_process+0x3f8/0x6b00 [ 2627.002123][T15473] ? __kasan_check_read+0x11/0x20 [ 2627.007143][T15473] ? __lock_acquire+0x1702/0x4c30 [ 2627.012173][T15473] ? __kasan_check_read+0x11/0x20 [ 2627.017213][T15473] ? mark_lock+0xc0/0x11e0 [ 2627.021631][T15473] ? __cleanup_sighand+0x60/0x60 [ 2627.026565][T15473] ? find_held_lock+0x35/0x130 [ 2627.031332][T15473] _do_fork+0x146/0xfa0 [ 2627.035473][T15473] ? copy_init_mm+0x20/0x20 [ 2627.039963][T15473] ? __kasan_check_read+0x11/0x20 [ 2627.044968][T15473] ? _copy_to_user+0x118/0x160 [ 2627.049733][T15473] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2627.055976][T15473] ? put_timespec64+0xda/0x140 [ 2627.060741][T15473] __x64_sys_clone+0x18d/0x250 [ 2627.065507][T15473] ? __ia32_sys_vfork+0xc0/0xc0 [ 2627.070351][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2627.075625][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2627.080634][T15473] do_syscall_64+0xfa/0x760 [ 2627.085123][T15473] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2627.090999][T15473] RIP: 0033:0x457dfa [ 2627.094981][T15473] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2627.114660][T15473] RSP: 002b:00007ffe9d25c010 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2627.123061][T15473] RAX: ffffffffffffffda RBX: 00007ffe9d25c010 RCX: 0000000000457dfa [ 2627.131039][T15473] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2627.139096][T15473] RBP: 00007ffe9d25c050 R08: 0000000000000001 R09: 0000555556205940 [ 2627.147075][T15473] R10: 0000555556205c10 R11: 0000000000000246 R12: 0000000000000001 [ 2627.155071][T15473] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe9d25c0a0 [ 2627.163942][T15473] memory: usage 17480kB, limit 0kB, failcnt 208 [ 2627.173480][T15473] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2627.180661][T15473] Memory cgroup stats for /syz4: [ 2627.180774][T15473] anon 4018176 [ 2627.180774][T15473] file 49152 [ 2627.180774][T15473] kernel_stack 1114112 [ 2627.180774][T15473] slab 8536064 [ 2627.180774][T15473] sock 8192 [ 2627.180774][T15473] shmem 20480 [ 2627.180774][T15473] file_mapped 0 [ 2627.180774][T15473] file_dirty 0 [ 2627.180774][T15473] file_writeback 0 [ 2627.180774][T15473] anon_thp 0 [ 2627.180774][T15473] inactive_anon 69632 [ 2627.180774][T15473] active_anon 4050944 [ 2627.180774][T15473] inactive_file 0 [ 2627.180774][T15473] active_file 45056 [ 2627.180774][T15473] unevictable 12288 [ 2627.180774][T15473] slab_reclaimable 3649536 [ 2627.180774][T15473] slab_unreclaimable 4886528 [ 2627.180774][T15473] pgfault 400521 [ 2627.180774][T15473] pgmajfault 0 [ 2627.180774][T15473] workingset_refault 825 [ 2627.180774][T15473] workingset_activate 330 [ 2627.180774][T15473] workingset_nodereclaim 0 [ 2627.180774][T15473] pgrefill 12552 [ 2627.180774][T15473] pgscan 17027 [ 2627.180774][T15473] pgsteal 4298 [ 2627.185737][T15473] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=11332,uid=0 [ 2627.301930][T15473] Memory cgroup out of memory: Killed process 11332 (syz-executor.4) total-vm:72704kB, anon-rss:172kB, file-rss:35800kB, shmem-rss:0kB, UID:0 [ 2627.320013][T26373] device hsr_slave_0 entered promiscuous mode [ 2627.325314][ T1056] oom_reaper: reaped process 11332 (syz-executor.4), now anon-rss:0kB, file-rss:34840kB, shmem-rss:0kB [ 2627.332279][T15473] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2627.350821][T26373] device hsr_slave_1 entered promiscuous mode [ 2627.357311][T26373] debugfs: Directory 'hsr0' with parent '/' already present! [ 2627.366404][T26374] team0: Port device team_slave_0 added [ 2627.367659][T15473] CPU: 1 PID: 15473 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190724 #50 [ 2627.373842][T26374] team0: Port device team_slave_1 added [ 2627.381090][T15473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2627.381097][T15473] Call Trace: [ 2627.381122][T15473] dump_stack+0x172/0x1f0 [ 2627.381141][T15473] dump_header+0x10b/0x82d [ 2627.381153][T15473] ? oom_kill_process+0x94/0x3f0 [ 2627.381169][T15473] oom_kill_process.cold+0x10/0x15 [ 2627.381186][T15473] out_of_memory+0x79a/0x12c0 [ 2627.381202][T15473] ? lock_downgrade+0x920/0x920 [ 2627.381225][T15473] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2627.396838][T15473] ? oom_killer_disable+0x280/0x280 [ 2627.396865][T15473] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2627.396882][T15473] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2627.396903][T15473] ? do_raw_spin_unlock+0x57/0x270 [ 2627.396929][T15473] ? _raw_spin_unlock+0x2d/0x50 [ 2627.413879][T15473] try_charge+0x1080/0x1480 [ 2627.423771][T15473] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2627.434496][T15473] ? find_held_lock+0x35/0x130 [ 2627.445250][T15473] ? get_mem_cgroup_from_mm+0x139/0x320 [ 2627.456197][T15473] ? lock_downgrade+0x920/0x920 [ 2627.456213][T15473] ? percpu_ref_tryget_live+0x111/0x290 [ 2627.456233][T15473] __memcg_kmem_charge_memcg+0x71/0xf0 [ 2627.456251][T15473] ? memcg_kmem_put_cache+0x50/0x50 [ 2627.465717][T15473] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2627.476826][T15473] __memcg_kmem_charge+0x13a/0x3a0 [ 2627.476848][T15473] __alloc_pages_nodemask+0x4f2/0x8f0 [ 2627.476865][T15473] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2627.476884][T15473] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2627.487353][T15473] ? copy_process+0x46d1/0x6b00 [ 2627.487374][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2627.487392][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2627.487412][T15473] ? __kasan_check_read+0x11/0x20 [ 2627.498451][T15473] copy_process+0x3f8/0x6b00 [ 2627.498472][T15473] ? __kasan_check_read+0x11/0x20 [ 2627.498486][T15473] ? __lock_acquire+0x1702/0x4c30 [ 2627.498499][T15473] ? __kasan_check_read+0x11/0x20 [ 2627.498518][T15473] ? mark_lock+0xc0/0x11e0 [ 2627.509246][T15473] ? __cleanup_sighand+0x60/0x60 [ 2627.509262][T15473] ? find_held_lock+0x35/0x130 [ 2627.509297][T15473] _do_fork+0x146/0xfa0 [ 2627.519779][T15473] ? copy_init_mm+0x20/0x20 [ 2627.519801][T15473] ? __kasan_check_read+0x11/0x20 [ 2627.519815][T15473] ? _copy_to_user+0x118/0x160 [ 2627.519839][T15473] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2627.531907][T15473] ? put_timespec64+0xda/0x140 [ 2627.542029][T15473] __x64_sys_clone+0x18d/0x250 [ 2627.552064][T15473] ? __ia32_sys_vfork+0xc0/0xc0 [ 2627.561649][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2627.571667][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2627.581053][T15473] do_syscall_64+0xfa/0x760 [ 2627.589965][T15473] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2627.589976][T15473] RIP: 0033:0x457dfa [ 2627.589992][T15473] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2627.589999][T15473] RSP: 002b:00007ffe9d25c010 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2627.590012][T15473] RAX: ffffffffffffffda RBX: 00007ffe9d25c010 RCX: 0000000000457dfa [ 2627.590019][T15473] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2627.590028][T15473] RBP: 00007ffe9d25c050 R08: 0000000000000001 R09: 0000555556205940 [ 2627.590036][T15473] R10: 0000555556205c10 R11: 0000000000000246 R12: 0000000000000001 [ 2627.590045][T15473] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe9d25c0a0 [ 2627.601824][T15473] memory: usage 17168kB, limit 0kB, failcnt 214 [ 2627.619321][T15473] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2627.625489][T15473] Memory cgroup stats for /syz4: [ 2627.625613][T15473] anon 3883008 [ 2627.625613][T15473] file 49152 [ 2627.625613][T15473] kernel_stack 1114112 [ 2627.625613][T15473] slab 8536064 [ 2627.625613][T15473] sock 8192 [ 2627.625613][T15473] shmem 20480 [ 2627.625613][T15473] file_mapped 0 [ 2627.625613][T15473] file_dirty 0 [ 2627.625613][T15473] file_writeback 0 [ 2627.625613][T15473] anon_thp 0 [ 2627.625613][T15473] inactive_anon 69632 [ 2627.625613][T15473] active_anon 3915776 [ 2627.625613][T15473] inactive_file 0 [ 2627.625613][T15473] active_file 45056 [ 2627.625613][T15473] unevictable 12288 [ 2627.625613][T15473] slab_reclaimable 3649536 [ 2627.625613][T15473] slab_unreclaimable 4886528 [ 2627.625613][T15473] pgfault 400521 [ 2627.625613][T15473] pgmajfault 0 [ 2627.625613][T15473] workingset_refault 825 [ 2627.625613][T15473] workingset_activate 330 [ 2627.625613][T15473] workingset_nodereclaim 0 [ 2627.625613][T15473] pgrefill 12552 [ 2627.625613][T15473] pgscan 17027 [ 2627.625613][T15473] pgsteal 4298 [ 2627.646928][T15473] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=6644,uid=0 [ 2627.678449][T15473] Memory cgroup out of memory: Killed process 6644 (syz-executor.4) total-vm:72704kB, anon-rss:164kB, file-rss:35804kB, shmem-rss:0kB, UID:0 [ 2627.729488][T15473] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2627.737298][T15473] CPU: 1 PID: 15473 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190724 #50 [ 2627.737307][T15473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2627.737312][T15473] Call Trace: [ 2627.737334][T15473] dump_stack+0x172/0x1f0 [ 2627.737356][T15473] dump_header+0x10b/0x82d [ 2627.737369][T15473] ? oom_kill_process+0x94/0x3f0 [ 2627.737387][T15473] oom_kill_process.cold+0x10/0x15 [ 2627.737411][T15473] out_of_memory+0x79a/0x12c0 [ 2627.841443][T15473] ? lock_downgrade+0x920/0x920 [ 2627.841463][T15473] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2627.841480][T15473] ? oom_killer_disable+0x280/0x280 [ 2627.841506][T15473] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2627.841521][T15473] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2627.841541][T15473] ? do_raw_spin_unlock+0x57/0x270 [ 2627.841562][T15473] ? _raw_spin_unlock+0x2d/0x50 [ 2627.950315][T15473] try_charge+0x1080/0x1480 [ 2627.954807][T15473] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2627.960357][T15473] ? find_held_lock+0x35/0x130 [ 2627.965109][T15473] ? get_mem_cgroup_from_mm+0x139/0x320 [ 2627.970664][T15473] ? lock_downgrade+0x920/0x920 [ 2627.975516][T15473] ? percpu_ref_tryget_live+0x111/0x290 [ 2627.981065][T15473] __memcg_kmem_charge_memcg+0x71/0xf0 [ 2627.986526][T15473] ? memcg_kmem_put_cache+0x50/0x50 [ 2627.991820][T15473] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2627.997367][T15473] __memcg_kmem_charge+0x13a/0x3a0 [ 2628.002482][T15473] __alloc_pages_nodemask+0x4f2/0x8f0 [ 2628.007853][T15473] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2628.014112][T15473] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2628.019825][T15473] ? copy_process+0x46d1/0x6b00 [ 2628.024670][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2628.029957][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2628.035286][T15473] ? __kasan_check_read+0x11/0x20 [ 2628.040317][T15473] copy_process+0x3f8/0x6b00 [ 2628.044905][T15473] ? __kasan_check_read+0x11/0x20 [ 2628.049966][T15473] ? __lock_acquire+0x1702/0x4c30 [ 2628.054993][T15473] ? __kasan_check_read+0x11/0x20 [ 2628.060031][T15473] ? mark_lock+0xc0/0x11e0 [ 2628.064456][T15473] ? __cleanup_sighand+0x60/0x60 [ 2628.069394][T15473] ? find_held_lock+0x35/0x130 [ 2628.074193][T15473] _do_fork+0x146/0xfa0 [ 2628.078359][T15473] ? copy_init_mm+0x20/0x20 [ 2628.082863][T15473] ? __kasan_check_read+0x11/0x20 [ 2628.087874][T15473] ? _copy_to_user+0x118/0x160 [ 2628.092626][T15473] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2628.098851][T15473] ? put_timespec64+0xda/0x140 [ 2628.103610][T15473] __x64_sys_clone+0x18d/0x250 [ 2628.108359][T15473] ? __ia32_sys_vfork+0xc0/0xc0 [ 2628.113208][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2628.118482][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2628.123506][T15473] do_syscall_64+0xfa/0x760 [ 2628.128017][T15473] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2628.133893][T15473] RIP: 0033:0x457dfa [ 2628.137793][T15473] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2628.157485][T15473] RSP: 002b:00007ffe9d25c010 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2628.165886][T15473] RAX: ffffffffffffffda RBX: 00007ffe9d25c010 RCX: 0000000000457dfa [ 2628.173852][T15473] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2628.181936][T15473] RBP: 00007ffe9d25c050 R08: 0000000000000001 R09: 0000555556205940 [ 2628.189895][T15473] R10: 0000555556205c10 R11: 0000000000000246 R12: 0000000000000001 [ 2628.197856][T15473] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe9d25c0a0 [ 2628.206209][T15473] memory: usage 16880kB, limit 0kB, failcnt 220 [ 2628.212469][T15473] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2628.219412][T15473] Memory cgroup stats for /syz4: [ 2628.219518][T15473] anon 3747840 [ 2628.219518][T15473] file 49152 [ 2628.219518][T15473] kernel_stack 1048576 [ 2628.219518][T15473] slab 8536064 [ 2628.219518][T15473] sock 8192 [ 2628.219518][T15473] shmem 20480 [ 2628.219518][T15473] file_mapped 0 [ 2628.219518][T15473] file_dirty 0 [ 2628.219518][T15473] file_writeback 0 [ 2628.219518][T15473] anon_thp 0 [ 2628.219518][T15473] inactive_anon 69632 [ 2628.219518][T15473] active_anon 3780608 [ 2628.219518][T15473] inactive_file 0 [ 2628.219518][T15473] active_file 45056 [ 2628.219518][T15473] unevictable 12288 [ 2628.219518][T15473] slab_reclaimable 3649536 [ 2628.219518][T15473] slab_unreclaimable 4886528 [ 2628.219518][T15473] pgfault 400521 [ 2628.219518][T15473] pgmajfault 0 [ 2628.219518][T15473] workingset_refault 825 [ 2628.219518][T15473] workingset_activate 330 [ 2628.219518][T15473] workingset_nodereclaim 0 [ 2628.219518][T15473] pgrefill 12552 [ 2628.219518][T15473] pgscan 17027 [ 2628.219518][T15473] pgsteal 4298 [ 2628.313289][T15473] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=6696,uid=0 [ 2628.328839][T15473] Memory cgroup out of memory: Killed process 6696 (syz-executor.4) total-vm:72572kB, anon-rss:156kB, file-rss:35808kB, shmem-rss:0kB, UID:0 [ 2628.352685][ T1056] oom_reaper: reaped process 6696 (syz-executor.4), now anon-rss:0kB, file-rss:34848kB, shmem-rss:0kB [ 2628.377827][T15473] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2628.392469][T26374] device hsr_slave_0 entered promiscuous mode [ 2628.397223][T15473] CPU: 1 PID: 15473 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190724 #50 [ 2628.408703][T15473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2628.418756][T15473] Call Trace: [ 2628.422044][T15473] dump_stack+0x172/0x1f0 [ 2628.426389][T15473] dump_header+0x10b/0x82d [ 2628.430792][T15473] ? oom_kill_process+0x94/0x3f0 [ 2628.435714][T15473] oom_kill_process.cold+0x10/0x15 [ 2628.440903][T15473] out_of_memory+0x79a/0x12c0 [ 2628.445570][T15473] ? lock_downgrade+0x920/0x920 [ 2628.450408][T15473] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2628.456202][T15473] ? oom_killer_disable+0x280/0x280 [ 2628.461473][T15473] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2628.467014][T15473] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2628.472632][T15473] ? do_raw_spin_unlock+0x57/0x270 [ 2628.477729][T15473] ? _raw_spin_unlock+0x2d/0x50 [ 2628.482568][T15473] try_charge+0x1080/0x1480 [ 2628.487062][T15473] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2628.492590][T15473] ? find_held_lock+0x35/0x130 [ 2628.497338][T15473] ? get_mem_cgroup_from_mm+0x139/0x320 [ 2628.502892][T15473] ? lock_downgrade+0x920/0x920 [ 2628.507739][T15473] ? percpu_ref_tryget_live+0x111/0x290 [ 2628.513283][T15473] __memcg_kmem_charge_memcg+0x71/0xf0 [ 2628.518724][T15473] ? memcg_kmem_put_cache+0x50/0x50 [ 2628.523903][T15473] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2628.529448][T15473] __memcg_kmem_charge+0x13a/0x3a0 [ 2628.534543][T15473] __alloc_pages_nodemask+0x4f2/0x8f0 [ 2628.539927][T15473] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2628.546157][T15473] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2628.551860][T15473] ? copy_process+0x46d1/0x6b00 [ 2628.556699][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2628.561969][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2628.566976][T15473] ? __kasan_check_read+0x11/0x20 [ 2628.571992][T15473] copy_process+0x3f8/0x6b00 [ 2628.576680][T15473] ? __kasan_check_read+0x11/0x20 [ 2628.581692][T15473] ? __lock_acquire+0x1702/0x4c30 [ 2628.586709][T15473] ? __kasan_check_read+0x11/0x20 [ 2628.591835][T15473] ? mark_lock+0xc0/0x11e0 [ 2628.596242][T15473] ? __cleanup_sighand+0x60/0x60 [ 2628.601159][T15473] ? find_held_lock+0x35/0x130 [ 2628.605919][T15473] _do_fork+0x146/0xfa0 [ 2628.610083][T15473] ? copy_init_mm+0x20/0x20 [ 2628.614584][T15473] ? __kasan_check_read+0x11/0x20 [ 2628.619596][T15473] ? _copy_to_user+0x118/0x160 [ 2628.624518][T15473] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2628.630762][T15473] ? put_timespec64+0xda/0x140 [ 2628.635555][T15473] __x64_sys_clone+0x18d/0x250 [ 2628.640306][T15473] ? __ia32_sys_vfork+0xc0/0xc0 [ 2628.645142][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2628.650413][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2628.655430][T15473] do_syscall_64+0xfa/0x760 [ 2628.659932][T15473] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2628.665806][T15473] RIP: 0033:0x457dfa [ 2628.669697][T15473] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2628.689437][T15473] RSP: 002b:00007ffe9d25c010 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2628.697835][T15473] RAX: ffffffffffffffda RBX: 00007ffe9d25c010 RCX: 0000000000457dfa [ 2628.705797][T15473] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2628.713763][T15473] RBP: 00007ffe9d25c050 R08: 0000000000000001 R09: 0000555556205940 [ 2628.721740][T15473] R10: 0000555556205c10 R11: 0000000000000246 R12: 0000000000000001 [ 2628.729730][T15473] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe9d25c0a0 [ 2628.738277][T26374] device hsr_slave_1 entered promiscuous mode [ 2628.749071][T15473] memory: usage 16596kB, limit 0kB, failcnt 226 [ 2628.755340][T15473] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2628.762815][T26374] debugfs: Directory 'hsr0' with parent '/' already present! [ 2628.767994][T15473] Memory cgroup stats for /syz4: [ 2628.768124][T15473] anon 3747840 [ 2628.768124][T15473] file 49152 [ 2628.768124][T15473] kernel_stack 983040 [ 2628.768124][T15473] slab 8536064 [ 2628.768124][T15473] sock 8192 [ 2628.768124][T15473] shmem 20480 [ 2628.768124][T15473] file_mapped 0 [ 2628.768124][T15473] file_dirty 0 [ 2628.768124][T15473] file_writeback 0 [ 2628.768124][T15473] anon_thp 0 [ 2628.768124][T15473] inactive_anon 69632 [ 2628.768124][T15473] active_anon 3645440 [ 2628.768124][T15473] inactive_file 0 [ 2628.768124][T15473] active_file 45056 [ 2628.768124][T15473] unevictable 12288 [ 2628.768124][T15473] slab_reclaimable 3649536 [ 2628.768124][T15473] slab_unreclaimable 4886528 [ 2628.768124][T15473] pgfault 400521 [ 2628.768124][T15473] pgmajfault 0 [ 2628.768124][T15473] workingset_refault 825 [ 2628.768124][T15473] workingset_activate 330 [ 2628.768124][T15473] workingset_nodereclaim 0 [ 2628.768124][T15473] pgrefill 12552 [ 2628.768124][T15473] pgscan 17027 [ 2628.768124][T15473] pgsteal 4298 [ 2628.781824][T15473] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=16860,uid=0 [ 2628.913962][T15473] Memory cgroup out of memory: Killed process 16860 (syz-executor.4) total-vm:72836kB, anon-rss:172kB, file-rss:35784kB, shmem-rss:0kB, UID:0 [ 2628.938101][ T1056] oom_reaper: reaped process 16860 (syz-executor.4), now anon-rss:0kB, file-rss:34824kB, shmem-rss:0kB [ 2628.941287][T15473] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2628.969607][T15473] CPU: 1 PID: 15473 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190724 #50 [ 2628.978733][T15473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2628.988805][T15473] Call Trace: [ 2628.992107][T15473] dump_stack+0x172/0x1f0 [ 2628.996449][T15473] dump_header+0x10b/0x82d [ 2629.000959][T15473] ? oom_kill_process+0x94/0x3f0 [ 2629.005911][T15473] oom_kill_process.cold+0x10/0x15 [ 2629.011045][T15473] out_of_memory+0x79a/0x12c0 [ 2629.015736][T15473] ? lock_downgrade+0x920/0x920 [ 2629.020605][T15473] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2629.026435][T15473] ? oom_killer_disable+0x280/0x280 [ 2629.031643][T15473] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2629.037177][T15473] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2629.042814][T15473] ? do_raw_spin_unlock+0x57/0x270 [ 2629.047910][T15473] ? _raw_spin_unlock+0x2d/0x50 [ 2629.052758][T15473] try_charge+0x1080/0x1480 [ 2629.057269][T15473] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2629.062802][T15473] ? find_held_lock+0x35/0x130 [ 2629.067554][T15473] ? get_mem_cgroup_from_mm+0x139/0x320 [ 2629.073086][T15473] ? lock_downgrade+0x920/0x920 [ 2629.077951][T15473] ? percpu_ref_tryget_live+0x111/0x290 [ 2629.083484][T15473] __memcg_kmem_charge_memcg+0x71/0xf0 [ 2629.088933][T15473] ? memcg_kmem_put_cache+0x50/0x50 [ 2629.094125][T15473] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2629.099657][T15473] __memcg_kmem_charge+0x13a/0x3a0 [ 2629.104753][T15473] __alloc_pages_nodemask+0x4f2/0x8f0 [ 2629.110111][T15473] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2629.116361][T15473] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2629.122068][T15473] ? copy_process+0x46d1/0x6b00 [ 2629.126910][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2629.132197][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2629.137206][T15473] ? __kasan_check_read+0x11/0x20 [ 2629.142222][T15473] copy_process+0x3f8/0x6b00 [ 2629.146820][T15473] ? __kasan_check_read+0x11/0x20 [ 2629.151844][T15473] ? __lock_acquire+0x1702/0x4c30 [ 2629.156849][T15473] ? __kasan_check_read+0x11/0x20 [ 2629.161856][T15473] ? mark_lock+0xc0/0x11e0 [ 2629.166263][T15473] ? __cleanup_sighand+0x60/0x60 [ 2629.171189][T15473] ? find_held_lock+0x35/0x130 [ 2629.175963][T15473] _do_fork+0x146/0xfa0 [ 2629.180144][T15473] ? copy_init_mm+0x20/0x20 [ 2629.184636][T15473] ? __kasan_check_read+0x11/0x20 [ 2629.189665][T15473] ? _copy_to_user+0x118/0x160 [ 2629.194423][T15473] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2629.200751][T15473] ? put_timespec64+0xda/0x140 [ 2629.205505][T15473] __x64_sys_clone+0x18d/0x250 [ 2629.210257][T15473] ? __ia32_sys_vfork+0xc0/0xc0 [ 2629.215118][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2629.220390][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2629.225407][T15473] do_syscall_64+0xfa/0x760 [ 2629.229900][T15473] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2629.235789][T15473] RIP: 0033:0x457dfa [ 2629.239682][T15473] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2629.259465][T15473] RSP: 002b:00007ffe9d25c010 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2629.267883][T15473] RAX: ffffffffffffffda RBX: 00007ffe9d25c010 RCX: 0000000000457dfa [ 2629.275845][T15473] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2629.283814][T15473] RBP: 00007ffe9d25c050 R08: 0000000000000001 R09: 0000555556205940 [ 2629.291793][T15473] R10: 0000555556205c10 R11: 0000000000000246 R12: 0000000000000001 [ 2629.299769][T15473] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe9d25c0a0 [ 2629.308165][T15473] memory: usage 16228kB, limit 0kB, failcnt 232 [ 2629.314435][T15473] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2629.321420][T15473] Memory cgroup stats for /syz4: [ 2629.321542][T15473] anon 3600384 [ 2629.321542][T15473] file 49152 [ 2629.321542][T15473] kernel_stack 917504 [ 2629.321542][T15473] slab 8536064 [ 2629.321542][T15473] sock 8192 [ 2629.321542][T15473] shmem 20480 [ 2629.321542][T15473] file_mapped 0 [ 2629.321542][T15473] file_dirty 0 [ 2629.321542][T15473] file_writeback 0 [ 2629.321542][T15473] anon_thp 0 [ 2629.321542][T15473] inactive_anon 69632 [ 2629.321542][T15473] active_anon 3510272 [ 2629.321542][T15473] inactive_file 0 [ 2629.321542][T15473] active_file 45056 [ 2629.321542][T15473] unevictable 12288 [ 2629.321542][T15473] slab_reclaimable 3649536 [ 2629.321542][T15473] slab_unreclaimable 4886528 [ 2629.321542][T15473] pgfault 400521 [ 2629.321542][T15473] pgmajfault 0 [ 2629.321542][T15473] workingset_refault 825 [ 2629.321542][T15473] workingset_activate 330 [ 2629.321542][T15473] workingset_nodereclaim 0 [ 2629.321542][T15473] pgrefill 12552 [ 2629.321542][T15473] pgscan 17027 [ 2629.321542][T15473] pgsteal 4298 [ 2629.326577][T15473] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=13500,uid=0 [ 2629.326697][T15473] Memory cgroup out of memory: Killed process 13500 (syz-executor.4) total-vm:72704kB, anon-rss:168kB, file-rss:35792kB, shmem-rss:0kB, UID:0 [ 2629.461206][T15473] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2629.474836][T15473] CPU: 0 PID: 15473 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190724 #50 [ 2629.484063][T15473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2629.494123][T15473] Call Trace: [ 2629.497433][T15473] dump_stack+0x172/0x1f0 [ 2629.501775][T15473] dump_header+0x10b/0x82d [ 2629.506198][T15473] ? oom_kill_process+0x94/0x3f0 [ 2629.511141][T15473] oom_kill_process.cold+0x10/0x15 [ 2629.516376][T15473] out_of_memory+0x79a/0x12c0 [ 2629.521070][T15473] ? lock_downgrade+0x920/0x920 [ 2629.525941][T15473] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2629.531766][T15473] ? oom_killer_disable+0x280/0x280 [ 2629.537013][T15473] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2629.542571][T15473] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2629.548219][T15473] ? do_raw_spin_unlock+0x57/0x270 [ 2629.553335][T15473] ? _raw_spin_unlock+0x2d/0x50 [ 2629.558199][T15473] try_charge+0x1080/0x1480 [ 2629.560374][T26373] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2629.562831][T15473] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2629.574955][T15473] ? find_held_lock+0x35/0x130 [ 2629.579739][T15473] ? get_mem_cgroup_from_mm+0x139/0x320 [ 2629.585493][T15473] ? lock_downgrade+0x920/0x920 [ 2629.590486][T15473] ? percpu_ref_tryget_live+0x111/0x290 [ 2629.596052][T15473] __memcg_kmem_charge_memcg+0x71/0xf0 [ 2629.601534][T15473] ? memcg_kmem_put_cache+0x50/0x50 [ 2629.606751][T15473] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2629.606971][ T4739] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2629.612311][T15473] __memcg_kmem_charge+0x13a/0x3a0 [ 2629.624610][T15473] __alloc_pages_nodemask+0x4f2/0x8f0 [ 2629.628987][ T4739] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2629.629992][T15473] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2629.643456][T15473] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2629.647536][T26373] 8021q: adding VLAN 0 to HW filter on device team0 [ 2629.649184][T15473] ? copy_process+0x46d1/0x6b00 [ 2629.660615][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2629.665910][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2629.671200][T15473] ? __kasan_check_read+0x11/0x20 [ 2629.676244][T15473] copy_process+0x3f8/0x6b00 [ 2629.680846][T15473] ? __kasan_check_read+0x11/0x20 [ 2629.685878][T15473] ? __lock_acquire+0x1702/0x4c30 [ 2629.690907][T15473] ? __kasan_check_read+0x11/0x20 [ 2629.695943][T15473] ? mark_lock+0xc0/0x11e0 [ 2629.700379][T15473] ? __cleanup_sighand+0x60/0x60 [ 2629.704914][ T4739] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2629.705327][T15473] ? find_held_lock+0x35/0x130 [ 2629.715507][ T4739] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2629.718159][T15473] _do_fork+0x146/0xfa0 [ 2629.718178][T15473] ? copy_init_mm+0x20/0x20 [ 2629.718199][T15473] ? __kasan_check_read+0x11/0x20 [ 2629.718214][T15473] ? _copy_to_user+0x118/0x160 [ 2629.718234][T15473] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2629.718249][T15473] ? put_timespec64+0xda/0x140 [ 2629.718271][T15473] __x64_sys_clone+0x18d/0x250 [ 2629.718289][T15473] ? __ia32_sys_vfork+0xc0/0xc0 [ 2629.718313][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2629.718331][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2629.718353][T15473] do_syscall_64+0xfa/0x760 [ 2629.718374][T15473] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2629.735552][ T4739] bridge0: port 1(bridge_slave_0) entered blocking state [ 2629.739986][T15473] RIP: 0033:0x457dfa [ 2629.740002][T15473] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2629.740010][T15473] RSP: 002b:00007ffe9d25c010 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2629.740023][T15473] RAX: ffffffffffffffda RBX: 00007ffe9d25c010 RCX: 0000000000457dfa [ 2629.740032][T15473] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2629.740039][T15473] RBP: 00007ffe9d25c050 R08: 0000000000000001 R09: 0000555556205940 [ 2629.740047][T15473] R10: 0000555556205c10 R11: 0000000000000246 R12: 0000000000000001 [ 2629.740055][T15473] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe9d25c0a0 [ 2629.741462][T15473] memory: usage 15944kB, limit 0kB, failcnt 238 [ 2629.744860][ T4739] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2629.751122][T15473] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2629.759584][ T4739] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2629.783517][T15473] Memory cgroup stats for /syz4: [ 2629.783649][T15473] anon 3461120 [ 2629.783649][T15473] file 49152 [ 2629.783649][T15473] kernel_stack 917504 [ 2629.783649][T15473] slab 8536064 [ 2629.783649][T15473] sock 8192 [ 2629.783649][T15473] shmem 20480 [ 2629.783649][T15473] file_mapped 0 [ 2629.783649][T15473] file_dirty 0 [ 2629.783649][T15473] file_writeback 0 [ 2629.783649][T15473] anon_thp 0 [ 2629.783649][T15473] inactive_anon 69632 [ 2629.783649][T15473] active_anon 3375104 [ 2629.783649][T15473] inactive_file 0 [ 2629.783649][T15473] active_file 45056 [ 2629.783649][T15473] unevictable 12288 [ 2629.783649][T15473] slab_reclaimable 3649536 [ 2629.783649][T15473] slab_unreclaimable 4886528 [ 2629.783649][T15473] pgfault 400521 [ 2629.783649][T15473] pgmajfault 0 [ 2629.783649][T15473] workingset_refault 825 [ 2629.783649][T15473] workingset_activate 330 [ 2629.783649][T15473] workingset_nodereclaim 0 [ 2629.783649][T15473] pgrefill 12552 [ 2629.783649][T15473] pgscan 17027 [ 2629.783649][T15473] pgsteal 4298 [ 2629.795408][ T4739] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2629.807667][T15473] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=7309,uid=0 [ 2629.835866][ T4739] bridge0: port 2(bridge_slave_1) entered blocking state [ 2629.842174][T15473] Memory cgroup out of memory: Killed process 7309 (syz-executor.4) total-vm:72704kB, anon-rss:164kB, file-rss:35796kB, shmem-rss:0kB, UID:0 [ 2629.849057][ T4739] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2629.896960][ T1056] oom_reaper: reaped process 7309 (syz-executor.4), now anon-rss:0kB, file-rss:34836kB, shmem-rss:0kB [ 2629.911995][ T4739] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2629.999745][T15473] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2630.019046][ T4739] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2630.028881][T15473] CPU: 0 PID: 15473 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190724 #50 [ 2630.054914][T26374] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2630.059977][T15473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2630.059983][T15473] Call Trace: [ 2630.060007][T15473] dump_stack+0x172/0x1f0 [ 2630.060027][T15473] dump_header+0x10b/0x82d [ 2630.060038][T15473] ? oom_kill_process+0x94/0x3f0 [ 2630.060055][T15473] oom_kill_process.cold+0x10/0x15 [ 2630.060071][T15473] out_of_memory+0x79a/0x12c0 [ 2630.060087][T15473] ? lock_downgrade+0x920/0x920 [ 2630.060106][T15473] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2630.060123][T15473] ? oom_killer_disable+0x280/0x280 [ 2630.060149][T15473] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2630.103412][T15473] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2630.113904][ T4817] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2630.116741][T15473] ? do_raw_spin_unlock+0x57/0x270 [ 2630.116758][T15473] ? _raw_spin_unlock+0x2d/0x50 [ 2630.116779][T15473] try_charge+0x1080/0x1480 [ 2630.116802][T15473] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2630.116817][T15473] ? find_held_lock+0x35/0x130 [ 2630.116835][T15473] ? get_mem_cgroup_from_mm+0x139/0x320 [ 2630.116857][T15473] ? lock_downgrade+0x920/0x920 [ 2630.126764][ T4817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2630.130513][T15473] ? percpu_ref_tryget_live+0x111/0x290 [ 2630.130535][T15473] __memcg_kmem_charge_memcg+0x71/0xf0 [ 2630.143708][ T4817] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2630.145160][T15473] ? memcg_kmem_put_cache+0x50/0x50 [ 2630.156141][T15473] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2630.156160][T15473] __memcg_kmem_charge+0x13a/0x3a0 [ 2630.156178][T15473] __alloc_pages_nodemask+0x4f2/0x8f0 [ 2630.156192][T15473] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2630.156211][T15473] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2630.156227][T15473] ? copy_process+0x46d1/0x6b00 [ 2630.156247][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2630.156264][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2630.156277][T15473] ? __kasan_check_read+0x11/0x20 [ 2630.156296][T15473] copy_process+0x3f8/0x6b00 [ 2630.156314][T15473] ? __kasan_check_read+0x11/0x20 [ 2630.156328][T15473] ? __lock_acquire+0x1702/0x4c30 [ 2630.156340][T15473] ? __kasan_check_read+0x11/0x20 [ 2630.156353][T15473] ? mark_lock+0xc0/0x11e0 [ 2630.156374][T15473] ? __cleanup_sighand+0x60/0x60 [ 2630.156389][T15473] ? find_held_lock+0x35/0x130 [ 2630.156426][T15473] _do_fork+0x146/0xfa0 [ 2630.156443][T15473] ? copy_init_mm+0x20/0x20 [ 2630.156461][T15473] ? __kasan_check_read+0x11/0x20 [ 2630.156476][T15473] ? _copy_to_user+0x118/0x160 [ 2630.156493][T15473] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2630.156507][T15473] ? put_timespec64+0xda/0x140 [ 2630.156528][T15473] __x64_sys_clone+0x18d/0x250 [ 2630.156545][T15473] ? __ia32_sys_vfork+0xc0/0xc0 [ 2630.156570][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2630.156586][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2630.156608][T15473] do_syscall_64+0xfa/0x760 [ 2630.156629][T15473] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2630.156642][T15473] RIP: 0033:0x457dfa [ 2630.156658][T15473] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2630.156666][T15473] RSP: 002b:00007ffe9d25c010 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2630.156681][T15473] RAX: ffffffffffffffda RBX: 00007ffe9d25c010 RCX: 0000000000457dfa [ 2630.156690][T15473] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2630.156699][T15473] RBP: 00007ffe9d25c050 R08: 0000000000000001 R09: 0000555556205940 [ 2630.156708][T15473] R10: 0000555556205c10 R11: 0000000000000246 R12: 0000000000000001 [ 2630.156717][T15473] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe9d25c0a0 [ 2630.165794][T15473] memory: usage 15780kB, limit 0kB, failcnt 298 [ 2630.171074][ T4817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2630.175514][T15473] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2630.189722][ T4817] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2630.192302][T15473] Memory cgroup stats for /syz4: [ 2630.192411][T15473] anon 3317760 [ 2630.192411][T15473] file 49152 [ 2630.192411][T15473] kernel_stack 917504 [ 2630.192411][T15473] slab 8536064 [ 2630.192411][T15473] sock 8192 [ 2630.192411][T15473] shmem 20480 [ 2630.192411][T15473] file_mapped 0 [ 2630.192411][T15473] file_dirty 0 [ 2630.192411][T15473] file_writeback 0 [ 2630.192411][T15473] anon_thp 0 [ 2630.192411][T15473] inactive_anon 69632 [ 2630.192411][T15473] active_anon 3239936 [ 2630.192411][T15473] inactive_file 0 [ 2630.192411][T15473] active_file 45056 [ 2630.192411][T15473] unevictable 12288 [ 2630.192411][T15473] slab_reclaimable 3649536 [ 2630.192411][T15473] slab_unreclaimable 4886528 [ 2630.192411][T15473] pgfault 400521 [ 2630.192411][T15473] pgmajfault 0 [ 2630.192411][T15473] workingset_refault 825 [ 2630.192411][T15473] workingset_activate 330 [ 2630.192411][T15473] workingset_nodereclaim 0 [ 2630.192411][T15473] pgrefill 12552 [ 2630.192411][T15473] pgscan 17027 [ 2630.192411][T15473] pgsteal 4298 [ 2630.201142][T15473] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=9425,uid=0 [ 2630.206559][ T4817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2630.214706][T15473] Memory cgroup out of memory: Killed process 9425 (syz-executor.4) total-vm:72704kB, anon-rss:160kB, file-rss:35784kB, shmem-rss:0kB, UID:0 [ 2630.219722][ T4817] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2630.275156][T15473] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 2630.284058][ T4817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2630.287318][T15473] CPU: 0 PID: 15473 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190724 #50 [ 2630.292532][ T4817] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2630.296360][T15473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2630.296366][T15473] Call Trace: [ 2630.296390][T15473] dump_stack+0x172/0x1f0 [ 2630.296411][T15473] dump_header+0x10b/0x82d [ 2630.296430][T15473] ? oom_kill_process+0x94/0x3f0 [ 2630.296447][T15473] oom_kill_process.cold+0x10/0x15 [ 2630.296465][T15473] out_of_memory+0x79a/0x12c0 [ 2630.296481][T15473] ? lock_downgrade+0x920/0x920 [ 2630.296501][T15473] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2630.296517][T15473] ? oom_killer_disable+0x280/0x280 [ 2630.296542][T15473] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2630.296556][T15473] ? mem_cgroup_nr_lru_pages+0x1b0/0x1b0 [ 2630.296583][T15473] ? do_raw_spin_unlock+0x57/0x270 [ 2630.322502][T26373] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2630.325746][T15473] ? _raw_spin_unlock+0x2d/0x50 [ 2630.742679][T15473] try_charge+0x1080/0x1480 [ 2630.747194][T15473] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2630.752738][T15473] ? find_held_lock+0x35/0x130 [ 2630.757504][T15473] ? get_mem_cgroup_from_mm+0x139/0x320 [ 2630.763050][T15473] ? lock_downgrade+0x920/0x920 [ 2630.767923][T15473] ? percpu_ref_tryget_live+0x111/0x290 [ 2630.773488][T15473] __memcg_kmem_charge_memcg+0x71/0xf0 [ 2630.778942][T15473] ? memcg_kmem_put_cache+0x50/0x50 [ 2630.784140][T15473] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2630.789671][T15473] __memcg_kmem_charge+0x13a/0x3a0 [ 2630.794767][T15473] __alloc_pages_nodemask+0x4f2/0x8f0 [ 2630.800132][T15473] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2630.806383][T15473] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2630.812102][T15473] ? copy_process+0x46d1/0x6b00 [ 2630.816954][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2630.822238][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2630.827254][T15473] ? __kasan_check_read+0x11/0x20 [ 2630.832379][T15473] copy_process+0x3f8/0x6b00 [ 2630.836985][T15473] ? __kasan_check_read+0x11/0x20 [ 2630.842009][T15473] ? __lock_acquire+0x1702/0x4c30 [ 2630.847025][T15473] ? __kasan_check_read+0x11/0x20 [ 2630.852240][T15473] ? mark_lock+0xc0/0x11e0 [ 2630.856666][T15473] ? __cleanup_sighand+0x60/0x60 [ 2630.861620][T15473] ? find_held_lock+0x35/0x130 [ 2630.866409][T15473] _do_fork+0x146/0xfa0 [ 2630.870661][T15473] ? copy_init_mm+0x20/0x20 [ 2630.875152][T15473] ? __kasan_check_read+0x11/0x20 [ 2630.880783][T15473] ? _copy_to_user+0x118/0x160 [ 2630.885549][T15473] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2630.891773][T15473] ? put_timespec64+0xda/0x140 [ 2630.896547][T15473] __x64_sys_clone+0x18d/0x250 [ 2630.901338][T15473] ? __ia32_sys_vfork+0xc0/0xc0 [ 2630.906203][T15473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2630.911505][T15473] ? trace_hardirqs_on+0x67/0x240 [ 2630.916531][T15473] do_syscall_64+0xfa/0x760 [ 2630.921059][T15473] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2630.926953][T15473] RIP: 0033:0x457dfa [ 2630.930843][T15473] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2630.950719][T15473] RSP: 002b:00007ffe9d25c010 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2630.959132][T15473] RAX: ffffffffffffffda RBX: 00007ffe9d25c010 RCX: 0000000000457dfa [ 2630.967130][T15473] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2630.975109][T15473] RBP: 00007ffe9d25c050 R08: 0000000000000001 R09: 0000555556205940 [ 2630.983068][T15473] R10: 0000555556205c10 R11: 0000000000000246 R12: 0000000000000001 [ 2630.991024][T15473] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe9d25c0a0 [ 2631.002231][T15473] memory: usage 15308kB, limit 0kB, failcnt 304 [ 2631.008602][T15473] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2631.015446][T15473] Memory cgroup stats for /syz4: [ 2631.015564][T15473] anon 3178496 [ 2631.015564][T15473] file 49152 [ 2631.015564][T15473] kernel_stack 851968 [ 2631.015564][T15473] slab 8536064 [ 2631.015564][T15473] sock 8192 [ 2631.015564][T15473] shmem 20480 [ 2631.015564][T15473] file_mapped 0 [ 2631.015564][T15473] file_dirty 0 [ 2631.015564][T15473] file_writeback 0 [ 2631.015564][T15473] anon_thp 0 [ 2631.015564][T15473] inactive_anon 69632 [ 2631.015564][T15473] active_anon 3104768 [ 2631.015564][T15473] inactive_file 0 [ 2631.015564][T15473] active_file 45056 [ 2631.015564][T15473] unevictable 12288 [ 2631.015564][T15473] slab_reclaimable 3649536 [ 2631.015564][T15473] slab_unreclaimable 4886528 [ 2631.015564][T15473] pgfault 400521 [ 2631.015564][T15473] pgmajfault 0 [ 2631.015564][T15473] workingset_refault 825 [ 2631.015564][T15473] workingset_activate 330 [ 2631.015564][T15473] workingset_nodereclaim 0 [ 2631.015564][T15473] pgrefill 12552 [ 2631.015564][T15473] pgscan 17027 [ 2631.015564][T15473] pgsteal 4298 [ 2631.110461][T15473] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=15473,uid=0 [ 2631.126159][T15473] Memory cgroup out of memory: Killed process 15473 (syz-executor.4) total-vm:72440kB, anon-rss:116kB, file-rss:35776kB, shmem-rss:0kB, UID:0 [ 2631.141555][ T1056] oom_reaper: reaped process 15473 (syz-executor.4), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 2631.166479][ T4817] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2631.177265][ T4817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2631.185124][ T4817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2631.210721][T26374] 8021q: adding VLAN 0 to HW filter on device team0 [ 2631.264690][ T4817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2631.275193][ T4817] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2631.304377][ T4817] bridge0: port 1(bridge_slave_0) entered blocking state [ 2631.311535][ T4817] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2631.348800][T26373] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2631.376574][ T4817] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2631.384685][ T4817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2631.407779][ T4817] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2631.427398][ T4817] bridge0: port 2(bridge_slave_1) entered blocking state [ 2631.434481][ T4817] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2631.456457][ T4817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2631.465588][ T4817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2631.494952][ T4817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2631.507647][ T4817] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2631.524358][ T4817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2631.533334][ T4817] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2631.544471][ T4817] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2631.811548][ T4817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2631.832115][ T4817] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2633.116198][T22419] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2633.124816][T22419] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2633.133507][T24975] device bridge_slave_1 left promiscuous mode [ 2633.141155][T24975] bridge0: port 2(bridge_slave_1) entered disabled state [ 2633.186865][T24975] device bridge_slave_0 left promiscuous mode [ 2633.193051][T24975] bridge0: port 1(bridge_slave_0) entered disabled state [ 2635.286803][T24975] device hsr_slave_0 left promiscuous mode [ 2635.326360][T24975] device hsr_slave_1 left promiscuous mode [ 2635.378698][T24975] team0 (unregistering): Port device team_slave_1 removed [ 2635.393110][T24975] team0 (unregistering): Port device team_slave_0 removed [ 2635.405358][T24975] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2635.453858][T24975] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2635.561244][T24975] bond0 (unregistering): Released all slaves 10:40:34 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000240)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x44) gettid() r2 = msgget$private(0x0, 0x40) msgctl$MSG_INFO(r2, 0xc, &(0x7f0000000340)=""/229) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, 0x0) socket$kcm(0x11, 0x3, 0x0) socket$caif_stream(0x25, 0x1, 0x4) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f00000002c0)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0xfffffffffffffcd2, &(0x7f0000000100)=[{&(0x7f0000000180)}]}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207c804a01a000000880367fb0a000200030ada1b40d805000300c50083b8", 0x2e}], 0x1}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r3, 0x0, 0x0) 10:40:34 executing program 3: syz_open_dev$video(0x0, 0x6c, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00\x00\x00\'v\x01\x03\xf2\x00', @ifru_flags}) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000200), 0x4) [ 2635.691171][T26374] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2635.732700][T26374] 8021q: adding VLAN 0 to HW filter on device batadv0 10:40:34 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a000000003a000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:40:34 executing program 1: r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x80046108, &(0x7f0000000300)) [ 2636.000222][T26399] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 2636.066713][T26401] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 10:40:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1000000000005, 0x0) getsockopt$inet_buf(r1, 0x84, 0xb, &(0x7f0000dcffe8)=""/24, &(0x7f0000000080)=0x18) 10:40:34 executing program 5: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) write(r0, &(0x7f0000000000)="4701000012005f0214f9f40700000000800010000000002000002972d1000000", 0x147) 10:40:34 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000060000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:40:34 executing program 4: r0 = memfd_create(&(0x7f0000000140)='oH#\x12s\x87\xf9f!\x00', 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x6a600, 0x0) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) dup3(r0, r1, 0x0) 10:40:34 executing program 3: syz_open_dev$video(0x0, 0x6c, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00\x00\x00\'v\x01\x03\xf2\x00', @ifru_flags}) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000200), 0x4) [ 2636.216774][T26403] netlink: 295 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2636.283033][T26408] netlink: 295 bytes leftover after parsing attributes in process `syz-executor.5'. 10:40:35 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a00000000f0000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:40:35 executing program 3: syz_open_dev$video(0x0, 0x6c, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00\x00\x00\'v\x01\x03\xf2\x00', @ifru_flags}) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000200), 0x4) 10:40:35 executing program 5: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) write(r0, &(0x7f0000000000)="4701000012005f0214f9f40700000000800010000000002000002972d1000000", 0x147) 10:40:35 executing program 2: gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r3, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x5, &(0x7f0000000840)={r3, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r2, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r4 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r4, 0x3, 0xc, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r1, 0x8907, &(0x7f00000000c0)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)={'hsr0\x00tt\x00L\x00\x00\x00\xfe\x00\x00l', 0x1001}) 10:40:35 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a00000000a0010000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:40:35 executing program 3: syz_open_dev$video(0x0, 0x6c, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00\x00\x00\'v\x01\x03\xf2\x00', @ifru_flags}) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000200), 0x4) [ 2636.616143][T26422] netlink: 295 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2636.796961][T26424] IPVS: length: 144 != 8 [ 2637.162326][T26424] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2637.377678][T26434] IPVS: length: 144 != 8 [ 2637.645581][T26437] IPVS: ftp: loaded support on port[0] = 21 [ 2637.885804][T26437] chnl_net:caif_netlink_parms(): no params data found [ 2637.963374][T26437] bridge0: port 1(bridge_slave_0) entered blocking state [ 2637.972282][T26437] bridge0: port 1(bridge_slave_0) entered disabled state [ 2637.981045][T26437] device bridge_slave_0 entered promiscuous mode [ 2637.990333][T26437] bridge0: port 2(bridge_slave_1) entered blocking state [ 2637.999462][T26437] bridge0: port 2(bridge_slave_1) entered disabled state [ 2638.014370][T26437] device bridge_slave_1 entered promiscuous mode [ 2638.032278][T26441] IPVS: ftp: loaded support on port[0] = 21 [ 2638.075608][T26437] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2638.100330][T26437] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2638.161043][T26437] team0: Port device team_slave_0 added [ 2638.169481][T26437] team0: Port device team_slave_1 added [ 2638.321125][T26437] device hsr_slave_0 entered promiscuous mode [ 2638.366575][T26437] device hsr_slave_1 entered promiscuous mode [ 2638.436230][T26437] debugfs: Directory 'hsr0' with parent '/' already present! [ 2638.451915][T26441] chnl_net:caif_netlink_parms(): no params data found [ 2638.493327][T26441] bridge0: port 1(bridge_slave_0) entered blocking state [ 2638.502537][T26441] bridge0: port 1(bridge_slave_0) entered disabled state [ 2638.511146][T26441] device bridge_slave_0 entered promiscuous mode [ 2638.522234][T26441] bridge0: port 2(bridge_slave_1) entered blocking state [ 2638.529487][T26441] bridge0: port 2(bridge_slave_1) entered disabled state [ 2638.538654][T26441] device bridge_slave_1 entered promiscuous mode [ 2638.562288][T26441] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2638.574176][T26441] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2638.602087][T26441] team0: Port device team_slave_0 added [ 2638.617188][T26441] team0: Port device team_slave_1 added [ 2638.625820][T26437] bridge0: port 2(bridge_slave_1) entered blocking state [ 2638.632979][T26437] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2638.640477][T26437] bridge0: port 1(bridge_slave_0) entered blocking state [ 2638.647610][T26437] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2638.738087][T26441] device hsr_slave_0 entered promiscuous mode [ 2638.786644][T26441] device hsr_slave_1 entered promiscuous mode [ 2638.846226][T26441] debugfs: Directory 'hsr0' with parent '/' already present! [ 2638.891128][T26437] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2638.903127][T26441] bridge0: port 2(bridge_slave_1) entered blocking state [ 2638.910286][T26441] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2638.917730][T26441] bridge0: port 1(bridge_slave_0) entered blocking state [ 2638.924831][T26441] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2638.938687][ T4738] bridge0: port 1(bridge_slave_0) entered disabled state [ 2638.996746][ T4738] bridge0: port 2(bridge_slave_1) entered disabled state [ 2639.008388][ T4738] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2639.019623][ T4738] bridge0: port 1(bridge_slave_0) entered disabled state [ 2639.027504][ T4738] bridge0: port 2(bridge_slave_1) entered disabled state [ 2639.052201][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2639.060506][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2639.078911][T26437] 8021q: adding VLAN 0 to HW filter on device team0 [ 2639.099938][T22419] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2639.109132][T22419] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2639.118312][T22419] bridge0: port 1(bridge_slave_0) entered blocking state [ 2639.125373][T22419] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2639.152262][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2639.161943][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2639.171063][ T3018] bridge0: port 2(bridge_slave_1) entered blocking state [ 2639.178297][ T3018] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2639.198918][ T4817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2639.208071][ T4817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2639.217607][ T4817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2639.227277][ T4817] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2639.261167][T26441] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2639.271386][T20972] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2639.279973][T20972] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2639.289789][T20972] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2639.312246][T20972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2639.321225][T20972] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2639.330503][T20972] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2639.339520][T20972] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2639.365699][T26437] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2639.375340][ T8710] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2639.388604][ T8710] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2639.399884][T26441] 8021q: adding VLAN 0 to HW filter on device team0 [ 2639.419576][ T8710] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2639.428911][ T8710] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2639.438052][ T8710] bridge0: port 1(bridge_slave_0) entered blocking state [ 2639.445093][ T8710] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2639.453451][ T8710] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2639.462690][ T8710] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2639.471553][ T8710] bridge0: port 2(bridge_slave_1) entered blocking state [ 2639.478691][ T8710] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2639.487181][ T8710] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2639.519831][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2639.535630][T22419] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2639.545203][T22419] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2639.558944][T22419] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2639.567191][T22419] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2639.582896][T22419] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2639.602076][T26441] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2639.613890][T26441] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2639.635233][ T8710] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2639.647058][ T8710] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2639.655410][ T8710] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2639.664527][ T8710] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2639.673120][ T8710] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2639.691298][T26437] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2639.731734][T26441] 8021q: adding VLAN 0 to HW filter on device batadv0 10:40:38 executing program 1: r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x80046108, &(0x7f0000000300)) 10:40:38 executing program 5: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) write(r0, &(0x7f0000000000)="4701000012005f0214f9f40700000000800010000000002000002972d1000000", 0x147) 10:40:38 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000030000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:40:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x2, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300003, 0x21, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff8f, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2639.970195][T26463] netlink: 295 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2639.994007][T26462] dccp_invalid_packet: pskb_may_pull failed [ 2640.015291][T26468] dccp_invalid_packet: pskb_may_pull failed 10:40:38 executing program 4: gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r3, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x5, &(0x7f0000000840)={r3, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r2, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r4 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r4, 0x3, 0xc, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r1, 0x8907, &(0x7f00000000c0)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000340)="50033aafef3038694fb645e4e76a268fceb201a10e379956047fbaec0175b0784bfb93143060479ca79db86372f4ccd6048ed8c0598be7bbee77d4c712e4877efc8419391828e47abbf6ae5fb91cea4c0766fd1ee56c499aa1ba8d8f708662db8ff95fd39a5349171c1bdefa62d1ab9701c70176dbf7ad4e18ae8e255306e078490db244cf132b761cf52c6428da2c18a1bcc4942cb0913d6173c7869bca1dcbb72e8fd4a1824a6ddf5652c8b7478b03dd71ba05d459b26fc740da725496ab132923aff0ef64226b6124535fb437cd4a9e00128a3fd4b4e61d814731901b88a7eb56b665fae7a69cb03260455eccf9783112e95b8d40f54cb89054295f020484") ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)={'hsr0\x00tt\x00L\x00\x00\x00\xfe\x00\x00l', 0x1001}) 10:40:38 executing program 2: gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r3, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x5, &(0x7f0000000840)={r3, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r2, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r4 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r4, 0x3, 0xc, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r1, 0x8907, &(0x7f00000000c0)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000340)="50033aafef3038694fb645e4e76a268fceb201a10e379956047fbaec0175b0784bfb93143060479ca79db86372f4ccd6048ed8c0598be7bbee77d4c712e4877efc8419391828e47abbf6ae5fb91cea4c0766fd1ee56c499aa1ba8d8f708662db8ff95fd39a5349171c1bdefa62d1ab9701c70176dbf7ad4e18ae8e255306e078490db244cf132b761cf52c6428da2c18a1bcc4942cb0913d6173c7869bca1dcbb72e8fd4a1824a6ddf5652c8b7478b03dd71ba05d459b26fc740da725496ab132923aff0ef64226b6124535fb437cd4a9e00128a3fd4b4e61d814731901b88a7eb56b665fae7a69cb03260455eccf9783112e95b8d40f54cb89054295f020484") ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)={'hsr0\x00tt\x00L\x00\x00\x00\xfe\x00\x00l', 0x1001}) 10:40:38 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000050000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:40:38 executing program 1: r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x80046108, &(0x7f0000000300)) 10:40:38 executing program 3: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f00000000c0)={0xa, @vbi}) 10:40:38 executing program 5: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) write(r0, &(0x7f0000000000)="4701000012005f0214f9f40700000000800010000000002000002972d1000000", 0x147) 10:40:39 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000043050000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) [ 2640.259832][T26481] netlink: 295 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2640.283635][T26482] IPVS: length: 144 != 8 10:40:39 executing program 1: r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x80046108, &(0x7f0000000300)) 10:40:39 executing program 3: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f00000000c0)={0xa, @vbi}) [ 2640.401334][T26482] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2640.516527][T26494] IPVS: length: 144 != 8 10:40:39 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1020, 0x0) 10:40:39 executing program 2: gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r3, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x5, &(0x7f0000000840)={r3, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r2, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r4 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r4, 0x3, 0xc, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r1, 0x8907, &(0x7f00000000c0)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)={'hsr0\x00tt\x00L\x00\x00\x00\xfe\x00\x00l', 0x1001}) 10:40:39 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000060000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) [ 2640.957654][T26507] IPVS: length: 144 != 8 [ 2641.035714][T26497] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 10:40:39 executing program 4: gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r3, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x5, &(0x7f0000000840)={r3, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r2, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r4 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r4, 0x3, 0xc, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r1, 0x8907, &(0x7f00000000c0)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)={'hsr0\x00tt\x00L\x00\x00\x00\xfe\x00\x00l', 0x1001}) 10:40:39 executing program 1: prctl$PR_SET_MM(0x2f, 0x0, &(0x7f0000ffa000/0x4000)=nil) 10:40:39 executing program 3: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f00000000c0)={0xa, @vbi}) 10:40:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@nat={'nat\x06\x00', 0x19, 0x0, 0x90, [0x20000003, 0x0, 0x0, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=[{}, {}, {}]}, 0x108) 10:40:39 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000008060000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:40:40 executing program 5: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl$PPPIOCSMRU(r0, 0x40047452, 0x0) 10:40:40 executing program 1: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0xfd87) 10:40:40 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000089060000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:40:40 executing program 3: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f00000000c0)={0xa, @vbi}) [ 2641.476527][T26532] IPVS: length: 144 != 8 10:40:40 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000070000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) [ 2641.938478][T26507] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 10:40:40 executing program 5: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl$PPPIOCSMRU(r0, 0x40047452, 0x0) 10:40:40 executing program 2: gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r3, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x5, &(0x7f0000000840)={r3, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r2, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r4 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r4, 0x3, 0xc, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r1, 0x8907, &(0x7f00000000c0)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)={'hsr0\x00tt\x00L\x00\x00\x00\xfe\x00\x00l', 0x1001}) [ 2642.272683][T26545] IPVS: length: 144 != 8 10:40:41 executing program 4: gettid() gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x100b, 0x1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xff, 0x181400) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000006c0), &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r3, @ANYBLOB="5e0000006cada44a19687b6ffc89f4bd062aa0fd3030d0e7b39c0a89cef5a874425b40da1730abbaf5c333760f7f681abfb69f41c4ea4606129be2ff0bea732452c0817e306d78ef0a5191b0d549f7c50bf4677f08981378574ad48102ffab996dd84f04b6e7e3ff8dfd87b22533c65c120bf4c6682fbcfaef38fc3368c822f0f0175b345f0ba6fd61e6b9c7e9031302e46f59379e442a6e3e8d8984d4163ed58ab2d301cc7557e3d9613dab768da0cb0141e5cbd1044234b65364bdbfa14d03663813ea1767c709057016a789362c2e"], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x5, &(0x7f0000000840)={r3, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}}, 0x84) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r2, 0x0, 0x2, &(0x7f0000000100)={0x180000000000, 0xffffffffffffffff, 0x9, 0x6}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000008900)) r4 = semget(0x0, 0x6, 0x0) semctl$GETVAL(r4, 0x3, 0xc, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r1, 0x8907, &(0x7f00000000c0)) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000008980)=""/4096, &(0x7f0000009980)=0x1000) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000340)="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") ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000600)=""/144, &(0x7f0000000280)=0x90) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000008940)={0x101ff, 0x1, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmmsg(r1, &(0x7f0000008680)=[{{&(0x7f0000000900)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/255, 0xff}, {0x0}, {&(0x7f0000000bc0)=""/233, 0xe9}, {&(0x7f0000000cc0)=""/6, 0x6}, {&(0x7f0000000d00)=""/135, 0x87}], 0x6}}, {{&(0x7f0000000e40)=@caif=@dbg, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/199, 0xc7}, {&(0x7f0000000fc0)=""/105, 0x69}], 0x2, &(0x7f0000001080)=""/10, 0xa}, 0x8}, {{0x0, 0x0, &(0x7f0000001200)=[{0x0}], 0x1}, 0xfff}, {{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000002440)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/1, 0x1}, {&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x4, &(0x7f0000002480)=""/240, 0xf0}, 0x8}, {{&(0x7f0000002580)=@sco, 0x80, 0x0, 0x0, &(0x7f0000004980)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000005980)=@isdn, 0x80, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=""/191, 0xbf}, 0x2}, {{&(0x7f0000006ec0)=@nfc, 0x80, &(0x7f00000071c0)=[{&(0x7f0000006fc0)=""/217, 0xd9}, {0x0}], 0x2}, 0x8}, {{&(0x7f0000007200)=@can, 0x80, &(0x7f0000007440)=[{&(0x7f0000007280)=""/175, 0xaf}, {&(0x7f0000007380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000007480)=@caif=@rfm, 0x80, 0x0}, 0x4}], 0x9, 0x2000, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)={'hsr0\x00tt\x00L\x00\x00\x00\xfe\x00\x00l', 0x1001}) 10:40:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000740)='/dev/zero\x00', 0x1, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000040), &(0x7f0000000380)=0x4) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x30, r2, 0x0, 0x70bd25, 0x25dfdbfc, {{}, 0x0, 0x4108, 0x0, {0x14, 0x18, {0xa5f8, @bearer=@udp='udp:syz0\x00'}}}, ["", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x20000040) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, 0x0, &(0x7f00000002c0)) sendto$inet(r0, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) ioctl$RTC_PIE_OFF(r1, 0x7006) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000580)=[@in={0x2, 0x4e22, @local}, @in={0x2, 0x4e24, @multicast1}, @in={0x2, 0x4e21, @loopback}, @in={0x2, 0x4e23, @loopback}, @in6={0xa, 0x4e20, 0x7, @dev={0xfe, 0x80, [], 0x1b}, 0x3ff}, @in={0x2, 0x4e22, @loopback}, @in={0x2, 0x4e24, @remote}], 0x7c) r3 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x105084) r4 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000540)=0x40) sendfile(r0, r3, 0x0, 0x102000002) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000640)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, 0x0) fsetxattr$trusted_overlay_redirect(r4, &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) 10:40:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0xf3f5, 0x2000010001}) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) 10:40:41 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000006080000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:40:41 executing program 5: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl$PPPIOCSMRU(r0, 0x40047452, 0x0) [ 2642.337902][T26521] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 10:40:41 executing program 5: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl$PPPIOCSMRU(r0, 0x40047452, 0x0) 10:40:41 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a00000000000b0000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) [ 2642.663372][T26566] IPVS: length: 144 != 8 10:40:41 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) setresuid(0x0, 0xee01, 0x0) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0xbf2) 10:40:41 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a00000000000d0000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:40:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000740)='/dev/zero\x00', 0x1, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000040), &(0x7f0000000380)=0x4) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x30, r2, 0x0, 0x70bd25, 0x25dfdbfc, {{}, 0x0, 0x4108, 0x0, {0x14, 0x18, {0xa5f8, @bearer=@udp='udp:syz0\x00'}}}, ["", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x20000040) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, 0x0, &(0x7f00000002c0)) sendto$inet(r0, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) ioctl$RTC_PIE_OFF(r1, 0x7006) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000580)=[@in={0x2, 0x4e22, @local}, @in={0x2, 0x4e24, @multicast1}, @in={0x2, 0x4e21, @loopback}, @in={0x2, 0x4e23, @loopback}, @in6={0xa, 0x4e20, 0x7, @dev={0xfe, 0x80, [], 0x1b}, 0x3ff}, @in={0x2, 0x4e22, @loopback}, @in={0x2, 0x4e24, @remote}], 0x7c) r3 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x105084) r4 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000540)=0x40) sendfile(r0, r3, 0x0, 0x102000002) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000640)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, 0x0) fsetxattr$trusted_overlay_redirect(r4, &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) [ 2643.058822][T26545] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 10:40:42 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a00000000800e0000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:40:42 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="1400000026000500d25a80648c63940d1000fc00", 0x14}], 0x1}, 0x0) [ 2643.608149][T26559] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 10:40:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000740)='/dev/zero\x00', 0x1, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000040), &(0x7f0000000380)=0x4) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x30, r2, 0x0, 0x70bd25, 0x25dfdbfc, {{}, 0x0, 0x4108, 0x0, {0x14, 0x18, {0xa5f8, @bearer=@udp='udp:syz0\x00'}}}, ["", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x20000040) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, 0x0, &(0x7f00000002c0)) sendto$inet(r0, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) ioctl$RTC_PIE_OFF(r1, 0x7006) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000580)=[@in={0x2, 0x4e22, @local}, @in={0x2, 0x4e24, @multicast1}, @in={0x2, 0x4e21, @loopback}, @in={0x2, 0x4e23, @loopback}, @in6={0xa, 0x4e20, 0x7, @dev={0xfe, 0x80, [], 0x1b}, 0x3ff}, @in={0x2, 0x4e22, @loopback}, @in={0x2, 0x4e24, @remote}], 0x7c) r3 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x105084) r4 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000540)=0x40) sendfile(r0, r3, 0x0, 0x102000002) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000640)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, 0x0) fsetxattr$trusted_overlay_redirect(r4, &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) 10:40:42 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_sco(r0, &(0x7f0000000000), 0x8) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) 10:40:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0xf3f5, 0x2000010001}) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) 10:40:42 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000140)="3c31cbbabbf98a5fa679965db016ad28c0a7444bc975ba73927bd0f8f8c6a50a", 0x20000160}], 0x1}, 0x0) 10:40:42 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000280000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:40:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000020000000001, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 10:40:42 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000080350000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:40:42 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000280)={0x3f, 0x2d, 0x0, 0xffffffffffffff9c}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000140)=0x3) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 10:40:43 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a00000000003a0000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:40:43 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_X86_SETUP_MCE(r2, 0x4008ae9c, &(0x7f00000000c0)={0xa}) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f0000000180)={0xa080000000000000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:40:43 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000280)={0x3f, 0x2d, 0x0, 0xffffffffffffff9c}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000140)=0x3) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 10:40:43 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a00000000003f0000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:40:43 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000280)={0x3f, 0x2d, 0x0, 0xffffffffffffff9c}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000140)=0x3) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 10:40:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000020000000001, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 10:40:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0xf3f5, 0x2000010001}) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) 10:40:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000740)='/dev/zero\x00', 0x1, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000040), &(0x7f0000000380)=0x4) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x30, r2, 0x0, 0x70bd25, 0x25dfdbfc, {{}, 0x0, 0x4108, 0x0, {0x14, 0x18, {0xa5f8, @bearer=@udp='udp:syz0\x00'}}}, ["", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x20000040) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, 0x0, &(0x7f00000002c0)) sendto$inet(r0, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) ioctl$RTC_PIE_OFF(r1, 0x7006) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000580)=[@in={0x2, 0x4e22, @local}, @in={0x2, 0x4e24, @multicast1}, @in={0x2, 0x4e21, @loopback}, @in={0x2, 0x4e23, @loopback}, @in6={0xa, 0x4e20, 0x7, @dev={0xfe, 0x80, [], 0x1b}, 0x3ff}, @in={0x2, 0x4e22, @loopback}, @in={0x2, 0x4e24, @remote}], 0x7c) r3 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x105084) r4 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000540)=0x40) sendfile(r0, r3, 0x0, 0x102000002) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000640)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, 0x0) fsetxattr$trusted_overlay_redirect(r4, &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) 10:40:43 executing program 2: perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xea4f, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x840}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:40:43 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000400000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:40:43 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000280)={0x3f, 0x2d, 0x0, 0xffffffffffffff9c}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000140)=0x3) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 10:40:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58) dup2(r0, r1) 10:40:44 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000005430000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:40:44 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000580)='/dev/dri/card#\x00', 0x0, 0x0) r1 = epoll_create(0x7fff) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) 10:40:44 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000088470000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:40:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58) dup2(r0, r1) 10:40:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000020000000001, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 10:40:44 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000088480000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:40:44 executing program 1: userfaultfd(0x0) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0406400, &(0x7f0000001340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6e, &(0x7f0000000280)=""/110}) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x4000000) 10:40:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0xf3f5, 0x2000010001}) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) 10:40:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58) dup2(r0, r1) 10:40:44 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000480)={0x1, 0x0, @pic={0x0, 0x6f6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e2e8d57}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000000)={[], 0x0, 0x260}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:40:44 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000600000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:40:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58) dup2(r0, r1) 10:40:45 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000088640000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:40:45 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$vimc2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/video2\x00', 0x2, 0x0) r3 = dup2(r1, r0) dup2(r3, r2) 10:40:45 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000140)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3235004000000f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4d}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, &(0x7f0000000080)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0xc2b}]}) ioctl$TIOCSRS485(0xffffffffffffffff, 0x542f, &(0x7f0000000100)={0x0, 0x1, 0xb5c206b}) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f0000000240)={[{}, {0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:40:45 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/wireless\x00') preadv(r0, &(0x7f00000017c0), 0x333, 0x0) 10:40:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000020000000001, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 10:40:45 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a000000000e800000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:40:45 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x8b23) 10:40:46 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x6, &(0x7f0000000100)={&(0x7f0000000040)={0xc7, 0x36, 0x829, 0x0, 0x0, {0x2, 0x1000000}, [@nested={0x18, 0x0, [@typed={0x4, 0x1, @ipv6=@loopback={0xffff000000000000}}]}]}, 0xfde8}, 0x1, 0xffffff7f0e000000}, 0x0) 10:40:46 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000035800000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:40:46 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/wireless\x00') preadv(r0, &(0x7f00000017c0), 0x333, 0x0) 10:40:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7bf070") r1 = syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r1, 0xc100565c, &(0x7f0000000380)={0x0, 0x8000, 0x1, {0xb, @sliced={0x0, [0x0, 0x8]}}}) close(r1) 10:40:46 executing program 1: r0 = perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x53f, 0x6, 0x0, 0x401, 0x0, 0x0, 0x0, 0x3f, 0x29, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x4, 0x8000000001, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffff9c, 0x1, 0xffffffffffffff9c, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x401, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x6, 0x0, 0x3, 0x1000, 0x0, 0x9f1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x9b, 0x0, &(0x7f0000000480)="188e94f2cb0a505cfd7096be36c9b7469da1f9566d5d403d8532a6fb120a1f1d15815c4435afc7115866c4ce3676817e62b86d6ee6cc6d93437f61e3c62bae83b59260b0e1dbe64297661902da3b8841ed09f26448e231bd37ba45b09e26bfb63b620dfddbe36060559ee6b1d7be67ab7d341c1167de92e4f6be7474238ce5c75c06f69793c14394ac6d2e6a33c2994214e1786092c572a7465e2a", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000540)) write$cgroup_subtree(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB='-pids -m'], 0x8) write$cgroup_subtree(r3, &(0x7f0000000000)={[{0x4000, 'memory', 0xe}]}, 0x200600) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0xffffffffffffffff, r1, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) r4 = perf_event_open$cgroup(&(0x7f0000000580)={0x0, 0x70, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x7, 0x10c, 0xb, 0x0, 0x1e1a, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x100, 0x200, 0x7, 0x2, 0x3, 0x0, 0x326, 0x10001, 0x9, 0x3, 0x0, 0x1, 0x7, 0x0, 0x4, 0x3, 0x0, 0x8000, 0x9, 0x0, 0x0, 0x5, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x7f, 0x0, 0x7, 0x0, 0x0, 0x7a}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r5 = socket$kcm(0x10, 0x0, 0x10) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x2) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002400)=[{&(0x7f0000000100)="3567b9f91d63bf02986a09e27384979c6d79ffb9dc181492a3428a5f30a1ceacf294d8", 0x23}], 0x1}, 0x2) 10:40:46 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth0_to_bridge\x00'}, 0x18) ioctl(r0, 0x800000000008982, &(0x7f0000000080)) [ 2647.520794][T26731] netlink: 171 bytes leftover after parsing attributes in process `syz-executor.4'. 10:40:46 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/wireless\x00') preadv(r0, &(0x7f00000017c0), 0x333, 0x0) 10:40:46 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000810000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:40:46 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) sendmsg$nl_route(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f000002c000)=@mpls_newroute={0x1c, 0x18, 0x21}, 0x1c}}, 0x0) 10:40:46 executing program 5: syz_emit_ethernet(0x6e, &(0x7f0000000040)={@random="cd390b081bf2", @random="4fe081f68f3b", [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @ipv4, @mcast2, {[], @icmpv6=@dest_unreach={0x2, 0x0, 0x0, 0x0, [], {0x0, 0x6, "d5cae2", 0x0, 0x6, 0x0, @empty, @mcast2, [], "f601929f106531aa"}}}}}}}, 0x0) 10:40:46 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth0_to_bridge\x00'}, 0x18) ioctl(r0, 0x800000000008982, &(0x7f0000000080)) 10:40:46 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000047880000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:40:46 executing program 1: r0 = perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x53f, 0x6, 0x0, 0x401, 0x0, 0x0, 0x0, 0x3f, 0x29, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x4, 0x8000000001, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffff9c, 0x1, 0xffffffffffffff9c, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x401, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x6, 0x0, 0x3, 0x1000, 0x0, 0x9f1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x9b, 0x0, &(0x7f0000000480)="188e94f2cb0a505cfd7096be36c9b7469da1f9566d5d403d8532a6fb120a1f1d15815c4435afc7115866c4ce3676817e62b86d6ee6cc6d93437f61e3c62bae83b59260b0e1dbe64297661902da3b8841ed09f26448e231bd37ba45b09e26bfb63b620dfddbe36060559ee6b1d7be67ab7d341c1167de92e4f6be7474238ce5c75c06f69793c14394ac6d2e6a33c2994214e1786092c572a7465e2a", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000540)) write$cgroup_subtree(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB='-pids -m'], 0x8) write$cgroup_subtree(r3, &(0x7f0000000000)={[{0x4000, 'memory', 0xe}]}, 0x200600) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0xffffffffffffffff, r1, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) r4 = perf_event_open$cgroup(&(0x7f0000000580)={0x0, 0x70, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x7, 0x10c, 0xb, 0x0, 0x1e1a, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x100, 0x200, 0x7, 0x2, 0x3, 0x0, 0x326, 0x10001, 0x9, 0x3, 0x0, 0x1, 0x7, 0x0, 0x4, 0x3, 0x0, 0x8000, 0x9, 0x0, 0x0, 0x5, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x7f, 0x0, 0x7, 0x0, 0x0, 0x7a}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r5 = socket$kcm(0x10, 0x0, 0x10) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x2) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002400)=[{&(0x7f0000000100)="3567b9f91d63bf02986a09e27384979c6d79ffb9dc181492a3428a5f30a1ceacf294d8", 0x23}], 0x1}, 0x2) 10:40:46 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000040)=@profile={'stack ', '&&//em0ppp1vboxnet0-user\x00'}, 0x8) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 10:40:46 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000048880000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:40:46 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) sendmsg$nl_route(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f000002c000)=@mpls_newroute={0x1c, 0x18, 0x21}, 0x1c}}, 0x0) 10:40:47 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000064880000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:40:47 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) sendmsg$nl_route(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f000002c000)=@mpls_newroute={0x1c, 0x18, 0x21}, 0x1c}}, 0x0) 10:40:47 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/wireless\x00') preadv(r0, &(0x7f00000017c0), 0x333, 0x0) 10:40:47 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000006890000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:40:47 executing program 5: syz_mount_image$vfat(&(0x7f0000000bc0)='vfat\x00', &(0x7f0000000c00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@fat=@gid={'gid'}}]}) 10:40:47 executing program 1: r0 = perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x53f, 0x6, 0x0, 0x401, 0x0, 0x0, 0x0, 0x3f, 0x29, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x4, 0x8000000001, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffff9c, 0x1, 0xffffffffffffff9c, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x401, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x6, 0x0, 0x3, 0x1000, 0x0, 0x9f1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x9b, 0x0, &(0x7f0000000480)="188e94f2cb0a505cfd7096be36c9b7469da1f9566d5d403d8532a6fb120a1f1d15815c4435afc7115866c4ce3676817e62b86d6ee6cc6d93437f61e3c62bae83b59260b0e1dbe64297661902da3b8841ed09f26448e231bd37ba45b09e26bfb63b620dfddbe36060559ee6b1d7be67ab7d341c1167de92e4f6be7474238ce5c75c06f69793c14394ac6d2e6a33c2994214e1786092c572a7465e2a", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000540)) write$cgroup_subtree(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB='-pids -m'], 0x8) write$cgroup_subtree(r3, &(0x7f0000000000)={[{0x4000, 'memory', 0xe}]}, 0x200600) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0xffffffffffffffff, r1, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) r4 = perf_event_open$cgroup(&(0x7f0000000580)={0x0, 0x70, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x7, 0x10c, 0xb, 0x0, 0x1e1a, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x100, 0x200, 0x7, 0x2, 0x3, 0x0, 0x326, 0x10001, 0x9, 0x3, 0x0, 0x1, 0x7, 0x0, 0x4, 0x3, 0x0, 0x8000, 0x9, 0x0, 0x0, 0x5, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x7f, 0x0, 0x7, 0x0, 0x0, 0x7a}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r5 = socket$kcm(0x10, 0x0, 0x10) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x2) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002400)=[{&(0x7f0000000100)="3567b9f91d63bf02986a09e27384979c6d79ffb9dc181492a3428a5f30a1ceacf294d8", 0x23}], 0x1}, 0x2) 10:40:47 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) sendmsg$nl_route(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f000002c000)=@mpls_newroute={0x1c, 0x18, 0x21}, 0x1c}}, 0x0) 10:40:47 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth0_to_bridge\x00'}, 0x18) ioctl(r0, 0x800000000008982, &(0x7f0000000080)) [ 2648.887573][T26787] FAT-fs (loop5): bogus number of reserved sectors 10:40:47 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000f00000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:40:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0xf) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="24000000040a07031dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0xec0}], 0x1}, 0x0) [ 2648.928724][T26787] FAT-fs (loop5): Can't find a valid FAT filesystem 10:40:47 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000ff0000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:40:47 executing program 1: r0 = perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x53f, 0x6, 0x0, 0x401, 0x0, 0x0, 0x0, 0x3f, 0x29, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x4, 0x8000000001, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffff9c, 0x1, 0xffffffffffffff9c, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x401, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x6, 0x0, 0x3, 0x1000, 0x0, 0x9f1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x9b, 0x0, &(0x7f0000000480)="188e94f2cb0a505cfd7096be36c9b7469da1f9566d5d403d8532a6fb120a1f1d15815c4435afc7115866c4ce3676817e62b86d6ee6cc6d93437f61e3c62bae83b59260b0e1dbe64297661902da3b8841ed09f26448e231bd37ba45b09e26bfb63b620dfddbe36060559ee6b1d7be67ab7d341c1167de92e4f6be7474238ce5c75c06f69793c14394ac6d2e6a33c2994214e1786092c572a7465e2a", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000540)) write$cgroup_subtree(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB='-pids -m'], 0x8) write$cgroup_subtree(r3, &(0x7f0000000000)={[{0x4000, 'memory', 0xe}]}, 0x200600) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0xffffffffffffffff, r1, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) r4 = perf_event_open$cgroup(&(0x7f0000000580)={0x0, 0x70, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x7, 0x10c, 0xb, 0x0, 0x1e1a, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x100, 0x200, 0x7, 0x2, 0x3, 0x0, 0x326, 0x10001, 0x9, 0x3, 0x0, 0x1, 0x7, 0x0, 0x4, 0x3, 0x0, 0x8000, 0x9, 0x0, 0x0, 0x5, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x7f, 0x0, 0x7, 0x0, 0x0, 0x7a}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) r5 = socket$kcm(0x10, 0x0, 0x10) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x2) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002400)=[{&(0x7f0000000100)="3567b9f91d63bf02986a09e27384979c6d79ffb9dc181492a3428a5f30a1ceacf294d8", 0x23}], 0x1}, 0x2) [ 2649.062536][T26787] FAT-fs (loop5): bogus number of reserved sectors [ 2649.070400][T26787] FAT-fs (loop5): Can't find a valid FAT filesystem 10:40:47 executing program 5: syz_mount_image$vfat(&(0x7f0000000bc0)='vfat\x00', &(0x7f0000000c00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@fat=@gid={'gid'}}]}) 10:40:48 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth0_to_bridge\x00'}, 0x18) ioctl(r0, 0x800000000008982, &(0x7f0000000080)) 10:40:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0xf) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="24000000040a07031dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0xec0}], 0x1}, 0x0) 10:40:48 executing program 2: creat(&(0x7f00000000c0)='./bus\x00', 0x0) lsetxattr$security_ima(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340)='security.ima\x00', &(0x7f0000000380)=@v1={0x2, 'N'}, 0x2, 0x0) open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) 10:40:48 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a00000000a0008000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) [ 2649.464859][T26813] FAT-fs (loop5): bogus number of reserved sectors [ 2649.534451][T26813] FAT-fs (loop5): Can't find a valid FAT filesystem [ 2649.579622][ T26] audit: type=1804 audit(1563964848.329:580): pid=26824 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir826181040/syzkaller.sC9xUr/17/bus" dev="sda1" ino=17360 res=1 [ 2649.718498][ T26] audit: type=1804 audit(1563964848.399:581): pid=26828 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir826181040/syzkaller.sC9xUr/17/bus" dev="sda1" ino=17360 res=1 10:40:48 executing program 1: r0 = socket(0x10, 0x3, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbf) lsetxattr$security_capability(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='security.capability\x00', &(0x7f0000000280)=@v3={0x3000000, [], r1}, 0x18, 0x0) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)=@known='security.capability\x00\xc9\xbd0\x12\x98>\x02\x15Y`\x19j*\x84X_\x19\xc1\xc8&\x17)\x82\xa8\xde\x1c\xccL\xdci\x87\xff\xc9q\\\xef\"\xce\xe4\xc6s\xd48\x8d^V\x04\xa0\xb88\xaf\xb3[\xd3R\xe4\xc9\xeed\x9aw\x12\b0\x9c\xa46\xbf\x91\x9f\xd9ck\xfa%_\xf4\xb3\x1f@\xf8\x8e\xcc\x9c-\x81!q\xc4\x12bO\f\x14/\xc5Oe\xf4\x929\xf2v\x86\xc1}H\x9e\x92]\xa1\x9b\xf3\x1e0\xecu\xcd\x92#yWf\x1c\xe8\xa1V\x84\x18\xe6\xd3\xd4(\x17O\x89\xa1\x1c\xc8!\xfb\xf6A\"\xa3okA\x1c', 0x0, 0x2) 10:40:48 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a00000000fffff000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:40:48 executing program 2: creat(&(0x7f00000000c0)='./bus\x00', 0x0) lsetxattr$security_ima(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340)='security.ima\x00', &(0x7f0000000380)=@v1={0x2, 'N'}, 0x2, 0x0) open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) 10:40:48 executing program 5: syz_mount_image$vfat(&(0x7f0000000bc0)='vfat\x00', &(0x7f0000000c00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@fat=@gid={'gid'}}]}) 10:40:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0xf) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="24000000040a07031dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0xec0}], 0x1}, 0x0) 10:40:48 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000100)=ANY=[@ANYBLOB="1f0000000000000000000040050000a90000e7fc4b83bbb6a23b4b6942b7871001000000000000002560b700ff"]) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000040)={0x1, 0x2, [{0x48e, 0x0, 0xffffffffffffffff}]}) 10:40:48 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TCGETA(r0, 0x5423, &(0x7f0000000240)) [ 2649.995689][ T26] audit: type=1804 audit(1563964848.739:582): pid=26837 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir826181040/syzkaller.sC9xUr/18/bus" dev="sda1" ino=17169 res=1 10:40:48 executing program 2: creat(&(0x7f00000000c0)='./bus\x00', 0x0) lsetxattr$security_ima(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340)='security.ima\x00', &(0x7f0000000380)=@v1={0x2, 'N'}, 0x2, 0x0) open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) 10:40:48 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000001000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) [ 2650.110224][T26845] FAT-fs (loop5): bogus number of reserved sectors [ 2650.154113][T26845] FAT-fs (loop5): Can't find a valid FAT filesystem [ 2650.293093][ T26] audit: type=1804 audit(1563964849.039:583): pid=26857 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir826181040/syzkaller.sC9xUr/19/bus" dev="sda1" ino=17360 res=1 10:40:49 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000002000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:40:49 executing program 3: clone(0x2101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clock_gettime(0x3, &(0x7f0000000300)={0x0, 0x0}) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f00000002c0)={0x0, r1+30000000}, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 10:40:49 executing program 5: syz_mount_image$vfat(&(0x7f0000000bc0)='vfat\x00', &(0x7f0000000c00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={[{@fat=@gid={'gid'}}]}) 10:40:49 executing program 2: creat(&(0x7f00000000c0)='./bus\x00', 0x0) lsetxattr$security_ima(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340)='security.ima\x00', &(0x7f0000000380)=@v1={0x2, 'N'}, 0x2, 0x0) open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) 10:40:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0xf) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="24000000040a07031dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0xec0}], 0x1}, 0x0) 10:40:49 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x7c4, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x2, 0x100) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) syz_open_dev$swradio(0x0, 0x1, 0x2) socket$inet6(0xa, 0x803, 0x3) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) ioctl$EVIOCGPHYS(r1, 0x80404507, 0x0) recvfrom$packet(r0, &(0x7f0000000400)=""/239, 0xef, 0x0, 0x0, 0xfffffffffffffe94) [ 2650.682065][ T26] audit: type=1804 audit(1563964849.429:584): pid=26874 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir826181040/syzkaller.sC9xUr/20/bus" dev="sda1" ino=17345 res=1 [ 2650.697345][T26878] FAT-fs (loop5): bogus number of reserved sectors 10:40:49 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000003000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) [ 2650.778052][T26878] FAT-fs (loop5): Can't find a valid FAT filesystem 10:40:49 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000060607031dfffd946fa2830020200a0003000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) [ 2650.995672][T26898] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 10:40:49 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000005000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) [ 2651.066102][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2651.072003][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2651.546947][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2651.552969][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2651.706135][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2651.711959][ C1] protocol 88fb is buggy, dev hsr_slave_1 10:40:50 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000060607031dfffd946fa2830020200a0003000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 10:40:50 executing program 5: r0 = memfd_create(&(0x7f0000000100)='#em3#/\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x5}) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5}) 10:40:50 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x800000000006) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) 10:40:50 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TCGETA(r0, 0x5423, &(0x7f0000000240)) 10:40:50 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000006000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) [ 2651.796114][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2651.801943][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:40:50 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TCGETA(r0, 0x5423, &(0x7f0000000240)) [ 2651.863395][T26920] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 10:40:50 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000007000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:40:50 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="4400000010000106000000000000000005000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800050000000000"], 0x44}}, 0x0) 10:40:50 executing program 5: r0 = memfd_create(&(0x7f0000000100)='#em3#/\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x5}) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5}) 10:40:50 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000060607031dfffd946fa2830020200a0003000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 10:40:51 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000008000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) [ 2652.275084][T26942] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 10:40:51 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TCGETA(r0, 0x5423, &(0x7f0000000240)) 10:40:51 executing program 5: r0 = memfd_create(&(0x7f0000000100)='#em3#/\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x5}) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5}) 10:40:51 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000060607031dfffd946fa2830020200a0003000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 10:40:51 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000100)='./bus\x00', 0x8000, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x100000000000011, 0x3, 0x81) bind(r1, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f000000cc80)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x87ffd) sendfile(r0, r2, 0x0, 0x800000000024) [ 2652.625367][T26952] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 10:40:52 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TCGETA(r0, 0x5423, &(0x7f0000000240)) 10:40:52 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000608000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:40:52 executing program 5: r0 = memfd_create(&(0x7f0000000100)='#em3#/\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x5}) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5}) 10:40:52 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000000)=""/148, 0x51}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) 10:40:52 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r2 = eventfd2(0x1, 0x0) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f0000000440)=ANY=[], 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) io_setup(0x9, &(0x7f0000000000)=0x0) io_cancel(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x7, 0x3e58c4bc, r1, &(0x7f0000000140)="e580d43de59191ec097d9e4bc06670d7edcacda85d6b717cd1b1a2dc09a3405c54ab28bca3bd27e2e9fa6bed68e965afecd95de63fe317badbf63b8e14759b1cc1e7003f1163c4bcf8f2ecba763b755bc60125e16f7fa2cf0b3c2be30eb90972533b30481cfe", 0x66, 0x7, 0x0, 0x2, r2}, &(0x7f00000001c0)) ioctl$LOOP_CLR_FD(r0, 0x4c01) 10:40:52 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a000000000000000b000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:40:52 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="24000000180007041dfffd946f610529802000001f350205000008000800030002000000", 0x24}], 0x1}, 0x0) 10:40:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x278a9, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x34, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) 10:40:53 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TCGETA(r0, 0x5423, &(0x7f0000000240)) 10:40:53 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a000000000000000d000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:40:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) 10:40:53 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000000)=""/148, 0x51}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) 10:40:53 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x11) ioctl$TCGETA(r0, 0x5423, &(0x7f0000000240)) 10:40:53 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000028000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:40:53 executing program 4: syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x8000, 0x1, &(0x7f0000000140)=[{&(0x7f0000000000)="eb58906d6b66732e66617400020120000200030000f870", 0x17}], 0x0, 0x0) 10:40:53 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000004cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:40:54 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a000000000000003a000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:40:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x18, 0x33, 0x829, 0x0, 0x0, {0x3, 0x1000000}, [@nested={0x4}]}, 0x18}}, 0x0) 10:40:54 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 10:40:54 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000000)=""/148, 0x51}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) [ 2656.001349][T27074] openvswitch: netlink: Flow get message rejected, Key attribute missing. 10:40:54 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 10:40:54 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a000000000000003f000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:40:55 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x3b) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000080)={0x200000000bd}) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f0000000100)) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x1000000000013) 10:40:55 executing program 4: r0 = shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x4000) shmdt(r0) [ 2656.799633][T24975] device bridge_slave_1 left promiscuous mode [ 2656.805874][T24975] bridge0: port 2(bridge_slave_1) entered disabled state 10:40:55 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000040000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:40:55 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 10:40:55 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000000)=""/148, 0x51}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) [ 2657.209359][T24975] device bridge_slave_0 left promiscuous mode [ 2657.215872][T24975] bridge0: port 1(bridge_slave_0) entered disabled state 10:40:56 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000004cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:40:56 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) setresuid(0x0, 0xfffe, 0xffffffffffffffff) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) 10:40:56 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000543000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:40:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000780)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000000c0)="77f843389e5439ca79e72476db2e0e68142d4c6cea50fb9c81fac1efec55fbda80b0386772af2a4cd7d3", 0x2a}, {&(0x7f0000000140)="16e974b75e049b47f62372967c9744c3b3f1241994d3", 0x16}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 10:40:56 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 2657.636818][T27115] binder: BINDER_SET_CONTEXT_MGR bad uid 65534 != 0 10:40:56 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000240)={0x1, {{0x2, 0x0, @multicast1}}}, 0x90) [ 2657.762452][T27115] binder: 27111:27115 ioctl 40046207 0 returned -1 10:40:56 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) setresuid(0x0, 0xfffe, 0xffffffffffffffff) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) 10:40:56 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000060000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:40:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r2, 0x42b, 0x0, 0x0, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'caif0\x00'}}}}}, 0x34}}, 0x0) [ 2658.548354][T27141] binder: BINDER_SET_CONTEXT_MGR bad uid 65534 != 0 [ 2658.618585][T27141] binder: 27138:27141 ioctl 40046207 0 returned -1 10:40:57 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000e80000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:40:57 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) setresuid(0x0, 0xfffe, 0xffffffffffffffff) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) 10:40:57 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000004cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:40:58 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000003580000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) [ 2659.331148][T27152] binder: BINDER_SET_CONTEXT_MGR bad uid 65534 != 0 [ 2659.404560][T27152] binder: 27149:27152 ioctl 40046207 0 returned -1 10:40:58 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) setresuid(0x0, 0xfffe, 0xffffffffffffffff) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) 10:40:58 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000081000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) [ 2660.046347][T27162] binder: BINDER_SET_CONTEXT_MGR bad uid 65534 != 0 [ 2660.125264][T27162] binder: 27161:27162 ioctl 40046207 0 returned -1 [ 2663.510822][T24975] bond1 (unregistering): Released all slaves [ 2663.636685][T24975] device hsr_slave_0 left promiscuous mode [ 2663.676271][T24975] device hsr_slave_1 left promiscuous mode [ 2663.754882][T24975] team0 (unregistering): Port device team_slave_1 removed [ 2663.774101][T24975] team0 (unregistering): Port device team_slave_0 removed [ 2663.785549][T24975] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2663.816617][T24975] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2663.897371][T24975] bond0 (unregistering): Released all slaves [ 2664.017100][T27142] Started in network mode [ 2664.021477][T27142] Own node identity , cluster identity 4711 [ 2664.027993][T27142] Failed to obtain node identity [ 2664.033461][T27142] Enabling of bearer rejected, failed to enable media [ 2664.042892][T27155] Started in network mode [ 2664.048492][T27155] Own node identity , cluster identity 4711 [ 2664.054419][T27155] Failed to obtain node identity 10:41:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x4000000020000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x10b, 0xfffffffffffffff7, 0x0, 0x0) r3 = dup3(r2, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000000)={0x2001}) 10:41:02 executing program 4: r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f0000000080)={0xef83, 0x5}) 10:41:02 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a00000000ffffdd86000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:41:02 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000004cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:41:02 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x1, 0x10) recvmsg(0xffffffffffffffff, 0x0, 0x40000001) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(r0, &(0x7f00000013c0)='syz1\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r3 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a0, &(0x7f0000000040)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000140)=0x101) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a1, &(0x7f0000000680)='&@[\x00') perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x18bbd54d, 0x0, 0x0, 0x128c, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x83eb, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20640, 0xe7, 0xf1c, 0x0, 0xdcb1}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000100)=0x7fff) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'bcsh0\x00', @broadcast}) [ 2664.060522][T27155] Enabling of bearer rejected, failed to enable media 10:41:02 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffc60, 0x0, 0x0, 0xfffffffffffffe2f) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000240)={0x0, 0x102000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x73, 0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000000c0)="0800b5055e0bcf") setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000)=0x5, 0x4) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:41:03 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000004788000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:41:03 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCAX25NOUID(r0, 0x89e2, &(0x7f0000000040)) 10:41:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_buf(r1, 0x29, 0x39, &(0x7f0000000900)="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", 0x118) connect$inet6(r1, &(0x7f0000000340)={0xa, 0x0, 0x0, @empty}, 0x1c) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_opts(r1, 0x29, 0x3b, 0x0, &(0x7f0000000040)) 10:41:03 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000004888000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:41:03 executing program 4: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000040)={0xa, 0x400000000004e22, 0x0, @remote}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000005140)={0x1}, 0x8) sendto$inet6(r0, &(0x7f00000003c0)="f8", 0x1, 0x4000000, 0x0, 0x0) 10:41:03 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000006488000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:41:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000ffd000/0x1000)=nil) 10:41:03 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x1, 0x10) recvmsg(0xffffffffffffffff, 0x0, 0x40000001) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(r0, &(0x7f00000013c0)='syz1\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r3 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a0, &(0x7f0000000040)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000140)=0x101) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a1, &(0x7f0000000680)='&@[\x00') perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x18bbd54d, 0x0, 0x0, 0x128c, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x83eb, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20640, 0xe7, 0xf1c, 0x0, 0xdcb1}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000100)=0x7fff) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'bcsh0\x00', @broadcast}) 10:41:03 executing program 4: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000040)={0xa, 0x400000000004e22, 0x0, @remote}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000005140)={0x1}, 0x8) sendto$inet6(r0, &(0x7f00000003c0)="f8", 0x1, 0x4000000, 0x0, 0x0) [ 2665.181840][T27192] debugfs: Directory '27192-5' with parent 'kvm' already present! 10:41:04 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x1, 0x10) recvmsg(0xffffffffffffffff, 0x0, 0x40000001) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(r0, &(0x7f00000013c0)='syz1\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r3 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a0, &(0x7f0000000040)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000140)=0x101) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a1, &(0x7f0000000680)='&@[\x00') perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x18bbd54d, 0x0, 0x0, 0x128c, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x83eb, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20640, 0xe7, 0xf1c, 0x0, 0xdcb1}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000100)=0x7fff) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'bcsh0\x00', @broadcast}) 10:41:04 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a00000000ffffa888000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:41:04 executing program 4: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000040)={0xa, 0x400000000004e22, 0x0, @remote}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000005140)={0x1}, 0x8) sendto$inet6(r0, &(0x7f00000003c0)="f8", 0x1, 0x4000000, 0x0, 0x0) 10:41:04 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffc60, 0x0, 0x0, 0xfffffffffffffe2f) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000240)={0x0, 0x102000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x73, 0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000000c0)="0800b5055e0bcf") setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000)=0x5, 0x4) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:41:04 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffc60, 0x0, 0x0, 0xfffffffffffffe2f) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000240)={0x0, 0x102000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x73, 0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000000c0)="0800b5055e0bcf") setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000)=0x5, 0x4) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:41:04 executing program 4: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000040)={0xa, 0x400000000004e22, 0x0, @remote}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000005140)={0x1}, 0x8) sendto$inet6(r0, &(0x7f00000003c0)="f8", 0x1, 0x4000000, 0x0, 0x0) 10:41:04 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a00000000ffffca88000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:41:04 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x1, 0x10) recvmsg(0xffffffffffffffff, 0x0, 0x40000001) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(r0, &(0x7f00000013c0)='syz1\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r3 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a0, &(0x7f0000000040)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000140)=0x101) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a1, &(0x7f0000000680)='&@[\x00') perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x18bbd54d, 0x0, 0x0, 0x128c, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x83eb, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20640, 0xe7, 0xf1c, 0x0, 0xdcb1}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000100)=0x7fff) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'bcsh0\x00', @broadcast}) 10:41:04 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x1, 0x10) recvmsg(0xffffffffffffffff, 0x0, 0x40000001) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(r0, &(0x7f00000013c0)='syz1\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r3 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a0, &(0x7f0000000040)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000140)=0x101) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a1, &(0x7f0000000680)='&@[\x00') perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x18bbd54d, 0x0, 0x0, 0x128c, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x83eb, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20640, 0xe7, 0xf1c, 0x0, 0xdcb1}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000100)=0x7fff) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'bcsh0\x00', @broadcast}) 10:41:04 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) 10:41:04 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000689000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:41:05 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffc60, 0x0, 0x0, 0xfffffffffffffe2f) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000240)={0x0, 0x102000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x73, 0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000000c0)="0800b5055e0bcf") setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000)=0x5, 0x4) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:41:05 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a00000000ffffff8d000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:41:05 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) 10:41:05 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a00000000008000a0000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:41:05 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffc60, 0x0, 0x0, 0xfffffffffffffe2f) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000240)={0x0, 0x102000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x73, 0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000000c0)="0800b5055e0bcf") setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000)=0x5, 0x4) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:41:05 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) 10:41:05 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x1, 0x10) recvmsg(0xffffffffffffffff, 0x0, 0x40000001) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(r0, &(0x7f00000013c0)='syz1\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r3 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a0, &(0x7f0000000040)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000140)=0x101) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a1, &(0x7f0000000680)='&@[\x00') perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x18bbd54d, 0x0, 0x0, 0x128c, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x83eb, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20640, 0xe7, 0xf1c, 0x0, 0xdcb1}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000100)=0x7fff) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'bcsh0\x00', @broadcast}) 10:41:05 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x1, 0x10) recvmsg(0xffffffffffffffff, 0x0, 0x40000001) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(r0, &(0x7f00000013c0)='syz1\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r3 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a0, &(0x7f0000000040)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000140)=0x101) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a1, &(0x7f0000000680)='&@[\x00') perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x18bbd54d, 0x0, 0x0, 0x128c, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x83eb, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20640, 0xe7, 0xf1c, 0x0, 0xdcb1}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000100)=0x7fff) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'bcsh0\x00', @broadcast}) 10:41:05 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a00000000000001a0000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:41:05 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) 10:41:06 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a00000000fffffff5000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:41:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000040)={@remote}, 0x14) 10:41:06 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffc60, 0x0, 0x0, 0xfffffffffffffe2f) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000240)={0x0, 0x102000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x73, 0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000000c0)="0800b5055e0bcf") setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000)=0x5, 0x4) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:41:06 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) exit_group(0x0) write$P9_RWRITE(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'bridge_slave_0\x00', 0xa110}) close(0xffffffffffffffff) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nullb0\x00', 0xc000, 0x0) preadv(r4, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) close(r2) 10:41:06 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a00000000000000ff000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:41:06 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000100)) 10:41:06 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffc60, 0x0, 0x0, 0xfffffffffffffe2f) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000240)={0x0, 0x102000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x73, 0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000000c0)="0800b5055e0bcf") setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000)=0x5, 0x4) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:41:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000040)={@remote}, 0x14) 10:41:06 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000100)) [ 2667.907251][T27323] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2667.915373][T27323] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:41:06 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000088a8ffff000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:41:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000040)={@remote}, 0x14) 10:41:06 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) exit_group(0x0) write$P9_RWRITE(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'bridge_slave_0\x00', 0xa110}) close(0xffffffffffffffff) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nullb0\x00', 0xc000, 0x0) preadv(r4, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) close(r2) 10:41:07 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000100)) 10:41:07 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000088caffff000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) [ 2668.479063][T27342] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2668.526399][T27342] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:41:07 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000086ddffff000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:41:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000040)={@remote}, 0x14) 10:41:07 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000100)) 10:41:07 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0000001c008102e00f80ecdb4cb9f207c804a00d00000088000afb0a0002000a0ada1b40d805000300c50083b8", 0x2e}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 10:41:07 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000f0ffff000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:41:07 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000180)=ANY=[@ANYBLOB="2c00000003060d01ff0488fffdffff57ffccad000c000100060d0010091900018cf6f000613e10319c6ce1dc42d86be002f9f93542707bdb7834db8be9937646ce65134f3119f35e31a95014cd856901a5493e789cd1a724afb701e512e1f7a29cf7d0a5d5398b8b42a7e83a0e4b53848a425631e00e416ec94a03d400ff7fc4d92fb7b691fb847e15aa3653c254d90a7f9ee5801409d213f36880e5fefde47e0b6ba57e49b7ed9b7df25ae4e6ec80d35f7733b3d40a33399677c50bb657a7bd9a67fbf05e1cd872f599b9f435d8c1e006504f1bcb9cf956a90161b4f0edde164ce17b6d4e69fd2a07361e6d1b755d5570b6d16368c47b7bba30f0a6f2"], 0x2c}}, 0x0) exit_group(0x0) write$P9_RWRITE(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'bridge_slave_0\x00', 0xa110}) close(0xffffffffffffffff) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nullb0\x00', 0xc000, 0x0) preadv(r4, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) close(r2) 10:41:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x132224) getsockopt$inet_int(r2, 0x0, 0x100000000000001, 0x0, &(0x7f0000000000)=0x1) clone(0x0, 0x0, 0x0, 0x0, 0x0) 10:41:07 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f00000006c0)=[{&(0x7f0000000940)="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", 0x1fa, 0x6}]) 10:41:08 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x1000009, 0x11, r0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b23004b0b00000000000000cc000000ac030000000000007e6dd282e0f34f8dfac0dc1695c4d6000010040002"], 0x1) [ 2669.220529][T27364] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2669.388645][T27376] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 10:41:08 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 10:41:08 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0000001c008102e00f80ecdb4cb9f207c804a00d00000088000afb0a0002000a0ada1b40d805000300c50083b8", 0x2e}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 10:41:08 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a000000008dffffff000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:41:08 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_MCE_KILL(0x35, 0x1, 0x8) [ 2669.472053][T27376] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2669.561662][T27388] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.5'. 10:41:08 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000180)=ANY=[@ANYBLOB="2c00000003060d01ff0488fffdffff57ffccad000c000100060d0010091900018cf6f000613e10319c6ce1dc42d86be002f9f93542707bdb7834db8be9937646ce65134f3119f35e31a95014cd856901a5493e789cd1a724afb701e512e1f7a29cf7d0a5d5398b8b42a7e83a0e4b53848a425631e00e416ec94a03d400ff7fc4d92fb7b691fb847e15aa3653c254d90a7f9ee5801409d213f36880e5fefde47e0b6ba57e49b7ed9b7df25ae4e6ec80d35f7733b3d40a33399677c50bb657a7bd9a67fbf05e1cd872f599b9f435d8c1e006504f1bcb9cf956a90161b4f0edde164ce17b6d4e69fd2a07361e6d1b755d5570b6d16368c47b7bba30f0a6f2"], 0x2c}}, 0x0) exit_group(0x0) write$P9_RWRITE(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'bridge_slave_0\x00', 0xa110}) close(0xffffffffffffffff) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nullb0\x00', 0xc000, 0x0) preadv(r4, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) close(r2) 10:41:08 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0000001c008102e00f80ecdb4cb9f207c804a00d00000088000afb0a0002000a0ada1b40d805000300c50083b8", 0x2e}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 10:41:08 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_VERSION(0xffffffffffffff9c, 0xc0106407, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x5c0}) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x20000000) 10:41:08 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a00000000f5ffffff000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:41:08 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={0x0}, 0xfa) [ 2669.845614][T27405] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2669.869166][T27406] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 10:41:08 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000020000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) [ 2669.937846][T27406] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 10:41:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f0000005b40), 0x40000000000014d, 0x0) 10:41:09 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0000001c008102e00f80ecdb4cb9f207c804a00d00000088000afb0a0002000a0ada1b40d805000300c50083b8", 0x2e}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 10:41:09 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x800, 0x0) ioctl$DRM_IOCTL_DMA(0xffffffffffffffff, 0xc0406429, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa5a, 0x0, &(0x7f0000000580)}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) r0 = syz_open_dev$dri(0x0, 0x0, 0x0) sendfile(r0, r0, &(0x7f0000000040), 0x5bd8) getgid() perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x0) pwritev(r2, &(0x7f0000000900)=[{&(0x7f0000000a00)="27ac07e90c4d39da18a3d6", 0xb}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x4, &(0x7f00000000c0), &(0x7f0000000100)=0x4) sendfile(r1, r1, 0x0, 0x2000010200f399) 10:41:09 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000030000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:41:09 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) sendmsg$inet6(r0, &(0x7f0000000240)={&(0x7f0000000040)={0xa, 0x4e22, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000000180)=[@hoplimit={{0x14}}], 0x18}, 0x0) [ 2670.557411][T27424] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.5'. 10:41:09 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/if_inet6\x00') preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/157, 0x9d}], 0x1, 0x400000000000) 10:41:09 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000050000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:41:09 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_VERSION(0xffffffffffffff9c, 0xc0106407, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x5c0}) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x20000000) 10:41:09 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000002f00)=[{&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000640)=[{&(0x7f0000000040)="b0", 0x1}], 0x1, &(0x7f0000000800)=[@sndinfo={0x20, 0x84, 0x2, {0xa}}], 0x20}], 0x1, 0x0) 10:41:09 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000060000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:41:09 executing program 2: perf_event_open(&(0x7f000025c000)={0x8, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:41:09 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="23000000420081aee405e9a4000000000000c6ff07d800400300"/35, 0x23}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000240)={0x0, 0xfffffffffffffff6, &(0x7f0000000300)=[{&(0x7f00000001c0)=""/101, 0x31}, {&(0x7f0000000280)=""/86, 0x24}, {&(0x7f0000001780)=""/4096, 0xfa4}, {&(0x7f0000001300)=""/136, 0x88}, {&(0x7f0000000040)=""/58, 0x468}, {&(0x7f0000001400)=""/233, 0xe9}, {&(0x7f0000000380)=""/252, 0x2}], 0x7, 0x0, 0x3a}, 0x0) 10:41:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f0000005b40), 0x40000000000014d, 0x0) 10:41:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/if_inet6\x00') preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/157, 0x9d}], 0x1, 0x400000000000) 10:41:10 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000070000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:41:10 executing program 5: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)={0x15, 0x65, 0xffff, 0x8001, 0x8, '9P2000.L'}, 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000000)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x26f) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) 10:41:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4000000000000007b1a00ff000000009500000000000000f319a0fe49f58cee14629c1c5d9cd3b6a1c1d739edf77a1837b0a95411ff44ad07980979958430acb242e757fda680796cb7a778e4ff4c7eaaf3815a4c01eebb5f00"/102], &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x2, 0x183, &(0x7f0000000000)=""/195}, 0x48) 10:41:10 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000080000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:41:10 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_VERSION(0xffffffffffffff9c, 0xc0106407, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x5c0}) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x20000000) 10:41:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/if_inet6\x00') preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/157, 0x9d}], 0x1, 0x400000000000) 10:41:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4000000000000007b1a00ff000000009500000000000000f319a0fe49f58cee14629c1c5d9cd3b6a1c1d739edf77a1837b0a95411ff44ad07980979958430acb242e757fda680796cb7a778e4ff4c7eaaf3815a4c01eebb5f00"/102], &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x2, 0x183, &(0x7f0000000000)=""/195}, 0x48) 10:41:10 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a00000000000b0000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:41:10 executing program 5: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)={0x15, 0x65, 0xffff, 0x8001, 0x8, '9P2000.L'}, 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000000)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x26f) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) 10:41:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/if_inet6\x00') preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/157, 0x9d}], 0x1, 0x400000000000) 10:41:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f0000005b40), 0x40000000000014d, 0x0) 10:41:11 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a00000000000d0000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:41:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4000000000000007b1a00ff000000009500000000000000f319a0fe49f58cee14629c1c5d9cd3b6a1c1d739edf77a1837b0a95411ff44ad07980979958430acb242e757fda680796cb7a778e4ff4c7eaaf3815a4c01eebb5f00"/102], &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x2, 0x183, &(0x7f0000000000)=""/195}, 0x48) 10:41:11 executing program 4: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x802, 0x0) bind$llc(r0, &(0x7f0000000040), 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) 10:41:11 executing program 5: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)={0x15, 0x65, 0xffff, 0x8001, 0x8, '9P2000.L'}, 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000000)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x26f) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) 10:41:11 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000280000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:41:11 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_VERSION(0xffffffffffffff9c, 0xc0106407, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x5c0}) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x20000000) 10:41:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4000000000000007b1a00ff000000009500000000000000f319a0fe49f58cee14629c1c5d9cd3b6a1c1d739edf77a1837b0a95411ff44ad07980979958430acb242e757fda680796cb7a778e4ff4c7eaaf3815a4c01eebb5f00"/102], &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x2, 0x183, &(0x7f0000000000)=""/195}, 0x48) 10:41:11 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a00000000003a0000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:41:11 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xe, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x64}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 10:41:11 executing program 5: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)={0x15, 0x65, 0xffff, 0x8001, 0x8, '9P2000.L'}, 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000000)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x26f) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) 10:41:12 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000600000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:41:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f0000005b40), 0x40000000000014d, 0x0) 10:41:12 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r0 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x0) 10:41:12 executing program 4: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x802, 0x0) bind$llc(r0, &(0x7f0000000040), 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) 10:41:12 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000f00000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:41:12 executing program 5: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x802, 0x0) bind$llc(r0, &(0x7f0000000040), 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) 10:41:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) recvmmsg(r0, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) 10:41:12 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000a00100000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:41:12 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_PIT(r1, 0x8070ae9f, &(0x7f00000000c0)) 10:41:13 executing program 5: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x802, 0x0) bind$llc(r0, &(0x7f0000000040), 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) 10:41:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) recvmmsg(r0, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) 10:41:13 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000300000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:41:13 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_PIT(r1, 0x8070ae9f, &(0x7f00000000c0)) 10:41:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) recvmmsg(r0, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) 10:41:13 executing program 4: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x802, 0x0) bind$llc(r0, &(0x7f0000000040), 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) 10:41:13 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000500000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:41:13 executing program 5: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x802, 0x0) bind$llc(r0, &(0x7f0000000040), 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) 10:41:13 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_PIT(r1, 0x8070ae9f, &(0x7f00000000c0)) 10:41:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) recvmmsg(r0, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) 10:41:13 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000430500000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:41:14 executing program 5: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{}, 0x0, 0x0, 0x0, {}, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 10:41:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) recvmmsg(r0, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) 10:41:14 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_PIT(r1, 0x8070ae9f, &(0x7f00000000c0)) 10:41:14 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000600000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:41:14 executing program 5: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{}, 0x0, 0x0, 0x0, {}, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 10:41:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) recvmmsg(r0, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) 10:41:14 executing program 4: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x802, 0x0) bind$llc(r0, &(0x7f0000000040), 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) 10:41:14 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000006c40)={0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0xfffffe4b) poll(&(0x7f00000006c0)=[{r0}], 0x1, 0x0) 10:41:14 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r0, 0x0, 0x4, 0x0, 0x0) connect$inet(r0, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x8}}, 0x10) 10:41:14 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000080600000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:41:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000000)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$int_in(r1, 0x5421, &(0x7f0000000080)=0x5) listen(r1, 0x0) accept(r1, 0x0, 0x0) 10:41:14 executing program 5: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{}, 0x0, 0x0, 0x0, {}, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 10:41:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) recvmmsg(r0, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) 10:41:15 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000890600000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:41:15 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, &(0x7f0000000040)=0x5, 0x4) 10:41:15 executing program 5: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{}, 0x0, 0x0, 0x0, {}, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 10:41:15 executing program 1: r0 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f00000001c0)={0x100004}, 0x10) write(r0, &(0x7f0000000040)="240000001a005f0214f9f407000904001100000000020000000200000800040003000000", 0x24) 10:41:15 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000700000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:41:15 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, &(0x7f0000000040)=0x5, 0x4) 10:41:15 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = timerfd_create(0x0, 0x0) readv(r0, &(0x7f00000001c0)=[{&(0x7f0000001400)=""/14, 0xe}], 0x20d) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{0x77359400}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x80000003, 0x8031, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = pkey_alloc(0x0, 0x0) readv(r0, &(0x7f00000013c0)=[{&(0x7f0000000480)=""/168, 0xa8}], 0x1) pkey_free(r1) 10:41:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e6178316737740000f200000000004300000000e4dbb77487e90104000000000040800000000000001b23004b0b00000000000000cc000000ac030000000000007e6dd282e0f34f8dfac0dc16959ad600001004000210040700000000000000"], 0x1) 10:41:15 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) socket$packet(0x11, 0x3, 0x300) sendmmsg(r0, &(0x7f0000000000)=[{{&(0x7f0000000040)=@vsock={0x28, 0xffffa888, 0xa, @any=0x3f000000, 0x4}, 0x80, 0x0}}], 0x1, 0x0) 10:41:15 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58034347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/130, 0x82, 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000001100)=ANY=[@ANYRES32], 0x419) recvmsg(0xffffffffffffffff, 0x0, 0x0) r2 = gettid() recvmmsg(r1, &(0x7f0000000ac0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f00000000c0)=""/199, 0xc7}], 0x1}}], 0x40003a0, 0x0, 0x0) tkill(r2, 0x14) 10:41:15 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, &(0x7f0000000040)=0x5, 0x4) 10:41:15 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000060800000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:41:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e6178316737740000f200000000004300000000e4dbb77487e90104000000000040800000000000001b23004b0b00000000000000cc000000ac030000000000007e6dd282e0f34f8dfac0dc16959ad600001004000210040700000000000000"], 0x1) 10:41:15 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000b00000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:41:15 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, &(0x7f0000000040)=0x5, 0x4) 10:41:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e6178316737740000f200000000004300000000e4dbb77487e90104000000000040800000000000001b23004b0b00000000000000cc000000ac030000000000007e6dd282e0f34f8dfac0dc16959ad600001004000210040700000000000000"], 0x1) 10:41:15 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58034347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/130, 0x82, 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000001100)=ANY=[@ANYRES32], 0x419) recvmsg(0xffffffffffffffff, 0x0, 0x0) r2 = gettid() recvmmsg(r1, &(0x7f0000000ac0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f00000000c0)=""/199, 0xc7}], 0x1}}], 0x40003a0, 0x0, 0x0) tkill(r2, 0x14) 10:41:15 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) socket$packet(0x11, 0x3, 0x300) sendmmsg(r0, &(0x7f0000000000)=[{{&(0x7f0000000040)=@vsock={0x28, 0xffffa888, 0xa, @any=0x3f000000, 0x4}, 0x80, 0x0}}], 0x1, 0x0) 10:41:16 executing program 3: write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000480)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000380)=""/121, 0xfffffffffffffeca, 0x0, 0x80}, 0x120) connect$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f00000001c0), 0x0) personality(0xfffffffffffffffc) add_key$keyring(&(0x7f00000009c0)='keyring\x00', &(0x7f0000000a00)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000780)='keyring\x00', &(0x7f00000007c0)={'syz', 0x0}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) 10:41:16 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000000d00000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:41:16 executing program 2: syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x40000fffffd, 0x0) 10:41:16 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e6178316737740000f200000000004300000000e4dbb77487e90104000000000040800000000000001b23004b0b00000000000000cc000000ac030000000000007e6dd282e0f34f8dfac0dc16959ad600001004000210040700000000000000"], 0x1) 10:41:16 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) socket$packet(0x11, 0x3, 0x300) sendmmsg(r0, &(0x7f0000000000)=[{{&(0x7f0000000040)=@vsock={0x28, 0xffffa888, 0xa, @any=0x3f000000, 0x4}, 0x80, 0x0}}], 0x1, 0x0) 10:41:16 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58034347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/130, 0x82, 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000001100)=ANY=[@ANYRES32], 0x419) recvmsg(0xffffffffffffffff, 0x0, 0x0) r2 = gettid() recvmmsg(r1, &(0x7f0000000ac0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f00000000c0)=""/199, 0xc7}], 0x1}}], 0x40003a0, 0x0, 0x0) tkill(r2, 0x14) 10:41:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xffffffffffffff44}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="020a000007000000000020000000854105001a000000000000d74619ed1307d89524429adc542c0200000012aac700"/56], 0x38}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="020100090e000000030000000000000405000600000000000a000000000000040000000000000000000000210000000000010000000000000200010001000500000000000a004872bbb6896209000055783d49310e528587d7b81091f01309e339be593f7710aa000001001700410000"], 0x70}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x3ef, 0x0) 10:41:16 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) socket$packet(0x11, 0x3, 0x300) sendmmsg(r0, &(0x7f0000000000)=[{{&(0x7f0000000040)=@vsock={0x28, 0xffffa888, 0xa, @any=0x3f000000, 0x4}, 0x80, 0x0}}], 0x1, 0x0) 10:41:16 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @local}, 0xc) semget(0x1, 0x0, 0x0) dup2(r0, r1) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, 0x0) 10:41:16 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000800e00000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:41:16 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58034347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/130, 0x82, 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000001100)=ANY=[@ANYRES32], 0x419) recvmsg(0xffffffffffffffff, 0x0, 0x0) r2 = gettid() recvmmsg(r1, &(0x7f0000000ac0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f00000000c0)=""/199, 0xc7}], 0x1}}], 0x40003a0, 0x0, 0x0) tkill(r2, 0x14) 10:41:17 executing program 3: write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000480)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000380)=""/121, 0xfffffffffffffeca, 0x0, 0x80}, 0x120) connect$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f00000001c0), 0x0) personality(0xfffffffffffffffc) add_key$keyring(&(0x7f00000009c0)='keyring\x00', &(0x7f0000000a00)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000780)='keyring\x00', &(0x7f00000007c0)={'syz', 0x0}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) 10:41:17 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000002800000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:41:17 executing program 5: write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000480)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000380)=""/121, 0xfffffffffffffeca, 0x0, 0x80}, 0x120) connect$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f00000001c0), 0x0) personality(0xfffffffffffffffc) add_key$keyring(&(0x7f00000009c0)='keyring\x00', &(0x7f0000000a00)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000780)='keyring\x00', &(0x7f00000007c0)={'syz', 0x0}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) 10:41:17 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @local}, 0xc) semget(0x1, 0x0, 0x0) dup2(r0, r1) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, 0x0) 10:41:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xffffffffffffff44}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="020a000007000000000020000000854105001a000000000000d74619ed1307d89524429adc542c0200000012aac700"/56], 0x38}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="020100090e000000030000000000000405000600000000000a000000000000040000000000000000000000210000000000010000000000000200010001000500000000000a004872bbb6896209000055783d49310e528587d7b81091f01309e339be593f7710aa000001001700410000"], 0x70}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x3ef, 0x0) 10:41:17 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000803500000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:41:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xffffffffffffff44}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="020a000007000000000020000000854105001a000000000000d74619ed1307d89524429adc542c0200000012aac700"/56], 0x38}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="020100090e000000030000000000000405000600000000000a000000000000040000000000000000000000210000000000010000000000000200010001000500000000000a004872bbb6896209000055783d49310e528587d7b81091f01309e339be593f7710aa000001001700410000"], 0x70}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x3ef, 0x0) 10:41:17 executing program 3: write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000480)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000380)=""/121, 0xfffffffffffffeca, 0x0, 0x80}, 0x120) connect$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f00000001c0), 0x0) personality(0xfffffffffffffffc) add_key$keyring(&(0x7f00000009c0)='keyring\x00', &(0x7f0000000a00)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000780)='keyring\x00', &(0x7f00000007c0)={'syz', 0x0}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) 10:41:17 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000003a00000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:41:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xffffffffffffff44}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="020a000007000000000020000000854105001a000000000000d74619ed1307d89524429adc542c0200000012aac700"/56], 0x38}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="020100090e000000030000000000000405000600000000000a000000000000040000000000000000000000210000000000010000000000000200010001000500000000000a004872bbb6896209000055783d49310e528587d7b81091f01309e339be593f7710aa000001001700410000"], 0x70}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x3ef, 0x0) 10:41:17 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @local}, 0xc) semget(0x1, 0x0, 0x0) dup2(r0, r1) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, 0x0) 10:41:17 executing program 5: write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000480)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000380)=""/121, 0xfffffffffffffeca, 0x0, 0x80}, 0x120) connect$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f00000001c0), 0x0) personality(0xfffffffffffffffc) add_key$keyring(&(0x7f00000009c0)='keyring\x00', &(0x7f0000000a00)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000780)='keyring\x00', &(0x7f00000007c0)={'syz', 0x0}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) 10:41:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xffffffffffffff44}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="020a000007000000000020000000854105001a000000000000d74619ed1307d89524429adc542c0200000012aac700"/56], 0x38}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="020100090e000000030000000000000405000600000000000a000000000000040000000000000000000000210000000000010000000000000200010001000500000000000a004872bbb6896209000055783d49310e528587d7b81091f01309e339be593f7710aa000001001700410000"], 0x70}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x3ef, 0x0) 10:41:17 executing program 3: write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000480)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000380)=""/121, 0xfffffffffffffeca, 0x0, 0x80}, 0x120) connect$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f00000001c0), 0x0) personality(0xfffffffffffffffc) add_key$keyring(&(0x7f00000009c0)='keyring\x00', &(0x7f0000000a00)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000780)='keyring\x00', &(0x7f00000007c0)={'syz', 0x0}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) 10:41:17 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @local}, 0xc) semget(0x1, 0x0, 0x0) dup2(r0, r1) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, 0x0) 10:41:17 executing program 5: write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000480)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000380)=""/121, 0xfffffffffffffeca, 0x0, 0x80}, 0x120) connect$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f00000001c0), 0x0) personality(0xfffffffffffffffc) add_key$keyring(&(0x7f00000009c0)='keyring\x00', &(0x7f0000000a00)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000780)='keyring\x00', &(0x7f00000007c0)={'syz', 0x0}, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) 10:41:17 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000003f00000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:41:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xffffffffffffff44}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="020a000007000000000020000000854105001a000000000000d74619ed1307d89524429adc542c0200000012aac700"/56], 0x38}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="020100090e000000030000000000000405000600000000000a000000000000040000000000000000000000210000000000010000000000000200010001000500000000000a004872bbb6896209000055783d49310e528587d7b81091f01309e339be593f7710aa000001001700410000"], 0x70}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x3ef, 0x0) 10:41:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xffffffffffffff44}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="020a000007000000000020000000854105001a000000000000d74619ed1307d89524429adc542c0200000012aac700"/56], 0x38}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="020100090e000000030000000000000405000600000000000a000000000000040000000000000000000000210000000000010000000000000200010001000500000000000a004872bbb6896209000055783d49310e528587d7b81091f01309e339be593f7710aa000001001700410000"], 0x70}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x3ef, 0x0) 10:41:18 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @local}, 0xc) semget(0x1, 0x0, 0x0) dup2(r0, r1) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, 0x0) 10:41:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = semget(0x3, 0x1, 0x420) semop(r0, &(0x7f0000000040)=[{0x0, 0x9, 0x1000}, {0x2, 0x3f, 0x650d35dfdf0a2e9c}, {}, {0x3, 0x0, 0x800}, {0x3, 0x4, 0x1800}, {0x7, 0x0, 0x800}, {0x4, 0x0, 0x800}], 0x7) getegid() mount$fuseblk(0x0, &(0x7f0000000c40)='./file0/file0\x00', 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="030000000889288c32a7ca59a7db3c555e8bc96877000042e25de7f3505bcb"], 0xf) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000100)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000480)='./file0\x00', 0x0) 10:41:18 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000004000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:41:18 executing program 5: clone(0xa047fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x1e) wait4(0x0, 0x0, 0x840000002, 0x0) getpriority(0x0, r0) 10:41:18 executing program 4: memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000140)=@nat={'nat\x00', 0x19, 0x4, 0x4, [0x20000300, 0x0, 0x0, 0x20000dcc, 0x20001950], 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="000000c3"]}, 0x7c) ptrace$setregs(0xf, r0, 0x0, &(0x7f00000002c0)="6fd30f39ce") ptrace$getregset(0x4204, r0, 0x2, &(0x7f0000000280)={0x0}) 10:41:18 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @local}, 0xc) semget(0x1, 0x0, 0x0) dup2(r0, r1) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, 0x0) 10:41:18 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000054300000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:41:18 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af30, &(0x7f0000000280)=ANY=[]) 10:41:18 executing program 5: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x24) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, 'w'}], 0x18}}], 0x1, 0x0) 10:41:18 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @local}, 0xc) semget(0x1, 0x0, 0x0) dup2(r0, r1) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, 0x0) 10:41:18 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000884700000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:41:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000200)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000b40)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x1, [{{0xa, 0x0, 0x0, @loopback}}]}, 0x110) 10:41:18 executing program 5: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x24) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, 'w'}], 0x18}}], 0x1, 0x0) 10:41:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = semget(0x3, 0x1, 0x420) semop(r0, &(0x7f0000000040)=[{0x0, 0x9, 0x1000}, {0x2, 0x3f, 0x650d35dfdf0a2e9c}, {}, {0x3, 0x0, 0x800}, {0x3, 0x4, 0x1800}, {0x7, 0x0, 0x800}, {0x4, 0x0, 0x800}], 0x7) getegid() mount$fuseblk(0x0, &(0x7f0000000c40)='./file0/file0\x00', 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="030000000889288c32a7ca59a7db3c555e8bc96877000042e25de7f3505bcb"], 0xf) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000100)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000480)='./file0\x00', 0x0) 10:41:19 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000884800000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:41:19 executing program 3: syz_read_part_table(0x0, 0x2, &(0x7f0000000280)=[{&(0x7f0000000000)="c9", 0x1}, {0x0, 0x0, 0x1ea0400000000000}]) 10:41:19 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x3, 0x0) listen(0xffffffffffffffff, 0x0) sendto$inet6(r2, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r2, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 10:41:19 executing program 5: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x24) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, 'w'}], 0x18}}], 0x1, 0x0) 10:41:19 executing program 4: memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000140)=@nat={'nat\x00', 0x19, 0x4, 0x4, [0x20000300, 0x0, 0x0, 0x20000dcc, 0x20001950], 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="000000c3"]}, 0x7c) ptrace$setregs(0xf, r0, 0x0, &(0x7f00000002c0)="6fd30f39ce") ptrace$getregset(0x4204, r0, 0x2, &(0x7f0000000280)={0x0}) 10:41:19 executing program 3: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000480)=[{0x0}, {0x0}, {&(0x7f0000000400)}], 0x3}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaae53, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000100000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x5cf, 0x400}], 0x1, 0x0) 10:41:19 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000006000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) [ 2680.484781][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:41:19 executing program 5: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x24) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, 'w'}], 0x18}}], 0x1, 0x0) 10:41:19 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x3, 0x0) listen(0xffffffffffffffff, 0x0) sendto$inet6(r2, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r2, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 10:41:19 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000886400000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:41:19 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x3, 0x0) listen(0xffffffffffffffff, 0x0) sendto$inet6(r2, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r2, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) [ 2681.091085][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2681.243034][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:41:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = semget(0x3, 0x1, 0x420) semop(r0, &(0x7f0000000040)=[{0x0, 0x9, 0x1000}, {0x2, 0x3f, 0x650d35dfdf0a2e9c}, {}, {0x3, 0x0, 0x800}, {0x3, 0x4, 0x1800}, {0x7, 0x0, 0x800}, {0x4, 0x0, 0x800}], 0x7) getegid() mount$fuseblk(0x0, &(0x7f0000000c40)='./file0/file0\x00', 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="030000000889288c32a7ca59a7db3c555e8bc96877000042e25de7f3505bcb"], 0xf) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000100)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000480)='./file0\x00', 0x0) 10:41:20 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x3, 0x0) listen(0xffffffffffffffff, 0x0) sendto$inet6(r2, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r2, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 10:41:20 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a00000000000e8000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:41:20 executing program 4: memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000140)=@nat={'nat\x00', 0x19, 0x4, 0x4, [0x20000300, 0x0, 0x0, 0x20000dcc, 0x20001950], 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="000000c3"]}, 0x7c) ptrace$setregs(0xf, r0, 0x0, &(0x7f00000002c0)="6fd30f39ce") ptrace$getregset(0x4204, r0, 0x2, &(0x7f0000000280)={0x0}) 10:41:20 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000358000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:41:20 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x3, 0x0) listen(0xffffffffffffffff, 0x0) sendto$inet6(r2, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r2, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) [ 2681.552197][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:41:20 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000008100000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:41:20 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x3, 0x0) listen(0xffffffffffffffff, 0x0) sendto$inet6(r2, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r2, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) [ 2681.828178][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:41:20 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000478800000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) [ 2681.990986][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:41:20 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x3, 0x0) listen(0xffffffffffffffff, 0x0) sendto$inet6(r2, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r2, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 10:41:21 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000488800000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:41:21 executing program 4: memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000140)=@nat={'nat\x00', 0x19, 0x4, 0x4, [0x20000300, 0x0, 0x0, 0x20000dcc, 0x20001950], 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="000000c3"]}, 0x7c) ptrace$setregs(0xf, r0, 0x0, &(0x7f00000002c0)="6fd30f39ce") ptrace$getregset(0x4204, r0, 0x2, &(0x7f0000000280)={0x0}) [ 2682.362036][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:41:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = semget(0x3, 0x1, 0x420) semop(r0, &(0x7f0000000040)=[{0x0, 0x9, 0x1000}, {0x2, 0x3f, 0x650d35dfdf0a2e9c}, {}, {0x3, 0x0, 0x800}, {0x3, 0x4, 0x1800}, {0x7, 0x0, 0x800}, {0x4, 0x0, 0x800}], 0x7) getegid() mount$fuseblk(0x0, &(0x7f0000000c40)='./file0/file0\x00', 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="030000000889288c32a7ca59a7db3c555e8bc96877000042e25de7f3505bcb"], 0xf) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000100)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000480)='./file0\x00', 0x0) 10:41:21 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000648800000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:41:21 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a0000000000068900000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) 10:41:21 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x3, 0x0) listen(0xffffffffffffffff, 0x0) sendto$inet6(r2, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r2, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 10:41:21 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="cd390b081bf244b07845154a86dd60a2fbe800383a000000000000f000000000ffffe0000002ff0200000000000000000000000000010200907800000000609033df00001100ff02000000000000000000000000090000000000000000000000000000000001fca967e17f7910105e0eff70b8f0cb38c6833f9499b190991fe1ad19b0fc296bee0f5a88d2d4cd70a23267fca1502037df3469f39a07ab136601dbbf0de7a64fcbd14fa4709dd3b939689a37677e3e85b245e0e49e6d"], 0x0) [ 2682.915691][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2683.078008][ C0] BUG: spinlock recursion on CPU#0, syz-executor.1/27913 [ 2683.085078][ C0] lock: 0xffff88806f8363c8, .magic: dead4ead, .owner: syz-executor.1/27913, .owner_cpu: 0 [ 2683.095246][ C0] CPU: 0 PID: 27913 Comm: syz-executor.1 Not tainted 5.3.0-rc1-next-20190724 #50 [ 2683.104362][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2683.114464][ C0] Call Trace: [ 2683.117750][ C0] [ 2683.120615][ C0] dump_stack+0x172/0x1f0 [ 2683.124955][ C0] spin_dump.cold+0x81/0xe6 [ 2683.129476][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2683.135726][ C0] do_raw_spin_lock+0x252/0x2e0 [ 2683.140846][ C0] ? rwlock_bug.part.0+0x90/0x90 [ 2683.145786][ C0] ? lock_acquire+0x190/0x410 [ 2683.150474][ C0] ? release_sock+0x20/0x1c0 [ 2683.155073][ C0] ? __kasan_check_read+0x11/0x20 [ 2683.160112][ C0] _raw_spin_lock_bh+0x3b/0x50 [ 2683.164886][ C0] ? release_sock+0x20/0x1c0 [ 2683.169480][ C0] release_sock+0x20/0x1c0 [ 2683.174004][ C0] wait_on_pending_writer+0x20f/0x420 [ 2683.179390][ C0] ? tls_init+0x560/0x560 [ 2683.183732][ C0] ? prepare_to_wait_exclusive+0x320/0x320 [ 2683.189633][ C0] ? mark_lock+0xc0/0x11e0 [ 2683.194078][ C0] ? lock_downgrade+0x920/0x920 [ 2683.198950][ C0] tls_sk_proto_cleanup+0x2c5/0x3e0 [ 2683.204157][ C0] ? wait_on_pending_writer+0x420/0x420 [ 2683.209712][ C0] ? trace_hardirqs_on+0x67/0x240 [ 2683.214740][ C0] ? drain_stock.isra.0+0x1cb/0x240 [ 2683.219948][ C0] tls_sk_proto_unhash+0x90/0x3f0 [ 2683.225081][ C0] tcp_set_state+0x5b9/0x7d0 [ 2683.229687][ C0] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2683.235954][ C0] ? __sk_mem_reduce_allocated+0x190/0x560 [ 2683.241792][ C0] ? tcp_alloc_md5sig_pool+0x4a0/0x4a0 [ 2683.247265][ C0] ? __sk_mem_reclaim+0x55/0x70 [ 2683.252130][ C0] ? tcp_write_queue_purge+0x5d8/0x1310 [ 2683.257697][ C0] tcp_done+0xe2/0x320 [ 2683.261799][ C0] tcp_reset+0x132/0x500 [ 2683.266057][ C0] tcp_validate_incoming+0xa2d/0x1660 [ 2683.271448][ C0] tcp_rcv_established+0x6b5/0x1e70 [ 2683.276657][ C0] ? tcp_data_queue+0x4860/0x4860 [ 2683.281767][ C0] tcp_v6_do_rcv+0x41e/0x12c0 [ 2683.286468][ C0] tcp_v6_rcv+0x31f1/0x3500 [ 2683.291006][ C0] ? tcp_v6_syn_recv_sock+0x2290/0x2290 [ 2683.296565][ C0] ip6_protocol_deliver_rcu+0x2fe/0x1660 [ 2683.302221][ C0] ip6_input_finish+0x84/0x170 [ 2683.306997][ C0] ip6_input+0xe4/0x3f0 [ 2683.311163][ C0] ? ip6_input_finish+0x170/0x170 [ 2683.316202][ C0] ? ip6_protocol_deliver_rcu+0x1660/0x1660 [ 2683.322103][ C0] ? lock_downgrade+0x920/0x920 [ 2683.326964][ C0] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2683.333225][ C0] ip6_rcv_finish+0x1de/0x2f0 [ 2683.337838][ T3902] kobject: 'loop4' (000000007525b502): kobject_uevent_env [ 2683.337915][ C0] ipv6_rcv+0x10e/0x420 [ 2683.345053][ T3902] kobject: 'loop4' (000000007525b502): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2683.349176][ C0] ? ip6_rcv_core.isra.0+0x1bb0/0x1bb0 [ 2683.349188][ C0] ? __kasan_check_read+0x11/0x20 [ 2683.349200][ C0] ? mark_lock+0xc0/0x11e0 [ 2683.349214][ C0] ? ip6_rcv_finish_core.isra.0+0x560/0x560 [ 2683.349229][ C0] ? ip6_rcv_core.isra.0+0x1bb0/0x1bb0 [ 2683.349243][ C0] __netif_receive_skb_one_core+0x113/0x1a0 [ 2683.349256][ C0] ? __netif_receive_skb_core+0x3060/0x3060 [ 2683.349276][ C0] ? lock_acquire+0x190/0x410 [ 2683.402133][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2683.408393][ C0] __netif_receive_skb+0x2c/0x1d0 [ 2683.413443][ C0] process_backlog+0x206/0x750 [ 2683.417152][ T3902] kobject: 'loop3' (000000003b73ea2b): kobject_uevent_env [ 2683.418384][ C0] ? net_rx_action+0x27b/0x10c0 [ 2683.418402][ C0] ? lockdep_hardirqs_on+0x19e/0x5d0 [ 2683.418421][ C0] net_rx_action+0x508/0x10c0 [ 2683.430032][ T3902] kobject: 'loop3' (000000003b73ea2b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2683.430393][ C0] ? napi_complete_done+0x4b0/0x4b0 [ 2683.455672][ C0] __do_softirq+0x262/0x98c [ 2683.460198][ C0] ? inet_csk_listen_stop+0x1bc/0x850 [ 2683.465580][ C0] do_softirq_own_stack+0x2a/0x40 [ 2683.470777][ C0] [ 2683.473811][ C0] do_softirq.part.0+0x11a/0x170 [ 2683.478756][ C0] __local_bh_enable_ip+0x211/0x270 [ 2683.483971][ C0] inet_csk_listen_stop+0x1e0/0x850 [ 2683.489189][ C0] tcp_close+0xd5b/0x10e0 [ 2683.493536][ C0] ? ip_mc_drop_socket+0x211/0x270 [ 2683.498741][ C0] ? down_write+0xdf/0x150 [ 2683.503164][ C0] inet_release+0xed/0x200 [ 2683.507594][ C0] inet6_release+0x53/0x80 [ 2683.512017][ C0] __sock_release+0xce/0x280 [ 2683.516615][ C0] sock_close+0x1e/0x30 [ 2683.520776][ C0] __fput+0x2ff/0x890 [ 2683.524760][ C0] ? __sock_release+0x280/0x280 [ 2683.529615][ C0] ____fput+0x16/0x20 [ 2683.533602][ C0] task_work_run+0x145/0x1c0 [ 2683.538294][ C0] exit_to_usermode_loop+0x316/0x380 [ 2683.543587][ C0] do_syscall_64+0x65f/0x760 [ 2683.548201][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2683.554094][ C0] RIP: 0033:0x413511 [ 2683.558120][ C0] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2683.579184][ C0] RSP: 002b:00007fff90accc90 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 2683.587647][ C0] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000413511 [ 2683.595657][ C0] RDX: 0000001b2ff20000 RSI: ffffffff87378f35 RDI: 0000000000000003 [ 2683.603639][ C0] RBP: 0000000000000001 R08: ffffffff8100a291 R09: 000000004901e87d [ 2683.612203][ C0] R10: 00007fff90accd70 R11: 0000000000000293 R12: 000000000075c9a0 [ 2683.620174][ C0] R13: 000000000075c9a0 R14: 0000000000761460 R15: ffffffffffffffff [ 2683.628149][ C0] ? do_syscall_64+0xa1/0x760 [ 2683.632821][ C0] ? xas_find+0x675/0x8c0